Analysis
-
max time kernel
149s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-05-2024 01:06
Static task
static1
Behavioral task
behavioral1
Sample
7b2e35351a0db1140ffc6ea4c59beb26_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7b2e35351a0db1140ffc6ea4c59beb26_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7b2e35351a0db1140ffc6ea4c59beb26_JaffaCakes118.html
-
Size
19KB
-
MD5
7b2e35351a0db1140ffc6ea4c59beb26
-
SHA1
04a06e5d51b9be6e84c9a9d0467e44c9ac4eecde
-
SHA256
70bcee63c2f3eec48f268cc938289739d3519fe23acf3eb44d2ef692244c86e2
-
SHA512
5c989351f0d22f0da4d7bf3676d6a8e0af4422946a20518dc6e8bb53e4142b47faf04f9b4d70e0355286b97f498329ecaaa63e64acec0ca22f9992fc2ce7aecc
-
SSDEEP
192:SIM3t0I5fo9cOQivXQWxZxdkVSoAIJ45zUnjBh/h82qDB8:SIMd0I5nO9Hxsv/qxDB8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7BF905D1-1C8E-11EF-A304-E60682B688C9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423020243" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2320 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2320 iexplore.exe 2320 iexplore.exe 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2320 wrote to memory of 3004 2320 iexplore.exe 28 PID 2320 wrote to memory of 3004 2320 iexplore.exe 28 PID 2320 wrote to memory of 3004 2320 iexplore.exe 28 PID 2320 wrote to memory of 3004 2320 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7b2e35351a0db1140ffc6ea4c59beb26_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2320 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5175d3634c9f180fb27363d05515695f1
SHA1b5616bd0c9d7239d33fa5f88484853dd99fdec58
SHA25661350591ab3e49f6ea7e3f15366b39ecbe895ad04926257f4fa95d6d413a0272
SHA5123f4964bb3728ce1d41347199a20a046099279e39760492e6437eb0b579dcc64dfe574aa6ce497b76d108b82cee0ff49d4b361540e8502ed6a22560a6b1ca542b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1d56723287011b9e53744dbf22366a9
SHA13fc26bf33c1326f09f3856e96e9696ee033ffd37
SHA2562d9ad0c819eca1d9e11e31ea28aaa33e6feea36a1de63e0ea32e93304bd6c015
SHA51259f9b59153c9d2f8ae0f7ff935aec0272708f4365a2f3e67d955715e4651a5379394547b4fac7a44271521d29478697c20144a826a37f6aba0bdbf304eab200d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53918ca4c9bebe57132702033dfc4271a
SHA14fd9b33abf093f32ff0886d28afcffbb0d3adcb7
SHA25688c4c2b619ba5064cf57a12211041a3f98cfa06130849754aad414157483844f
SHA5127790c2e939328e4f8bbc39250b0de836ea89458ac3e0918967041c4463aa39d25e6e2a03806562e8c0599af95e95da885d2b9818030943347c9edbbf61381340
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9e7d4b1f1eb9bdc3469ee83f05570ca
SHA1fe82d9b1ab867d90e5e8e6cba822bd883e25eed4
SHA256b732483003cf6b0dafc780860bca7351f64373e91a47882d6545383ae2bbfffa
SHA512b1050727f1938c34f3266c1c6a91ea0073a4f2596cd64e93b4477404c1d02c2de94dc67d05a5ad08d611da485e5f123b5d90b66a31ae74f5c008571a6508cddd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ecfb74651e85df308c2ad4e7eb663f5
SHA1b44c71adc69ee720afd6fe9fe3e54c2a320ff1bd
SHA256f011a0001990e24353d295a605dde4d8ff6a4770d79b1fd63661b718c65acd45
SHA51246ac5e980b8bd1b536ddeadf42afd6ff5925e2ea4bccccfdd502b41b8808d0e9ee61cca1b8c33be2856533ec88846a02f7ccbace5cf26a46d2667964264d05f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515debd261986dac40c8d77c879cbbd43
SHA19f46751371b83ee794c3f0ba520171f5196e9ec8
SHA256ca1126fffb3ba3b78822f7523edcfe338f5ba60b8d83249463742430165c0d8f
SHA512387adfa80ab7b36abb8d6e5bd656a686c094cb0da526030e147b46f435d4aa541694b16a9be00ea368ae36fd18ae59633c4b4b50fb232bc51f485a27c302c7a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5935704c9a2672059dde836e74fc7149d
SHA1673431a26ab304d78a60d25c9563d0e43c7ba0e1
SHA25677ad84ed5d400b7bcd6fc44155c47569846becc959ef27fa02f36088ba3ac5b7
SHA512bef4b92d051afebb3553d6efd18e14a688ec9f8e4a6b8a9538548437ad9fb72d73d1d6ff8163551c4410f81ce8b5180711d8d07b57f37e6c7b2679177fd93990
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50524020b2ea61ee85163855f7d23a32e
SHA1610535c0bac4ae57f24f398e6237015f33451cee
SHA25659fda353ee75bf4d328b89074d69d26c196d31e0848de39b0f5d39cf416fbe25
SHA512c49848325177016e15cdc8d6ecf4a0fd2af1c347325d083422e2663916076d9b53413c93a2a7b6d7ce3f6fc5823658f8e73285cf4f89e6a1ec94ce794ddc1ce5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2a94ec0df90f545857fa37984c8513b
SHA13f261689c681b60c40f98ca896ac160ffd4ead7a
SHA2566a553fb35e05cdb7f7d33076cd7fedb4bbfa8166960512897aed1ee46e5056a7
SHA512bf40f5eb749f074cc868b937953777caad253c27f2048db1db29c8f2849b27c843ed3135e417f3dcff413f0072d5a01092de76a09bcab780dec8afae3a8438d4
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a