Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 20:56
Static task
static1
Behavioral task
behavioral1
Sample
64be4816d089f1fd7a7707e5f0dd5577_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
64be4816d089f1fd7a7707e5f0dd5577_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
64be4816d089f1fd7a7707e5f0dd5577_JaffaCakes118.html
-
Size
17KB
-
MD5
64be4816d089f1fd7a7707e5f0dd5577
-
SHA1
2de02a7c7dfb39d664f503b85ce7cbed6ed060ee
-
SHA256
f27d91ab259f4992e6ccc8b4b804ce4b6076b698b95e27615a62fbaa22b551e1
-
SHA512
c6ff31fcd828e742b36d6f044b581e4337c1eb6dda7da0362bf6775ab55165fd8e2ccc06ed5e3d6ec12da87e24be0ddd40aee132ac8b86d476cb57d1cd76fb4d
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAI34XzUnjBh5D82qDB8:SIMd0I5nvHRsv54xDB8
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A5B59E31-17B4-11EF-B238-4AE872E97954} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422486879" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1896 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1896 iexplore.exe 1896 iexplore.exe 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1896 wrote to memory of 2872 1896 iexplore.exe IEXPLORE.EXE PID 1896 wrote to memory of 2872 1896 iexplore.exe IEXPLORE.EXE PID 1896 wrote to memory of 2872 1896 iexplore.exe IEXPLORE.EXE PID 1896 wrote to memory of 2872 1896 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\64be4816d089f1fd7a7707e5f0dd5577_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1896 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53806facd938329fc5fdc9d2b9cd6fdfb
SHA1b262d25fe09ff09415dac9865b2ee213012cafef
SHA256646beb190f73ae65d22e2dc2853c2a45a30aa1919b1cdf464a87524af1417f7b
SHA512f5ad81a99b7be8cb78b4ee7e4c77b0bcefbeb407143a9e10ca9dbeee052b99f2fe30bd644cc94338d5d07f90879759c596181681cd8f35ac2155f8da8745a085
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b39e2bc72f23dcbe3b1ce9ef23a6d1ba
SHA1451c70ec6d6ac14a714e389b9970524bb54b82d2
SHA256917de2ef3fb630adb8a6079165b6c73344b72cb3622c29fd18d22bc4831237e6
SHA5125241b5fdb25b5dcd26ed38f0bca60e6806c51ed4f8f45997b8af016b314d57ba7750b5518dc6d3f33c6244f799637be04d421c421e7cd1c0714a0464284f9aa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50df7dcc2ff726a8ef019cb6583e03d46
SHA158128c2beae50defd5e1765d600ba0a179a0e375
SHA256c7c86c5d95e5648c4612bbbea235f29c911b5cfa8442d3d691a24c166da496e0
SHA5120209ebf53a90cdfde01b1ca76742914477ff8db9cc9c5eab12ba23904c8945465e52b30b9feee4f67d038138723507e74af9aa8cb1ccf08958aedb0637cb70b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596b00ab1ad223c430d4028530ca9aa57
SHA14d69cf23106a3ea3034343120cc37d5e7fe7f31e
SHA256fdc743de12db104eaa8bc01703aaeff6398a006a47470ab01d8003b9e7533478
SHA51292d26f64ee65b6fdef48ef502d5921f7140d92ade2dce3547ed7272b58d8ce0c35349e255f3981ebbbfcd912b13d92f1af3af1ea794f0bf231de7bd68f5b6bba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520d128ce98a3a68540769717f3ef86a7
SHA1bcf66128a57ac7e61a519ef72e647e34e3f54192
SHA256e00b4a9a2256d6d8debcaf65dd96761ea980e5f977628f5d50b9cd3a3817ee1f
SHA5124590ee86bd1cd77baff0c800b3fb2de23a47db4b967b55083cecdb79a4be45e45843d7d31586c7d5c96a87039bd774dd291918535ff1b79865f5676a1976288f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5020cd3f4dbbf902aa670dca47fea41eb
SHA13f1804e923c1a08516941548a6dd13d5c2dd95b2
SHA256e8bfd581ce9ebf3a306b119cf3261a795cd4c0297a80a89f3b88fdfa6de78183
SHA5128c14ed7b948dc7b3d259a48a8f2f77ac869f95c61e7780202fc3435c0a780748e81e639a54c68a81444be7ab6b235163eaa2f340e0b122ed81096791fa627aa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599e96a5ff9822c8ac85c5c30592b8e94
SHA12485f6c640cc33720e5b5d5fef62208a5ff95896
SHA2560e9bed5f59b1ddb09761c9e4ab434517d73320da5f74200e4305ed27a162ad54
SHA512a50f46a830058ddfa51c76a23e7189314d27b7ca84cef6524241ca10af1fd3bdc6b764214fc52fc2a8e7119fce9c7acab9e5e27a67aef054745032f34c1dcbde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f08aa218eb76451ac3282f96f36a6a40
SHA12b8c87210803d6688531d0d39830001b25ce7e0d
SHA25634a7e12cfcb80e13ca936f99f0204d05e86bbab56d1566e08315bdb56ff67169
SHA512486dd0bbceaf3096d543758e8e66e0ebde48834bc177db4d11e28a291faa6e1210eb4a50e5b5089c62a7c919ac4a7e548d5fdfa046f041c3a2bb52098c5f1beb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e707094c9b39d2fd10490d103d932aef
SHA1e1a3adcbc09fe33641769b096ab42246d6f14a1a
SHA256b0d4420f544c2d71d0fbc5e73146db0ec30a5b211e11a4dcb2dac34f2e903321
SHA512824e0cd665235209b500d2729a9e3adb47ab7d731c93c3803bbc7a3d28683b80f14997966b7c2c75e52be7b7749ad50ed0af106e443f14560c467609cf91c85a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a