Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 03:01
Static task
static1
Behavioral task
behavioral1
Sample
70a67f074193b1aee6c84c5344250b80_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
70a67f074193b1aee6c84c5344250b80_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
70a67f074193b1aee6c84c5344250b80_JaffaCakes118.html
-
Size
22KB
-
MD5
70a67f074193b1aee6c84c5344250b80
-
SHA1
9d6d606eab25090295ec88f4927aa116357a3138
-
SHA256
7c9da4c885a4d303e275cb9590cb277d6faa344085476a082b3100f797a3195d
-
SHA512
8a37a7458cb3ef9005c03ee2c31a736da1ad5c3c0b1acac9fb5b017ee7451b81f99a673fab61682cd4bb6170d228a3822263a2068b9ba876942d17dc222fc6db
-
SSDEEP
384:omOH9iJzPMrGqi+fErlub/fQ/JvgShb909v06k9zY6LvFvjUfdsYOwP:omOH9iJzPMrGqi+fErlub/cvgShb90wm
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422767929" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0495B5D1-1A43-11EF-A01B-4AADDC6219DF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2272 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2272 iexplore.exe 2272 iexplore.exe 2980 IEXPLORE.EXE 2980 IEXPLORE.EXE 2980 IEXPLORE.EXE 2980 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2272 wrote to memory of 2980 2272 iexplore.exe 28 PID 2272 wrote to memory of 2980 2272 iexplore.exe 28 PID 2272 wrote to memory of 2980 2272 iexplore.exe 28 PID 2272 wrote to memory of 2980 2272 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\70a67f074193b1aee6c84c5344250b80_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2272 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2980
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5516788c7339c46bceab85d6f653e3713
SHA1b99dfc86dc3a0581f1d7f4f8a53aa824e618a87b
SHA256a48018d5e3e23ed49d754c7b1b81bb81141972ce635c8a2c51615cebfc040d7a
SHA512b072cabcb04bd888af56d991716c97ab31b891e6ec9f0e378d20983c441896938b89008760519cfcb5e051559ae9967b057ed5ffd56c085f051647f26a3851ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58aa16b9f6adf27b0ccfc26d4fcf10c70
SHA18e631122c0d2d9df6c02a75ceef69c702e63aa24
SHA256d19262fc0febec73b669cdc9f8d273bac1a8be6269edce5cd5bfd7378866c5d9
SHA512f4ff10bfa2dbdfe1d45ba0d6413c375f08d8f9b73872ba0f7f86e86e87a91b16f4cafb5080459d4d34e2d76555123fdd2308980aa7208d1bde93381d979f4657
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef41d26ba423efad6d9dada716ea878e
SHA1987fbb09e953a138f4e39ac3210d9ca0f298813a
SHA25650d6bbbced4f49ed7e5c7065d884578c310b76ecf25e9e8bad8a9e6ff6303599
SHA5120be366d361372af2c8b879244889b36a18f05ffd6f13753de4c70b0ec683d52212f1862f6af145341fd188f7dae1be6e4c4669daaa8670f72d1fb0e0822cf118
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5273a9ee978be1cd2620c5e3459b15351
SHA1d9a166a7dc5b91b909d222207b5a51285570d3cc
SHA256ca5c530e7395d144f94c29fec702b409d8fcf5d7996174df157a69ade7901175
SHA5125aa7dcddf98abc0c7c4a601bcb2e5e8efa49cdbb14fb241aa6d76e1ee346f859be68a103ae10c82f7715b66e2ae1a8b68dfa1d364ac30f2eb616409a5193a098
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d351a02303051f63ffb232adb46a2c7
SHA1791fe0b20cb8a25a57b8207399e601d2afa35b83
SHA256f8aec69bea59cd114060147d8e53c3f167d5bec54b30fe72b9bc537b02ed4f5c
SHA512b5cd9d616f43f931e96a9fc0de092c5a86cc3239ad6686bff9f5fd95f6a0c6b5432827ad601cfb2e4889cbaa2eb394508f17bc4796a92f2f4baa6ced0862f35f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589d91a2ffdc7197e65e4696f40fa4da1
SHA1be28738c70dd15deca44dd3212eb79858370c4d8
SHA25673ea53fb90230f99418c4fb84c1954aadfeb6fea58fa0cf62c5e606e582fc07f
SHA512282a1f39d3808936797a3c0cf503c87f008d5d13ad1d81fc25947b1323e9ff41f28fd9d0104ce934ec553f98235b46087e4136058658a123a634c7c8e3216708
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ddcf7ad75c554300be286170265e6ce
SHA11f50c953a4434b267c0debee41b8b3c69a775ae6
SHA256301e7b7eca5d6a30b5d304c42688abcfb326a716c9e6dd0d7cf1751ec1a5c9b9
SHA5127bc02f890545abed5cd66a83d346e71fcfd3b027b70211100173023361782426fce6db01b4d1e4fe2833df8f0e4680e2de0eec86b645cec82e4938d2654c9099
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e636f7f3747ee8c694a6423f77643abd
SHA1afb14e405dab39611d64150a698e239903978918
SHA256bce027890e4fdda4e4745e8d5d717d9ea46b76dde9af7fa5ffc5e1eeed7c5e92
SHA512e31f29ce1da7ac78680df948b90159fdd92719bcfa69599f5d0293716751818d39282e42ba9c1e54a9b1d99d4e0fcacf960beaae6eb4b24bf1e90b3a7a2ede34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58967905ffd5bc6dde20dfd7a84742426
SHA1cc307fae9021d6b526e3d303ccf2a10a42f638a0
SHA256774ac737d9038f6cde4af981b8bb059f3668248ce676945c9e9fe72947aed0ac
SHA512539625a2de5a2c40ed40c638f0f4d63d7d5f8021bcfdff72fd0bd237eb8d96cd76d59ce6c22f6d2736d50f05af574290c90d977993377e073581455a607cdda7
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a