Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-05-2024 23:50
Static task
static1
Behavioral task
behavioral1
Sample
7ed35f750f179c60a451e1de3b04ea40_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7ed35f750f179c60a451e1de3b04ea40_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7ed35f750f179c60a451e1de3b04ea40_JaffaCakes118.html
-
Size
34KB
-
MD5
7ed35f750f179c60a451e1de3b04ea40
-
SHA1
ca0466cb45131788fdc7ad41e93faad35e95e808
-
SHA256
9902fbe7ef9f3bc6842d60c722e06908a6acea0f4ed3dbcf1159d6a4f2fbb7b7
-
SHA512
62bade98d0415e8a3f220fda8900d836024ece96fa66027d72ecae7869443fe18dab7ba8bbf6e60b7fef84390f2d4579845910e9f673f3adf26a985010e19450
-
SSDEEP
768:w97MIf5oeL41LRBmfKKdkIjGbISYiltP+nFKnnVtun5QFQzQnPTxnITxnh3cnadQ:w97MIf5oeL41LRBmfKKdkIjGbISYiltZ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423102072" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{01439BB1-1D4D-11EF-9969-66DD11CD6629} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1048 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1048 iexplore.exe 1048 iexplore.exe 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1048 wrote to memory of 2944 1048 iexplore.exe 28 PID 1048 wrote to memory of 2944 1048 iexplore.exe 28 PID 1048 wrote to memory of 2944 1048 iexplore.exe 28 PID 1048 wrote to memory of 2944 1048 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7ed35f750f179c60a451e1de3b04ea40_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1048 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b680c6abf9411f13a6cf0de5025e0252
SHA19288645805cb1ecc54dd493b8bf7c194b81e7ddb
SHA25617d689312fa84f742e551db68fab24704a8647c8ee10f6d2aac73554fa3af4b4
SHA51291f844449cddf03910da23094092260bdfe9106c12b43a3310cf931ca2ddd4c26c30c834dfa7d35777fcf3ec31ada7ab89ad0b6d0df434872679b214a527bef3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b45968231954387ee7da96b08f9f6bc
SHA178232a7e3268a0b9ce4e36c7bb923bb1f1017425
SHA256a46b346cd79dba474328551a32656b30103b5aca7246d80dd57ed6bcbcce58d7
SHA5126425fe9146d90515366ad47fa3f668e135c1cce70a5d969d3e6297386ae6d0187de154433c5bc9d4a61f49b6e85843e91f18f1993174dc1aba23ecc2cf695b07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e16302a2a14b9f7969567e0b539d010
SHA1d41b5bb49673a494a28c8f9f38811021070ae573
SHA256d81334f2eb12c030d0973875147a476ad6c7c6f53cce920274dca141ef8076f0
SHA51236e11686995efac8b063abd0f7f5db4d407f0e33dbcc18b437984587a49ab88c6d47e16d2519b58f74849e6065974ed2eb7bf4d5a839df0e9868f5122756c10c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2cccdd164da64ed0d012113ffa21fc7
SHA1f27de76f3f5243dcba14165c10c7bbb16978696b
SHA256f6b29e323dddec1102ba8bfd7ae3681311a0a249bd7319268ab4ab445128fe73
SHA51200afc389f8063ccfa35ab2a298e57878045fd9b71c64818a775ca7e2672c0526adaea3d27aec70c73f5ab67f7425b25b4656d571607cf0e891ad26e80e17902f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e8e654f2988184a75b376ca07fb6728
SHA118f0a12c3e7ddc53093e6bbe1ab65561dcbb4252
SHA256bcefa300647137d48bc2e0b0493a07ad80c343617fbf2641c305d099c28988e0
SHA512f17049f052f8dd89cb2499c95086c02cdc8b2fbc7469a8d66e7c468780156331aa283647c486488a0ccf37040574201082245b53aeeb8a3b62c7b897447345ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555fd76de997fbd9b98d7ad0f39f4b2a2
SHA107382c59c2a41e0d11a78f93f00934eb11ead200
SHA256fc5ea04e6e9f3465316ba12ee486eedb0a0c83ef51c397f017c7eec9fd7662f2
SHA512fb1c1544fc8d1009678260e72094bda0b5041f092cf04e1b2ac3d90b18d662b57b64bcc0f0ca6ee655046be02e19413c7cab85dd9c8db207f968fa1460c120a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583ab1483d23a51f408a0690df056628b
SHA1551d3527672b348d00a6d2dbe1373ecf5eacb695
SHA25644c6fecb8d9e203942ff0990ad02595335e0767bc06e06504ffe30aefc3e923f
SHA51255366dc9931ea73bef42439db5e1e6079ae9cde18ad2ce3b2c66b24a5de303f0459759bd570a52ca1fa536198d8368b048fedc7ac28633bdc1dcd9dae2a4de36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc8cc12a49c48437da7726d6af0063ac
SHA1380208ecb75e3d6c90385069d2bc3db9dc50fa41
SHA2567c3131a666e944f4d749e7de46e15b7dec2fc115e03fdf6beb03f8bb0267633e
SHA512e80d8c4eaa71c0e586900879cff06b00dac43ca55b617ec9b7b65edde27931218048bf6c3bd1f02373cf465064236d603c53783e974a304e26c3643c9ccc4bff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532294666408801d217b2e974e98709a3
SHA13848f2dcef026ab08615f2fe3d4b09473e78c38c
SHA25654ce1d917968225576c0fc566724015ba99756d173ed15363bf0237da24690d3
SHA5126f78b1878136136db6bcc1b56dd04399c840bcde34e08f743f11be7f7b2312755df82b28860ce409ecbbb81f910c659db2ad73c4e474de3af6c920d8ea6832b4
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b