Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 13:52
Static task
static1
Behavioral task
behavioral1
Sample
6ebc873b2c9b546a76257f2221e8d70d_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6ebc873b2c9b546a76257f2221e8d70d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6ebc873b2c9b546a76257f2221e8d70d_JaffaCakes118.html
-
Size
34KB
-
MD5
6ebc873b2c9b546a76257f2221e8d70d
-
SHA1
774de03aac1edff5974129d9546e5e81522a95b3
-
SHA256
e0cb949211cf51fc1a8b665e047b4ea8ee016df6a758aee5492369fe676f2187
-
SHA512
53caa3d05fa935078f1740a8e3b397d388a0c61b40bb5bef3735c2b89c170231697ac9c03d6c87a34a233e82ed18c0cf574970c45e36a9dbfc00a10a9a46f9a1
-
SSDEEP
192:uwP/b5n5unQjxn5Q/wnQiezNnznQOkEnt4EDnQTbnhnQOg4tcwqYygcwqYNFcwq2:LQ/MqHd5/xhIZDY62fVZC
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EE3F84A1-19D4-11EF-9CE2-EAAAC4CFEF2E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422720647" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1968 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1968 iexplore.exe 1968 iexplore.exe 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1968 wrote to memory of 2516 1968 iexplore.exe 28 PID 1968 wrote to memory of 2516 1968 iexplore.exe 28 PID 1968 wrote to memory of 2516 1968 iexplore.exe 28 PID 1968 wrote to memory of 2516 1968 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6ebc873b2c9b546a76257f2221e8d70d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1968 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b566f0833f83d5a2a8be16ff6d5246bf
SHA107c926988ed6a096af4eb4aaf97ca28c30469739
SHA256613432a73e65317f0c86e98c9d739a6e2b72e0e55a72761b6d4a99d2513f1086
SHA5120321d1129631c8756662be45f4e62fc7553cce92e6afc3301caf01e63a933402791aff5ab361cf6a8867397735ec13bf3e512af09cd357407f8aad00631fb57d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560a109c9a81846552ded904d8ab7565a
SHA1c87d57b5b0ba8171f94609df68a3254d1edc21a1
SHA25666e164a162aea5ec2b88b0c425ec034767e812cc866613a92ed3e869d3e84606
SHA51248e1c92b971a49c0d31c1b919d96a0fccfb84c80ea77429bb6a3fec22de3b187801971024101c047e12168e231d7fbc7648be4653fd3913fa836fb83a59e9368
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580259ffb56e15398b57f5857c9ca774a
SHA11480f9b49c4d4c923f12995337f6ca4fa19ca01a
SHA256d7f9af932a7cbea169a09ee158ce7a50c0f019d3c7b57de9024f63ada11d74f3
SHA512ba882e8ea449d9fa7ac0baba30fbafbf35dc586f6505b93cfcf6cb431fdb503a0a1f36f6486f1a1ba219820f6644a329b0a757c3981d259f9fc1fc2134965a00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593d84be5d26f64e056ae71d602be13b7
SHA1330aa6389d42c5d04c614fad4a91b98c77a4f191
SHA256244d47bd1ef601f2f2d91c16f6ffa24cbae3bab949cd58a822c5a93042a2cfc5
SHA512e6690857707177437290c28d070f8c60966201d5343a0b62972a0c15a1f19064d44c2ad023f0e565522c4fb05a1f2edc66300679f249ada89b155de16da88bbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb69fcee5793a0925b9e1b12ea52acae
SHA1aeaa76c9ea531655017877a83e476202804a6058
SHA2568d790d80f6d67bdc100c27985005203674c2d28b71a24e2f04a59cb4ed4a96cc
SHA5120bbe20f50a469f63d633d9a146ec2f77bb130c2e89095d485e8e094e5d110a14117e2ccf94f9118fde65d762ee8718ef67f09885352f52151a48084a4eea5ec7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8609091eab042ced6fc49e0c936d118
SHA1ee130579e9aad130c6b50d3df03b2deb02fd6556
SHA2563a0c169708ffc3cfc390fd11737a5b448c656845a68eb891d8e0e8ab0aeec298
SHA512db1e8ffee6f027736cb86189d005726d524dc7fe414ab05fb8b4a85878229c66eaddcf7574f069c8eafb0b866b39eaf321f375dc6e62bdc7a9c4827912e70355
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5276a78da0f6d7cbb252d33b082e16b48
SHA146ff5e92c93ecc19ebbacb901a8f108242283c4a
SHA256c31bb2a7a865600ce6a488278d68a86bffd7663e9b0430499683f8093a7be32f
SHA512333580c95c216825d2b24531ac2bcce82995ce14ea605a5ada53c36d37566e866c9aec61d751ca771ce3caf1521c13470546a58bc8497bcb0b67fe1fd617367d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4eb2effea7adcf21984e4a73eb6cded
SHA1cbc6280a6921a99fe90677bf9c3c82e1baeb0781
SHA2566c34eb1631d072e7fdb1bf184371b8a9a35e0dd12c312ddcc9fc2847f1ecb5c1
SHA512a662df9358c6ddf92c6b7bba155bf3d642b2dc851c547c6c4cf86b7cca6b5dab810aaeaaef91ef9e1df4e417a3f4d50bda0c005224e81c6580476739a7d433d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567aad00f806e01cf8261501e1c2bdc95
SHA1a0ba1b42e6950418ec867e02aa626e4f57460580
SHA2564d5cc060e8dcade4be9014b5b03d02a491fa55be1957e06d62fc69d202236292
SHA512aeddf7e73d60f723ec1b5d5da7aa3a84aeedb1d78a44ab56adf64205af133cca6feee84c3d9d7b92fe12414d96f5903214c3035a349b5478157e2ba8a3a8618b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a