Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 05:42
Static task
static1
Behavioral task
behavioral1
Sample
6d7fd52c32f8bd293a7372d43ec54293_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
6d7fd52c32f8bd293a7372d43ec54293_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6d7fd52c32f8bd293a7372d43ec54293_JaffaCakes118.html
-
Size
23KB
-
MD5
6d7fd52c32f8bd293a7372d43ec54293
-
SHA1
1f8b889e1dae108f2f927fd91aff009303f01c53
-
SHA256
9d69bd286b6f14c8b58742cef46d9d2de229d29671ef78828ce308692b799739
-
SHA512
58d1fd47b067cf871c95dcb0feb1f44070ebb064e797c3781cd4fc55785798836c4487c603219a2378f0dafbbc78ff00b1b5e65f28450ef8e261b0d34524f124
-
SSDEEP
192:uwrgb5noanQjxn5Q/3nQie+NnonQOkEntxNnQTbntnQtBXsvMBeqnYnQ7tn2YMnO:9Q/2/EK
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{617E8001-1990-11EF-A346-76B743CBA6BC} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422691204" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1764 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1764 iexplore.exe 1764 iexplore.exe 1872 IEXPLORE.EXE 1872 IEXPLORE.EXE 1872 IEXPLORE.EXE 1872 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1764 wrote to memory of 1872 1764 iexplore.exe 28 PID 1764 wrote to memory of 1872 1764 iexplore.exe 28 PID 1764 wrote to memory of 1872 1764 iexplore.exe 28 PID 1764 wrote to memory of 1872 1764 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6d7fd52c32f8bd293a7372d43ec54293_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1764 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1872
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577d44462d466f161f55c063d45e864f8
SHA191fb5507fcb519531305bb5dc04d478bcc1d38a9
SHA2561bbf3dde073d2f746bce236aa7866cab94a8e5ab596dd692163c5ff3283ab5e4
SHA5126438ac5f8eeaa35ff7f76acc9e2612b04b510b147ab3dd18eff8c2e3e470665a315363fc0481697371aa0177ab81ded133aa993a4d82224ee9b2a46a2e5d0368
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5391ec29dc2e9f8343615681c6a5ff9b0
SHA1b9d013b84409905f0b84242dedf11ef8af26e285
SHA256d1a837c5f4ecbbed0d15f9448e600c0a5b36467e411f8514ebd1a1eec0969b25
SHA51242758f34c224b11cbc13e5d45eb3aab7438e1f9a59fc101270966eae4d000e0acbdef03216d4fc44e2e9f6b93560f767f45e78706c2940f71c37410b7fa78ebc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e83b1c8384c285aa25744b97e4c5533
SHA193c90b7d96155840ff526b3d6d77b9c0b1de332f
SHA256cc05a47742b4d1d0e7ba23aff823a842d4ff46d01efc79f0da6771085999a675
SHA5121266393efb58cb3280b2f5a67c394449f672d9948311f66127d89649058d0f224b99d7b9abf4ad95cb467f7edd849aafa905d680c0707b2ba7173bb47f395154
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb667c54d603e62ad879f9598f84e03a
SHA10624e10e96015aeab67dae39fa0eff7af15373d6
SHA2565fa4e26dce661e6b0a4b76604b715f7e00e4dc78b26f0fe73fa40f0fabbfffb6
SHA51285dad378dae6091c8d58b2bd2c0378106e854941cd0e7d56649b0610153860086d81e1d340cc70c0595231cc017e0bc5bd13f23833ce3d806e6285a74d2ce22c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b303c8c4ddbe189ae8ed8e759475a2d8
SHA1810ed56b7f47e11d40726162cca317e79cb44748
SHA25639cfeb2f43b91d7dc98130fe55a98cdcecfe1a64acff1fcef9680e545c043c4f
SHA512a018ee37be3abed71ff702f5274efd59df5560f0cdb7511aa8cdab0b3a1a0008e1dcfaf5f9d8017a725bb273af284e30d9b51fbe79ea16a1c8696dd53d2ecb4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5843ca6eab07e939fd647a607b3fa11b3
SHA11c3b461902593b41cee53e8e4ba32af98a8a816e
SHA25673d8a79b1b466ab99dee6e9cc30dbc848da6d25ab3ea186d2d31388735e21c7e
SHA51221de6db31d74023def41f479fa9fefeda94fd79eba400bc0cb5f591d8da61a8ad5b3847bbef67aa683f01579d801380898a8229af0af3fb1a91d1d503639dfa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc9095693edeb9a41aa5765a77b84e2a
SHA1400069c9345bcf691fbae98c509e216dc46db8c5
SHA256cbe2b8bf740f67879d9a3988dd691a08e39d7be4f94458e6060c1b5dbac1964c
SHA5120bf6f7a010b840ea02c7487bb1abd0576409dbdcc58537395fe8c535290a890032136555a69046e5a310d4e1e31b5d00ee6718124d200461e906ed9e7d13694e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c15d14bcbe81fb67f834df350c9e449b
SHA160f67ce4e964638a1d4ed1390f5c0d06aa85521c
SHA25610863a88f9b38599789850e2e4c71a9c91ead21dadadef4d28d34e9be80263e3
SHA512ad22047cab2bfe095052e31f27968fc439646a4d500320b62db312da34e02522607b45dfe86c50b8e4882a549e84a9d3617901f37f698ce46d785f9d291fa63d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547f889ba431463d020ee121416e670f7
SHA16118ae2988050d63bcf6bbbf5f6a01e3ed478f4a
SHA256df8bfad949d4a6ab00d19680dc617795df4269b5ae97c84665dd4ccd52bd9db3
SHA5120d61b73e27d153947a1257fe69460e553cacfdecd79cfdbe22ff8762110a53a4b55212ec0552860ad047fab01aa11c5cf52a61526db05cdee275ac0f466bd6cf
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a