Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 18:03
Static task
static1
Behavioral task
behavioral1
Sample
72cd05ac877fa19467a5655abd53483a_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
72cd05ac877fa19467a5655abd53483a_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
72cd05ac877fa19467a5655abd53483a_JaffaCakes118.html
-
Size
23KB
-
MD5
72cd05ac877fa19467a5655abd53483a
-
SHA1
707ca08cc4b4e76605134e63738798e3a67a697a
-
SHA256
e717bccb76e29cea41d97f36f30fbf00144c6d302757c0e6bccf90888226330c
-
SHA512
5dbb898e2e0f1938ed5dc35a959e573edfd52b3d0a7eec547d18b3ab7142136103eab5adfb022b82bd20c4003ccedca655481c5cea1597cb17090f32eaad9b00
-
SSDEEP
192:uwrUb5ntenQjxn5Q/4nQierNnLnQOkEntkOnQTbnZnQKdjjvMBLqnYnQ7tnAYunh:wQ/UMlP
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0F869801-1AC1-11EF-BC03-E626464F593A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422822064" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1876 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1876 iexplore.exe 1876 iexplore.exe 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1876 wrote to memory of 2556 1876 iexplore.exe 28 PID 1876 wrote to memory of 2556 1876 iexplore.exe 28 PID 1876 wrote to memory of 2556 1876 iexplore.exe 28 PID 1876 wrote to memory of 2556 1876 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\72cd05ac877fa19467a5655abd53483a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1876 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524daf1c75cb2079b0121f755d2d12c43
SHA1c902a91bb7f15a5d8b2b7346d3c107146c0312d7
SHA25611467b370c6249c759656965b26106016c5c8b35001049bdf2efda2c6c6be9ee
SHA512216624691422c8f2b84a504038cb56f7d5164d5aa6b77aa6bca4328bc71e1d7a2eb48ca810f445384d7bee07fadfec65564a68cb339d56c77440cccf8340b858
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b0d143dd456cd7ad5c130aa58ac6d54
SHA1068ce8a2cfbb9002f77a1638dc0202dc470c7c63
SHA2565efc897262f38ebf77c025a179575721e7cb505850e8c82ab5b94af07abd5a74
SHA512b9427ab9f04434b3bcb12023e13b2e30a3c1cfc46499a01b3f22f6ca4125fa2b2c4ee4becbd652ec2e8ad5d415e20ee153161a79c6dd29d1ee2937187590ecf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffc17318fbac17939fcf3e849d3bd7ca
SHA17653e30a7f6e63e1ace7a978cb2058fbee1c8b5d
SHA256b82957ffdec1dd6429229b7fdb19d1fabb3d468efde9d562627c60c56d7b7969
SHA5120f209e6fac4de8d43b8d46281bb672d06d37fe7089575d7f88c268cf6aad2e281ce8816618ad8496cc11a993fe1f2fdb137b0ad929252ae2c170c2c2296ab437
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac04c457feb52b5f9dec8b50ed2f1367
SHA19bd8c5c94bc1229851b0c168cb89bc32d4539652
SHA256d262deb2473e45be899b9f11619166a04b627d9e1298ceb0b9f8792d5217f020
SHA5120904fbb525e4995c96e6432fc2ee8cc73846966b0cfc9da5622560380e495d189e4bafc1ca1da695eff1f1c4eba04f35c52035c269e974e2d9a84a65f2f4a714
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5304a9c353fb00c56dea2186f6dbce477
SHA194951253b9f104ecab117848394f436b78f484e1
SHA2562c7660a620955e1a2c1095bdf6c8b9181848478189866b3ab1a5b2ac996b44d3
SHA51277e660a2febc7c3375d2f15acb39abe1829b7a9c4841b2a1ba03d4ad4cfa70531e2d701507c0e816f16385eb6437d1246447705821b89f6a5a32965632ff4d87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561ba01fea23c0db2e5b9da8e4d47a0dc
SHA1d86dd2742c6a308fa537b23ad27fe2150c21b1de
SHA2562c8b83120b9d38fb7fca27a41b0d6ab0672f4bd8468408125dd028b4c80dc76f
SHA5126c43d9c2a9795fac28c58b8f7947d38f6ca2163744a8508de71da40c8c0e4f377662f2c3861e705fd7ecdd75d8c322f6b31600aa41e353e3a2e21a7477f9d19d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c16fdf2e75c5332dd62fc1987d2535c
SHA1f7aee743e6bd323c695248b667be066086664ffc
SHA256b36afaad308d1021c0b43c898be15a784e26ee10673c1238a0dfd4a266925599
SHA5123bf163661c2a19ad067848c1a971f3b5f72252466826005201c66a45c4f378a718b17d4de9f33c53f217659eca53c4c4ef6ff1ad4eb83ef3b87ff05b15ea6291
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5397853ade26b2f92449543f0787dad8e
SHA1e0bd737389bf465f920a97b0b0ae4a3f483eb6a2
SHA256e002746a02009446e870a894b9f780b3cbb0802d263a1d158ad7d150b420323b
SHA512f435b56e7bf07cab79aaa9a631a347c3b868ea60e4a8be79d5c1b26fd2cad7bdbdda3a83bc6ecac04f9865d6074df46fd4977bdc9cd27992977cfbf735a55509
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a