Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 11:44
Static task
static1
Behavioral task
behavioral1
Sample
71d76b68aea197800fe0c3475990c2f6_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
71d76b68aea197800fe0c3475990c2f6_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
71d76b68aea197800fe0c3475990c2f6_JaffaCakes118.html
-
Size
40KB
-
MD5
71d76b68aea197800fe0c3475990c2f6
-
SHA1
17d347a8b888bb6a68f20b621c4084e964d7270e
-
SHA256
20079033917c9f857ff6722043cf42ec9113d805c6456686fd1c4dd63dd899e1
-
SHA512
c20d65b68378954475d62af3a68cbab5d45d3de3067265ab0ae616881d118e9163e2a30b38b92e644c37620e70d8228e1f19880f8536d05f456098ac6c55c472
-
SSDEEP
384:fQ/SpxSREtH7TMNs2QVikdV9aFBFddmdxEn8PSzLD/mSxQE:EQVfdVYj
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422799434" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5F0B7241-1A8C-11EF-B02E-F637117826CF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3052 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3052 iexplore.exe 3052 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2704 3052 iexplore.exe 28 PID 3052 wrote to memory of 2704 3052 iexplore.exe 28 PID 3052 wrote to memory of 2704 3052 iexplore.exe 28 PID 3052 wrote to memory of 2704 3052 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\71d76b68aea197800fe0c3475990c2f6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3052 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eea9d676ea51f02dccc819a2bc70e94e
SHA1546633f848934f5a6bdd3e282a932a7fbe4e9b9b
SHA256596cca39690f43db972cc6587caf493dab2babe8d3fa8a8d105c6edc2bdae562
SHA5122a8a2d8ff9ca8160dee7ef626588fb76c2fdf577ce9568fcf260e102d251436c0adc35c1bb5d73367f53b8629ea693d8793defbc22c440f7283d55149b3d4e64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c1f19a3fb080f6f2b11c884da2554c4
SHA1cadb87055bc54be423020740b5c017cbaa736379
SHA2568ec3eeb3ae3e00bb4c9ea7fc2db29d4b22a5d00a404c70158dafda0ed5f3fc2b
SHA5129bb4a962ff0482f41c5ad09e85ff56b5f097d849fed3a7ed0cb245c3b5f32a02581858664bf7a2734919ca55090ac126ce69c716f9e3fc0df5355314e64b6c0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f54f6763cb0008790f12ea6995b56f82
SHA1b09402ae34432bbf7d42b870963eff54c5fc2606
SHA25678a420e4ea5fdf320124736c8b2adb9053191e9d60e764329ac96a3627b52626
SHA5125f650cc53db1ca63bdb8978685ef7bb5a9cb13cf38d29538c12dff64197cb83995cea72ca7b8ef867b7a9292b557df116f5b0748c8715be5fb1f49fc47a2c172
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5984be832017d0f1786b75287c1007d32
SHA1ff957ea2bd15bdb809687819f37627c364f47a57
SHA256a25ee149f62d830baf2f65b64ba962791427532b1bcbdc453550acbc311d431b
SHA512fa68dfbdbe28496df1acbe49a02ee4d6f42f1631d842611f4b8218aae50f590cf46070297516f3191df39c55a354cbeb5be60883b553e45f67fd9f59de30e98f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f29479026207abf51024d58c19a13c2a
SHA11af442c71b9323922783cc1ec5052fd5a4372c24
SHA2560266d5a79f972383dd37d76f90df9ebd135218baf4aa715833589b3ea53778a3
SHA512d72a8e6ef92a8aff4696b2363c8f278bb553d363acd5d2c23e9c1bdfbac802391fd80903183c65451881726370587a50a3104940c74d9278914fe0b650a03324
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8536175fe209ef951c6c78a1639352c
SHA1a0eca46a707489da9e54ee09d4cde9d246b7997c
SHA256a2cd2d6db241e95c0f1d9d9a1bca8344c2616b29851f174aac12a079e3c9a95e
SHA5123b3c6937130b10115532d0dffd193c1a1d16fc12419f7f4539e2422fd57b9754410bcae646860c8832c3ff4bdf4dab1a419a6079799acd774f0c07c7941ef993
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aab354b05b12b0f47387c4b625309bb5
SHA1883a27b2a6cdd2074fc23aa218b04469ec11d3d9
SHA256625d18f68218ec66a9d623fe278db460de2a145390717ec89c3b126182d8fb92
SHA51249f7e4b89289c18055d670858421ca2db1668eb3176b331157a119af0e22b9395b3a64341593ff9331c368a52a08f9515b5406003b674c7f71a9286140759ba7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f53e267194415f1906a55db027685ebc
SHA14718a6d7ca05f6a5dfbcbab1cbf49df3fbbdabed
SHA256c3d647dfc96e8e6b63e945adb1424af6f3164280420f50e385b4e34ba86f531e
SHA512824f86d9fcd9f78010593dd1788c32f25e5afe3ae8acb80ac36d885648973652f2916cf049c3eaef320566c62a697f003f6adcd99705bbe57f929feb5e168fbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d65dcb17a3b7b1ecf62a96cca06e6cd
SHA17a9bcac496b703be3de6813867d54ebdfc45b15f
SHA256fcb23d3caafdd1517c9ee931392365f6a416ba5b57364e5be7ae790475c0eb21
SHA512d0c3da2a6ea063924975be74a800255b2fdeaaddd2cb294e9bedaecdc1415a30f77cfacb065988ca91c84304d16c40331dc4d01f4627de541bbbbd71d14b8106
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a