Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
28-05-2024 16:21
Static task
static1
Behavioral task
behavioral1
Sample
7d9b52a4026e7feed8a20736eb678921_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7d9b52a4026e7feed8a20736eb678921_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7d9b52a4026e7feed8a20736eb678921_JaffaCakes118.html
-
Size
22KB
-
MD5
7d9b52a4026e7feed8a20736eb678921
-
SHA1
e89448a866cbaa23bac61e820b740effb91e5558
-
SHA256
ce7bf7ac0b405d9d79546c718ebcb5396eb90a8ac4fe31613a9c697afb41f04d
-
SHA512
2bfa7eba01e4a4034206ea6ce30a77fc424afc505267259d5ca7515c26cd2dbdef3c418ffb516e45514b25acd076e26cf322f8ac50e267fed1281504d3247663
-
SSDEEP
384:7wqPYSVvl5chzR20lwnAl/8bQAe+6H6kDnDgsXff2B://Vl5c29AlUbQAV6H6J
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423075173" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{603E8B51-1D0E-11EF-A5E3-DA219DA76A91} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1632 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1632 iexplore.exe 1632 iexplore.exe 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1632 wrote to memory of 3060 1632 iexplore.exe 28 PID 1632 wrote to memory of 3060 1632 iexplore.exe 28 PID 1632 wrote to memory of 3060 1632 iexplore.exe 28 PID 1632 wrote to memory of 3060 1632 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7d9b52a4026e7feed8a20736eb678921_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1632 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1bb347907414d0e7811475f5db0917a
SHA1a58adb6adf78415ae2e1f50db50e1f755b04903a
SHA2562ee62a9d165a2e29ba7a0c50c765eec40f8f5154f6abeb6640ffc1d709ff6ac7
SHA512702692d0955d92f37b8c52221698d068e57d4969ec41881762e195d970272b3063f6bd68731e443a3ee91fff66708af283f0dcf02ee49cf898cf23a23476b2e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b605cee53cd1e7023b14975a1831c62
SHA1d3d1c62797e3659cc3e8eb837924b27ee23816d5
SHA2564b6fc3d8218c329304c725e0c694b027da2ec06cbc0a3d93abf7e02086bb2af7
SHA512c673fee78c40eecc930e1d4ba856d130c73314884c4579ca6ba3c16b7c001be2b0c516fcf3de017ecdfa7d98eb2828086febfc8afaef35c06c59065bfee2280d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0a94c12af0e1f370ed6775aa6786aa9
SHA1a3fb9c54a2b2eca80417f5af73028f3f095c0f28
SHA256d29236f5a39b3851c511a207b21997be561195659b7b6137185d47dc58a5782c
SHA5125e168e2ca5754d99112028fbc686e76038318a6cd4707a969642dff090654061ef66617633f88f17742a29cbc5c09f3aa187916a74cf783fd729119834f341b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2f76521be8be63b98ad784392d4ed10
SHA1488f19656e867934700c5e867797d5373b0b59a6
SHA2568d13217ac08207fff3d197e8c161bf4ecb8ee1ee1a338190f4d184f69585b21d
SHA512b0ca7718d01f8807bafd86d8646ce8708f635e9227d88b2d57c28e4315a592e023d9da7860a3fb9f2b4844fd25cfd607d4143988b6d22e9200c641e159f700ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5939e0fdbe20875efd3256498bfb2bcc0
SHA1218d44e363e060d7638c37d67a585a6d35dd832b
SHA256ffeeadba84e5f3fde0f5b390e3843bdd1ead8f77ded072286af7e2a90079f260
SHA512424a4a050d1a532d4624163b4774ca70857f717a7bdd73361e7ca6a6ba9360804adba357c0448835add34282946c5d8e5eadbae41417a639fd835e5b04dcd30f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549d2e792e3f08484a69d2db389f718a0
SHA1c143517f540fadfb09fc5396e44996a485fcb3a8
SHA256df8e550cdafd6bebb067c4e11d3040ce5211f5ee9eae5a9baaf81a6e8544f987
SHA5124d1c906f66cea5fccf0885feb2cd16dbc9ab44974e3a7368f25b3f89c8ca267e73cfc11af5f5db635eaa3d87c30cb8aa98a46c78cfa66713925f1f49b5e6cfd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f2e3ebb40dce63ab8c168417cec17a1
SHA1ab5541bdd3f3a69c40b929c0e325cf3161f01d7b
SHA256c9026e8c5e6855ddf4fa8743606cf3641763b3231cd1566f53cd9dd65db41bfd
SHA512781454bbc38c767c4dad8534f2338fdb9aeb79c5984b5c28df6a1853f51888f4b05d6b712287bc9f4f0e61a454f2e1af4822bc1bd33c684975fad1f37a7aa811
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551e925cc578f50d17fae7bb76f91f8b8
SHA1c9057afe40f44de070aa314dfcefca48ae585665
SHA25600cd83488b41af0a152b635efecfc8f88a4d9639b2218e66aab81f1b09767f6e
SHA5125b031a8b4334d2f974c98b858c47627ff43d25cd3fb10c767dd8e42c9a43f5500240f18bc7eede3623e05f9469aa6289c80cbe9a1f4014be7f95733ae3e2c04a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584af5fe3000e811c1716eb87e8d1dc0b
SHA1ccf73a0cb407feaf67856df1524b0ec0ee39221b
SHA25615895398afc6dce945c6a76a6b0878aaf2d25889300e455c7c597dd94196bd87
SHA5126e9bebd423741f4780569b60b164464ae229d62694c62dc4d0f088a7c580294be608962b678654210ff73f1851e073f3ca34270429a7085e2bffda861e9b0663
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529ba4d7a263753567a75d5b97f1bf589
SHA15eb690e90d4abcf0579eeb1f9cf2fb67c373f3d5
SHA2568fca72914771fef3360655e2f122d663c23d8cb325e797f98a4c9bb47122dd84
SHA512c12d531d1aa84997e362f671e8d025e74243767210c0ca26f003c1167ab28b774b8b4423ebecf6cf8464a334055a15c3560baad6cd371c03bb754d4b429d451a
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a