Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 21:13
Static task
static1
Behavioral task
behavioral1
Sample
68a82f34327d8fb217f64d3bfc527cac_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
68a82f34327d8fb217f64d3bfc527cac_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
68a82f34327d8fb217f64d3bfc527cac_JaffaCakes118.html
-
Size
47KB
-
MD5
68a82f34327d8fb217f64d3bfc527cac
-
SHA1
70e2eb14ee06436173ad7343e9cb3b1fa5f646e0
-
SHA256
8cb9d0344d3a138cbeef63c23c628d2d569be1ab3118c44dd6ee1db38e50b802
-
SHA512
7d66d724d5c4c704103ab66aa09ae3a05dafeda8b5dcf60563a5fc86f66776a5b8b403e8d9ac6a257dc7eb3f2fd063e0933decc855f51374c53a1147d09e29e1
-
SSDEEP
768:gk143goF92QJQx6mS/1YTfNdw6tMR10ToqWXyigNANvZOfl:gk143goF92QbeTlX2R10ToqWXyigNANe
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2EDF9D71-1880-11EF-8B04-EAF6CDD7B231} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422574297" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2368 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2368 iexplore.exe 2368 iexplore.exe 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2368 wrote to memory of 2576 2368 iexplore.exe IEXPLORE.EXE PID 2368 wrote to memory of 2576 2368 iexplore.exe IEXPLORE.EXE PID 2368 wrote to memory of 2576 2368 iexplore.exe IEXPLORE.EXE PID 2368 wrote to memory of 2576 2368 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68a82f34327d8fb217f64d3bfc527cac_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2368 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579870bd9f5b4a7b350c0e7571dbce0c7
SHA13cf75bd302c41a4ceda567f401fc639c7bda0e69
SHA2568810c84ade6b5114dfceaee98185a953f29981cc6773e3d452b2ea62011ab79d
SHA512d20d22964db887090099dc8f79e4fa4254815430b7f24f2d331f7ab7413624c12af66a15375791ca3a80767e204996175831e6a390311e0a882660063416185d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ade5b48b933f816276e31bbdc8782586
SHA12062514d32ce3b31bc2ce9ac04dd7f5f24606414
SHA256b7d5b5b9bf6e92e6587547fc65a6ae34c6cd619ecf4831e3c8baf6277901b173
SHA51213019dd8598608b388f5eb174a88d7a34c27fe70ee35e31d7f341492901ff15c0da1da4ccda30dcf3dd871880321070c95a0cc1b43209765529818acfbc405cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5edb116367f099d43864d93ae6e99e338
SHA17d214182c4453f907514fcc95aed5842021e76f9
SHA256bf3c831807fbda4deb72a30d7f78b49e78b35f184e5faf2442f06c370da7b40f
SHA5123a589279c2d98300ccaaf86c38e985a1115e00990920cfae4d192a6323bb0842b9f8653e030da40b826bd7e8509afff1c3f014ce0a9482706a9054cb15d0ed18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3459e35889820527aface255f1cf3f3
SHA15426e2da16ed8618b9a1a03737e475d6e5c9bbca
SHA256641a95fb9ec97f8e46e0e50423c171906e1be16cac1d7aae817872e7d2f0f2d8
SHA51207ba0eef58d3549dbc2839affa1f920d66dd9c2f0be2090315ea3cf118fc3ceeb673fe210e956b83057f5375ba2d46d683d8643aac90d59f1e0f2fbc18e3aa4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5161a62f30d96dc068e65d68885b4993d
SHA16061d7f464b9b526257d55a9981b7aa2e000e3d3
SHA256a97f3e98c41645b5e1d8242134a95bd729ec3310ec198ec861ce7dd7111ca4c4
SHA512daddabf60c96e808787262fce429fdae2ddaf8c808060bd3d92cd990e7088b8226b314cb127448fa4320ebf26c3a0dc8a53c541709eb21a25c4b0dfd9a699963
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef82b9cda6949bec35f591aea94ed419
SHA1313bcc73e4555b3db0fa0fda87c19a4f31f07efe
SHA2565241561de304111ca99bb47bb5fa4ad554b577e236145d2a995949cb4ae161cf
SHA512837d01c56662904bf361fd26b38ef062c6caa4b46492fe19807aa5779d5b0a9b613dca1619442d86847e2990578baf47bb9a1dfac767df6a1bb9d9587c7b3ff5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5abf1e6c9ad82c560da23e1671e1e7e4d
SHA1f7d6692207e37ad5f9728544cc07add03bbf841e
SHA2565b14a1433c907fcba6b3cc8f9d3d7ab1e088892c53bacc81f0299a9e123e5b33
SHA51262a067fcf02a24c6993821a6fc868999a4c460cbdd663522fdb2c2ed4b36f45feaaf1b30c4ce580f1183b65f3f7c4da878d63da1536ae3219aab92a84c2180a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4c86c803ad1f1a49ead50b1133f6663
SHA1dd76f87836afd78d0051dc8472be03ab54f25e65
SHA256a6069cce0766c12a8929c2b88b86499e91d1d2e4eb820abc98c8b964c186a209
SHA512cfb50f048c982b1374bd3b14d4cfc3a47494bde002f5059afa41cab41f5ad548b4844604056f7abc65204c3bbc28915c251b22a44709c974b34b1ef20e748cf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dcc12f4d06498315243881707716a69c
SHA1437d2a2ff725074bb62af3c0fb170e2be364d600
SHA256e8561cf427e726c232b10efb38c0d497f39fd96747596530b8b92875cd9a164e
SHA512c61a2f4ef7a567837aa87417a18053f1e6bb8db129f0b11f588f5fdaae0772c71a2925977f69ca99776831e6d8589cc2f0fb9d2a02f06b7b5878e4f30bc00ffb
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a