Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22/05/2024, 16:51
Static task
static1
Behavioral task
behavioral1
Sample
67f05769cd5f45f87ce7f2345888e660_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
67f05769cd5f45f87ce7f2345888e660_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
67f05769cd5f45f87ce7f2345888e660_JaffaCakes118.html
-
Size
4KB
-
MD5
67f05769cd5f45f87ce7f2345888e660
-
SHA1
960e1c1c617fc83c0fa7c32504ba3aae0bd832e8
-
SHA256
acff0f50483adf0d43f71659455b766a628cb86a28926b25311639507e70a2b6
-
SHA512
c7e0adf54c6301d115dba668fe55871e032ea45703a80f0026ab44050e0773740eca87c608fa753679981d6892bf8a588cb975520f3a26943e13b5d53055fa86
-
SSDEEP
96:x3Fcl1Wym27vFWyC27vt4Y4IsY5kraFNXBtBA7NOArkSVfTmfiNKC7p7p0s9cmn9:FFEl7vFZ7vh4IR5kyNxfQNJXfTEiNKm9
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0ff836b68acda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422558600" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000003c5fba6f4073f476036bf530874f40ebacc7387a1af36bd9b925de92a8aa157b000000000e8000000002000020000000424d7dcb513bdf91325ee7da9e5d37591ca1f2199a9511a033584e908cd33c1d200000007844efc4383acc4564ef0a2c283bb0ba2a5c20deaf2fbe17756169a8750759d640000000a419441d5968d0cda3af266f3d02221251443a74200263a15c9530c7424a3dc66444f4b73372c5ef162798cdbe3dae343c010faf8e07569f40ee1d0e8e6d1a32 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{94724CC1-185B-11EF-931A-4205ACB4EED4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2184 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2184 iexplore.exe 2184 iexplore.exe 492 IEXPLORE.EXE 492 IEXPLORE.EXE 492 IEXPLORE.EXE 492 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2184 wrote to memory of 492 2184 iexplore.exe 28 PID 2184 wrote to memory of 492 2184 iexplore.exe 28 PID 2184 wrote to memory of 492 2184 iexplore.exe 28 PID 2184 wrote to memory of 492 2184 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\67f05769cd5f45f87ce7f2345888e660_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2184 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:492
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5922c1b0173cac4d34a6baf7872bfa888
SHA10b1c24226eb769e01c5f463361b8ffbe3556d5e4
SHA2561add3ea7ab05f5f805682e0c6ee35b45dd7115a2274ec500560b3892b5b4a1c4
SHA51232d26d7ca2e178ae28b390acf2c841e8ffcff2862ed1ffe7fe197d880be692d1960b59ca0e795496b72c187a5fb19cfc51e973dc3a155cc81a32650bfd141de8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573bf5793275ae9d9dece604b9cfa20d8
SHA185ecd93f72231c7421b9d2ced308969829c0a151
SHA256acbc7eeb7070377a5a1d4dd4482b79e62cac6da7a5d558b42f1e1755c5beedde
SHA512059c970885c2417ae03381f191323be55871c3c19f8baf72187469fd025d02673022b5cc7875e88fbb6b00b0a2944dbe364695b08196a2cea24670d316c35841
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5921a59fc0e4d3063d8a8eca5aaf757c2
SHA1bc74cf34fae3c49f0dadddc8e93ad9b0b005ea70
SHA25657b5c8a42684ba2bdfa21cf2c350b2104174efaf89f179dfefdf5973f0c4cbe1
SHA5128a272ad1572fb5b9608f6eb8f8438961e6b5b0cb7cf7a0b5ad6ef136bda3436e6988bb43a7d8aaf79f7d6e9ec8cb2b6d2a3922f46fd4b99c4cbc663996a76d28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575653f104864a258853bb3fe627e24de
SHA1e26054789193acbf2fe34eb8a2bff64f2eb889e7
SHA25603dae79f52eed6c5e271981425e41dc0b9be2ce860c9a979843095fc772e2035
SHA5126151b17320a5fc4e3938427e24ff3cb80c4001c0bf52ac42f75dbf4465b0d88dc485d68c654d02c65485441f3456318e90bd75d5eebdcf523fc15aad963c5e0f
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a