Analysis
-
max time kernel
134s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
23/05/2024, 15:41
Static task
static1
Behavioral task
behavioral1
Sample
6b6de1e4cbd4b68aeb72aa1ba41a8311_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
6b6de1e4cbd4b68aeb72aa1ba41a8311_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6b6de1e4cbd4b68aeb72aa1ba41a8311_JaffaCakes118.html
-
Size
204B
-
MD5
6b6de1e4cbd4b68aeb72aa1ba41a8311
-
SHA1
06ce8149877b822097fbee9da7b5a634fa78ee43
-
SHA256
898b61bf4c1a48643b9308e12c5dbabe3807b4a0d733876c0aa735b88bd51c92
-
SHA512
44dedcb2e987cc332510a571041e62c408f59bd78f298245a6ea5dc835044625c81d4d3228b13dadf3ad1811a9a9e3de193f0fa0caff5f619e613f5963a445d2
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F8AC8A61-191A-11EF-A41C-62A1B34EBED1} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002cebeac447120f4d9a58311d42eaa01500000000020000000000106600000001000020000000be78ac265835bba36ad79c29f2497e6101f8dfc9c81695b3cfdd0dfd3f858d4c000000000e8000000002000020000000c784daeb90b2a52eddbdf37ebaceefc75d6cec24571e75c3e89abfeaebbc8006200000003644cf0fedb408076175772bd30e5ca57d48dc6bd612f7fb7584eea37f1057ac40000000487e1dcf95a208f8d5015f0d8dd35cde6f2534c40229b49d6d2a2aafc138d574acaa6ba15c23cb36889bddfad208668ac1959c56f064b95f71d3bc7841497dc8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50f33dcd27adda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002cebeac447120f4d9a58311d42eaa01500000000020000000000106600000001000020000000791ada5845232f2a4dc095f368d2a0cace525c6fc41c944ac33b7c7ab8b7d25d000000000e800000000200002000000057fef531f0d50ff5d4cc3822b12d7147d476a87fb300355309de7b59ef41ad85900000005f6ee98a585346f6a9bead62471e5eef6a9773213564020ab533ae00c517237789301de5cf75fbddde7db8760b3e1eedbaebb8cdabf392d369ed11c7baf5c6413aaf90dac1ddab8a41a9cad956b152c267bb17fa683970c95ac4e26d38437b6e1da7bd39dbb760bdc3dc95b57bf5003b1d6d110a7f4f1e44ce254542ade022c41926f319f15aeaf04daf4da6579f155d40000000e141ca767f895b3158c8bcd95c703d5527b4bbe579c19ec2b69bb45b65f5d6a258802ad2aee0b74b6fde78d01cce4703d856999cfc2323176a85b0204b7799ca iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422640778" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2204 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2204 iexplore.exe 2204 iexplore.exe 1744 IEXPLORE.EXE 1744 IEXPLORE.EXE 1744 IEXPLORE.EXE 1744 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 1744 2204 iexplore.exe 28 PID 2204 wrote to memory of 1744 2204 iexplore.exe 28 PID 2204 wrote to memory of 1744 2204 iexplore.exe 28 PID 2204 wrote to memory of 1744 2204 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6b6de1e4cbd4b68aeb72aa1ba41a8311_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2204 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52573ecff7e34e939728f1a056da415d3
SHA11ccab6b60e19f32524b093bef7b6c6325f5c9378
SHA2560c17996b0c43fb215fccc0dfc92df799be5a00e4ef4ac6a845d840f1749c8d7a
SHA5126e939d17bdf4d10ab01dd964b79a24a78c7a9a419f0101c190d697ea3902f625b79549b0ed2bb72fbfed4a642004cff6aafc5e57dcf575770ce74cf357a7d877
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537d440a5fed7a96b59a6aef5ba2dea0a
SHA19689e141f8ed2b8e2aeafec8bdbefce53efb6546
SHA2567242c07b92f4c9035aa112b12a5d92618f41060ac43e1c25af72929aa7786aa6
SHA512dd584b0307097ed9bd1497d6a7b8ec4e6539e23816f40152508a1e80ba97e873f131cda6a6d79a6d70e1ae33cfd0652ed3c0f4908767f70b50cc2ce37734172a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee82c225113e97822b92cdfbb04f7903
SHA1ed006d0d9722f8dd76b48690be28ef56e90b4902
SHA25606f3348736d292199aacfc60d6e9a8ee67b4b795bba78c26106ba6dc5d7926af
SHA51211d29b2fc5ccebb0f225c83a7acc2d67803f1bf19c5daaf9eed30f7e5fba5a5d2cd21c30efc13b1fc815a739b807f448015f5d9940d144889ef4f9ec3db49800
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570a666d30f61791b00fca11bf895e276
SHA1aca71ae3b78d49492c063693f21e4d6b2af8f7f3
SHA256d1652ffdcc66cfe7dc081bf1e1272e8757d03bafbf7317b667435d6429211350
SHA5128b9eec31039ea3637180ce8fd369c0d91b4b33d6602e74a99f5766bfeebf71e3aa57b86173c56f9e35015e10684fd03cd9ce631ac32e00de86bca06f15be4cde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b841126610fba1407993cc0794419b2
SHA1a8950a3a5d8091ee99c61e9d0ee9e24e0513f37b
SHA256a70a7b9f9eaa9d58f512615a1cc7b146a110aec4a7ec8a05a8c2d3d2e67c585c
SHA512f2fd8728665a97a3e8aad8eae9c0084a3969b1f7f623b0888d810dba555da57324c498844571970f70272fc0e0cb56f2eddd69b3e1f6970076002402e1dd498e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f4232682ecf2a3fe2b0016198e9cf70
SHA1b837aba322031ceb0bf459b1cebf9715df640c1b
SHA256fef20262a4e40d8c45caf46716be01f93e67fe8ebbf4194923e2697736489416
SHA512b2f22713eba1455152ccfd180fb0b4629528c8e897e3d50281eb27781ae7aacfe452d4531b0bc8fea8c99fbd835444fb64188d699cbe0008c5b0021613bf20e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b82fcd3c7e9caecef5222ad08382520
SHA18c41901fc21ad931099b4df7aada96d4d552be85
SHA2563314225fc812452a9f98327677b99d507e2b16f9d3fcb0ae8c66de7de4872945
SHA512a8a4c4f381e1e1916c747c24add22a7a770576bc285991210171e12025070e7da3f19d9e7efcb6c579ce443b16fa3b26e29f6a1f05cca14200cce06c7dfb0696
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a