Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:48
Static task
static1
Behavioral task
behavioral1
Sample
6957036e66585b042244f3e9ab346b53_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6957036e66585b042244f3e9ab346b53_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
6957036e66585b042244f3e9ab346b53_JaffaCakes118.html
-
Size
18KB
-
MD5
6957036e66585b042244f3e9ab346b53
-
SHA1
509082c636c230b5143f2fea04008af1629fddd1
-
SHA256
878085aa4f05ab515294aa1793382f4fa4aacc2c4dddf9af0eabfa14dd12f572
-
SHA512
e2e40ff7fe336b7cf42fa2d4c58490282ff152a0d7eb4364b6a787874be99408458f257d14eb7a1b615a4f1e0ff1144e43543c87a91cd386e7966521726f1f40
-
SSDEEP
384:SIMd0I5nO9HqEAQSceuuoGfgJPsv8vUixDB8:SE0EAQSceuuoGfgJPF8iA
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7E4ACDA1-18A6-11EF-B8F6-D6B84878A518} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422590751" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2380 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2380 iexplore.exe 2380 iexplore.exe 1748 IEXPLORE.EXE 1748 IEXPLORE.EXE 1748 IEXPLORE.EXE 1748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2380 wrote to memory of 1748 2380 iexplore.exe IEXPLORE.EXE PID 2380 wrote to memory of 1748 2380 iexplore.exe IEXPLORE.EXE PID 2380 wrote to memory of 1748 2380 iexplore.exe IEXPLORE.EXE PID 2380 wrote to memory of 1748 2380 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6957036e66585b042244f3e9ab346b53_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2380 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1748
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5adcb586abe1b9bc64aa5bf7d62e0d4c2
SHA1f5319a9891a5255f11cb9669f6475491b8e1b547
SHA256e082501b75aacb509e921d5add54130c6cdad27e7ba48be20ee8db80f8ae4246
SHA512f23eb7bab309dae087c826258fb481e46fce998d91e8f5cad9153b20387cc00bf85e75f329cd82e63d126e9e631555c077e96112d5657b326ef222d86df15d75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ef5091bf4d113ba2df1fada9437c61b
SHA1060fc00c43f06508924e1e9f75d8c0de1f329318
SHA256328e901de06fb7af978a2d920e59fccf2df3133ddb9261be41d5a63b6bc9de20
SHA5127a6c08a8ecdca8e8ccf3b275cbdcd0f418a5da4538fb549ab7421ab3e800f951e1f6c56ba41daeda1ac3e4137589e28f3b12ceedcdcd5ac5a0ac279fa54cd998
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597d31d38df81e5f1109484d6d76771c1
SHA1f41f42f7782906c75ef6c97c4d2e4b00c34add96
SHA2564a6c0bc8e696c650a70087a1e9c8588572e29c5522c0a632d2ace3b4cc1c3a4e
SHA5127f54b0fe9287210db5d7b2946c75d15e1069ada91f7ecd57fc6cdcebe39f6090f0fdb1a0f17854d01feea30cc7f82b94ebdd550becd0f81cecb0547b74aea96b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d2771650edcd3238ec76c4535b6cf3d
SHA13d6fc8bae2d315ab74f3dcba60ac5446ca4c6a3b
SHA25655dff2aeba8a3a474816a1fcd598e446f96dbf4300813384ae5dbe9d6dd9d5d9
SHA51286b0e77bb1cea5b16bd5b64f3bfdb52ae9827b0a8ded9faa913b9c87301246321c07a69bc304354c54037fa7775ff5757226a3425797db5d07dc5ec481b8adc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2c4a2fb4d7de61fbc1631e94200fc0d
SHA1a7fde660d1e13bbe1d0f9391a63883eff3e0d713
SHA2561619b0744e9ed93d929b29e7d23c29a7105ce76d6e46992d22267b819ccd6ae2
SHA5127880b82b66990c59dd881fde7ac2261b6aa9405380959376ac253c69b1335546df2e7ac7a42d3cdf9a5c7f49e9891237f3ef43c47758de1d40b7b3f253e4b5ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598ae5f23caf2ace0a916a1834d964139
SHA10bfc22ea15999d1e1418e3a7f78dca93bc2094f5
SHA2561585ad16edc861c3a695051e6080eb5bbbd2f1c8549595b147306d8bb609fd8e
SHA51286466267ef3a0df5cb205786614b645eadcb963863075dfd9773120f046cf1e1cc4738aabed6619ed02b6af051c5ac1e323cb0bc1c214d86e7fe8f1d0fffe348
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e17ed062c76ab02a73b0d5bd4f865d6
SHA10071faba34c243bbd43b362cb5ac4268a43f0114
SHA256f3b72ab39170aceb040141d5588cafcf0ac416df19342f41194fbc4ba3771882
SHA512f5e0047f3e6abd69743aeb24463419c364551bca984c8d3e79f0f2d4ae3c27e33b58ac31380e673b91fa117e5215975547cb1c8f5a9debba9b851026ce842333
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5761fb5a1dc9239666a8fb0c50da0890b
SHA1954b42771491404f41540c6ec12fd79143a3a035
SHA2568d0548f706eb08e97ea3e9acaa21c3190d9499396105668e46c29a90a75bd5d6
SHA512e47426c8c3fe2ec3ebd23dae8926c6097821d39be020f49a9201c2d7bd5970b9016959b7669f65ff66c461e0505efe0d58275df98698c6ef5a92aa2b2888cc1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57de581f9db1f99c80859d53c01615993
SHA1f9733742ca77e195274b01c16ce7781f4189dbc6
SHA256792739c1540a21a6461f99c6e4dad1f402e0a86a6cdae37cd8d6a0ea91d55732
SHA512dd6fa086dd2083bb31f2d4ebf42b1d86980b718dcd980ebdb3f9ee2895a97f31c3d813d904762ca2f150e460386b470ba48208be768a38458ceaf9501b0007bf
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a