Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 20:50
Static task
static1
Behavioral task
behavioral1
Sample
76c9adb6c85370f681b33cfba80b4be8_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
76c9adb6c85370f681b33cfba80b4be8_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
76c9adb6c85370f681b33cfba80b4be8_JaffaCakes118.html
-
Size
27KB
-
MD5
76c9adb6c85370f681b33cfba80b4be8
-
SHA1
98b72224f01c34246b4d7b2d630acd12170f49e7
-
SHA256
c3df6d1b22e0d3da6fa5515b96ac7a2126e042d312851f0722e33e14579de9da
-
SHA512
5c6e77fefe10b7bf5cad44ca27e03891a9f99dbff3fab4d60596cb99b5d712d9a5af448efe51dad832a3ad5910dfb3804061e7bedb2c0ccd9d98f393bdb7fad6
-
SSDEEP
192:uw7Ub5n4+nQjxn5Q/7nQieKNnEnQOkEnt5VnQTbnBnQ9ewCm60x2YQl7MBqqnYn8:tQ/4Jq22rScnL6
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422918502" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{985AB221-1BA1-11EF-9FA2-EA483E0BCDAF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1440 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1440 iexplore.exe 1440 iexplore.exe 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1440 wrote to memory of 2696 1440 iexplore.exe 28 PID 1440 wrote to memory of 2696 1440 iexplore.exe 28 PID 1440 wrote to memory of 2696 1440 iexplore.exe 28 PID 1440 wrote to memory of 2696 1440 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\76c9adb6c85370f681b33cfba80b4be8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1440 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5264262dd30b1f13b760d281abf1cb4d6
SHA14615435ea1ca10204b248beca0107009a1778c78
SHA2568514f70518c9a8a6b2230cff3e9d51c601feef8722c246ba43a77564daacc676
SHA512041422c8a7a5181331be65c6cd05598d12e5b0dead3b6fcd42a097183bf9decfd81e30063d84635dcb1841a5077033bac7b743c66963e369e1f331e6b460bf0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a993a2f955b36718b82186f6cfb5ce02
SHA18e60295df10a862e9bb497fdf0b9ff263d02b796
SHA2568ba5fbc9040ecf1d05756bdf348f385b1ffefb77018205180d5db8865d26b2c6
SHA512e292f4acd4c4193531460debedf95674d2c91961784db09d3ce90bc94093f0a06262a48b68e63f51189758f084cc1cfe21e778197d79e679299dc17a93ffb2b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52fe66773509fe312e68f6add83899e3e
SHA16c389785996d02ea26460b700dc21bab52cd764a
SHA2568d278b4bdafe476c3bf720c6c123d4b6f72aee1f4df762840babd27c3bf2336a
SHA51235bbec3fa89e9250bfa3627c641743e40f6e94606c0d39b659f30300fc235c30a149937b5a92fe265999cf56581d9e5aed058b36036b99d46bc07bec57a90d99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56cdf0c09db2f5b46ba5004269fc2e99e
SHA1bd7ba26db4b36b3ba17c6933ba9ab46cac51685b
SHA256f6b1352501c20905d9e3494e87ea8922a7e532560f5eabe1c6aaff05c7582967
SHA512e6d0517dce216c2b419b80a368f3dd5ab1bf3bbf73ae00a1c5268993f84ea33a3c0e6f1366714bc7a9d155d5165ef2f5e3673c419b23c29aa2eff1590fef87b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525703e8a5535b29cf9e7480cac4bbedd
SHA1aa752b8b0624d9149e5d61701c0b90801b78680d
SHA2563a05f403eb9c7672669bff51ee3c761c07c2af9c9ad13959f02a5bf8927ed346
SHA512aab29d0322ae1902c2faaaab1dc37b71d0a7bc57be90104f22bde2dec451d55dca1daafdeb7a10087e12c67cc06d8c1e6a7dd790938d53356ad6dd5722e80252
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ffaa7f11bb571a350d00665d1a8f12e
SHA17996eaf2002fdaa117c344d2a62407491e29f53a
SHA256e25afc49a389a7478ce7d02e604355f33fed32b8727040b2003a75090cf99ffb
SHA512f51e7a9a991e0af483e0bbebc499c9b81fbab773d6bcf7252b4d4ed63c2f83250d7f3cbb7eb7232ea6bab15fe08e66302e95d2e4561192044c13fd7475d6b294
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51feb8934725e9e0e15f748dd19ed4833
SHA1f76baf8572938950ed21e498d7b9745681dfb610
SHA256b834c5523abdc730257f94e95ea12cdb15b419cd4a025764987bbd0839f0eebe
SHA512e564502a97acfaff7bd16dcca04ccc6cdd4eb6e23b8aa3e3e0ffe1ad7c0fbd57869e4946d5a386ec28af8419e0d3fc31a4e395186c933074344e8c83a6b74425
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575caada472c74338bed1a7bcbece257e
SHA1490ffcae772bda5a330157b6bffa39836cad3806
SHA25694d4e011feca1b57509aa4af41c71777ac472b3bba36973d13b56fc88de20529
SHA51291bc11535d252c95bdf7f3a3b973d6960ad63ee2db5afeed4c917bb6aa36914771631f673a9a4d9e3225aa71f05acc68d3dccb3fd60024bef5aae4563decd684
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc5ca61a5f2a2357a9a244dfe4aeb4d2
SHA17635662ab7ad84f4d0eff4712cdb8b00d53dcd75
SHA2567735ff09b666e91fc5e10f9a3608360cb82d7688d2e6aeecf1c76d2b55924245
SHA5124a71afe395f80806c1c8576f849c5581d997d638de2bf5d5735d287d9a7b6148b11f31bff1718e373ff448db7920434f633b5d499f72a154c784f2a7e5f3e415
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a