Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23/05/2024, 18:54
Static task
static1
Behavioral task
behavioral1
Sample
6bf0bdea99f6360f773b9652d3e5db27_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6bf0bdea99f6360f773b9652d3e5db27_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6bf0bdea99f6360f773b9652d3e5db27_JaffaCakes118.html
-
Size
20KB
-
MD5
6bf0bdea99f6360f773b9652d3e5db27
-
SHA1
ca5b4c1216828565f5eb909813d6d478c00b9885
-
SHA256
a2bb8ec8f68442b82dfafc3e5fc8e423ffd8652eb6d338cb7e9d95dfd7c9fe2b
-
SHA512
543363f6fda91b93af2387a5f72f203270fec6bbc900486b39d85f1fdd8e02e5a85c565768c11496b0c213308ed5fa53dc9b6f17d42e8eb8a0c1bf7f1adbd9ca
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAI84KzUnjBhOA82qDB8:SIMd0I5nvHjsvODxDB8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D7A49F91-1935-11EF-B85E-52C7B7C5B073} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422652319" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1728 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1728 iexplore.exe 1728 iexplore.exe 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2908 1728 iexplore.exe 28 PID 1728 wrote to memory of 2908 1728 iexplore.exe 28 PID 1728 wrote to memory of 2908 1728 iexplore.exe 28 PID 1728 wrote to memory of 2908 1728 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6bf0bdea99f6360f773b9652d3e5db27_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1728 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ad46e7b699219415a8c84519008227f
SHA1578b4b9ae2dab95b8862411fc6223c64e05dc89d
SHA25661d574364748bbe30d06cc9dad0d81af13d560b1990adc964d0622d9037560a1
SHA512c9772e55475024f3871d74826cc14eae2fe9596562147e06cbf9da9956bfac41bbf7dbb10c4358a60892ec36a9dd624ba88d3b64e42511f9bb5b49124a531037
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570fe04adcc7a238aa70f1cd53295235c
SHA168ffcf99340c19f2b7803d9f535b0cd76eddb45d
SHA2567d44291ec5522b8ba90db8bdd0f515add2ac6f9434ba16f2ac6a06c35f2c8420
SHA5126bc23711ee6262c373604a6722a9fefd690010e35d33192f8170717b249491be3003df83c17d8377d3cf1fe4512e3707b414b982f52e39c619d15ef39f39325a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5677f0bf0d3c38de45c9ba050e32c4ea4
SHA1ddc63934a9821f751985e54b18996cacd817b46f
SHA2563c4dc8d6294dfb754f0e2b9d8c5750f8b89c65586ac1e25e83d6c9e2432f945d
SHA5125a89f81df183350444f488a6bbb6711e875748be51920552ed85940d7c915f42e6a221a2b5380bfe5d14d1adcd0ecd19f25c160c28bf4b6ba8bb7eefa09216c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3a753633668c57bef7ee3db9656b429
SHA1de260f9e8c03e3728c620010b2d5f417786c17d3
SHA25623a21f4f05c71304d4b3dfcc4dac56f0ad5128a982eed92f317c1806830b6b61
SHA51296726fff9afa368ee49016cf67485c8ed879d7b28c35546953cd47e5627376eb9c64814ee03f3735155f283e39a2ab99ce1e12168421beb232c7bc1ec3c26c6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a96d10d5f2fa0751c8df2c03c6be20f9
SHA1dd3eb15ff9f8190f19bd44ef8db158e6bfeeedcd
SHA256a9b39cb4997987001cc192be31371c4592de9866ef3329bff9a134e711c8c891
SHA5123b58dff88827ec7775b66c37d28fed4bdef6c92940560b8f60e08662faee232a5cb611b4e7096dfd3c15088ba2bab47d5984cd548173df792bf7e326f7738632
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cfcfad3578ee164880483d3cbde4824b
SHA1925986db622e087d6fcf5c89238437477dc171cf
SHA2568d163407ef0603d0d05458aa45ad56ac39dd3a099333cdb9aca6a272710c044d
SHA5122dff48081d9f87fe7086dff8eed2f54a1d2b45d6da4164187577f4659f7b35f97e492422165ed529e0c5f8b64db9030f475d89c33e65cd7789ab3debd13b6733
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3f2a87b0c562ac004c9298bb57a9751
SHA12171aaddbf7c504c8345cddeee30fe12a762ec98
SHA25687199e124046a861b25bfbf14172bf61e05dc1c9b4700ae472080ef37673b916
SHA5126db3f55184fc9c5f099fb5e78646a7510747c19dcfe4aec51e05991f02e34ba58872af8ae8841a6b974ee2b74e3aadecdb6902e4da28cd1c906fd943c60d6c44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cecb86fa08fe17f17a1bc4d3b7b0352c
SHA1ac3518a9f8eed9cfbbd7ac83c031fce923a72b56
SHA2565843a72879bdeaba800223d7c1cb78c85395dfcc7a1581702067acc644d5b8f5
SHA512b5e071651182c23465342cf5353bf68f7520c6a9914e9c768d654d97e6c459cf2ea28a2534c0ea7b7fb13847b0f4a8e2d3fb4721c81ea9317cdacb44f23ea6f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0892684a622aa7838ff918152c3b350
SHA1f8a70e4f4c785758b96e2d09978e9dfd170a163e
SHA25658c5c0f2b1f62afd13605df66af2ebbd6c8eed3cc52d3bddce14b0c70cb2da87
SHA5128bddb5862ea7bb14f03d10991d8a14f6d84f3ab99e05c0ef4e7eb4942687321cc4b28e2441e6ac82a7bad05eb53542557b292e0d92bfbfd77f79ab373a50df79
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a