Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 12:53
Static task
static1
Behavioral task
behavioral1
Sample
7939d7fccad535df93f13d5b143db7e3_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7939d7fccad535df93f13d5b143db7e3_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7939d7fccad535df93f13d5b143db7e3_JaffaCakes118.html
-
Size
23KB
-
MD5
7939d7fccad535df93f13d5b143db7e3
-
SHA1
ccb36f5d3bd32d1174cc990eb5d734e138942c48
-
SHA256
d74eb21a40168605b552450793913e95319501c5b6e85130ba93f3c127695b37
-
SHA512
3767e893fbc8a381cf2fc7b5b20bc3d47663aef7fefcd04f6bc99ea269972019565ce14da2263c4ed74d37d4d57932687bf87daf772adddbd065174326374169
-
SSDEEP
192:uwz+b5nIynQjxn5Q/nnQieONnWnQOkEntpNnQTbnw8nQ9GLnLnQtAqMBuqnYnQ7B:XQ/sGFsO
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422976281" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1F652A81-1C28-11EF-9201-6EAD7206CC74} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1540 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1540 iexplore.exe 1540 iexplore.exe 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1540 wrote to memory of 3064 1540 iexplore.exe 28 PID 1540 wrote to memory of 3064 1540 iexplore.exe 28 PID 1540 wrote to memory of 3064 1540 iexplore.exe 28 PID 1540 wrote to memory of 3064 1540 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7939d7fccad535df93f13d5b143db7e3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1540 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557bc3ddc6b2766a6de170a3b13e3a572
SHA1861dbecdcf3c5c6505e4ab7aa090abc745cf0dba
SHA2564754b00f057e325157384e599fb3eec4df43d7e0f50fe464a84df1da6940c74e
SHA5120f7db5a6e5576f5c2c08e7856dc46778f035a4f0f70fe3851ccbd323aebd78faff589eb15c16fd02deb5382280898fabc23b86808cba0c728382995e6651c179
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5edb4e2a29817ee5cf5bfb6cfc36b9c9d
SHA133632249fa1ce851fb67eb9876e611b88e7892c6
SHA2569a7ea8da08e2c0923f0a0c9a276bdc6ff3078a01f622ab94988f25f7789885b3
SHA512c3407ba51a52f94400af149cccc031080220891bc0bbead85ed436a4c8eecb57994a02c32bc4cd9a1e25624a0e4a29d85eec6f8246007560d3c8c2a45616098e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5419134f84290eccc607feaa35130f22c
SHA1e3d6e668d2c2d699ac3caad5d75d8b05b7203b8a
SHA2566628ee509a948db6402804555584f009813bb5037428a2d42e466ed09f5e0437
SHA512d7f090b5dd74f341a15da0ba89e268b240946b463c8b861003f9d35b21603e39be1163a616d7def0305d634b01d6ef417faa1793af776236dfe68004fd76eab4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c14a0bed09f7453d472d5ef8157b2b5
SHA180bb00ab8b838042724508aa1a50b7f261076486
SHA256d120ea30192eb1e678374cecbea479b299b6a564497a42f13e8263afc177e8e7
SHA512b98cb650d1e7f16267e4c017efa28c184fc4e34102b51985d15f97ed30a34ccaf95fafedeca4f5450516661c058fe37f576ca71e985a5d92d44dbd8cbd29cf6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54cf7d3f55f4f51ecdbf15644203244c3
SHA153597a98cf186116178a56fa3784ec35b16329d4
SHA25617e968ccf20127d9cd27b0257bc10640038af29d278e7fcdaa76a785238af500
SHA5122347c06d89b6398ce0f4a611cbf7dcad4607396deb1d8013589d63c46dae3c3034b625af606cfde424a765811e5c44b1dc1b07c97579aa1f3ef8f1182928d601
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57504f19dec8cc18f494de7808c9de9ef
SHA13ba611d2a4977618ab8353c755f65bdeee6e6d48
SHA256b53241930fb07742b0374ee8c0b804a9f6837d3c63a15b460cb2f37869c8215f
SHA5128b811a066b10510ac872dc7e6049d177034880036a708502b98fab45dba7c091b6701b2efea5e4b0ca2d4c1c65fd156e5676b2a289eaac8853e8b012a5d6729a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c85dc337aad210af89524ed6051f9da
SHA105e899a73e38f7747d2ff6dd799014009735af2a
SHA256cafe33bd065750177d993ea60fb4cd045370d21b1c1a1558183f6b07d9538e0c
SHA512ade2b3cdf62ae361d5b994bbb698e66c3ee31ba32fdbd5d24e3e73f699def8a7f34aa2c889cc41ccfca9ee16bcc4e02eff346e0db188d3c07f2b17a8fc4fde8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a1b73cb6b92a5bc86371c99dce7ba8f
SHA10e705bd390a1805a868e1eb052b27336d75a672d
SHA256565572addf05d10f24b3ecd0c3e723edc059f51b18630f2360ab791d8cf257b7
SHA51256f90aea787ffed3d379d85987a2140a9d7b0e4c09fb423efddd5376298377aa6d71978229dbafd697ea3a9e43117653d3519abdc0bf7411ae515a662cce0bd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f01876a377e5d4e29264c1462688014
SHA184361db1eccad00873ad7fd43c800eb914ca5ad4
SHA2564eabf64c1639410fe5a070c85514ca75828a50b56c60dd2cbd6aef6528b08349
SHA512f311ca30dc6728df4a9af0645ece05f983d91f0fbff6e6940bf02e965f752186ed1270c4bafc2a7b358d10f6a87ccd67ea25cff99ee8205c2094dbfd8811f187
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a