Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 17:27
Static task
static1
Behavioral task
behavioral1
Sample
6f4781f0d350d27cba4360ddd8a80e8d_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
6f4781f0d350d27cba4360ddd8a80e8d_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6f4781f0d350d27cba4360ddd8a80e8d_JaffaCakes118.html
-
Size
27KB
-
MD5
6f4781f0d350d27cba4360ddd8a80e8d
-
SHA1
8aa1d8ac2fefe4bed92b02cdbacbe9b453fb4dbb
-
SHA256
551504bf45d6ce15b8dea170b47163fbd1edd4696070262b273cab5c4a316214
-
SHA512
f9b1c13e46c8890daaa6e0b327c802c2f614f016b464ab33578593285dbadc100cc2081cf78f8502508d48c2566d6a4c111c4daeaef27f4319c744114909a48d
-
SSDEEP
192:uwPsb5n+GnQjxn5Q/9nQieANnTnQOkEntnfnQTbnxnQ9eqsm6urFwmQl7MBgqnY0:zQ/9HUSFwxSqNg
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422733517" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E563DD91-19F2-11EF-8ECF-42D431E39B11} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1732 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1732 iexplore.exe 1732 iexplore.exe 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2532 1732 iexplore.exe 28 PID 1732 wrote to memory of 2532 1732 iexplore.exe 28 PID 1732 wrote to memory of 2532 1732 iexplore.exe 28 PID 1732 wrote to memory of 2532 1732 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6f4781f0d350d27cba4360ddd8a80e8d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1732 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57969ae3a8261bfb4a72a6a1c95b4c7cd
SHA1f61a6f311bf5a914cae964be537e89641bc38f86
SHA256ff50fc12d37f1fbe74e95568a4c0158fe9ea59522fa44cbed67755e8ab7b575e
SHA512da794987bd426216f2f45466baf12c07e6ff99d7bbf9d87c42baf63cc856e2f3e972062b23b6348cc91376c454de6441774ea7aec0e4c9baa763884e0b0e3ca1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5602387cab25058d74986315fbbf3f9df
SHA15941e3d4a52fd8de7b8769e881a233cfdb6e8986
SHA2563649d76c924140e0b263729bffdcacd2348c8e4c369704bda9ab3f35fe028747
SHA512855096e0a40de43e55fd11f62a69943f713b2e7a5cd57382e14835944acb0727d036ab2c86112fe92238f6d29dd034ddd023d58411772f4a974bd309700dfb00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5085dd0e56b92db8ad748e803b672ffa8
SHA16d7f11a4691d88d529ac6a9304bf90b633783a2f
SHA25607369b218ce4c06057d4973695eb2b4ebf15234a4c84dfe556192cc1889b58e8
SHA5125b2e7127b2d4ede5c82c0e17112a4f4a0657a5619245eac4ec9e5f1cc471f833e52a9f2a92d0fb3fa9c439db206b6c88a7246e6daf54ca524ce3a81a3f316375
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3a3dfbc8533d31cecbd6899c68e491c
SHA1f319c90398662593b5ec93e54a5450614f9927fd
SHA256320e5db3f89c4183760175625f871121c98183ca1bc0e5f9af1cba449ba101d9
SHA512641870d0dad58abf2e1f17239e0c5f396c4f3cac760e8f5452d15f3766133db9dff17ab2df53172ecd54eb2e9363d8df83e3c0f6d6e0fc662d265f4ceb77c86c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52aad1403167ec3636dad39f2994ad2b4
SHA1708402a84ed08aedd7c8ed359063d66a0f4ef577
SHA2568f71b65a6fe14ed2a9719b5797cc853a3cc9903972193197ca7eddc0305f8368
SHA5124d1d2cd09edbf2fe5b8f897cd3234dc89f950410354cdee29df19abc5219adad342966251e14738a24285629921aac75e76fa363f2e73fa9329363d355d2714d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f6a777e439e4495cc37ea5c9240bdd4
SHA143c5dc37d27c1d7fd346eaf7cfd99f2f58c34e23
SHA25629cfb3aed05487a289018f5ccb3581f61c45c53bc170ae37c2e36d9bd4240995
SHA5121b1bc43b550a66720f498aaa160d8fa117448a2f90e758f69e30771b77c6f03edfbdc6938df065a86d68662b77492cce01268e18dcade9156a7d774a7c80cf01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ad0458547919d52bc9fc03124665925
SHA18cd5cd1a2b75d67892cdba5d362bf9b891116535
SHA2569fd9b97dee7664ab0d5161b154df47bb29c75a755af5607fcc8decac3e183314
SHA512f906929d49992e12ed4d788386b8f4f9450d85e089c557776a5857770f50a9da111ce5f86ed57f773f39754926368c503823e727b3a65b508ca0f6fadd72a632
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5062121cb7a06a1d08fc06e43d4cd0d80
SHA1cc9b0549b335417bb026d21508a1723cc0cf134d
SHA2569038c42a2e100ce7e904934388555ad791039be151ddc2d77bf82383004e78d4
SHA51295bc822e245ce38530e028bd048ad7ebd74ba1f6143b607ae5a60668b107e64d7bf9484b102269b80163e5a4902b00569c7a53351f00d13d95626e013416beeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9eac4c6fd144d7c544d7ecc797755d0
SHA16089b9651cc1e0165f2b7b25335bca01f6abcf5d
SHA2566823d35008d0a08022d732c2cd35a3d14ba60553174704cbd2f76f0302f969ad
SHA51236c8aa6e28f744122c36061118565e72857e09818c306e2f70b3a103b4940802ea4f1d459e1f6215c9a14215c182f3ca0a5ec69140800d3762d30583b8dbcf99
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a