Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 21:13
Static task
static1
Behavioral task
behavioral1
Sample
73452a58bcf79a5cf6cae0fde5f7d619_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
73452a58bcf79a5cf6cae0fde5f7d619_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
73452a58bcf79a5cf6cae0fde5f7d619_JaffaCakes118.html
-
Size
22KB
-
MD5
73452a58bcf79a5cf6cae0fde5f7d619
-
SHA1
d2ec4d5139d993e158dd38b98e19354a4432562f
-
SHA256
e41a2faf836d22e71cef0e19290966bcf40f6b96a7e5bc2000d5e39165f83dde
-
SHA512
0c38657c126b376fcbc1909bd4a1df48b54b2f3a3cf2f3b20f0369731c700c041e3a1b9b7b90166f8459ac5d7867091a79f50758162fadb080633b54be403f7f
-
SSDEEP
192:uw7rb5nC+nQjxn5Q/FnQiegNnPnQOkEnt/znQTbnBnQ6v06J4RnQNjMBAqnYnQ7n:cQ/2v06kKY
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422833501" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AFE623F1-1ADB-11EF-B5EE-F6E8909E8427} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1720 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1720 iexplore.exe 1720 iexplore.exe 2960 IEXPLORE.EXE 2960 IEXPLORE.EXE 2960 IEXPLORE.EXE 2960 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2960 1720 iexplore.exe 28 PID 1720 wrote to memory of 2960 1720 iexplore.exe 28 PID 1720 wrote to memory of 2960 1720 iexplore.exe 28 PID 1720 wrote to memory of 2960 1720 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\73452a58bcf79a5cf6cae0fde5f7d619_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1720 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2960
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5adb359573d1ff1f5ce510800de0dd176
SHA139f1d02f1549c024e41f2a49a6d264efe5643983
SHA256b06b59c7f306194eb2913a9462828b43ea8a281a6c6987d3cf293bd7e3c943bc
SHA51258d4ce06e0d083ebdbc564cfb1d47c216f99a41613dd79ab507e9d3a1fc0992cf260c425ee78d7051b45b4a963f013d81a3f4706f73081e5d8d58f9ce78cf777
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb523c1d7fe59e51e4c173e343d963f2
SHA1f3d38e0f1423e507b5552e7b181600f83c4e858d
SHA2561aae718a33f478ad1896a90db9738a9f3c48535f5050f1af0246304e111a3b97
SHA5126160038205e3d993af35680db7441d2941062f9ac26b6f8a566a5891b786135774c1b78fc3956682a1867cd542551cc626d1e120cf92109a7c654e587ed56101
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8530ca6700dab948a98a474088c66d4
SHA11f9873351646622a01b3962ba394cee0284c94bc
SHA2563f9fba25482ffae1852b13f7fd3348cf223053447a22ce42190b50031ed8d2d2
SHA512c32a37df796a1b3d28a281844b18007428955d4cb7e9e45495dc5d744f179c4cc6116148d7fbfff3928c1148fa51b61296a1f0b3aae141c13cd20aeb919a2b5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50dc0ba7ef1d4ccc01e71f5b6b34b771e
SHA16d0b294525dccdbfeb9cb49d5a8f571b3f54fd04
SHA256825ade19feade14c38c9c370f9aea1949c9ce4e70f7a80895177db3ada527f16
SHA512dbbf996b1f1e90ce50b11366cbd68f6a0b003ff1bc478bde585aaf0023a29970b8251f919bf37eaceef9e864bc2919fb8f336c6ce1d8d104ef4a958996a6a916
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540f832d5c31df3ec0143a4976232862f
SHA10a50f9fbe0972237ad5cfb825ab9b62f3ccfaa67
SHA2561167d8155c6b6558abfdea3c9d5ad5e87a6522cca1876e47892bbb7acdf33cd8
SHA512c8e6f09e5d47d982770fb1048703760c9c12eaa9cda8920d8da2e8ec100ff102b9a203458442e05a1e3db97822a22d4f35d1895b3f1d253adecdf014f5cbf2fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8f1cbefdf52aff99776824cc99bbf3c
SHA15a240bcd607397cd0f9486657f07f743a575c8e9
SHA2563a1de2dc9392d64390430d304d2f58effde94123e8b4c8f744e0159fbae00961
SHA5127f09117fe44df4d46d888a727c45928c52c316991043a4b3035832ec539a34d85ed0d0021213c138c74c60dc6a892bcf2c85ad26f6a3cbc2e8fcf7be6520801f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58be1139e23fc1ea47b4d183b1fc4229a
SHA151397fbf580b69827f7eb415924eb05e6a9d6682
SHA256fee8fada0db8e23a9be86d249433bf502ce4a41e072e1f2a31f9614d48dc8efb
SHA5125f9803a1ff404600279fdc1df6ed30e8c285e4af95a95d3bf1a855da444a42fa517a69aa2359f252c2344eeac233c8e36834d89c90be5ed05fb3144a9bfde3f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519d547f92de6985d61538921cbd12a2f
SHA1c32f8faed8a1f23a4086bcbca1ba02991650ab28
SHA2564622cdc2b1961f598feeb5879e9db07ab9822955f1b5231a5fd9d225db33be42
SHA512d29568f439b7ff73d582c371033d223b7df27af4d9b28824ec245f330eaf8cb1eab0183274522202d2a6e6fb21ab7d89cfe260c1fe36ce19d5c97beaaa6985c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5beebc529b3d4f46cbd3cec2b736d0865
SHA178744cc4bbd8a6379bdbfde95f0fb35bc37c5a4d
SHA256a1de0f7665a02bbbbd729e14563878de92f2fbb834a510b4de8e623b3d8a7b9c
SHA512f721f795dc17f7502bf65edaa266c14063a204ef55b6b9a02a396e387e5ff7aa2d503176b68bc1e76a0a659d007c5282f88b58070a5bbc3705ac4bb02881b453
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c07237b818f990cdba7f2c6badb39229
SHA189dc296f9ab0f6858e92a1a5763b5a48998dc1c4
SHA256b58e3519c75f5b1d60e1d4077717f108e488aec5a4b70609c9739b0084b0bb8e
SHA512361e176276384980c3a33427d87007eb58bad63f516073dad31930343ec272cda8bfb6105f1753f7eb9c32cbe0c92a405a8d1efcac28871d66190ca9ba84855c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5d5b7f786dca90f7207858895a4906f17
SHA1bb10b4d9ce63f23298645ec13f7e38f98b778fd0
SHA2566eba84112c96de3ba6ccc7e8fb59d8010e55f8753cbf65da6ea4bb5c74a088c1
SHA512c263dedc7a5bec269fe0ade4c12ddb14a02aa58fb1eb4281ad540811d76c1a584c8e52644f24bce862e9c527776dcc15c7a778781946d6434464b7f81dd05f66
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a