Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 00:01
Static task
static1
Behavioral task
behavioral1
Sample
6cb82c1781782836ee216e51c86bd300_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
6cb82c1781782836ee216e51c86bd300_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6cb82c1781782836ee216e51c86bd300_JaffaCakes118.html
-
Size
20KB
-
MD5
6cb82c1781782836ee216e51c86bd300
-
SHA1
5540e9117ab471cb23dc15ce6ab60026c07e6271
-
SHA256
641623f82f53cb583173f3702b34d63f37e0956e0e3cff5cfffa03121f4a9691
-
SHA512
a9b74395da9ed0af8f188c3c5182a51372ba121df7afbb355d11e579918f8b627b9354f57e01e5f930f9cf10edc21e6c7468a734b5a7ea515ae5d4207e1e6449
-
SSDEEP
192:SIM3t0I5fo9cOQivXQWxZxdkVSoAI547zUnjBhN382qDB8:SIMd0I5nO9HhsvNMxDB8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422670758" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C6B6FA91-1960-11EF-AB95-422D877631E1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2072 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2072 iexplore.exe 2072 iexplore.exe 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 3020 2072 iexplore.exe 28 PID 2072 wrote to memory of 3020 2072 iexplore.exe 28 PID 2072 wrote to memory of 3020 2072 iexplore.exe 28 PID 2072 wrote to memory of 3020 2072 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6cb82c1781782836ee216e51c86bd300_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac46e88d8b4c4c69b39c185fb91d6ba7
SHA178adab3d48425e64b220398a4e27a9fb5a2e0fc5
SHA2567cf8e2b7789bf54735abb4feb3bde28312e2812cc3a6102c5ff831169983564d
SHA512dec91f2ba4b7f88f162722224434e11a56ccbc5d860916fe1ba5ecd3d31e44823a2cc501a057b8c449ded25ff2d44f9d6ee38a099a12303c3aa3a64a6aeaf4b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6c6091f16e50f19a098fb477beca296
SHA1211291326b3f6ae2bd57bf1e530af603ec25ea51
SHA2560285c25f07976a5ab29ed32b39bbcecf95652567411b738e9ac80ebf13e841e6
SHA512421e7be402bdd8e0594392da7fa38bdb8ba09562bc828e96c4850622d89741d12b7dc92243adc1060c317a0336a69958cc3c7fea1a0fbc476a07c665171bd21f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e826a21921c68536969fae0e86853445
SHA192a4bef3cc65350554b1a31f9fcc7b9bc7468d3d
SHA256f2adbde04927c4e5b7ae3d302a4841751a456bb94c95e71cc4d3270b9e44057a
SHA512ab270c6c873e2fdcfbb365b0b93bc0fdbe9f31ff477823b2f1f8f56ab4bd17a793aa41f33ec7694e1bcae49b3e5437813cb96f6f00df0ff5222cbdbea3eb813f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5069909a5d46bab0b356eefcf2bc6eb5e
SHA147dd7077ef2d48694f9ab0610458b5ce15656f6d
SHA2567b5cecf0df81c318b153d27c5da69a783f88a8b5cba5a261a8d65a1ca49f0733
SHA51221c6c1d319e7db3bbf887d210be2e8a94edc7ef393cd7cffca58a1957c0003340824b2163ee3eb006e8467d9cff32998af289b122d071efb9a77afb4097ada3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef4291034006a9e19e9d1087de129d28
SHA17e09aa6a21b60a252a84b0ca68072fac23d11332
SHA25690e35251ba446b8b0a87b415e495fb77dd04d3700f0b82f8463e8127c5c7f148
SHA51203371e0fe56c08de77e588b418954f0b5541300b44d6ba9c42177fd6513b762537467187cd0fdba5112f6f32812f8b6a0d3fe14db785d1dcbfe1b8ec5f7c8ec0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc4d754aa968e4cef253ac0583a0d1d8
SHA1e201c60eb08faac79ae99b4f313b0c1bba39300d
SHA25622ce84dd002ad04046df40d030a37721839e35492f592edde52946280876b942
SHA5123a25476c139d2bde376b7356384c776a214fac5d3f56104cfd80ba9dca5d1b944411fa216aba2bfb7910c853e6e6794e076012abfa1f2c39fb15f85333319219
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5643e912bb207b71dc031481543179169
SHA1bfe126d382a02b7f5c3accad5618aaeca4026c54
SHA2560b374692db2949541875df0dde1d81a944ba697cc175fc6f07e09a304792847b
SHA51236472b8232a36c0b6574db665ce352dc4a69587d056b3bee576f4dfaf434dd3d65020f05f4334f635c73f3863e9a1df40c5637a0839feb8f4ad352961f8a8f2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567eebf51c34327537b15f20ebd88965a
SHA180314afedb9fe3dcfe7ca91198e58e9d760cf3dc
SHA256271d25dde74c1cf819d1403b5b10937f7fb51265462467a19901efcfaaa86b2e
SHA512954d232420a650e953124288fccea521a200c17ec68e105f02ad184740e90cd89fb54a5b8866464ecf0a3abe0734a96a22e31d9870546addd1f6e3f508ca7ff3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e745f0926092093cfced4b33a3794950
SHA1359f50bc4500cc4091fe6825afb859dc2d2e8936
SHA2561554e650f939edecf4cf87e28413b3846488e259ddd906edc4d4ca7b7633a824
SHA512ddd1c641a5be480059e15ba706feb539f9492d2eb2e7473d55ca02647d208d62b8e275d4af580b75d612ff38bcf407437db3b85f9d2cb716b93c8a858ade731c
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a