Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 18:34
Static task
static1
Behavioral task
behavioral1
Sample
72e14338b8ca889f5e95cafc3dd8cde7_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
72e14338b8ca889f5e95cafc3dd8cde7_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
72e14338b8ca889f5e95cafc3dd8cde7_JaffaCakes118.html
-
Size
27KB
-
MD5
72e14338b8ca889f5e95cafc3dd8cde7
-
SHA1
056cb2ffe100938606ccdf3317364bf0af3f6044
-
SHA256
99db7f4071638facca25bb968053843ea55cd466fa7c5c360c8c74045821cce9
-
SHA512
f550000dffe77302a63566c7a8921c1c2301da4c219fe989e11b8470d3faa294170a17ee593635f08e422faef61c27f80598bf53b4e894529faf1c3b2c413498
-
SSDEEP
192:uwDAb5naunQjxn5Q/FnQiewNninQOkEntXjnQTbnhnQ9emom6l98OQl7MBQqnYnI:rQ/2HQj8pSKds
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422823946" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{71492811-1AC5-11EF-B69B-6AA5205CD920} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1960 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1960 iexplore.exe 1960 iexplore.exe 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1960 wrote to memory of 2840 1960 iexplore.exe 28 PID 1960 wrote to memory of 2840 1960 iexplore.exe 28 PID 1960 wrote to memory of 2840 1960 iexplore.exe 28 PID 1960 wrote to memory of 2840 1960 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\72e14338b8ca889f5e95cafc3dd8cde7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1960 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5ee00620be0d0d0b808be05b1cc9f58f9
SHA1e2f0a13ff0c3eb30a9bb65c49f1dadb8413ef975
SHA2560ffa30da3481dfbfd35796daf0d407d7cb71d6bf5668bb910b9cb4476c2f1d38
SHA512a6ef7fef323571647a4b244cad19f574a5acd03cff35ce408e1e1be6dd960836bc9430f103d6396f02fae9363f54aad651343a5d3a7a120c9e9e8f04f0c36d7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4ec918cbfec291975c8aa0d23d1d7d9
SHA1155c9a7430ab40bb9b9b55c4def8d0e58aa849b4
SHA256aca9f8b80c906e283a0864ffa6b47ce61cac89a1e35d1dace95233423bad0753
SHA512e525558050a0273b58e5383291aefb231f13f8ea35319d604c6af8c568871fcdb943aa9246a44a5d7739a90498afb9c70a53f567c7db6494205ab434636d2bfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc596f034fb969d82154a827a1bfe130
SHA17a9ef32abeb7b478012db7ec8dca4f299afd7264
SHA256a4f2fc8a2138aef7b888d82dc9483ea26ee43fd8baa603226f769bb2ab65cac6
SHA51286847c5c00f97f1c24ff72d74b3d4931f34a715f167af3ad3c75396eb4aeb9b00db12cbbd8328d29d58b7c10eeaa8de5c9471fd137eefdf75778800a2581558c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b844351d6202a9e121ea7d157da76e1c
SHA15a11379e7a9b9da23494b79b3bf0d7211c35dddb
SHA256d5315b7a38d8df53c008eadff45c08c969a730c1e18bc646396d3196d1c9d82c
SHA512bec2a6dbbd7fbafad4e02baae4caded9c4e7fe31b8bbe7a1cb1463b74ce7d7b85e8c4faabf64a38cbfa47464e2dc98afccdb30fe5d91c983ea1e4298d6c1173c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2e99e2bf07e7b3cd45fa55b8c248f41
SHA15498d31c34a784e4efd616cd024ccc6a3c14f3ff
SHA25668b4131ec7382d6fb36e2ac48be9c9e1b8f1f2a4be4b8398f52eac6e23752577
SHA5120e92bd792f2a6e95202ac4625c09436f5236b2220bbac3d7aa7b9feed2f3eee27b0e2274de68883e0c3ef7edaf18f764f7801ff5dc2024746c2bbc6fdf503c5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e95ecf35c5f7e455b41dd4e2c3e189b8
SHA1ce965f845af021d23dd6ca22767726f4f4c7fd0a
SHA2569ca8ab7614f2d478ea7a900bfea6090de200663f049192fce4ca2cb8bbc1c26e
SHA5127c5df20f3f37a8b28f4093e025c9c2f5274837da6ed6e1f2eedc3b7041aa85ed1b0352e96761b5d6dbc2fd828046d0b4bcfdfc31189c60ac4ab99ff681d8de1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8563fc97c456927881a3127d418195b
SHA15478fd69a5798cde02ff00d526c03d843089420e
SHA256d0487b8202b351de41b1f4bbab6a7940b1a3b2b5b39ec31b3001abb876150f08
SHA512bfa39643c6e7941710bb9e9ca6b7869c7ebabc7052698b3d02809e10948b0059e4df3f4b0ffd2c98464963220dc3b4ae3693bb95e1897ddc5d3f3dbae45dcd07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b374ab0ec717987c53e233f96626bc3
SHA1400b9587268e181099cc1dc5b277e4a57802aec3
SHA256d52b0f763df6f22a8245f5ad4da4b9c9cba864e5c4e67be2e3c5cdb7624b6ff2
SHA51296638e098cf90d40544e751e0e0724536ca988bd31f0606731a2cadfbccf5e73a4752703a2b319753931fbc9235b44358850bce6f30411d6841deef0abf414f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3a8a96e0889060eef6d621c64668b97
SHA137ad890bedace80681c405e69f11f16e8c01430f
SHA25647c947a8fee2ad4e000aeff1756488e72a460eb30c7ee77cfe687a606e60f930
SHA51215eca2660b3c708fbbadcecc580bee3a526c188480acf9e5be671d5cd5be08e39915ac308d406341869c2cbc3d1eae2afbcfed8a7be7d2ca36af30dd13860dbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea39e05a0e905929fb2a5fafefe27b60
SHA1c67dab321c5b7c086009a16c41e62549de906272
SHA256f9e5b312e3fac1631f615f5e2b446f03f0b4ca045a870e22ecb51939025afda8
SHA5122625ab960315fc6300ac5ed0d57fd73beb819bc7c24382e49e2f5fde62e490c64d5dc4585f347768de62eb904774661c1901e7bb826928a3cc66c4a18b40b2d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5bb27906e1f3ce6087f760c3bf8567554
SHA1f8db19ce60863d1db3e6700315840df45b6f8dcf
SHA25606a9b39f8f07c56993c413e53a087f6185529b20799f075331ca271621e7e6d4
SHA512f6ff507c3e826fe6ce28d7f84459c7779c7f8a9248725a911e17d81aa455bf2d48601336501167c4a3a99eed260f52fda101f92c1cb23357b8de7917ec38f708
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a