Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
28-05-2024 19:13
Static task
static1
Behavioral task
behavioral1
Sample
7e127280503fb3c7c851902027287dca_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
7e127280503fb3c7c851902027287dca_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7e127280503fb3c7c851902027287dca_JaffaCakes118.html
-
Size
27KB
-
MD5
7e127280503fb3c7c851902027287dca
-
SHA1
17c8843bebfca2798ba4b59116e52d92f3379195
-
SHA256
4889adb082ef2031a3e86bed45cf806bcc88eb327700216e25a56a3f3659b56f
-
SHA512
79ac80e9a63f9ddb9682ea7b2aae6f8072137ceb286a70af8648bc7ea8573f4152235895fa82833b954d2952a4a28358e097f27eaef61bb2da3400186ce9f35b
-
SSDEEP
192:uwLkb5nHanQjxn5Q/enQie9NnrnQOkEntOgnQTbnNnQ9el1m6uLXZQl7MBdqnYnj:uQ/HEPSXwSLcS
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4E652161-1D26-11EF-B411-768C8F534424} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423085451" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3012 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3012 iexplore.exe 3012 iexplore.exe 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2940 3012 iexplore.exe 28 PID 3012 wrote to memory of 2940 3012 iexplore.exe 28 PID 3012 wrote to memory of 2940 3012 iexplore.exe 28 PID 3012 wrote to memory of 2940 3012 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7e127280503fb3c7c851902027287dca_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3012 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504bbd9c6c989c26072a141ccffbfaa60
SHA1b09af82578e1c0f833a81cb0c0c8ae3ec4fba98e
SHA256fc2bf122efc8004cb566cdb683b068fe224eca0a7febb341c0f96ea832534a32
SHA5120b02d8c4e7c9651c920a7a22dfcc36b7147333020d23f729aac683df329677db7162a570b32286c4b18093f1e9c2360a7e3138c13acadfd5718554e6b3f73379
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5792763ab116b72de26ab39917f5c63
SHA1bcb26a64f2131455229090c214c8457052ca7862
SHA256c77fe2678c80bcc2d1d056a14a7d5bd7d0055bd41dfdb84e9e079158f3846c4d
SHA512c8a8d4c3256756970a96be468f6c0ed337ee7760934bf2a1cb35da4209b1ddf647528778ad392b065d1b7172ea1e0b75538a31061b1efc6993b15066c4917d43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b800dd19d0a28b3fa2094d5fc46b89c7
SHA155f4c9c9fcd2d3fe06445eb344d25111c1774c11
SHA256740e868a08e70258dee64f34a36d104cadd4bb7114782e86fcbee550db0f8976
SHA51269508d5fcb40acc09a3bc07d82bd64093d4d93faa7321ce7eb02de0f9c7b27eee7626320bb48885928ab8a0cf30dd8a6b41449ca9d56d4badae72be34abea87d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0383dc142c86f201face32496e6ec97
SHA1ed4f567087f775b7ccc90da70519c36adf975240
SHA256de4f32a9d0b6f63b67aab52b51c22e6bad2e21c0745009f42f66f218c86c907e
SHA512d75101fdd4e9a94ed93327a44f75bd0a312b2c32942fa13f46c1e940c2d49f64a0891f5df771cfb78805e802c008406e175577507b74619e049dc7e79c991f6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a98cdb6e4b9e4ec39f60c84785224993
SHA1c0c6bc5c8f9bfc12c29158c39b7070e490db90e6
SHA256923faea5e980970f020836d263927306825145d41858e5fdb46793e209d589db
SHA5121a8ef74ada3d2576a8c5f1bfff9478a83f1525354f1d952c603a947cde9c1936c96135fc2a5983a2d6f7ddb654213b937901550f7714c700b4d8b94532430878
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5771163b8ebec25dc6e4d5d93cd20b0ae
SHA1b799c933ea184ab69f065d3958d298c19eb7ff05
SHA256221413614c427cfa8c0fe8a6993696068985dd34cb5cec230decf2229d9aaff2
SHA512b8e4b13df373eb37b7a86c5ecd1e3acad7858174f1296f0527224163c32be906e21773caa4f9fdfac84368e1540dcf366ddf1371ede28acd14ec479007bd1256
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fab3b09b8beb2b2eec9fd8953614e752
SHA12ddb39b81d42dd859b0a1f55609c3f2ae11d2698
SHA2562ad41269a5a5e3b94f75005cc3cbfd2f6c09298397f422e302d7acc5af673fc6
SHA51282dd14f5bc7f87b3977d734b1f2b0a4044a6e7d0d9cd370557b8e1b896c95b23aea00c7c8480e48936443207942e34edbaa4dc304970e66a597453b532c9c150
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc299bd8a6f114116c64c28bffd89f7a
SHA1b127f28fb8251ce59ab47b1de8dbb769df776279
SHA256ed98d0dea1335fef10288758c6b5a02a6e71ac575960b9cce9c0533dfd07b9c2
SHA5122fe5e6fae8766318e71cd232a9b4c0a70ebc79ba0d9a48c914a4f9e49362002f90b6c64df09febd3eaaef32ac0b037b352a32510ecd92f0ca8f070d539c12262
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524f20b32061e7c7dff5dfc5e9c75a79b
SHA1e7e94869d49d5e8c9d580b60f40a4f2eec97784a
SHA256bbd1acb84a57811c0b74754a8c7dcf2402717dbee3181e6b385b44d47957e140
SHA512b5ad0eb1f71e3bdaca5372f59b8df68d208ee97aa65270ff46d229646c13ec765df129cef3413fc516fc5da3ee469b9088784d67ac0a633a4a517add30c0eae5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a