Analysis
-
max time kernel
135s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 00:32
Static task
static1
Behavioral task
behavioral1
Sample
704bd142a075fb14101e60c3755873a2_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
704bd142a075fb14101e60c3755873a2_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
704bd142a075fb14101e60c3755873a2_JaffaCakes118.html
-
Size
21KB
-
MD5
704bd142a075fb14101e60c3755873a2
-
SHA1
da9d2f5a23d69b0ed4a0cf2f31646f0883427f56
-
SHA256
aa22f8b05129727eced9595849613383e972b43f94a174bde598357daae89116
-
SHA512
6fdf0cc2128c282b49e4b26090571ad13077ee7d6e0680dde5af23609567cfca0b5c9ddf4565241b90bde981cf6fb21cb638bbc6089a26642c9768c75266da6d
-
SSDEEP
384:0oO9Q50/eXFcqWtUwuemZf2/L3dbeWH9nxcZUOg38cYcFK:0S02XFcqWtUwfmeimxcZXg38cYcg
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{380BADD1-1A2E-11EF-8A5C-CE787CD1CA6F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422758996" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2068 iexplore.exe 2068 iexplore.exe 2096 IEXPLORE.EXE 2096 IEXPLORE.EXE 2096 IEXPLORE.EXE 2096 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2096 2068 iexplore.exe 28 PID 2068 wrote to memory of 2096 2068 iexplore.exe 28 PID 2068 wrote to memory of 2096 2068 iexplore.exe 28 PID 2068 wrote to memory of 2096 2068 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\704bd142a075fb14101e60c3755873a2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2068 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2096
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5712de2f4fcd129df62a88846c41db714
SHA13470d487ea975de44c12d745d6ab9e23975bf804
SHA25672ba077e3db4df7f8f6477ed986168bf911d02a72408f49df3910db4f90b0ec7
SHA51239c3a51043e60e51af23adcae21d24643789ff327c260e913f8e77c084f83c81251b59dcea2082132516999c1e9d1a1e3572c3ca058f4d47a46e5d7f39ea22da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59810bfd8232db42da96af361888dd05d
SHA1bc050995a86442d38d5d7036b0f7db026d9a1707
SHA25696fe5d50a349a1d416649194fdc5a8f2ce37c515603b1ab4d2a15b3cd07ad2b9
SHA5120645ee0fe87fbb995c0ecf432aa5fe82e4ebea3d5cc197dfbe8f2b50730d432900f104ed4dd3aa02b6b83da62c607a84f6092b41c6be4069295123dcb6795c86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa32d3b13863f67bd624e825ee6274d7
SHA171f3fff3ca18aa898d54d24e6eb208eb2b4b571a
SHA2564a8289b58ff67b6832155d5c595e3490283fad4e15b3a2dc181a1e49b596ff88
SHA5126ab199ada578e1331a701326af1242f0aa7cbc5af30142c0bf813b17d38f69ac24d6928a7db901285a3e0fad976f13e2e230f03adc304f7971ce97745b37ab91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c689aed5ad32de28f9bd58ab06a3a95e
SHA1e3ba56b8a3e781beb314444ba302a5a874f7c574
SHA256c4e69007dfbcf1cbeea27ca32ccd7a6b90056ee7def0b9733e80434df5555dcb
SHA51231bc6c27092c5b518b8362640ca672fddd3a7a02a13fd02aaff6437d0f514cc62667519a59807c6faafe8354f5897bfe7399639f728348510681c690d588e865
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5745647a96db2025c1d74a688838677d8
SHA15205156252e72f55b77b14beeb56b8d681f3ccea
SHA256ba06265eae5fb6ef50734c4faf860713b85e804edd3c4c5df99653108a0e7090
SHA5128a58d54b37cc6f216070f1dd10dcc7fbf87126d347e6997f02f94dea0cf9a41d27980ef4f79d8b574ce9c323138733503c3cec92fe729cc1a06399ecd7a195a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab1b4d0636a102ae01db9b0e9355af5c
SHA14840becf5a595eed743110365d2b2e1a2ac1773d
SHA256fd4c32789ca12f12d6fd733cab6af2ae672d2ed17174924502a42ccf66ed96eb
SHA512f764bb21bd18b8a2eb8d5580ea6906030a465a8d3d65578b9e0341c21d3b28555ae189b4f22de0f175f7dfb5c033d538ff544c65b636cb536a74323d91a54c0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5105fd050812b6db4f4a15fd0f3cdb650
SHA1604dafb5f37ded8935daa2c06929ae2bc3c3d013
SHA2565755a7c0f30b7ec7189d5069d3099f1b590aedca5d7a66768851a69c84906e36
SHA51262febb7d9aa3a6eec744bc756cae6ac1d1d0eeae81bef28f24014361f032762b743a2a8a54d82e15728ef41583b1f1d72f94e5d2afbb8d36fc22ae510389e343
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a