Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 13:37
Static task
static1
Behavioral task
behavioral1
Sample
75a5d7dcc1b24618578de7f08a5d6dce_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
75a5d7dcc1b24618578de7f08a5d6dce_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
75a5d7dcc1b24618578de7f08a5d6dce_JaffaCakes118.html
-
Size
23KB
-
MD5
75a5d7dcc1b24618578de7f08a5d6dce
-
SHA1
6abf810ffc87e4cb03faaf4fc547c34f39963aad
-
SHA256
51d13a4dbd70bf584f85e6471fe35ac1af2d552895ce7d2ed6cf7971672316fe
-
SHA512
2801bd8f267fd79bc335138be4e802731be14f305770452ed08c7e9c0f780aa97f2b77dba7d3d2e83978f3b9fcf47cb1dc98058f5f3c0d6340dc80a5d15b6969
-
SSDEEP
192:uW/Mb5npCnQjxn5Q/0nQienNnnnQOkEntgmnQTbn1nQhCnQtXwMBHqnYnQ7tnMYQ:0Q/B9d
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422893696" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D796DAC1-1B67-11EF-85B1-6A83D32C515E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2728 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2728 iexplore.exe 2728 iexplore.exe 1216 IEXPLORE.EXE 1216 IEXPLORE.EXE 1216 IEXPLORE.EXE 1216 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2728 wrote to memory of 1216 2728 iexplore.exe 28 PID 2728 wrote to memory of 1216 2728 iexplore.exe 28 PID 2728 wrote to memory of 1216 2728 iexplore.exe 28 PID 2728 wrote to memory of 1216 2728 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\75a5d7dcc1b24618578de7f08a5d6dce_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2728 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac05d6528aef9f82e8c04d053c0c4007
SHA164f424726f3b614e85434b4b8a8b0a844d5318b0
SHA2566b1d624371a7472de4740c91973ab67e92af75738873c9ec760888af951479c8
SHA512b4a82931cb4d46a3f09e642ec938995a8fd6d2d83befad43fa26c218af881e5b6174ffd9d4080a237369076ebe1c235605f833a82ec3151e805db7e2d74aabed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e785a2a950afe448432336aeaaa96ae
SHA1c880e78e9222aa802c0f0f5fdf70195928dd555c
SHA256ced54d07a06f94fa70a2c521108b82129f0342bf8937a209c3cbcb1eb15767cb
SHA51248cb5aa2148031b24a19f12d013054c48e3ad59fd1161b99dd5e701925194956efc73360793397bf0dcff96c5084e5c208ad0924b3f681eb561defdbecd232e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9eef952c34b256d6f2323aa16014163
SHA1c51643a5a3667d817865b2e0484a144dcbb25e0b
SHA2564ae466af62107ad29a213e183f050e5ed50ff66bfe72e46a242d5b0407c2c7ec
SHA51253cf0a128c24f4cbf71bdba72b5fbf7022a56e6401ecc874f7226287d5df05d9d89b00335fc261eacf4c52c78d830eaba157b8532e19652b1c18d65bdeec98d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5552e9c2e762edc3748717f880b8d219a
SHA12f53b486de3c7a6f38519993ff7bd2d8503b23ff
SHA2566d13ae16cff53cdc064d2040a3d29a602ac533e754aee90673eb184f4342a5c7
SHA5125ee73161f0b51b223e4e083d1f547a091c43561aa6b1d7f7e4e9afa8b2c70ddf4dfce104e41e022fdf0a277f0e22752523a0419dbfecd650b4ab06979caf1fef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b507dac6638fb5d651939b6abeb83a7a
SHA1f77d515892469c200d9850cc10f662b7fffa35f7
SHA256fbd6af22316031450f490e429373015591e217612f7e5a7b2cdb7d7d4b440e46
SHA51267915250208bc3588989c3431e28bced09d9ef3e27c0f230d99aadce29aeb116e8f95c2889474d2b128b728596e1bf6c5dd0813058470291eae529e79cd68426
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0177f71833f29b7b9f34fa3281a268f
SHA1114a63f6a58e672430c1b7fec51f9c7cf84bceb3
SHA2562a1a3df9ce6b84e4c440071138389df6d864c1c36d9938542a29922ab988c061
SHA512105bc8797b276837d4113c3aa9409afaf876365a3f9d1c83ef5a41f22d8780cfcb02adeb5cf9c5a53862072df017033e0f30304fe509c673981ff2908b58a4eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa2d143c37f00f8f7c0121f121adf963
SHA13d77b2461403fb030878679704beaf002ed2900a
SHA256d1aefd8f76568f6d7b163e9f1a8a3860343beba67611e46b18ca1113e549324f
SHA5128a84dc41427387fb1ac0ff8b4086016ea61da2a51f9b229dfe346f2681b02f8f02c758e1fbd26a574914742b5907d3399598f3dbe8240fda6029586904b259f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5837bc338ff05a00572fd9accf47e3d1a
SHA151ea9870c3c38f96d058669fcf6b2bba020f1b1a
SHA256b359e7a7182cc366aa113c8513c7107c99fec651b933d565679a72bc6a31ddc6
SHA5127bebd008b6f580a822e41762703620bd57d0c30656265c15abcded08896bdf948e489138f154b01d788d8f16c2007581a0ca3e23e0143ea469f00b51d22eff8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5509c0a532b88c34390abf0b1635c9ce6
SHA1f44f398af0b21f86c98a858883dcb2fccc143110
SHA2567e9b619a915654b0d899fcf0fec14ce76885c0b22f395f5f2b282949b2d988c2
SHA51261bc005e6690d157b00ad331a848b6099f8b9ff506eb7e333c9b4f0d1c4146a6c5bf45ee87286535f03eb76137681dd6890d1e2a7e2addc6ba314b2ab72d7f5e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a