Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 01:56
Static task
static1
Behavioral task
behavioral1
Sample
778739974a95ec214b78d2834a89bb0d_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
778739974a95ec214b78d2834a89bb0d_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
778739974a95ec214b78d2834a89bb0d_JaffaCakes118.html
-
Size
18KB
-
MD5
778739974a95ec214b78d2834a89bb0d
-
SHA1
a6997744dffdd966f5a9977672d629b8fd75ed95
-
SHA256
456008495dd9369f7352cdef0ee22ce6ab14738e1b0f46d320fd7b484d133884
-
SHA512
e8723071f26a7472bb61d16b84cc56d10247ab14b133618e344e04cd1a453d17a3da7f128ec0f67637dbc790367b5c1141d42940baa0c9acce5706ad6c8c96cf
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIU4mzUnjBhi082qDB8:SIMd0I5nvHvsvi3xDB8
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{54E2E141-1BCC-11EF-8857-46361BFF2467} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422936856" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2884 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2884 iexplore.exe 2884 iexplore.exe 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2884 wrote to memory of 2964 2884 iexplore.exe 28 PID 2884 wrote to memory of 2964 2884 iexplore.exe 28 PID 2884 wrote to memory of 2964 2884 iexplore.exe 28 PID 2884 wrote to memory of 2964 2884 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\778739974a95ec214b78d2834a89bb0d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2884 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD538ebfda8decd4fc9d159509c123aec64
SHA19e0e7a0c6f95190d8db147bf2d5164111e9ed830
SHA256a31398d246f9ff6c9f31116ad82aecfdc15770b03f0519a760ae6aa8b0a9da95
SHA512d655d5f0bbe5b1b82262c4c98d3bb4526255ec30ef56f3ef40b454eead51cac49b7a8378fdce26a7b27a16fbbd022b7abfb2f1f8853a9397dbdb3efea64da124
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53aa037852853aaf78d2f1626fdc25b31
SHA1132536982aae5f460b2d7d3f65b9af6c9fb427f0
SHA2569a0f17460d103c3dbcf401c96bb30c3a831129914a235943edcef3d689937968
SHA51213649d35973efcbb6bd60ddedae56f33650e4b1d878afda1d6406a0a1a95dc04fc002f4a6e86e8155c9814e60b58a203b0c7606059df69ad8d44f1eea9d18ae8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c0861d87bad2ee96ff8ff3ee65e0b04
SHA1f8765e2e51ae893d5a73ff7fec4c9b65e13f3454
SHA25641be5f6581094c397161490b34725597a03bf4dbc289d56704f1e9bd318735de
SHA5123a4c48caa0c0db8573ab5bf8750d43cba2499ffe03317c2d38c026591f735d7f0d9e32bd9d807372933806bf53769016a1e8288a9c91d3bb6c94ff293077d91e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8257d08994132f90902b1bf09ecea67
SHA174f7b5df32d0772dcdd33bcfed0207398ec810be
SHA25608aba81d3d8885ff7b6a9d08ad43796dcc47bc3a6d98a424ef1a05cf0a7babb9
SHA512f668b7dc73da4d9bcdcee5ee1290c30f254bb858e55f585f303a315d84e9d7544f2de7c56246c901e9ca23784b7dead533d87c434702ae16477cc472f9a26742
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f050a56890413450fab509d083fe1434
SHA1d4e0b8ac1d19640fba4d9bf671a15c75d0d50b8f
SHA256238544847ead0d8f004ec10518a201c9bd3593f937bc198c4da7df48fbbb5e33
SHA5129aa3b4cde29a497aa39b3155195e2bc95e3d1ae126dc1c3bd3ff46a470f1226cf0424b34d2aae0b2a7d5afd96030a8602d687c1e653ef96827eba381fd15f818
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d7deedc4e920f84b79ac3ac1db18fe3
SHA1554fe2ad32f03e35e9f182a026b9fd96f0d3f821
SHA256bbb586c67d22d0dc90c5d4d8a80054e768efc53fd7eb224cb988c03697670379
SHA512c1fee1bf2305fb38e7131263e37a2f21686f32de6dd97fd0532297e0efff025288bc133940ac6488398150eaeb99325486be311816c5106ffb23e576ee5a6244
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c6bf60bf5166fdff6110af79974fca0
SHA1c963d1c02f85d1759b6586c5d9457ca934cb0627
SHA256dcb9d555b62bc7243a51da9a6d7ad0785f3efeed9350777413ab2d39412ed677
SHA5129bcf27678067023828f98018118a1392a1471b6aef4f1d2cfc3acbd3da300440b0763de1decb2929c7cd9779f6d02ef6484858d4b8be2810a92900f02ae8b5ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535fb33fc0c03ad4220e063dd212e7596
SHA1420b9f894d6ad751267af68b0ed9be48da9da004
SHA256516736224d280baad6c69387cc33785e72610d16eed3924c17819fcd340d0d2e
SHA512142521c5076da53081813a1a617c7b2ffa30353aff8f9d6c1f161848fdb9afac75d153e6f4fe4e93c6e9c2cfc57fff2f849189a5bf59513f8992b550cceda249
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1f22af314f745a2a003a1042e5f77ba
SHA1c4460de75918ba59e81a17b25b902bbb380bbfc9
SHA2564f02f79ce9dae37d061194fbd6f7fcf09e3ff69b3ad2566614f8e2449fe8a2f9
SHA5126d0c2d57876414cdd98bd2f91804310fbf77d856af42d015884b1bd6cfd4a4f866bba4e27a645a2ac8de7bc0ba7a38e3113b9e6dda3bb968515532459ddd2a74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b3030f6d54027e4f9a0d1824dff1f42
SHA18492f7ee651085925326719eca230d7baef90510
SHA2561de4a9ccf4f944715bb57e0cadd55276c6f0a55f13a57de888df2f53bba94bf6
SHA51235312ba51905e651bd51e57986a4722989ca24b619705e60d5c12d6bb677b9e15fa1695e3f0bbd1760aac9015b1191cc3ae973677acc3c7d3a8f6d66aa645443
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5056b97ad7dc0c8f31a3550a5f0fad5f5
SHA1ee353782d10f18db2dceec936a1ae725e7620e29
SHA2562fd11020e48348dbd6caef72220403515f7f9676b28ea438ef134a54008c6b80
SHA512ecfef59651ebee7395b359a9ea23ca9494257ee884f5d62d21186d067f9e7283780ccc8a52aa5a508aa12a7b17f222fba650883507d0e36631b97dc8ef9dc642
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a