Analysis
-
max time kernel
131s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 05:46
Static task
static1
Behavioral task
behavioral1
Sample
7be912cf428a6ca27940c43738f8c3ed_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7be912cf428a6ca27940c43738f8c3ed_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7be912cf428a6ca27940c43738f8c3ed_JaffaCakes118.html
-
Size
23KB
-
MD5
7be912cf428a6ca27940c43738f8c3ed
-
SHA1
766aafeaa3c69d32f9be53387e6678345cd98fc9
-
SHA256
19acb53ccdd0481eea8fe2919cb1b3408a8a613e991c33ffbfdd154ef366a4a9
-
SHA512
80644e2d38e19fcb5e3f3abb93e2399fd5972234d18a0b145acae2f87ca98ef6115ed0ec94a1efa4ad9a1043dc9d569c896664095fac1dc5c87b59e3d9eb31c6
-
SSDEEP
192:uwrhb5no5MnQjxn5Q/znQieqNn4nQOkEnt5lnQTbnBnQ6v06J4RnQNjMBKqnYnQ5:ABQ/Lv06kEC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423037060" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A1C3D981-1CB5-11EF-B35F-5267BFD3BAD1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2140 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2140 iexplore.exe 2140 iexplore.exe 1268 IEXPLORE.EXE 1268 IEXPLORE.EXE 1268 IEXPLORE.EXE 1268 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2140 wrote to memory of 1268 2140 iexplore.exe 28 PID 2140 wrote to memory of 1268 2140 iexplore.exe 28 PID 2140 wrote to memory of 1268 2140 iexplore.exe 28 PID 2140 wrote to memory of 1268 2140 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7be912cf428a6ca27940c43738f8c3ed_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2140 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1268
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e6f4d242681b69337942849559fd6e4
SHA1fe3955509bef3ef332a59131c3fb8c6423a971fd
SHA256245ff33e55ad9555f3f6dc5b1b663fa5611924ae79fbb65cbb23615baa6afed8
SHA5127c0f2b9cd5dd616ce3e2de356ebf72096f3fe52824ad0330411582bed011f9156c0548a5caa01983c8f52503c327c0398e07ec875643db33fcccc30799648047
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bcc779318848e0867b93f1ba8cd25d0b
SHA1f4ae5e769fbb1a8d386aa5b4995d3a76a08fa2ea
SHA256a7dcd401d47996952e005a8ffe6be382416f1a37a4f9748d9538ba50c1b546cb
SHA51210f6a88d31b8157e86500ca6aee09078383b29d9dc122555c300667f6ac050504dffc06c4c73df42f908bf842045684d8891fb8bf22b8fa10abefa167c147b3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb130e580f2390760312fdd55e0e12da
SHA14ea167acb3ade5ac94b46d5c9a80bd9c5aec2a55
SHA2562804a3ef533b9d37c56d513e51c04843cdb8d8cceaf3f20af1331801ceacacca
SHA512eeb13a8ee2b18f58f05c7e2c65b8f290939c0fcfc7eaedadc4caedd548c2aed1a96470a21148e35be4cd4b8b2c1f2295e49eb9a2c8350ef9680536cf24d9a901
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5959b0b59dab284d34e25a83043390fc3
SHA1617473d0fff78f20080a5cc89d93ce08f4ca1fc6
SHA25690da7b98b4ec45b0c7769e2ad6d220cd78ccef56a49982880a348aa268e3db6d
SHA512e3572086a48026c4457be9a372d7034912f7f01987c35c51584c74af67d5ffecf3cbd30290534ab7c0818c4e1af2cdd4d912a2d2812832cf4853c1fdcedbe18e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c5242861e9652638c7420c7b7de8d40
SHA12e0c8e5a9f22fb912bd53c2086c9871547989f89
SHA25615c76d5708e083cd2d92ffc1f27378a1599c5af1af1b489661fb29fedd087926
SHA512a045cdfcfb471137f0180b2c42186a8cfa21a91bfe60d52290964f9e7b926fbfc22ebc9e9b628f0efc588908ed3d46cdc22dce058aaa6bc99087b0fa41381f62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51daa94db105cd4c9a5473ca02f4cbc33
SHA1a6cff454c45f96cbf9a9c55f428230e4b38dd02b
SHA256e8e4478846a0b1d9bbd1a45e757012792865f3a2f60a721b40f81e03bc3f82bb
SHA5125d4b8a01145781c0b474806cb0134f5d484ea60fad7503ddb3f518616e913f77d09cf4b3051432c0b7b0597b128ac0f37685a37726c8ee392cd29da94b0aad19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5622be14b288b209bbd0d7bf8ee54739b
SHA19e8f0258ac5f8420a032f6864de80feee8a1a05f
SHA256fbe4e2ffaaffa378c1d0f1a25ded1cb92883d7b16dc3a407ac58837727d2435e
SHA51207722820614d422ddc5a3c05aa5b5223324ee771534b1c94bab65a0ce6a58643cde30fd35c38bda4aa597c47ef59b4468cd1c1fdca90c8e731d01e752d628cfa
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a