Analysis
-
max time kernel
147s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 18:11
Static task
static1
Behavioral task
behavioral1
Sample
7de654777fc8cb524e09ad3450aa24ad_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7de654777fc8cb524e09ad3450aa24ad_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7de654777fc8cb524e09ad3450aa24ad_JaffaCakes118.html
-
Size
146KB
-
MD5
7de654777fc8cb524e09ad3450aa24ad
-
SHA1
743e35ee47e96ef1da5d96b05d6e75ed4bc95877
-
SHA256
595f995332da579a377e5efcbf49d90823e8237250053d292a3833b527ef0497
-
SHA512
3e195e740eb66c42ce7509013bb232396f62b103e27b9f3b4c4375f876eda1e3a0b325f2b34553d7a800fabb2c889465acf700891e3d4f470f100541d45ed35d
-
SSDEEP
3072:SwDwCTxBx7dyfkMY+BES09JXAnyrZalI+YQ:SwDwCtBx7osMYod+X3oI+YQ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423081772" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BD89BB41-1D1D-11EF-9340-6EAD7206CC74} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2924 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2924 iexplore.exe 2924 iexplore.exe 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2924 wrote to memory of 2508 2924 iexplore.exe 28 PID 2924 wrote to memory of 2508 2924 iexplore.exe 28 PID 2924 wrote to memory of 2508 2924 iexplore.exe 28 PID 2924 wrote to memory of 2508 2924 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7de654777fc8cb524e09ad3450aa24ad_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2924 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542be699cdf52904a445e363ef9630888
SHA1d0843740677f2d164d2f4b00a9d13dc1c65f42c1
SHA256ebaab50bbbc78cb6c6c338ba32228a252ab6218b5c9457f6c2abc00ac762799e
SHA51232cf18191d1bfec6d60a32ebf1793e6d0fb7e8ee1f2049071ef86049857c036f2aebb255cd277aa8b93e43b3be8b411dbf7323d161d3e66e2bdfedc7d7f45b51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b80891ad89211d325b1cd959d89cd29
SHA1ede09e87324f3da3fef1ca61c5f3d69db12d494c
SHA25629938a3542c8a2562c93159fbd0d0a73501e50d71eba3f751dd95554bd543527
SHA512d55a99a1dd1390870ed4844a0cc141496c91170d57b374ae7f7fee9604bb19185b32bbee3176522f4435fa10d0601457b5f21f78fcbd52563e3f10f30cb05331
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d00405df8ab31fc205614ce73932dd2
SHA1f8001ae21c299c8d34bf24eb78ba4d76688bd465
SHA2560fd30b6bc6a14dda52f128642ad5dc2db558fbe118a05aa4ad08275216314332
SHA512d424766a0a090932428bd477db2d153f097fbf0acc28593751fda2b88e1db7b26a1c09fecc73ae95339c7ccacf97c05146876cc021a63e5b30fd75d66d13c0f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af9671d91bdf8d2dc92c03422baf9338
SHA17c51e307c1d934ad998f7c53659487b2c5944889
SHA2567e9a789dd230de3caab22c4ee861639789a81ba5c0ae2093ddb3c89924bb7feb
SHA5127e7edc9c882c9b6a317a3dc678e6b956e675c0b16c3437c6d24bdeeeb76585edd2d5ae14fc34459d7756a51431408f58eb81d288a943bf80cfb028a290895a76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5493059c2d62f923cf02cbde0c0b74f61
SHA146adb8aad880b614e9e2fcae9f99f7e53d4cc53a
SHA256417b68b3144d4b41726b222bb1ea70d66dafa4dad361fe4fd5d3b5521d479eec
SHA51263866cfa4c93acf2ba15a4c854f104530e391e86cb750d785f8957f7e354d8140b42d371109fda176c96e3e1316f93359ed5ef69aa5a8fd35d8ed321efe45687
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad8bdb3ce01a392345df176ae8552273
SHA17e36db805acbbc964d6a17d69fc23e7ec53be4db
SHA256ad5ec0739d8b6393bb967a593b2d98db6560949df2e037faf98d854dad208d69
SHA5126cae295b8313161b3d2a67f3837dbb2416d15862c8af6c4075710bcb42d17083cec3ca25337046f5fde008a8a53ed92eb62cc3433366117a90c1e7074593eee3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc3ddae0cdf28b97cd9e5e793c6e107d
SHA1cba7f009a451d99f629a90541c4b3ece66b636c7
SHA25619a083ace04cdd8bfb60b905c7c0a437378a76ceecfb92b1e53e171c9a78dc24
SHA5121e0467340950982eaf296d7e3aa53e6b42d0d744850b9133e7205913608c28e738fa17e8682a9013cbb8528f25814dccc79e0a38fae2f98dc8a99d9906e05147
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e424e6f58334ce5330bc6cd46767c1ea
SHA1a7a5b2b7a05e1d8478c3de3398f778ac4086a767
SHA256eb219242c7f6f3329ec1b90a520b97feebf1da5ea620f4ef1bec6fec843183ef
SHA5127a0d5b174f7ba440e83fd25c6ce635dbb40499df8a4d2d4518efab6d7ec5e577f5bda329efe034e9969d7e15ce51d4e31c1e1c9ee1edfdd4b3ecc65e9975f1f8
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a