Analysis
-
max time kernel
148s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 14:30
Static task
static1
Behavioral task
behavioral1
Sample
75ca87e2ba17bf1e3c66aeb683992469_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
75ca87e2ba17bf1e3c66aeb683992469_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
75ca87e2ba17bf1e3c66aeb683992469_JaffaCakes118.html
-
Size
19KB
-
MD5
75ca87e2ba17bf1e3c66aeb683992469
-
SHA1
2dcab5f9a303e0a271243901acb55b45a7ab7c90
-
SHA256
35005f2f7d8efe6af79f399df63f9e6b0e3ed4c042bdd30a380a7987ac80a9d8
-
SHA512
7079f6cf427c8053b66d051aee5ce26a5afa1e53028d86ea0d7fe8e6708f1b1b685e94af89cea178508b4bb1d9115d6003fcae811b8901b5d455ead9c06226bf
-
SSDEEP
384:SIMd0I5nvHVmq2miQgA4G5iP8svXkPlxDB8:SE2pA
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{816E6B91-1B6C-11EF-8C92-6A2211F10352} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422895698" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1960 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1960 iexplore.exe 1960 iexplore.exe 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1960 wrote to memory of 3040 1960 iexplore.exe 28 PID 1960 wrote to memory of 3040 1960 iexplore.exe 28 PID 1960 wrote to memory of 3040 1960 iexplore.exe 28 PID 1960 wrote to memory of 3040 1960 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\75ca87e2ba17bf1e3c66aeb683992469_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1960 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50076fb05aadafb98fef4548b321bd02c
SHA15c9d2ba3dcf7d9fe2c9959cd98e8256c2a1520ce
SHA256fdf5151e78b5e86cee4e1153e93ca4ee41ed58da4b11f6bc6fc0a3042c6fe94c
SHA5128f74e9c87c0eeb415ba42dbdf4ad71b3d9324a736eca47c2965b478b42a82bf74702be20bfb2f2547bf65aec24e32160ab95805a40a6dc22b01592454f07176f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5665e6075624b8fb2d4874519b837eb23
SHA15446a10093511c1dea8aafd1920b0b0b1886b007
SHA256fde37141bb12cffbecdf098421f55cf7abc59ed9c00277be747b03ef3d95d708
SHA51232b1f1f951726e5fa0c94f14669bf9ff35e40e6b330df8b5687a7105ec4d9f86a6bc5268d52cbbe054b160348eee1d19ae6f2aaf1c3b8ca3073acd8b86482e30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57feaf9344181dd911e022a91967f047c
SHA133f22c3d013c5deccece020734e2429487fe2205
SHA2565e9a98276b5c7a9ec475987447ff7a7d4990c2c5186a02279ec7446a4f51d765
SHA512ffea44a9d2d1dafaf5196d04972d0f668c6ab9a487fc8cf70d5cebffd1b4530652f4ed6310d2ad4d016e88bbaff80abb94a570dd9d1da4dbb712def5662a6cae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5564695dd789fb9055ddeec47db5eb0db
SHA10ba8b1b80be2a6e3494c0a25e53c8284c5d2dba5
SHA2568818fdb145c05d859c495f73e0cfa25d7255926d16c37cd22ff60887bfc4875d
SHA5125b15ecf4993e29459e9d8a15f1f1b64c585152d94bc9cdbe626a1c13d59a798add50a80e2d6826692c1aec5a00016e71431cd21d5ac06c55a4b55f7f899eeb59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554f8237ee477be11eeda47e9fbc83994
SHA16cc237dead6f731abe0a87dc4e832d9fcb10fe86
SHA25688eba5791f66e72f43d8869dcf4a870f31889ca3d735760427f819c107520acd
SHA51268a57564b992f958c6fa65495eae69fd802ad4bdc31b97441ee1b7b7491e12420eaedc05ae3d82c0c61c64a60cc005c3784d6f7e1e10c4e858a1a8d087d5a676
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54de310056645ee558e698a81a896fd81
SHA1ec9c426e60d76189898f4b38917c6d156763f750
SHA2566506651d61ef741c93a82d95e01c5d468cb1cbaecb2566382d9ec471b3e573c5
SHA5120b7a6eee40d5b41e63e341751fa1d2b1051355c03735a0d0b59b8b4d22b7c76d1edb1b88867961a0973ec36c4a9da972e05e21cf2b520b6ad4ecd7420c1f20e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5716ea3b45b746b4a2ae240ccc1db406e
SHA17c2c6d0ad249cae24e79df5b8381dde794c64c6d
SHA256c0d2f1926e6e9cac3f24b36753ca653ece5e7d0271698569592f1661f00e4572
SHA512b4a18bca5d7dbd3291173dd13f18ad327bf36376a9b17a741e4e2e0af9f5b187e6f4036548933c3fa5d180d3a85ff694e385c9b4316142746a0f5c4df34e26aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5758eeaab6a347b96c517f4da52e3a0
SHA16874f8993fbe3b22916b4df289937a36180676eb
SHA256e7973dd289714984a5e1cc01fb82900a4d5024ce5c9ff450171fd992276a1d4a
SHA5121e25de161a458f934d93ec2449a76cfc92a2637c91699242c5e5bdbdbeb2ee8837874f40c2ef8fb615511650d29ef42e2744223ecd6f31c722b43a3ff593ed25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521fd087daa5f8eae52b5eb9c961815c9
SHA1b271fcb5e2478f15bc84bc52cfdb8d5655324768
SHA256b41af5fb1cff01fc812c88b383e09d8d2a60a2fd603e198b8e28c2af12500265
SHA512e44665b21c22fd9d64637f545e93b0b597f74caf70c51e8fc712af2ed39afbb1cf88a59e5d3cd33e8f5f2998eb267997fc81a4931d05b78ee6a5433ef3dae030
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a