Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
23/05/2024, 12:18
Static task
static1
Behavioral task
behavioral1
Sample
6aeaf15cc22657f717de1ac057f08e36_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
6aeaf15cc22657f717de1ac057f08e36_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6aeaf15cc22657f717de1ac057f08e36_JaffaCakes118.html
-
Size
19KB
-
MD5
6aeaf15cc22657f717de1ac057f08e36
-
SHA1
c59345e823ad9a3c57e4388a99ba0f20205ce25b
-
SHA256
bc688f95579e39b4e2e1cba2dedefff07a157d986282b0142b96607a95f1ae6b
-
SHA512
5f25a69f12bea79604ff4ef5dd7ff51411825052fe4bdb4cafdc70d6e2391e0bc16339fd308838c388eea9f213ab74d70c5d1dcdc71e3cc49394ae8a7ef67839
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIY4uzUnjBha882qDB8:SIMd0I5nvHbsvaPxDB8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AB1D61A1-18FE-11EF-9A67-52FD63057C4C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422628622" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1680 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1680 iexplore.exe 1680 iexplore.exe 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1680 wrote to memory of 3044 1680 iexplore.exe 28 PID 1680 wrote to memory of 3044 1680 iexplore.exe 28 PID 1680 wrote to memory of 3044 1680 iexplore.exe 28 PID 1680 wrote to memory of 3044 1680 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6aeaf15cc22657f717de1ac057f08e36_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1680 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553122edda00b086fcc1faf00b2220fca
SHA1b27766c66b92db60f5173330bea52bd0cb09e125
SHA2566b5bdfa1b98b32602b76606deb91f16c97ca10e15748397b4e5acc34d656c4e9
SHA512b5068d238aa0abb807bcc3d90e2f29a7b2b84cdc1c9b4827e83689f4d8fa90effffa820a7db81efed85af415263b01405361a2ac82974e339a8ba910f8fb794d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7b3daedd4d6868e62ba91da6b5ba44f
SHA1eed28ae2bcbb3ab27eae9b30518344b650464271
SHA256ecbb74cda5cc5035e4b2c47968a74479dd48062614bf0d763fb176a98b77504f
SHA51235cb4f3e7f3f78a0cc752c86d48e95c3a739c149d728b95c839175f44c1495b9fdeb709b407a3d315146e468db625c4a267120d524f114a069df260dbf0b60f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ada62f1f8d87d462e7388fa3425cf222
SHA1cc7bc843e7ba0bcf10c6afdd60be5509b134698b
SHA256f30bc66cb8c74d647c19f992455230dd009c340da3e7dd15a2260bef5bf86c0b
SHA512b69b6f3a34cf267379ad152dea416a072301b7794f1319d3d40106368e34c42e3821cf4198b0bcf5937c660c97a11f0f287758ca4de1835e635ad99f15209aed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d34a29464b24ab201049a74a7116251c
SHA11df09e4a14fab01336c7621c274ca68809ada7e5
SHA2569d2c0e0a737bf80fe5eeeebde6f9e257a56bc92d6cb26ccd9aae17fa4ba308d4
SHA512b3742189b82e33483a50f77fc340190e6955f8de5f8dde0479954e06704fb5a71ad811d254acac2185b0913b2136f6231b5e63ab9d56d8f20245df38ad5cf22c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566252c832529c3cb9ec4a65e77de822f
SHA19ee674113e78a20bdc0326ae28dc719906370308
SHA25632cd856d390060cf0551ea6475a9b828fae0e085c6db0afe9cea371a115c0de9
SHA5125c9420f83506188e189e24ee8533e72f1ae2d00d078ba4f7d0ea332ffb40b27d2a97cc5cc212844c5c6eafe7f070ec7e17ba69671a74e03ae18d1cb4be910cc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c06ca34d3597e8bdbcfd2b94c48bab0c
SHA14bbc2b77106a212bd43a820bfbe9b783fcc00cff
SHA2562dcc57bed13670fdf3e18fb3be5e15bca9624148dc84a92c83305790f915a459
SHA512638fa7ef7a0f10b4b6ceff159fb5ba346087ba3ed02db0fea991ccd8ce71dcc71645f25b5f7a6d979c188ec63cd178eacda42ad6e6dbf377901f47cacf3f40e7
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a