Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 00:28
Static task
static1
Behavioral task
behavioral1
Sample
70498ab137a0266689c276ddaec1d5e2_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
70498ab137a0266689c276ddaec1d5e2_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
70498ab137a0266689c276ddaec1d5e2_JaffaCakes118.html
-
Size
20KB
-
MD5
70498ab137a0266689c276ddaec1d5e2
-
SHA1
1292d4fba79d93475aa870c8349990c8953a4786
-
SHA256
065cd7c4047422ba0b29008df3a7eda4dcae7ac86978404c8133588ef790bc6f
-
SHA512
c7f2ff603cb8d4b1f5d0758ae769e2191d1fe4d6c5c9ab59956d36a97cb2183003fdb18563922a1a664e5344f88f743f91d9ed2df61207eb1ae0dbef72ceee37
-
SSDEEP
384:SICNUO3lnRc7qx2GWBgrqXH2PeZ8Ek8mIG0JI0VrSqid:S13lnRc42GWBOqXJzI02
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422758753" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A73EDCA1-1A2D-11EF-B023-6200E4292AD7} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2196 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2196 iexplore.exe 2196 iexplore.exe 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2600 2196 iexplore.exe 28 PID 2196 wrote to memory of 2600 2196 iexplore.exe 28 PID 2196 wrote to memory of 2600 2196 iexplore.exe 28 PID 2196 wrote to memory of 2600 2196 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\70498ab137a0266689c276ddaec1d5e2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2196 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2600
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab0aa914d9312c99dd70add6531791ac
SHA1483516a6fb5b1443b9330ab44e200d279c4125b7
SHA25686c29246560c114c8ee981531e10854c31ab02367d3be97a1cfbe16c088a3e22
SHA5123c9ff489df338a434e21a3521f110a383bff0acff7a027eeed5df2938c54c5132a33bdabb92719c29bee96734f4c5d9ad94f30ce63715bd474fcb35750e977fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52071275527a0d4b728bba7d85f827fc9
SHA139fc38deb72392bb4c1693041404ab99570330c2
SHA25647d9d552ef75d481ce9f26c3faba5779e38c6f055f05d4dae02bbc0921f6d174
SHA51233c564c44aa9ed789eb45dea13719181e8bda7a831ca3c010d13581461c0e963b178d6b7a2a2fbf97db96c8eb43563b0b68a464f0b6a00a7f391c84141397831
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58052823ffc9393a1c1b4a03d8f997ef5
SHA169b40073c90f987084b90c8f38b8a3001bc5c8a3
SHA256ecb6de2ee41b47ee3111a70519706aa7c38b1b3765eab3fa9408bd3737eede9b
SHA512cc25366ec2c8bbad01146e24884820c463236b13ddc79c0ac0c136a4e01d9feb27094d31f1abb24935d0473cfd82eec88f3ae3987dad0e8d40d958d5ba9440af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55efad2348180b800284e7c4cbeb216c5
SHA1abd7b083d1723af47fd9a7fc0fdd48d0cd612090
SHA2563f83e5f81bb44189286ac205966847aab7df55498446c6fdf82c589ab5ca5c67
SHA512835da73ac94d72548f6678b2b7601a7c1f572730929d79953ed2856ba224290edf8f0fcf117bb64e543b5a54b0e6184f42a387cbffb419e25e80f12970621869
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2672fc97c8770b9608fd1a2e0648f88
SHA1e2be90b3ca9379800b24d58a395edff20394502d
SHA256b1ba4d82e93612935ad58674e06bc67f8340268f2a4e42a21db678a14fe50578
SHA51205b19462619f0777d7a7df31b8dafd4eb93101c8652a902a5f46444db370f01eb32b0db16ed57d01da47868e03f7c17f74748baa3bd823e2204587d630bed1b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50edf9072333117041587ca721cee9493
SHA13ec6bb081752a8bbf72686b844025c634b1f661a
SHA2569a333297c533a5ee5d43adf5e4c377d4b34964580106b68cbcb77a1ed9819a51
SHA512d21d21c30e6be52c4f86f75404437dcafe668426e5df3a2085d2224e2b20bcff71442e3fdedb0cdf1d164cc346921720832a6f2923e35446547cb5c0e65b1be0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6f7b9bf845c3d1177633f2a8d0c0c26
SHA1d979f251ec65cb49e3b43e5040c2c34e521e6848
SHA25653b11d2d660bf3185b5f8627ff9fd97a85b891cc49f97c009fc7e10cbe970fc6
SHA512269afb226c0971cdb154dd9a35cfe6eac4ee123411a7baa7194165286f3d27fa20f28e2168fa688a7317a1a9c7a2f9e2f7e2a63827740196fb3f183d82fed4ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a8441c82e2f86c3032ce34f2d44facb
SHA13fdd6a98c8075b945d1037bf7885f737d13a877d
SHA256f261cd6f94eb0ddcda6f8915e90369a91f4582aff157906d5edda0912ea783ae
SHA512a71dbdbd0781f7069cb19317d58513ae09dc6e90587e1e711dca6514782250b731a57881ce5fbe64a7e0870bc72b5a9fafeac8ce9145fbf4d2caf0aab3b3deea
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a