Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 22:38
Static task
static1
Behavioral task
behavioral1
Sample
68deafadf3670d7492c0ec942be7e496_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
68deafadf3670d7492c0ec942be7e496_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
68deafadf3670d7492c0ec942be7e496_JaffaCakes118.html
-
Size
34KB
-
MD5
68deafadf3670d7492c0ec942be7e496
-
SHA1
d72289c336b510c446669ceedc2582f191efcf1a
-
SHA256
37d419b87cb9e4f38c5b30df90788d38c8d35c6de02abd9f656369c644d4b284
-
SHA512
6daa9240f72a4bade1b978cc3fd8903fd74a72fb234b11fdf3d5b77e986db3b3b5120ebc74d68eedbef87ce12aada69ade87d391bb8ccefb0626599f90ebe09e
-
SSDEEP
768:FAW1DuQjIPOR76w9taEUKFmxUjldq7v7vkmkyJ:FAW1DuQjIu7JthmxUjldq7v7vkmkC
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FD65D9B1-188B-11EF-AE27-76C100907C10} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422579367" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1752 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1752 iexplore.exe 1752 iexplore.exe 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1752 wrote to memory of 3060 1752 iexplore.exe IEXPLORE.EXE PID 1752 wrote to memory of 3060 1752 iexplore.exe IEXPLORE.EXE PID 1752 wrote to memory of 3060 1752 iexplore.exe IEXPLORE.EXE PID 1752 wrote to memory of 3060 1752 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68deafadf3670d7492c0ec942be7e496_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1752 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da71516c33561fd536f4cd4402053dcc
SHA1cd72e09e7458324a2a44d190fbc5c998685ce74c
SHA256ac1015dd6e7cca5db156b52c431a47a5b692ce8ffae92c3fa0c40d80882291e0
SHA512bf954819bfb0b8745fb1ab0cbf7c2ed8735fd331fb0964dc75ce42de9fed5ec024f5b8c3ec00e9f4d097ae68d9c6dc67dad0fa4277a3078cbb1d2dde9261316e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b51ca17bb1699fbabac5a8767173119
SHA1de667babd19464f37a2508fd611cf9cef5c58bf5
SHA256081db11874583f2209e6dc7e9700def23ec335e148938611c101cfc6ed943e69
SHA5122a08e4424c8f1b400628748a0b64cbe817c2356cad6b47b0e34f8bde07ec6ca3d4b26375df8f088d4bebc4cc4b47bdbaae9ae9544138858a177e5f167b3d3cde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5051784a74c5b89c61efaac065969d708
SHA1038b3e983419407752110918025987bf89b64a42
SHA2564d7d6bff163d80ada60d42a50251ae4c3552738d390a752fcaddba93b82a9fe3
SHA5125afd3619e5a9faaa43d9725338429d393ee3fc278226558e2eb36210df027685c661ebf9505760a20a3e69e914d6f456755ea9a436946f8723122d017ccb782c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531cca71fa8d8c303de0e1a1e476b3780
SHA115d39e71bf051c2d3a7960cfc694a6ddb512bbf6
SHA2566c5bd491ad74fb5419fc4e1fb9c2bb0136a17ebe978173ae28ed14a8bc0bcf5c
SHA512373ae364f5b32a1c24a4c8e1137b9e59be7cc276280a4778adab2c145c6c3d8e1f9e952ab13c0764316d11730db8f7c97ca04fdeb74e615413c96467737b55e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f690d332f4ed8060fa95fb29e0223e4
SHA18fced15b78ad3158b359a482d0df695420e8ec79
SHA25689d5a0c313e0c445b2af10da12e7374a6b07107830ee278b500a66bef2c7d694
SHA512241697fba56253a75f69f66bed2e6d50db32c3f3b8638d4a5a8183ef30db86ee6a02598be1af344baa829c3b33233280d98d433d088dd4bc25e603a1a86e197f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b11ff28aa43b7bc035a3c385300107b
SHA1f11be6abb189530ffc8ebafb2da9f8d3c11f59ac
SHA2562b6fa6f2a0f9615e1fdce25cc8d76223edd50763df5c1091037e7131810949bb
SHA5122fc73871dccd314923d196b7750157f8159bf26f92f20ef52915c24e452faaae45821341a23900aa5f9d32179df39f151894a37e4764060e56811d552383c906
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb8327e3093eae26d4a7936bb88143f8
SHA1e6dde6eb9c179ad9e6e2d40233e60d16d49f48ab
SHA256f5ecda3d74ff0b71658e97733b478b1c9377e058e3b5467d4fc8a51eae50676f
SHA512bcc80af0b41848b1f4fac00d85b7d087eddaa6bb1ef1f424c99bddf8b1655b8fedf29616d1e10af217360cb75865c79f6cc69e031a45868fe227465044b4f257
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5662377352d8a261d32a59369302e6ae5
SHA173216c611a8bfa6c63709795f852cae4eb8abcad
SHA256236cb43e54d55d03747490552241d1e9fc196a3e57c68d3beed7b638402e9299
SHA512d47b524860b2a841fa94579013fd88597ed1398336235a33ef3f30c859b918d51dc8334e193183a445fe2fe21a19aed1aca722a3a8f7529fa3111258fe2e2428
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a078f0c95286caed3d145b5ed6c4b95c
SHA176903166697a455c951a0e5d98c50dc973724e92
SHA256b817659bc084dfe78df6ff8973d8e9e2e6522af34b9b36066c8e06a404c596d6
SHA512d575f91803803dd9c40d81763411e2339c1f0ba93bd53db12c6f0b9799b1071465a91e415b241db92a2f726f6cee10ab6f71550398a886114f97158544ec85e1
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a