Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 10:01
Static task
static1
Behavioral task
behavioral1
Sample
6e21c6e6ca57e8e3c34d8950bd676fda_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
6e21c6e6ca57e8e3c34d8950bd676fda_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6e21c6e6ca57e8e3c34d8950bd676fda_JaffaCakes118.html
-
Size
23KB
-
MD5
6e21c6e6ca57e8e3c34d8950bd676fda
-
SHA1
df802bc4fb992fa37158fe116a7632161dd418bc
-
SHA256
9ceb39239802b92d2445992c711020a48202d05a5049f9e9446a1ab938732c72
-
SHA512
34d51fb59ed71f74c31e0d8ca180043d7043c1c8bd0ebc64c2e6ff699c456e021aecc24e8138c1aa2955f1b3848a64d756dc3871b0e44d591203385a5846f844
-
SSDEEP
192:uwjvb5naf2fnQjxn5Q/RnQieUNnYnQOkEntL/nQTbnZnQ6v06J4RnQNjMB0qnYn3:vsQ/rv06k+l
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422706750" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9301E7B1-19B4-11EF-B411-768C8F534424} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3000 iexplore.exe 3000 iexplore.exe 768 IEXPLORE.EXE 768 IEXPLORE.EXE 768 IEXPLORE.EXE 768 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3000 wrote to memory of 768 3000 iexplore.exe 28 PID 3000 wrote to memory of 768 3000 iexplore.exe 28 PID 3000 wrote to memory of 768 3000 iexplore.exe 28 PID 3000 wrote to memory of 768 3000 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6e21c6e6ca57e8e3c34d8950bd676fda_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3000 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bdb53df9e231da9894d8068519204060
SHA11ce8a36538c3629d8e20c52c00e70ca2de97d659
SHA256ce9dd9b7b53b4a07450508ae149e886234981b4d9e86a624801f01be9fb6a495
SHA512f9d5396c21aa1a496aac998eb830d0ac842b4e38f4d98e589a12243a7bdeee57913bc16924e8b78a28e21ba60f05797e5dd5619b788628b3a6ec275cf7ee9046
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d203e35f953bb9eb6ec45095fae07beb
SHA14d3fdbc75963e632337003b3c6ca41499946548f
SHA2564e47737d22d6b419f49a69c67e5e161bef95d7888f3cf9b5c6bfc69c945ba16c
SHA512b952c763789361293de873abb355927faae80d519a52532a1f70e6f9b09bf35e96d97681447edcc1c3c66ae907483170285d2149c7aa9955c940bdcd2fe791f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5096cb703a712008d8e11be79eef12d81
SHA14bed8a846ffe24c94127c7b9a68b9ba5f5b53a51
SHA256c02c9bc58aa4b4dd97d15da4c296e317632e2a546448d634b5612279ca6b0f50
SHA5125d368802f7f31872b8621637b995e4ef4b3caeb61e3d8997d233242e41b6a4670bc767976a45cfea91aaed7d41baf1d186e1def6621f82fb209685ad12999e3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574194c7d3139ff5b2b3699261789b984
SHA1fcfba3a1abfa8da0e3078f1ba276f09568901354
SHA2565274bd82a57102f7f60fd9a4b40e1b2ab6030a31d714d3890a5847c0197f4d8f
SHA512e5207f3904efc9b09010ac65bdec81f6774437ce2aec231f2b281305441c560d06fdf0b34fd93038f608d107f5ce1a3c30822196abbcc6419dee8460bc582c7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e464a47246c4cded87e83bf0e32d0d43
SHA15d65603c13e808b317cb3bcbd36dd96b481d823c
SHA2562d2a6ca62932a4312b8d9f00608a11b2ad5f6c69ac74094b97888ebecc4df13c
SHA512dbae44e3a5f56cdaa0ed725fa29851957be8daf4e91e7bdc1f02739b1ad8d270daf3e51c777fdeb88b40f62033f6e95693c1106f50586cafab0a7694a1f6e1a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5833c9814953d8d1701b091256ef0bb28
SHA1dbff96e98f5e4346a43cf294c282aa4890370966
SHA2569decad1464538e559a0a85fa9bf1d2f8e24baf84133a9b2b279625b8cd94fda1
SHA512f752c3ed1e473de50989345daa75896c5d9348f15198f583098926212d7587383d08a232b85cd0215153b8227095972174edbf2e1ed5e940a9122b359c446e83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6b3def35b1d0071850999beb94c293a
SHA1f1cccd50b5cdb508819f0ec91fd628ac43ecf513
SHA25613331bbee545b2c4f1770eac1478b5f9734ee38d3b8e7f551cee273bb090a484
SHA512f9f869f34db63c330a6176798e3691ebd2970163b4346804ad54694adbe2565088630e32215591937479dfe60570c5b0fdffc36449982df3b0b5809d323f2398
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553c1901f7bd82dea88fd6485b2862c0f
SHA1c932acd4dff44597e8a139e06c03c9d593b38e4a
SHA2560a151519eee84b097419192ade05533d2af4731ea301d7e2605279b97853692b
SHA512e5d09eced037f805c96cfa73d89d4cb35d7cfad879b51dffb98aeee3641f7f647db03b592cad3ed67d6ab74b06127b0bc34c59e9661e28883f659bd50836934a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a