Analysis
-
max time kernel
134s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 09:10
Static task
static1
Behavioral task
behavioral1
Sample
78a2757f5fc40acd38b1df0f3e54e526_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
78a2757f5fc40acd38b1df0f3e54e526_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
78a2757f5fc40acd38b1df0f3e54e526_JaffaCakes118.html
-
Size
12KB
-
MD5
78a2757f5fc40acd38b1df0f3e54e526
-
SHA1
df82aac2c371996a581d021e868c2706928065ed
-
SHA256
53ae8028c20689bbf9d231b031c1ecb553967d3080dccae68c317dc84175ae7e
-
SHA512
49867cdbb5c9f2cfc6ee40b9953ef8d2bd97c597d1592013b2644033b269d6a8c5e5da531899dcded814ae2d70a38aefe30d35ec08e9831b81f27337aba8b60f
-
SSDEEP
192:F6aCw4l1rRJq2xgP/ttjifrR7YywM+GV5kCJ7/Jnw:YL1rRJq2xgP/e7nwMRV5k0Dy
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ECF6EBC1-1C08-11EF-A7A3-7A58A1FDD547} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422962880" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1488 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1488 iexplore.exe 1488 iexplore.exe 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1488 wrote to memory of 2068 1488 iexplore.exe 28 PID 1488 wrote to memory of 2068 1488 iexplore.exe 28 PID 1488 wrote to memory of 2068 1488 iexplore.exe 28 PID 1488 wrote to memory of 2068 1488 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\78a2757f5fc40acd38b1df0f3e54e526_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1488 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa2610ff710b0e6731d9f22ea8bb23ce
SHA1da875171f53456fb3b3010d5662fb0ccd64be0b1
SHA256e078450cb1da08eee3741fd20fb0bea0597227e5ad67fc550b3baa09cf410be7
SHA5126e5cf18c4bca9b88e04cb7e45e531677c7d12f8ba45161aabf950adffb2d8fb8bc42477352ef94e98d075cc3072c7ee70de7e9edee414dc84d6367ef20718af9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9a4c361a8611df2b1fb7f9b82de0dc8
SHA1677d17727d76063861610aa03a7f7b31a90ad673
SHA256583419288e86987d6a0e6e8dd7a635a0b3533b6f694bf1dc4fc264254e3a014c
SHA512ac12c10b0359b24bcbcb637b7ab8ae3987cbf2dec0674363b2498d324e027526d20da8e5933531e1c78049b00917d7f5e2d65c7d75937a4d96240d27f17e507e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9f178d2ee49a342ae1209b79144c248
SHA1e7ef69a2e9b7e75f99a83d42042e29ab6dda3967
SHA256b23c6f39eea211d745ba3280a0cb3e28cea09b37959e7eec880d3fd8f68f33e5
SHA5127493c7ae585b607905107bf42937f4a255ca2dfa89861ad28fed97d8f12aab70fcc8b783855671135f8fd521678e78c9b39c489ec6f8469c7bb9bfb95e0a4b9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559cacf63202d95b68132ba26d3824d0a
SHA1044fcbd7b96ffa120ea00c6581487a93a57c2bce
SHA256c45a9fff1c7e420f569d4580401f3ce7f53a47caae4277c2047cd7645912a080
SHA512a77442cf7bf0ee0990499e703631b8b2d634da78484b20c959e8c2d8d1873f2d072a4b2160c92f7a464d1b18e92b0a43be332b828a0ddf1fa41b93c6743c832e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a90b60493e36cf4625122b7f8071162c
SHA14c05186e3d51a9f45af2ff69f882354478997476
SHA25683f23ef2d2e16652aa9c43003b85aff0a306a3e53dee4b96587e3549bf9881f6
SHA512836b55dbaa4340e55c521d5a44495def120122d6b9f0b573bec69606c94a188edcd0f1fea166d6c638cdf3023451d3dfa12695059f1c2353fa8e5dc807820c95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5186434e7d9ccfcf628c7134bee2f8ea5
SHA176327172e27d8f24825afd45ce46d4607b0b4f1e
SHA256f5d58d9aef4030c7c3ebfd51e779816ed51e2e4feb3648aa2389146faed7040a
SHA5129a204204cf2c2146eb9f07d84d9f7f60583be18e478af1104ddc41cb958157cf1c1088bc1913f691b49a48a99913f168c70f52c6caed73b8c37345b5bac127d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ba86981deab1a8d25d90cb7f31d41b1
SHA1f845fa8706f4c35e5dc462be59e89c82c3bf44a5
SHA25600318ebfe74519a9ca9137345cc966324f126ad97cec3764c78096f4392f7776
SHA512dae8e6ad9d6ad6f790ac514ef199363be1a992b6493fabe6d26fc714d7abff53ce91fa004ed6e33872218fa6280eb3a0452f0c73051778d62e206854306986b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df2b0451ec0f39c7a3904b9abf16cad9
SHA16b170595d16e71fd4ed92890be1fd237ae1ea250
SHA2567dcf7dbdb9ceeb1a09399db24caa3ec368815dabd81b86afe38bf9792dd18ad7
SHA5126821b4d890ce7aae5e8c4faa1896253fe344934adb2f8f7c27ee3919f874dd320fdcc0d66111e8cb4cabcaf6f98964d1c681b88c994a506c997b41717b9ecfe3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f259b6d6f729e34dbf5f21384c186d6
SHA12cf839155f40f90f566b98684dfa7eeb7d519c7f
SHA256d1f594c54b1246f9b000e31e919657d9cadd6af082334165d1e8b96beb5a963d
SHA51263da242edef3eefbcbbbc84a173175762cb037eb974c2d7be9f5d2e745a6a88b82cff9cbd93a93a3592afc33dc8d82f325f30fea79a76bab64aecb864c8fd3d8
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a