Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 21:51
Static task
static1
Behavioral task
behavioral1
Sample
820ec1600fe0c7d2e7a705037fd92f63_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
820ec1600fe0c7d2e7a705037fd92f63_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
820ec1600fe0c7d2e7a705037fd92f63_JaffaCakes118.html
-
Size
26KB
-
MD5
820ec1600fe0c7d2e7a705037fd92f63
-
SHA1
94e13bf66b20df919dfbd63c898af8e2c9d4cbc1
-
SHA256
4bf46c64aa62fcef887f6dc120c21bb83cb318726a2a1f67a7c5c84080cd0e72
-
SHA512
987ad0403ce9bbf84c06aafb8d57a303c03a0278d06084c16dbfbaf37a5667ddde979dbe611ccc8f14cc4cb22310b8c6f6a79b0a181330bab58d292a0c7a7762
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIl4NzUnjBh3J82qDB8:SIMd0I5nvH1sv3ixDB8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423181382" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A9B37961-1E05-11EF-B33C-C2439ED6A8FF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 384 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 384 iexplore.exe 384 iexplore.exe 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 384 wrote to memory of 2368 384 iexplore.exe 28 PID 384 wrote to memory of 2368 384 iexplore.exe 28 PID 384 wrote to memory of 2368 384 iexplore.exe 28 PID 384 wrote to memory of 2368 384 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\820ec1600fe0c7d2e7a705037fd92f63_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:384 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5661cd1f626d9187436716f6c711d4eef
SHA1ce830ea91ddcdbfd0a9ec08ff1d5130bc5a93312
SHA2569dc552deb9492b5654c06dd167ff7b88bde13295bc8eb34b21443ae1cc9a8700
SHA51268cb7f973e0aaca7456249e167798d56774964def88334dd093ac5438089638b6f5fa47e9f8a4a04768dc8b5ca734819c580f1b7d3e0305dcf0f3c58ccaee6b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c7c594bba6f962825e3959d2c5b5967
SHA1b5056c1fff775efe8db220e42f88dbe2f7376b00
SHA25644a27ae89a5cf50c99e3f84af4e06ae71cbc2682cc0a03b854bb38b2aa22e24d
SHA5122faad93f6bfa31f10ad55752ec498ba73defd6cd3faa73a9fc3deaf39b877972e70e3d2e929b3553a2038aba1e23c2962cdf2a7bf107ae58b3903ef837de17da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5129c1de31b8b3063b497103427022966
SHA1c6b7328928439d77590fa4b726bc17571edf652b
SHA256e0b4d311c8880f62a209114e93295af6b231ec310b8d761954d9659e1ffbdf00
SHA512f9af5450d2b9db71aa812087afe6ecc6644edbad914a33297fb461f599ed03dfd3b05a8cffb275d32db54c858eeafb9d2013029f65e34e1920cdabbce5c504e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5997a03207f3aa7d78f93364447e17fe8
SHA1b778dd255179dafe4dcccf5e0f8d841538e7bdf2
SHA25625e53268b6cd63be3d61cd5d25278383c21c85645600ea0343b055c8e1b8629e
SHA5125e07cd316d6b29c0c6b46ba034d4d0875c8d6512bcccb65d337014b9f71ba04d3dd531df945a2981d071e3cfd8563b1eb01cf9a5e7545bbc5db539811e264452
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5760a11c4aa914895b9a2461345d02a7d
SHA1e632b9ddee4483377b9da0c324abbf3f3c0f9c82
SHA25684c01ad7dfcc406f8b1e48ee7f2528463fdb469ea1f475a7531a7bd69366d4cf
SHA512e6ce7fa9d49a23b8ba6a90c90afdbb8a833745046bd42c75771698ef879c624b4e09df8e70f0b239dcaa54cf6701978c2925d98f99c106d1ced397ade9f80d67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7a2f99e39cc377ae1e2c3f151e67af3
SHA139d7196165427f3688eb78f47f18d60f7430d80c
SHA2566766916528a43325b532c2dc076e0168300f7a27522c87478a89d0294606783e
SHA512c42ab2c56c6a3edb88a8e44fa4330490c811aa0f78ce30f3a4a6acd35dfc2bbbd7e371a49b51868ba85db9599a24fc36503ee58f02278d4491edb4ef47c2ff1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5312033c9491891c30dbee19e5e4b6257
SHA1f22610b5288d8304de67718cc77b727fe7ffb8b1
SHA2561802deb21b36558de0019093c4958e1c11c5be8df8a51e82ae99e09780767aa3
SHA512bfd8cfd25a6db0a64a24238edc1031674103513cde38efce1a16aa24fe075d9c639d17a93c5bd152dcfde0ba83f809b2f89dfc9bceefba3a70876c1cfe96fb45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf5134d474668f08449bf49e29bdfa46
SHA1e388fb9323a46fd75a0222b6df0a34771e3008ff
SHA256ddd54bb50f7098424ffef56722131d5e0c6ebfe1ac0ddb2b135c87c9112d5d2b
SHA5123cdd93c06613484f73de1920f531999707bac451c128af60974beda19f8da37e59ce368bc4c2397afdf795c9b7115c879e542b3ee8cd2b3d220f81b53ad7ab2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f95ca16358e225ad87c1f0c15363dbb1
SHA1f622f2d371ec55dfa0b18eb01a14866471fd2eb4
SHA25688fe1e291f0e0c60f8d973fd575e1835d73a0b79cdfb3137f71b30ffd3927cdb
SHA5120b869eb9ad5f1dbcdfd9f45718689212d82ef5e02cfbda5e6d4e4895bbeceb2e48df4f550d31fa11dc13d8182701fc377be93affbe6f6b11892933996a359792
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b