Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 03:47
Static task
static1
Behavioral task
behavioral1
Sample
65e6432e9173f0027a4b8260e87dc51f_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
65e6432e9173f0027a4b8260e87dc51f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65e6432e9173f0027a4b8260e87dc51f_JaffaCakes118.html
-
Size
29KB
-
MD5
65e6432e9173f0027a4b8260e87dc51f
-
SHA1
dabf90104444dc7512456e8d39e5ed0ea42e0175
-
SHA256
8ee073e9b135b15e0bf9ecc5d93f3e4adc7b9ccfdeaa6a4ffe2e762ca204cf47
-
SHA512
d1fa57f0c7cdab3d8d9f9c6abe4e6368ee38c9501910c63115a72e2d7a583ba96ab855d9207f6411751f0b409ff8a430a0fcd9474bce07014b8aac31eaa67391
-
SSDEEP
384:KNanqbn8mQ0Xw9h1QD89HDL5ZM3bLWusbzTyYZ3/RKWgRE0Rx/6yRS:Pqbn8mQ0XwVQDojMPWbyYiWh/5
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0F9ED711-17EE-11EF-A0EE-F2EF6E19F123} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422511538" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2876 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2876 iexplore.exe 2876 iexplore.exe 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2876 wrote to memory of 2904 2876 iexplore.exe IEXPLORE.EXE PID 2876 wrote to memory of 2904 2876 iexplore.exe IEXPLORE.EXE PID 2876 wrote to memory of 2904 2876 iexplore.exe IEXPLORE.EXE PID 2876 wrote to memory of 2904 2876 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65e6432e9173f0027a4b8260e87dc51f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2876 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562c28b57c1bf7bf61a912fdb2a7b1085
SHA17921e81aa07465ad9415bd393b10a17fbce16795
SHA25648f028b35d2467d09d7b875fe98d678340eac7104f9ef4b7cb7a3bee7038055d
SHA512297db3dae887929993a60137397c3d9c526e29d372c8830f8f872a88c72a28936691cb3a892fa1a2cbdf2903a4676339a10d6458ed2f1d4946ce9e9ad3e52cc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5720b0f7b6fec04c5f04e8d8c4d3274c1
SHA1a597759b4f44c5aa0bee936f3239911523f6e06c
SHA2566f8b1cfd17507ff624b79ebbd03543aa5d34990a0d9b1584a05f80dee90d8f4c
SHA512eb441357c9cd90dcc56d95b0a571a22d9b23c610bd6d9b2684782547ebbae5e45b939e9bc31fa57bebed7d5df15bd9fc9dff167dfe39634dd2586eb7cbe419aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2adffe4b0371e40b496335866ce59d7
SHA1694f22b7b821f930b363b07ab69dc76dd1a0abf1
SHA25619e6b3ce5d0b85e5d69a2cf2522935a3023ed2a3906c2580d5b416ba0c8511f7
SHA5122104e1ad95cc9a63b53890acb96615e11da15d61bf125ad7ad97572fd500c0a314898e60391d68740281258c9cfd4ca5ba1829fce6424b8a3d70ba9a4aa2b1e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c97c0a87aeabd7925b0ce36331bd1fb
SHA1cf16f6827464b5321fad14be6d88a785f1f5a5f4
SHA256168d63010821287217f663f59e16502d4f043a9b1b36eaa7ae650244f2012ad7
SHA51227d87413eebb984d6ca2d943033129446c5364afe6456ed79513d8907bfce9070ace29aa5d6939af36e5c8a8f9bcc107a0899f89cfb6905cecbb4f1644c8d4c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db7ec5679b0eb454c1dc5db8ef3332ef
SHA1068f37445413c7837d29c602fcb8f5d8e86c09b0
SHA256f1cc53d31e167985bd1126a3a74f8910fccfb4f1537bf2babfd5a6036ecd6886
SHA512a8f09de1e565a85ecac7bfe3d9e3bb643d1bad85374a8f4c538b63ea386b3994f10e6e77f244a291ec84dec3843cdbf41226f304759c20f96d84a6d992a6f318
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572b5d519756a55b8b2b73a34339ca735
SHA1a6502e8899fc4a34c502b2995b3ba4681652e3e0
SHA256504bc4a4568b1a46964195d49046e49c46ccda42564fd126539ad8fc9df1741f
SHA51252cc4f0d4ba54947d1699e2c02996b123f72b3e0030fa160de66e165cb7b529a7015a96c24ce688b79fe5699e50d2a90aa34a363978d8293aeca790593cc0765
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf6ddc4580368da3b74c0062a1d5b1a6
SHA1e569e8d062e3386f274c81cf0b893aa2ca1d57fb
SHA256f7edf1389e1f851bbc87f8ae8b18901f169a6e042f9816fc22f7134368f44bdf
SHA512b525b0706e6929f830a956c67d71325b7d3af65435b906d7aa11adb868afc17c85a796a51e8202404e11a9a5ccea6d9af2f7010d8203a8349396a8c6a74679d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5919e3464c4b5e946312a2f98b7a94223
SHA1a5b39fc147e6e7b60d5bc59382163ce883146ee2
SHA256968f16b00c7c233f0176d37278533d1077e9c6296cbfca24ba01a00ceb0989f9
SHA512f513837066e33132d65383ac5f2dfcaf04bd4d5f3a7a4f31be92c586e2a871097e8c06f0445d2f787d35400d71e138248a873f32df1fcebed0a1cf3747788681
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4972cee031742f9d09d9425e29c0fb8
SHA1a68408aa4420d76ddf1cae3a9fc57615aebddc5d
SHA2560542ccc83bb498f53978890567cf5895e89400f0034bf7e112ccddc8795d439e
SHA512d59333ea0d842782fbea02164c05cc08f4011d5c94a0e9370be1a6402db919d6dca07ff048806e86329236c8f941b2c467c65306c484c7a8f79c98c21a10fe90
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a