Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 11:09
Static task
static1
Behavioral task
behavioral1
Sample
8089da920ffb98285593db15c3aec52b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8089da920ffb98285593db15c3aec52b_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8089da920ffb98285593db15c3aec52b_JaffaCakes118.html
-
Size
31KB
-
MD5
8089da920ffb98285593db15c3aec52b
-
SHA1
b2f1e44db01a747018d7c0271fd1de2e7cecaa1f
-
SHA256
1511cb4484e78ed8468653f545984b675d556a348c7299bcea1f135c97585c43
-
SHA512
633a6f0bffbad2b5b63485f429eed7ead09a01ada1276bff6a6701605f90bd6be2052bea1d22f163050a266f3eab47faf4801bce147089cd5cf5544c2a067d53
-
SSDEEP
192:uWNy4F5jddbARHtb5nk/csve4ypvK5BAAsFnQjxn5Q/uRnQie6oNnN4CnQOkEntE:TvQ/ZKqPyzHZ0iawFO6HQkMC
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F24C23C1-1DAB-11EF-83FC-5267BFD3BAD1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423142849" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2696 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2696 iexplore.exe 2696 iexplore.exe 2228 IEXPLORE.EXE 2228 IEXPLORE.EXE 2228 IEXPLORE.EXE 2228 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2696 wrote to memory of 2228 2696 iexplore.exe 28 PID 2696 wrote to memory of 2228 2696 iexplore.exe 28 PID 2696 wrote to memory of 2228 2696 iexplore.exe 28 PID 2696 wrote to memory of 2228 2696 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8089da920ffb98285593db15c3aec52b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2696 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2228
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4cb07339ef9d6a08583c6d256eab2ac
SHA1b6e17ef78f98bb20403c71940d890ff3e329bbae
SHA2561bd9995d32c74686a2d49ee2ba06c28acbeeb0b2fa2edf25c015162953835816
SHA512b62f26d6d4ea1c302f709bf579009fe7c13a1f8a300176668a40d4465128b599fe5bde885b0172036432a73755a17ef5c2e14d16648a925d6c154c19af764c4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a8ce872d5e7fc7221ca7e540668d387
SHA1d199f8cd4965033184d7ad81bd0c29afc4a3651e
SHA25654105b6649f500445ecc14a2e9322925b6cbcec49d222f59bd8f9e8ac515f5a9
SHA51249e40886b4997e4766b4c9c1467191f9ea815b8ab0a80b106bd3aa7e1d31b7fe7257ff9f715571ab90fd6f9933b69c83771fcff95ef39052bcddd9489fcb83af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5391be331df114d04b4c4de7096e66846
SHA1d73e4bd0f6376cdf9a5026a251f6510e1a4007d8
SHA25616cdab436d643d9c4deb8e99ab99424bc83250711c146825f73615c1fa6f8ef4
SHA51200d3a46eb930533dca115511f4efcbcd12b434d9a12a65678c1a2648bee3cccafbde523d40d3189882155f0487938cd6cf6b126996ce18e7fec4781abbf35f2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57032823e37f79d69a8054785b0386089
SHA1d2e0b4b184d3a641bcc2f80f7b04ec9711ac6ee9
SHA25662460b4e70cfb5a3c7e65e022ddeb93e97e4a8eea8a53c003b1391162443b741
SHA512a7f257a1e1b07d4c7cbc924d4113995bdcf1d20cc890d63f5e139b8fd3c04529e402ff56e718184248f8a448fd3348c7664ae130207c8d8e2b47004ca7aaca28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee115f55dde5c5c3d09997997b464d33
SHA1b6bf85b1e8e903e6305f4fbff5b521d52ac8434f
SHA2565fa0b69f477308e76677dfcb6e26c25b8ea32e429eef250437c828669fb5ddd6
SHA512883ebcf5c3635c904594f49e29c9a5cd0a1541afddc66674035071cd6f375b743b1b7c4cfa25980b30a5df93082562ed1afd76629d7e91921acd3f2223698cf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583938cce2d47cf3bea0502ab09f02808
SHA1ce69853796e054a53ab235a2eef1578c9a2ccd20
SHA2568b7ea7ba35c10fd8fe92950afcbd7f9357f84eba97d2ffe22ec63ddf6e5a21da
SHA51279db7fb1ffa940a236ab4af6b553d2282e32a138c9b48ecba44808d532ec76f9c8595cbeaad86c8d6fc915294e22b0437d196d4ef18ac815205a67f7205caec6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de638b96064fe9fedd29193a565d8d99
SHA1d408227cff1a939b53fc0b3b74d7b345f0c66489
SHA256179c7e17980c32c06095f39b5b862937617676f8b2893c88896061ea2ace352f
SHA51230a6a3aa4368bf88024aa749d9f707ddccac45d41a990c5666c486e78e54cf77c8acd1dcace7e3245c630133348c08639b7d982b0dd6bef563efea46974f3fe7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6dbf4af5cf571dcebb7fefb8ac72d90
SHA18fc170d5548f1c5478235bcb8e541b50856f0dcf
SHA256285d65f5c412be66b83b85182fcf43b02d03a265ad65ef0b833b9c33ec87f47f
SHA512bea31c928ace9dad0975c6759e6af2775eb20697a22536c54f0ff6227f35fb99f4d1c2ecb42641eef56356bf1ef87a07f4a7b6979f1e371a62175ce00dfe828b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce419be0156221169168019832498893
SHA1b19fd076b199d8a8e6521ac11ee582e481f9a70a
SHA2568851ee95c06dbdd3f3e404cfe9c81cdfc188fc2c3913e5dcaccf536be247cb0d
SHA512ba0d7bb5f38814ea6cf496cd9c015567c231b189e6b75f5b3f4e7bd640a615fc098f04ef876ab6f30ffc45d4f73d32d57a9da48b1c6ef1c5703c2d87c81247f7
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b