Analysis
-
max time kernel
117s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 19:28
Static task
static1
Behavioral task
behavioral1
Sample
6f97525e0b27946755ccc6396b06c6f5_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6f97525e0b27946755ccc6396b06c6f5_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6f97525e0b27946755ccc6396b06c6f5_JaffaCakes118.html
-
Size
68KB
-
MD5
6f97525e0b27946755ccc6396b06c6f5
-
SHA1
5be3a44c0b7f7b7ee7648baf83b1e8456de4cbd7
-
SHA256
a1ed8fa67483af10796819ee76835cf64dda290ad5088dd0044cac892370a34c
-
SHA512
562e32c60f423adeca0aa406349e490b6326b9ebfc36a7f19882edff8dbedfeb1f42525f42aae3fc58bca18045dacd1a5d1ef9145986d611398853c0fe30437b
-
SSDEEP
768:JiAsgcMiR3sI2PDDnX0g6mj6f0doTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVGo:JbX406TcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CE846571-1A03-11EF-A30C-E60682B688C9} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ecc31ce1bae17645aff68831691db50000000000020000000000106600000001000020000000235c5a1234d91c0956a08f20166762d0915e66bdbd650c1befb89e3bf4eadfec000000000e80000000020000200000005d3eac33b8132a9197695d7e3750c3873efef5690691894b49a6caa9586784b02000000010b4f71c0846ab28d2a5cdb234149757c8e922ce0c48b872012e22631160e1e240000000d441f321d2c0ee20b6545a68efb2b4ac16909e2fce7cddb10034c9bc07130dc8d29918445d5d10b42596b775644d213e6eee342d684a79c29a57fd6393a49bac iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422740788" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b07d43a310aeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2168 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2168 iexplore.exe 2168 iexplore.exe 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2552 2168 iexplore.exe 28 PID 2168 wrote to memory of 2552 2168 iexplore.exe 28 PID 2168 wrote to memory of 2552 2168 iexplore.exe 28 PID 2168 wrote to memory of 2552 2168 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6f97525e0b27946755ccc6396b06c6f5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2168 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56a276cf49ee34d4b711249de31776393
SHA1892f49d73ac3c024806c72b4b56d44bc5b01dda4
SHA2563ffc06a4a3e8a0b7a7a93282e99a22859a347c6cae99cc01bb9645da2d3e3ac1
SHA51242572b488c952265f19bc228a088429ebe85445989538e1a3d446201a028ffc4cb2fd4e756ecea06c89d922ec5cb1daa019d03be7c225ada40310aa2b785c956
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD589524ec94ec3887ce2f59126b00a9b15
SHA18b6101975c3617363d296acdda49548274899a75
SHA2566e84b6accb53c57e69abfda2e7c8fad1889dabb9cd0c997a1cf0512b08837e12
SHA512f7da0f0334ad18f259603e60d82033acf275d0ead833c230812997d9289822abebe580bcd36ceebd77d0104c4af9afff6c0c0359ae6bd8b48830a8562c0c9cc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ea8292f57895c06aaa8f36889a8970f0
SHA102459642b5ed3ccf09564d2c51a6d3ada13d0fbd
SHA256fce08f8a6233726c2bd0482068f140845c8953a52448e5a171d0b96fe7e6690e
SHA512af054ba331af691c9293abf9e9710b5c67947e283771fa4c326c5bb4a3b9a514b1d023b20221691c4729b761b9824ebd23077f870503f2cd679e33fc83565b7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51d054acca6545a7794196e7bc1504317
SHA14ba8013bfd1efd464085237ab4cf201faf679dde
SHA256a198d1619f73a600f504615de32b054b2bce4a439cbbd585f73e055c71a4fd71
SHA512a93e9140e15e9e9edfe1d3c00e8e17226b65db8c478466812da1fc15efe55a97be3c2a22f2652eed14289a9785cbc6a389170a85351d094a071999ec6ead57e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58df1269380d42bbcd7c63e1c82abde99
SHA11fd477c503f52481de1f07d3a64f44afba8815d8
SHA2565d8ffdcac9d9f421a99e1436a91a9f3db3595fa97422e5c8dd153fb4d0fe21cf
SHA512bc2dccd59faba548eb5e17687ba5bcf8aa99623d045ee2e2004d66351cfec3a3348b71a6e3c079b8254b5bf7a5e341d130f94d2bdfb34f087a4bef4af9491721
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD532e20f9fe4417993f8336eca84f90671
SHA199211da642687eac772d502a4de07788254e9b6e
SHA2567b12c65db3f378eea2b941b6cb86ab9097b8e8045a54dc1cce149083624f1dd4
SHA51280e358cedb56a0fa28e1314f1beb564bd022cc4a3ba9a24f508eaf7d5c8b842763d5f847f15fb0cea50ea940e319f81890536cbc3696eb19ef71bd815b06ffc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51ab14b964a7ddfb103e2b96caf386813
SHA1b4a9b233f30455a018557311928d31f73e874baa
SHA2567b93af2fd0d0e157c36a518f526825ed7c3336fdd7196d69a401038a112167f4
SHA5129a4cfec728eaa4085b28e0ab6defb57dec6084c330a80f4398623170ee7f50579620689ba1af71bd6970f6869c139218260a1c7f861177b3c14d322b4a6f38a6
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a