Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 22:51
Static task
static1
Behavioral task
behavioral1
Sample
68e8db8aa4f00d82906e0eee135d1739_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
68e8db8aa4f00d82906e0eee135d1739_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
68e8db8aa4f00d82906e0eee135d1739_JaffaCakes118.html
-
Size
19KB
-
MD5
68e8db8aa4f00d82906e0eee135d1739
-
SHA1
47766a78d06c832d3e252b524025218886128621
-
SHA256
5e2d53b925ef423d8b3819a2f4f9b2456f5c5bc11850169e3194a325998d6c8f
-
SHA512
6d4580908a795c4619e40c8eba9e0d1dc174d914cd9d3cdb2634ee97d1c40c83f0c72303535747a58c63efac197974486849e38e0a3633952e242997d1d2a973
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIp4/zUnjBhxL82qDB8:SIMd0I5nvH9svxwxDB8
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E0D27131-188D-11EF-9B89-EA263619F6CB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422580179" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2876 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2876 iexplore.exe 2876 iexplore.exe 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2876 wrote to memory of 2916 2876 iexplore.exe IEXPLORE.EXE PID 2876 wrote to memory of 2916 2876 iexplore.exe IEXPLORE.EXE PID 2876 wrote to memory of 2916 2876 iexplore.exe IEXPLORE.EXE PID 2876 wrote to memory of 2916 2876 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68e8db8aa4f00d82906e0eee135d1739_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2876 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1c9420d8dd27372bb219c04a85a27a7
SHA1170ba181b3b6067710c00912ffb7a7c13b2ada77
SHA2564065e9194f693fbb60ed293321716bd7298afb33420b1b3150c5666c1d5439b3
SHA512de8436888a5359ef351f1ffb272fcb0b490732c5ed9c3026be97ae8c6f5115cd13020062548e4e90375e26a79e3c68cbf67c74ef3662db0874af0ec60ee8d52e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561948870a4c6edc2bce9842e242826e6
SHA122ba01dc384983cc26bbca1ca861a84077275a89
SHA2561db9364a8332672c2218bcb4f87b67dfa24099336f4bc031b8fd7bebd1f4ffc4
SHA51215fd1c82f9f385f4fadaeac769cbbaed0926d7bb6717ab9af9d15d8d9fe80bd2abd05834da3772de0dee506bd05691cbb1a2a1de5d1afb602eee6f6df3cb3cc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5047567b008508dd22da28efce42ed5dc
SHA1a2109512e191c5c219c2642c1f117b74a9564dce
SHA256a423c1376becdfa575b04007f380f91b9c6d58c17e0f731fc81d5c0e7054e011
SHA512fa92be4d4f8d1403ae9c7dccdce7a16acb1d881d26c2b3cff49980eb3ad17e4489c2325c20699a00054e15d2808b257c9d3607877858827b81693bcb0d4125a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5520ba7647b9b4bcf9e017372772dd4db
SHA18b4b37e339c3b5b83ed7ebcc169206836fda3240
SHA256a6ca7b08e68693436ff5568c562e37dcaa261f80c7bded660ad567a7d7709fb1
SHA5122f7e45a0984f40dbf8821aadb74e067ced6d79c20adc537fdbacdf618796dcbde89fd876a0c23e9d4dda133c7c4490fdc51d5345c17869a19b8a323ceacaca9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5daab6415aa259e2a9983236bc326e8a7
SHA1b0e6ccc6f4902a2a0e89b8ae949c3ea260fe8975
SHA2562c4c92ee71a0dcf422db92a25773122e22ad206fb325640a2939c06792b1929a
SHA5123c26dfc0af2a0297fbd3219dbfe733e3e2de7b3683245b1ef0cb7df5601bb879e3e2c9a2bd1dacf3a2ed6adb1a1fc55fb3167d3b11b2343f17534a882ec7655b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d7cfe494c0c1707ec30e4147630ca3f
SHA114eb9c859fba1d0d1204a08bba3f1dd6affc161a
SHA256960deb803f3a783c70796ae91ed63082e948b0efc2fac8b78d10e64dff366c7f
SHA512234210fbc2cd0c89247da7baebc8ed49c36a5879ecd5e0c536ec4ee0030fb24add3bb490c61dcf8fa8bee9b8a8bc2e15b8f159deb7c63e187ca912e96717f0ef
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a