Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
27-05-2024 17:49
Static task
static1
Behavioral task
behavioral1
Sample
79fa47078eb09a1e18baee1ae63b0577_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
79fa47078eb09a1e18baee1ae63b0577_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
79fa47078eb09a1e18baee1ae63b0577_JaffaCakes118.html
-
Size
30KB
-
MD5
79fa47078eb09a1e18baee1ae63b0577
-
SHA1
aef632b6d064896cbccc041e325b176fe2e527b2
-
SHA256
5ee6cf2fcfacada8eb08bd8d7de260ef0f48c8bf5e91ca7bcb77f2fad45884d4
-
SHA512
9f17c71676105a4a9a119533d0ca8a42dbe3040ba86db406b49e4fe82f5b7f31f340826d1f9e675797d650586100536e7903c778f97c2c50e04694c7d4b08c6f
-
SSDEEP
192:uWnBb5nSVnQjxn5Q/JnQieMNn1nQOkEntXPnQTbnZnQBMCEAX6K+iibI3serwxwD:1Q/rSUOcca5zARvfDOT
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422994057" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{835CE271-1C51-11EF-B20D-42D1C15895C4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2460 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2460 iexplore.exe 2460 iexplore.exe 2488 IEXPLORE.EXE 2488 IEXPLORE.EXE 2488 IEXPLORE.EXE 2488 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2460 wrote to memory of 2488 2460 iexplore.exe 28 PID 2460 wrote to memory of 2488 2460 iexplore.exe 28 PID 2460 wrote to memory of 2488 2460 iexplore.exe 28 PID 2460 wrote to memory of 2488 2460 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\79fa47078eb09a1e18baee1ae63b0577_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2460 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2488
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5648dcef8b8492923ef4328d527757648
SHA1590c25c8b0182979170df9efb3e3f145f483f853
SHA25681e6049f325ab99c5698cddd026e731ddc8e4f2a2ec4b282ba4732547102d277
SHA51210504332a31f88587a13c3892fa2f1bf7676329800b76367a739f2969145f1dba3ce20d5ab6fb54d40b6e841a9abb8e899091f0c9986f7ff1707c9f2c0783cd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5093e652569e2794640958f4e3bf4b3b4
SHA1ae247b7af4d0af78dc957a0f71da41e100f018dd
SHA2562a977559c52b11bbd631479a92f1393b01fad78ccb8182abdc4c166df894d529
SHA5122bcd38f09e037886791c0a01d4b1f0ec9465874cc6e4eafc426b39719306affc2ed0708deace4f964aaa80b9dd6804f130e5f0db5cc0054a6e1e62df6fab8a8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2d262a3f0974fd9549c212e04ac3cc9
SHA1eaf858e9ced1b98c6cfb133fdd37695d380848c7
SHA2563faf2e3c8fb9fd5cf4047db5c2ca26aed2df8535c328fa7c1e7a0c789660ea24
SHA51230041960bd3cb36536a1f83edd6e86f46d70c0e01d9290a367fe9ee2cf0a3cbe6b3f0c16ec7bfa2b8e5f8c565b5da29a4ae5d64a2f74b838e2b9cb6c0654e7bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565f7f44ad8b21c841683209b66237632
SHA1546a6377c7f4be0a3224fdf53f38ee54ceee86b9
SHA256636f73e7e0a729ae151bbe81ea5fbd2857b33600b6698caf235e3431c8b85e54
SHA51244bcdcb7e1b35c677a21e6737f2610a6d4411dd0ef7d020a9a5551e4930f5f5a546f0208c3f73508e71ab2188906c1826b28fcc3b3b7086a96fc649122593cb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576c598c46876f0902fc6fd0234043f5e
SHA149529cbcac06fefa37ee500bf9e4e467614a7317
SHA25642a94d0bf76a103e512f89c03e5caeb5156cafbebc184df245180938962b7aa4
SHA5122085c2b3c9cbf4bb0bf6547cc22a9fdf634f8af16569240f74bcd13606bd96e8f1d540702377972de0705cbca463d8c1166e1c069cc89e1f22838b1c9ad18f1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5424eacd23c6e3c5a7a18e76092bbc38f
SHA1c56794055c5bb1d468c2a9e2d099c70a44082a40
SHA256a676acc1d1bdff13a8ddd9ce9c23c40943e925f10089e959e7400a4898bab3ca
SHA512cf9315e410cde2ac58ba4d080d409e9bb6aadd409ff14275e44799614027d391ac4756e2f9d5ac496ce75cf9a7202cb4a844426f4e0448e45b240549eb970cb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba8e15ea31901e69e11cb0f7032be3e6
SHA17c0ebc2093f00a3ca279a11e40d75f7efb660b99
SHA2569a03946db40390f3ae1bcf10fdf5dce804b79d1ae2e1f975678213d7dc995cc1
SHA512d3f02b11b1ad885c06ff5960b32938b7d52d650245318c7124789775085067d035fa06a14127d4db76275ebb4722af8bac14b5fc299be72a11b8bde766a7c3cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a4b3222e456bf882219c438e0ca6e7b
SHA1edfaac3a68f80efa7545087b06e2cd1c26df92b8
SHA2564d8ed22d63913d404fd18fe22934984be560f33e5c98055aa3ca794284536919
SHA5121486fef5794e2e54a63cf401a605457fe01b94b8080ae718146a54adf78fb5606a81401f59b994de3d0d73854608dd4b37e07b2731c7b6ef6aba827860dba7c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5357724b0328210287876c2d750a4adeb
SHA1b2b8e31cbbb0e4d814760c132174bf18bb6997f6
SHA256773c4e78ac3bfab695b6c7fcfe1401a16d118e9cf60071ddb5b724b0c5606f41
SHA5121aabc38221fc8115eacaa2e959f4070ef5ee7ac8a5500e7eefb44050f079c66e6eb6674cdbbccc01b605bd191edced28b4c3982e63c5527956f91711f03581a6
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a