Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 00:45
Static task
static1
Behavioral task
behavioral1
Sample
6cd302eb869c7a9ff51a24bc3f638b22_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6cd302eb869c7a9ff51a24bc3f638b22_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6cd302eb869c7a9ff51a24bc3f638b22_JaffaCakes118.html
-
Size
22KB
-
MD5
6cd302eb869c7a9ff51a24bc3f638b22
-
SHA1
44e7fdb4a8674f8e5e97c6bf619967500e33c438
-
SHA256
9531a1a34b5d917480a65086177b1785379f7d4bdadb0b52c3160bbe3829b8c5
-
SHA512
ac49938d3d012a77a763b9eeda27972327ccc02f93153adfba10c11156eda7a635843d08447b96e79e0599dde02c9732b65be5e9a8802bbd43172ffc1fd46ec9
-
SSDEEP
192:uwXSb5nTNnQjxn5Q/inQieBNnFnQOkEnt6gnQTbn5nQmSixEGcYk5xHMBhqnYnQD:HQ/WdxAoGw0N
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FBC82FF1-1966-11EF-815A-6A55B5C6A64E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422673425" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2184 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2184 iexplore.exe 2184 iexplore.exe 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2252 2184 iexplore.exe 28 PID 2184 wrote to memory of 2252 2184 iexplore.exe 28 PID 2184 wrote to memory of 2252 2184 iexplore.exe 28 PID 2184 wrote to memory of 2252 2184 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6cd302eb869c7a9ff51a24bc3f638b22_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2184 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a61ec559ed8272e463f76851e22795bb
SHA1122ad52be233c0247986a6ac7434fe2073cdf2a4
SHA2561f3b5603d56628fdc736b38e3e2a185a151462d81bd5555482685386e104930f
SHA51294faf0a9169c9210499040c7e97f21f8bc9837cb83ccd57bf0ab676f0e79efc70f76bb71bc0db6a8e5d08ceb8921d8bb2d59d33c1d54b0a6f93ccd8b1f300980
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50162185ddaf46f4ec076393c66e76af9
SHA13092da1a01c69d5b74fdcdb49102698270fb3ee2
SHA2565716f37313ee2d217fce6326d2cf10cc0e37a437b326a738dd06de3b8cf827a4
SHA5123d46b1d4334f4b582df2b3dcfb54b9179e8f496046079b2fa5839e9bb07a5ba5b1ec31999ad6ce33736e84fccf0af8ea1c2b09640b2dc73cfbc678518693348b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6a062def2907129aacc9107afd0c52d
SHA1659e104af05579d9af27c790b76cfa15eb2355b8
SHA2563d2cf832f1dd1f3ace41828a5847c00c5b45e6cc04f9571cb0b9e0093c765d2b
SHA512f98e5cc71fdec8a88556fb95c78003c4f2f3cba9929e4a884cf1c0e70776f64fa006fd32a43349d011aa7d1494a21de91945a39813e7041af84556436b36cd88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd93bd56dc993c97e0cfef526cadfd9f
SHA1a33de4885d9e23306931122145d6845250839dad
SHA256f65e89f5e18ee593b9f3ebd5d5d8aa766359e750280f3652aa898cb78b19b386
SHA512110b137265c563b507c20b219bfde18eefef04d5a9a19404b7615512ce19aa0f3d123438a4f79413c9d9c8cacd3eab9cd4e500627f4bd3d771c799a2957d6fb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ce0c5adf65cccd6792a9c72c9facbc3
SHA16f4dca5e3bcfd978c9d1379441357557abf5630e
SHA256b937bc3e1fb20f81bd5e79e27e70b5efa6f384217d5e0438bed0b573c4df8074
SHA512ab0a9cd173ee208b8a17fdda7dec304ad91593efe9192152772c33c12468b4038131d12157b14be3107315d52172e204d99019e6b3f6595795d757d39299f8c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbd665e69e6313ca00d6da5a0cf812f9
SHA1c161576f0e1c0ffd0d9809f88400864f871c0be4
SHA2569d76d8926c600171d9bf5a409e3d9443b3ed44936c1ed473efe55a2ef38c519d
SHA5129a7dcacd80c806401505bea9415bd33142452e45ffae39f7e3d15fc85c0456dcf11d795574825dd23f9d83aeeedd49c7911addf1e66bcfe0b1d84837c54f4bca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51696db7c6f00ebf25167383d0d6be80a
SHA1bf2f3f62bfb5bcac2cb204c0d4f83043fe9d4120
SHA2569502ce179c9e90859035f23faeb2c7a9d170ad112a8b454e4ad99346f7113106
SHA5127be711df4c6aecdd2c9b431193efe9ae26f8f14b4488cc15221fb40e4c02f246a49fb353c85db22840f7ccd9e060ba27289592cfbc3c0a72b1113c4ee22b9ca9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5118fa005d11a15a337aaa281954c4184
SHA11f8ce59ba210284bf05072c1599d95afd1e3405c
SHA2568dd61f91140cf3a79d092e66099a79cb0026c7f8fbb56060a85fba9c6d86dbff
SHA512afac233dcf6ccc5664c419efc9cbecfec9df0ca07d69545fcd9361cfc07906cf42cc3a6dd6bc4f13a01d37b38f94b0335c318d357872389ff803f36751010379
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe4e4738975202c3a71800c5802286d6
SHA1af73a919e12d0d130351f4566e585193fffd4d39
SHA2569ece50c09a52244b49ce612ed2fe7acfbc94ad0e174034832ff157418572dae8
SHA5124700a5ad9ce66e19ce902ba9662b1c49bca7bd6450e80f93754dacf43059c55d8f5e75815962c01400e351a44a0fff5d590f65502f4a11e6ec26b12a9e402902
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a