Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 01:47
Static task
static1
Behavioral task
behavioral1
Sample
6593652f2b9c18b6fef3849674ef1395_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6593652f2b9c18b6fef3849674ef1395_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6593652f2b9c18b6fef3849674ef1395_JaffaCakes118.html
-
Size
130KB
-
MD5
6593652f2b9c18b6fef3849674ef1395
-
SHA1
8eaed156cf30f572f18e11c87d38784eada19b3f
-
SHA256
4920e8ea57a1370daae5bf5e8d3a56098dce4b0e8cedffbdf4d6bf64fe6a50a3
-
SHA512
0a20afda1d4e9e88862d61346df32ee9c605a2730a23e572f71bfc7e30edcf8f9e73a84f1ed3d50f1f365d71b3d12a1cafd0b0225497778ee66e64759c754941
-
SSDEEP
1536:z6ZydlEbbA99YZHqRHHEExx66++IIddtt77bbSSSSccllbbFFDD998811qquuHHI:zJdlEbbA99YFV
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{39919C31-17DD-11EF-9F3E-D2EFD46A7D0E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422504308" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1688 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1688 iexplore.exe 1688 iexplore.exe 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1688 wrote to memory of 2856 1688 iexplore.exe IEXPLORE.EXE PID 1688 wrote to memory of 2856 1688 iexplore.exe IEXPLORE.EXE PID 1688 wrote to memory of 2856 1688 iexplore.exe IEXPLORE.EXE PID 1688 wrote to memory of 2856 1688 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6593652f2b9c18b6fef3849674ef1395_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1688 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51943addb025ae715460331d19adc71cb
SHA102cc92a2a32bc38a296bf1934542f317c1bb7b7e
SHA256fe0f1797295c326fe767cf51b42b74c8a8140cc137414457dee1da7477a1f2ad
SHA512d356f2ee34824fbc76415ed6648b74697ad0d70f21ad4bdb9e2faa958c8f18daeb096a2734ca2b0dc678c57f0bb3b7df260833926abf035c9d97973ab9236af3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514dec66e9bc69857b8a63af0bcdf23f8
SHA1bf1ab702c5f1ccb8b06e93a1c2a34c0497b55601
SHA2560c2950ddba7f6e74082a9c4e4315ad763ef5e3f4a581e398205159265e48f071
SHA51289e516f8af1009be76117b83cfa919ab7ff7d94569d881927aa23dc4df0c653e595fb9d5e053920ebf4386a52e948395c5aee09807bb6aef26d64b172ef5ea50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee9c00028d8bfc8301be160defbcd59b
SHA11a03e4041431bcf73fae820d2e30601dc53b78e9
SHA2561ee298037d9bed79b8e36a3a5d435ac5f2969663ac25051597851e6118d75553
SHA512c3ba9512741a83e57fd1e5432f55188c49f84c122a0cef10c47e6156928b5a7a2d516de317c41a64cf1b75ec03a285e703a2e6a7a0ee19ca258ad2fe8133fc7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58be6f5ab64b5066627a97f973cfd0968
SHA1803bf6e289a64ad061ff1a084aaf28e362a6c7e2
SHA2565b778b20814dfad365cfba45f78e2326be01d274b1225c4f77e779ad2f83cb9f
SHA512f1f0292545fe1575e6a70e970e8a0dd689a246a7ad973f8efa4cbd42ef9ae1b8f515180f2323de0ce99c86b69148880e1606798eebe4b20387768f16dd8c2b05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a9b38ef0b5d072c67e6a9b5dc584365
SHA1d0cb28380ba80451e45b8afade6f794becca1739
SHA2560c607c865e7a23533ad5e7644f34caf30bbadbf5e2d6eb992315367472903c4c
SHA51228e753fb07ca35af0c0574d6d32ce3bbbbc50f6ba8b1b20580e0b322f78271dce81be3f0c589f934dcae4a992d75feb22d58d1322006a01f199cdefbe7924f53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579a5612968045165cb14758de7d1481c
SHA15f600292263052d05966b02fa40dab585ea02bd8
SHA25655b66ad0ee338724179f8b170aecea77beb3b301974c660d6ab8537bc027e28c
SHA5124317efe23ed781413a2892e1f8ed12a88b02d8e76654d657a48f0c531e8d894ea1ad86e1d2798e0e78959f2dbf6b3e9736ff10cd52324f395326e193f04c1f33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bca51c8f8abd85fcc2285d1ea7ea263e
SHA1b5485056b203f0a15b218e20f46c0394f8ca084a
SHA2567efcaa41dd8aba4043ff7898bfb45dbdb2f63e94f931a73d512be2d4ee0e7c38
SHA5124a640be0f38d0e1b25e53fdcf79ad597cbed10bd556253422448aab98f9ad30c2d308a829cc039652da0838472c1c2067a540d83b68027b65680c8dee2ad592c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a