Analysis
-
max time kernel
148s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 02:18
Static task
static1
Behavioral task
behavioral1
Sample
696bd9800b55dd0ab5fe283e083fe465_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
696bd9800b55dd0ab5fe283e083fe465_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
696bd9800b55dd0ab5fe283e083fe465_JaffaCakes118.html
-
Size
19KB
-
MD5
696bd9800b55dd0ab5fe283e083fe465
-
SHA1
b327851ea245f6cdc3ac721e41a5080dd604e537
-
SHA256
474df0b46deb9cbac7d1beb8752680f0a6dcc0e77374eadca0df85f57e52817c
-
SHA512
d6e3dc61d99b5d8d9901d41d5436449295d47836b348d12a7a980d83c16f1ffd25d971bff30ba466a63224e27e2776f9a9b2372f15e456e548b461aaa6852c81
-
SSDEEP
384:yje7+95dVqqYWnnLiyKf9WZ7H+ksMXZmQXk6LLMAmuRkD5tXfAQirtvuJM:yje7+9HVHFk9WYVK8Buifbirtv1
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422592566" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B8AB5D81-18AA-11EF-8C89-6200E4292AD7} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1636 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1636 iexplore.exe 1636 iexplore.exe 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1636 wrote to memory of 2832 1636 iexplore.exe IEXPLORE.EXE PID 1636 wrote to memory of 2832 1636 iexplore.exe IEXPLORE.EXE PID 1636 wrote to memory of 2832 1636 iexplore.exe IEXPLORE.EXE PID 1636 wrote to memory of 2832 1636 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\696bd9800b55dd0ab5fe283e083fe465_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1636 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2832
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cacecc9f2bc6e97f3089e03e7dd7e835
SHA1f51ee8479b0e3db00b8eb4d610315a242e1246f7
SHA25624b8a4aad482f1bf8fabe3cb23dcc72479cce633f835874dc0ea651d3f2fb8b9
SHA512563b1e06d6838247954cde6bfae4297f58db17af8d4b16d81c6a17661e1a50d396795f1c21ceaa18552b08fc1b5ecf131baf0924a1afa23d89d3c3087a137af6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bae5871bb3a2bae1d23bd4a116e0aa5
SHA1adb0de7ab9cd253a46f13de05e400b19490018e3
SHA2566ef96e04cb2729b8b66228a3646720acddba9cad65cbb3d81d741db90b17e506
SHA51205d4c03d2c32f74056c039c48c898e6f8c80998d769583c2e5d3ba29111bc0023d511f3a8f10d9095b92c83ea3fea9bc571e659f638f47399aa25ebe7e17686a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3f85c2781de82e454a65734c6fb319f
SHA16f932ccd7c314b528d03b520dafe1c760e7efc5b
SHA256c9a4527d0bcdc4c48e3f78eb336d04c9bc6e7ec26d0bda5427d8de7d1d1e5b6b
SHA51207de7aba2c51cd3b2cb53457e19e17580cc3e4d1928a44864e30d0214725deba53bde6dab06441a66a44a7423b000feaf34468dd5d7d52cf9632ad9c8180fe81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558eba6dfb9e7ec08f9ab4e1a3e6a1953
SHA1b9a68f1f93a93c70d6780b7925d499a6cb1ffa71
SHA25681f59d79c5f1646d6f4198c01a045efed0167efefb42785c8f7a2c2e08939a63
SHA512adba434c30120f511e218f5196389f9716859e7cb3915379f02daf738b6fbcfa54b681ac90404b5db87e8cad95a5a399a5f402b8ec1c70757f455d3a05cd071f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a1877a4f6d323470ce068f588526772
SHA11011a7812e1fe0c6dbb9c62a87938d6fd2fd8d9b
SHA2568438abc1303535812ed6b7bf64549a19f266861bd5d2d47cc0268961dba9ef16
SHA512326a78dd1789f649c1d790f20c3a7057b539eaaaa17e49a29aed9d1db5a0c158a7594eb8a9ef5b17a830b23a8b6e49c9b996e6a57b52a8f2f1fdc6021d0392c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd2fccd2902b9062300299862291b7ff
SHA135092cd6669f28000f9ef30ca60c17ccca643522
SHA256449e2d228a21911ad722b2f8ebdf80fe203e3003970519d8f7164fb1f4bcb7b0
SHA512cf909a1a0f54287746a1569e83cd38790419090eed04a69595fe2c43dd4fa4d754d3e97b93c2c476d02253a7bfe0f8d7e9853eca38f49196a7a7550c2d0a9e34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547290c5d399fd9477f59578e4bfa114e
SHA19144bc8578588548ae4842d891a0da26d7868f7a
SHA2563e15dca038dca6373dfbde551743bb90aa0ebd464889c91a046c71e04ba5b824
SHA51237d499ffce64e058addbf8dba94999cd3d51c0f69f13d3ef0ec8fbe26f250def1cefb776cc491903fa4691cfe7d258cef34f75963cb875059f2e613ab33b1181
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d5dfc1cf61322722eda657bbcf765ad
SHA19caea82f54b868e4a9bcf60ec4dda6c23f50a5b6
SHA256c9338f6761a2ae8da5055f1d6fbc8bc10b19efa334bd33d9fe61c72b060ea42d
SHA512a3eaf9d015fe43ccdc62af26b22f0ff6b91cf266f871d9bdb249e63db088ae51d63b7a4b7fea18e389ef520c12b96ed22256e778cb20f4ed6d31a82f5385dd2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5395512f9322c8e1ec18895cf67da1b11
SHA1fc59537fcd0bddd012c1ed3e332aee6f6ff26a67
SHA2560034068629c2457cbb90ada2f3b9b1016cdc7793c16bba34a63e22531b2f0912
SHA5123b6eece3404055a273e449baabd3a9e5dce37e7e359d8250820dbaba529bddef9bb385eaa43e0ab1ec1b41dde986d58cc0f4b4c25b11812111d73c08fa7ea95e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5e046293c5d3ed1a5160aaf200a908b
SHA16595744debabb8551ff4e7b4f85ea23970fc2241
SHA256420d75c46fc0af9da7e8d799807890ad4bb2e946e298acd7d742a9b7b61b4e8f
SHA5122f17af2dd8982392bd6734931692ee3e9070dcc75a776c882a12bbccfe0d3bb7595d0c6fc4ba72c0e5d698fb940dd56f1d22bb810ae2b151c6cdb17c98ee6222
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5374914cdda42cfc248852597cce2012a
SHA18c3371dec9ee1e2ac17c25fc9caf42fd0ae55b4f
SHA2561840c1d13e84b3a3014767162b2776590d22953440561849fe2d62ad5b074cdc
SHA5121f5e2f319c281f09dc4a038199e7ca8188972720b73f18f13c5042df1a8d07d5281fc106959871a974b32e911f0ce93cdeb24642f2172789507ef213b0266c9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fe0b0b475af1bca2e4fbfb31be1a563
SHA13b3947f806dd58863e7e86353ea6a4d89d985ab2
SHA256ecabcaf750e725943bc51a0d3536057cb67cdcfded8aeb6f09c95ed42639a2b7
SHA512257633ecd61ebcc0ea864836b16cb64f7ee0dd8ab014b13ff37325cb50794ff9c199e803153ba049daadcecc3cb57c6b171a649a63c481a6370992f73164f63f
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a