Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 18:23
Static task
static1
Behavioral task
behavioral1
Sample
6f6e6026486075542fe39dc740745600_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6f6e6026486075542fe39dc740745600_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6f6e6026486075542fe39dc740745600_JaffaCakes118.html
-
Size
31KB
-
MD5
6f6e6026486075542fe39dc740745600
-
SHA1
2ca6ebda3a7e3a8c5cb4a736c994f7a5e96f6302
-
SHA256
a59446bb9b0af905b460bf8af2bfee25729219f8d91a39e817f1ea1d42c8ad02
-
SHA512
fd7b28799cef910374b63d91777d1ee54c5bcfe8bf12529bd154f8f9df6e351f55fb53b4df4365cf6eaf75a741bd91dbfa5655bcadeab9cc865606abe4d5c216
-
SSDEEP
192:uWDab5nzw1/nQjxn5Q/HnQieWNn8nQOkEntFJnQTbnJnQ1XCR4A53qRiv19UMs0N:MQ/KC4S6RivUMNThjX
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C8C571A1-19FA-11EF-B238-4AE872E97954} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422736905" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1848 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1848 iexplore.exe 1848 iexplore.exe 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1848 wrote to memory of 2936 1848 iexplore.exe 28 PID 1848 wrote to memory of 2936 1848 iexplore.exe 28 PID 1848 wrote to memory of 2936 1848 iexplore.exe 28 PID 1848 wrote to memory of 2936 1848 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6f6e6026486075542fe39dc740745600_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1848 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52bea34bb71a868a81d4d4153057ac76b
SHA145286133c30e686acb8b118849bec9711d09e012
SHA2569f70bd358ec3a3f162844fc1715e559c6a745d95df804bbff0e5cf9ae0cc5309
SHA51235c4b8a449145779f1b62a8f4c901999587243c9b719cd3aba853864698fb0b5e93c5af7b87a38be563ffbacf1dc72a14a44230225be5181819dcec18cc0d263
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cbec628b80ee6de6544c26e46509f739
SHA1ea80114d601f189d478aaeef5b234d31cdf330ff
SHA256732c2bb976bd125a8c2d4c3a4c13e8be5755f2cdb53f9fbb0ff6a85f5c351e9b
SHA51233bc3f89d3713c20d57b606f707f9d6be85a87207e84f672f6391f53c3943a30929cb70426932a4696d4ba59c39ffa27f003c7d10f00e30a3f3b69fb53122811
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54528d42377136b1bccaf7938a62428a2
SHA1bd436ba268c5cbfa23074e38ad8d203addb4cfe1
SHA2565e45f8a70315866f0d9d2d26519f7b4fbfca315e60791e67422e4a0a7bf2c34d
SHA5127ab5dd0c514cac6123442ae85d216adec43c53eed6d3acd450012693be5986488861238366bdbeef34e6d7351eca4905936f6f6c4bd5c0ba3ec6b66c5f9f923e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec72bd2ed7e2f29a19ab8eff75e034da
SHA19c7e97e69c7a1f581ff5b20d65f9226143a2e3a4
SHA256e42941590bd7f31f773b83b5e179b601a3022f990066370fa4f02244eaee20d9
SHA512e6e14ee7638fc10f86637eb27f6d87b3c672fa88549834780025447009ca52b22ba28022f1de935bb0039f715accc8d54ce6e291e47153b2d62e88b4f4f25c74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591d94d2a3ffe42a20c59a9ed1817b346
SHA1b7b954c2523496601a0d5bc50bad6147ffee527e
SHA25617f9b17d9d467a6d4fa781bbe7c2d93082fc008c63cf1ad49d745d8caf0cbebf
SHA512abb7cd54144b1578956f1f1e8e6b98e86ac928104bd01c627b7d235c48cd41802cdace5ca79e960fcf382f3d6799a72df4600c1dce3ef6898a938a4487f2e89a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9fdfcb8e9298c8be817b8f1f363a5d2
SHA12581ce301387b6e6f67a9344f4dd098eb62d895f
SHA2560d7dca222d0494d4625c82c6a2d4ab5182cdf8b360cb6257eaa92c8a14dcfbd3
SHA512271a0a16fbf5f2e5dbfd2cabda490c73c935536dc5b2e71c2fd6ef5e27e3f0a53bf4005a12deeda324a1ba7f0f727531d874cf2a3ccd93f65ee9778103f25dff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581dcf47d568436614b719a6148ee9551
SHA162bf82a08a7b527e621a530603295cb3ef834ea6
SHA25699ba44ef602dc2a7ab2e1c558535fdafb2f260f824e8df37ca9c3cb7895157d8
SHA5124c27ac4f98b5075cf3a775e3f03ca0e25c8c948fd69a36bd9404e94b20ef8f6ed4214ac0052aee991c127f5cf69fd00a5f6c268eae588ba651462a9a19625fc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c0ad5a1cc041a786c532371687e7e81
SHA1aa68c6de48ab7bc2931f90567bba3a77bb21b393
SHA2560b6cbcf4202ffb04b83786f70a449ff78cacc9c2df1ad5b27dbdfb567279acb3
SHA512fceb421a7a1948bd278fffd4abdac827b4801abbe79b2b10eff0f0dd874b7832dc196e32c4bc609ed8509e39127b7ec8fee52a382e0869546119c6576d1ce8ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5162f1a5e0b4de007d4fb80417ad767c4
SHA156cd344d1f9c0f9bef24214a8ad431e993974e3c
SHA256a2ef0377c4f89aaca988ca839725e977bc230459040ca611c7134d44fb877122
SHA512c338790fed76fbfbd97247596994177e101d15bf99c1b847d4c80a565a457667772f7d0cb0081a2fdb0d958cd0c452491b7de51975a3fda8528f87c3dafffa83
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a