Analysis
-
max time kernel
148s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 02:26
Static task
static1
Behavioral task
behavioral1
Sample
65af5babcbceec36faf56b196c9baab6_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
65af5babcbceec36faf56b196c9baab6_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
65af5babcbceec36faf56b196c9baab6_JaffaCakes118.html
-
Size
9KB
-
MD5
65af5babcbceec36faf56b196c9baab6
-
SHA1
0ba0192857fd7eec57ab39e9b929708ef3e60da7
-
SHA256
678490c79cf52bdc7a5834808c4bb8745cab526832f311b3bc49e87117d46113
-
SHA512
cd8c5063ce3dd4630d799718e97c6093bca7cded95d692f63822fd8e5d5ddac4aefb323f4e2f36ace713afe64c80cb61b73784c2414a027f61eed9db507e9ba2
-
SSDEEP
192:epnEls0lUgijLOTciZPMlahSEoIoow7/2IBiPM4ex/ry482xEua:YngiOTxxoHV2IB/xjs2xEua
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422506686" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C42DCB71-17E2-11EF-B781-461900256DFE} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 3012 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 3012 iexplore.exe 3012 iexplore.exe 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 3012 wrote to memory of 2080 3012 iexplore.exe IEXPLORE.EXE PID 3012 wrote to memory of 2080 3012 iexplore.exe IEXPLORE.EXE PID 3012 wrote to memory of 2080 3012 iexplore.exe IEXPLORE.EXE PID 3012 wrote to memory of 2080 3012 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65af5babcbceec36faf56b196c9baab6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3012 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b93a5331b453b32cce5fcd695d49d5dd
SHA1383677106145623c6d1914b595489b4ec0f4128c
SHA25616dcf66b7da20e82fd3049911fafe710a131135b2c3c1679c1fe9110a9a2fdda
SHA51249b1eb2a8387f65b77f08f4f15c9819040083126130530dcc270625ebbb2284bad367241131d5ef169f120c22f12005b236870bb02a38e1c4af164d1155d5913
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577ca70e3b52e48b688220516a1926ecb
SHA1be1555fca6b49c1f206205f776917b3797df413e
SHA2566410c175d13f781ce8fbe319837f6d6c2002707f028e0629770d04eb445e1018
SHA512d458f6f92b66bb2fded45412683604356f98174187c54e7a17279167d0ea0e5e905f36e24f09d09895aabcef4370f7d996539aedd20d1bb38cf8736efb90a507
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517d9567b922d1f6eb11d357732820bd3
SHA173b942281faae55251df00258a6022eff8d99802
SHA256ead01a3fe3502a3d159cd3c1562737f90772e96d9e5a553a713ebe2319b06870
SHA512c4049d65ec7682906427a342e793a658368c8c730d6ca170ad8b79068804825315c0dc6c073e174fd7d54d6848346dfee8462c2b458637bda54bd61a6930b803
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b2bc66f4e887fa664901b4b07d893bf
SHA1a3beeed8eeda6731372519fa6b1ec6e47b128f4f
SHA25664feb320037513b404b95d9461cbbc86126a726374e8a3a54353c002ac3f566f
SHA51262d6d0eabca6b021c04a967060f90e4bcef74b7cf19966e5e9d0f2f74fc3d9d5ff145c647ef2791076ca982f8ea48805cab4a520c4affcc1a7d61585042f906f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525857cf4675c61d2bfadd62aa73d1e0f
SHA1501ebeccf3d148e5b75eeef03edade6181669c76
SHA2567e48dde5314e84fee66284e6039b600d387a2217bc3b345dac9e43bd3dbc57e7
SHA5129642a8876b76c0c4511a6be555b39ef9b63d3de6d51b650227f0a4609fa0113b23faff041c64fbde8220463c21036bf1c4efd412d9665aecd8b386425f992cf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bdbe891f323b8e92a6dbe8cdcc48318a
SHA1f20651b29cea5955e8b8b52fe65dc7b1eb1b7067
SHA25658657f01d3ca55a3bc48f3f6d6150cd642a9320f6e0979bb9999a07de13f3a2e
SHA512c982546e5d219df7ff7371456fe566888d6e67f6d029df26bc40cb344d3a835c93e57fc97d3efdf642cafa0da3f95603ddd6bdbf23f4775cc67c3fa10d702f31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52cfd97f3cab36e1614953bbea3f457fb
SHA127974b8babbcd18cdbad5f6e0b07f5f9ab675c10
SHA2569494e1678f305cf7397c6b323a7c9e1662d27154aed94bbc155894d239e5ca9d
SHA512816e22b045f21a3a40cb1a11e0f3a0c99323844759b594c3fec35bf0f2ed50f1dbd8c1394bfd1ef5f196d2633543f67099b7aed60b34b52c7a9e9d6e13a140fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55813e5ae0a5bf47c4550f0ab47579e9c
SHA126909088c70645083b1967e59e2c46ac661d524a
SHA256776c484f4c374497bd0cecafe7c69551cf112dc493dd6eac9e7b7e058e6dc70f
SHA5124ff9ebbcfe5e1507652186e6bb0ff599731d7828e62318ced096d0bb9b2c9e6e07ad5010f4b58f70f22041e4ec67421c1847d244ab82d78a5925bfdbe07c10cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5600f57f4a29d4357e21982fbf212ee65
SHA164e4e1e506c3658a72f8f99319d9dc73d00ffd99
SHA2560bc59fdeaaf651e3917ba6d8d3c105d2cf4c3b59b398f355bd4e5bea237ded93
SHA5129a1b9b398834c16392004b98fffe0b5cfb41cb3f4a45ceee40e72cb4f87ceb503b142bf888ab8ec301fde81c7a94e3249ca735c7595aa2b4ebc577492df679bf
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a