Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 21:35
Static task
static1
Behavioral task
behavioral1
Sample
7a9b619fb52ea708b9ca706b2ee011bc_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
7a9b619fb52ea708b9ca706b2ee011bc_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7a9b619fb52ea708b9ca706b2ee011bc_JaffaCakes118.html
-
Size
26KB
-
MD5
7a9b619fb52ea708b9ca706b2ee011bc
-
SHA1
78746871aec6c0df3d1245dcc672c145a41c7686
-
SHA256
d2ce6b10e8013d22a05f4e915c510ca5c8873fd8478b458e41d70685b45b86e9
-
SHA512
6592f5456fc0a55389cdc09cca62c6e6b8af8c9bd8ae90dcc292444afa624f6ff6fed44b7c64d88d719c79a378489659998b3287cc36a843286cba9b1328ddaa
-
SSDEEP
192:uqDrrTb5nFinQjxn5Q/0nQievNn2J6nQOkEntU2nQTbndnQDCJVevo7NtqFo+Nzr:nfQ/AJcygc1l1+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423007620" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{179E1161-1C71-11EF-BC03-E626464F593A} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2868 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2868 iexplore.exe 2868 iexplore.exe 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2560 2868 iexplore.exe 28 PID 2868 wrote to memory of 2560 2868 iexplore.exe 28 PID 2868 wrote to memory of 2560 2868 iexplore.exe 28 PID 2868 wrote to memory of 2560 2868 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7a9b619fb52ea708b9ca706b2ee011bc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2868 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a7c0020ed01795d35e8e6924a4d18cb
SHA130ce9d79b2588eb6c5664eb37bdf267cce0bbca2
SHA256fe77dfa3ca0705f4a4fba76dc565455c560141bb6494005f00afd378c802521b
SHA512c56e8922efc07e6d84a163032a4d4f17a7d4fccbe7bce8e3d3ca92c31130f54455bde0335d25fda5e713a5a9c7a8a5de2dcbe489d5337308616abd6096e0c688
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e260d8993b0efaa60851c637961ab4c
SHA1f8863db9cb534d16fbd17d0105f11047acd28f6f
SHA256f8fb2d74a5d5bffada57f1a36691efbf06bafac4769879bd17ab09d709c14f1d
SHA5123a49fb9b68972af2e0acb74b9691622da469a1432a3af38ddd20ea8aaa5ca9dac62a75097f06ec33e26676483b2caec97b01b752a6bf2c9813ae9954f614ae3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f032bf054be0ac5e0901f780a9bc1091
SHA142250569cf5829ebdbdab3793461580acefc8ff2
SHA25676cf415e71ab1c696df720ea4fce1e354af8887153e82dfed543700f778906a8
SHA51229e8bcbf8ab3d583ff2920fa46e5450c0498f58b8175b7a1c3c5a35534630a6e971d343fa2fcf69a34a6e8214f91d10b0780f995cb78d645783ca5cf52fbee35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a659a5599e511b9eaab0cd848110a3c5
SHA1b494ebc6fd118c15397f59f937050e4a89c8f95a
SHA2562a23d235c067089e2f5370550e93cd9f3087bae63875cab7fa0ae4fd1d2b2253
SHA5124a7998f94a01e99fc0d84e44f3e4db2243e2093d53aee75c59e992c6de69e380ded0a873fde4eaf80677c84c47209765e8f32bf285ef39338c3db65e873f08bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf1b203e358cf798eb39b56b478a94d2
SHA11147736fdcb19aa1f75bf622b94d3a63c19e8e49
SHA25605429f94bf2a70a45c6857917b8fe0202a073f77ecb4c3516161dbf1cec01897
SHA512fdaa633a35e37092701745f86cec0bf98dbfe9912a0f31c96b5b2104eb6a61000a20364deec6db2b26bb3d55b46081484de5a7e09414e13d0d4e3c0c90b67595
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dca952b19f7aac51e3d4e61cb1da2bd0
SHA1fdcdb1c774fbde74f1cfd0ab4b55a5389a544bd2
SHA2569cc8bd35fff074c4e3f5980c506fcb6fcd366f505137a13752ce9abcaee1b16f
SHA512074e92b915a57eff7934dfe7ba1266350db5c4c310483fb7882a63ba5d21f9e874dc67b3c21565738474094f847a082eccf3b64240462564a5f2cbdc96b2d95f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f3e306d9c3365989961dc73d4d6be4f
SHA1be6fb032cd20b8206d90c114d003111847ac05fa
SHA2564bceaa2bbc7846a2d8e3ff43fd04a0408f4a47c7ac364522a9a64b35d7dc7a47
SHA51238bd68f04d5bafd8c4bc369a1132b4d359db3783cfa419eec39c430fd8c044d5d19f64af93f36194c2b72f85a18e952cc6edc19a3fc7eb822e5cbd88c87c419f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a3ee8285454ba155a4de8051bb46fc7
SHA18b7bd5e352e083e22743049408dd1d7f10007454
SHA25681a52c0f00a3b3ca041cc80a608c82b861c2cb3b2e3dfe59d614e4b3f5426649
SHA512fc8c6ca26113000e5483829e4debbbdafe4616118b2477e55a22dd254a9229981d2c3ac2d25bd2eca392664b11b7ed496df883ba57570c224a0e73447c1f0cb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b5b83c34bfaf1959d21744b8d2068f4
SHA110af28691c8ea0e32b12109e21d241468d4b82ad
SHA2564f8237a5fd051e7615711f79031273eae28a085fb2fc09ce17195a13d47779b1
SHA5126f45d2f17ca695e2072fdedb3dbb47e023159651df89068c7cb0bd683fe535633eb19b18d2f4d6f77a91343b4031f51c669040632cabf3bde0ad75e087eb0ec9
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a