Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 19:00
Static task
static1
Behavioral task
behavioral1
Sample
818f01fc66be8dc3fa7528369236c6f3_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
818f01fc66be8dc3fa7528369236c6f3_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
818f01fc66be8dc3fa7528369236c6f3_JaffaCakes118.html
-
Size
27KB
-
MD5
818f01fc66be8dc3fa7528369236c6f3
-
SHA1
d59b203de80daa697337918c9acfaca70c8980bd
-
SHA256
d1e5fa7e6f1ea70562cfe51edd246b40fdd8c65bfafefe32c97703c61570f196
-
SHA512
7e1451c0d95dcfde4f26df3287f8dec4c008f9d12ea4fb884b2e0dcdaf7f19dedbfdf109910a795e3ee2edbd423261a1e0b5b66b8b6bf99a488521573985edad
-
SSDEEP
192:uwXgb5nF2nQjxn5Q/cnQie/Nn/nQOkEntMCnQTbnhnQ9ejfm6ufdXQl7MBfqnYnh:0Q/PyB2dGSZaS
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423171102" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B9CEC061-1DED-11EF-9F3E-D2EFD46A7D0E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1688 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1688 iexplore.exe 1688 iexplore.exe 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1688 wrote to memory of 3024 1688 iexplore.exe 28 PID 1688 wrote to memory of 3024 1688 iexplore.exe 28 PID 1688 wrote to memory of 3024 1688 iexplore.exe 28 PID 1688 wrote to memory of 3024 1688 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\818f01fc66be8dc3fa7528369236c6f3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1688 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a45f50e40d9c2899b1e8337a946c0920
SHA12eac34b00ab9ea05a8342fec355d9c256ed5c111
SHA25688f1d4a3ad90ef09d6ea72ec659a9e926b1da4def65e9049300c3e7c60ffea56
SHA512c1e4f1437ff84ca5614814616e67448c7e9e2a428a48aafc87d0927b37e9c6706576803688e9bcdf29acaa1711884ca5af2b589185f9c5db6f34852b837594fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df0e82c46ad98df725781fcd0efeb37e
SHA1884e5098cc649c824d68d0392608b4750a423b19
SHA25666771a9decdca1166a0b95a4e24d87bd6a882ac3561a9b37a55eba12867b1d4d
SHA5126df0eea6e9fb315452941d19643c136444228cc5c5be8ee617c37ff0a51695398de160e32e2d22da36958dfc1dc16a3de90603ca76e4d145ffc8142cf15e6976
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5352da4e9b2da3f1251b8113c24e70040
SHA1bb9a48ee7ca7c761075e7ee624a4c52b7d36f32b
SHA25641672874201dc52ef2655bd459a553133ede5bdc1f14b03fb9ed3c67bab9842a
SHA512d2624b5c6569c8d2e4e3ccf18f409a5017de74941a7cb90480538ed5a1c5a15e50d2a23c7e2b4022e2ee307337f5f600a36fbc5f2c68a4bc99d01762ed544b09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b639dd8463767853bfd8094770af7ed7
SHA1d9b9c5820c60be5e8f303d1b358ef66ef81e6efa
SHA256000247486a140801f6b1f22887fdfc81aec2f1502dfda5a7aa0b7d6a01735ea6
SHA512582c7ba1c8517d8600fa4c5909df706c2d5e1a66a2e7401ee6d4f2f178fb32b392f4adbd3652844e43fb14de09d0a98824835fd73ff8f5c36ed6901e4c831b7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503fe9a500cd8b1cab8bd377b64c3e341
SHA1eb6436cf277fc07bed89de58e3991b2678c234de
SHA25664380ee09b0dc69b7e7929cbd1fe77aa63ffbac8c6799e03ebc8de7070cf09cf
SHA512c572ed052121d450d5ce5700f9d77395a850c4bd27693870d9cdecb7e77ebfe214922b0feef21806b317fdc470149ddcf8208e56125e55c7eb680cd7ec0faf72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51792fada8d2a4c4cb0057771e25a515b
SHA118df58923433024ed88760c991167d680f7b4c77
SHA2563488614b9245fcdc254a333c463ffd16015116fa01f3af886eb24e9d40b69476
SHA51254d000e22a51321a73c92d8d5023230bc49283b7df7a6061b91d91d9eda4f4621e286d935d13a333eec740881b781114e85b038cff10a8a8db37cccc8d74ac55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572617358a38b33d6108550c62d9e927f
SHA162359c73056079e9937fd6af43af2ce1cdb87805
SHA2568827b9dd07e62aad9c00cff84bf4772e9dbc02ad110db9a39b628faea287e4dc
SHA512c913ac66c1e6d38d336251cf29feb3f890d9d5f86689fcde53050dad03f80a660d622a923383172c3b7bc82debc58368cba8e8858fa978fd914b292a420cbaad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518c08cc6c1117f5509507ab0784e1c83
SHA124add75494629ca9665f292fb3023ebe45028631
SHA256dffec20d8b871a3ac64945a5eec03c378efb919ce53bfe210ec540aa2f70d46e
SHA5128b4046cd22302d2e2e8be6cd9763002fbcbc36c1eead1ee9af729a5a0bc0346dcf00413f0c35e3f58dcd5e1352cc4a71ba7b83366bd7ea3061512d5f9283f7eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb1e94029e54442e65d0ea7029b030ea
SHA17b68e749662c19eedfd30ed5be6b41f0ae01a37d
SHA2567202cca34e9a8aa705293ac0c8ad6dff588149d4c5ec0e846fdf236121378d7b
SHA5121bcfbf6fb0cc94b44aba135b28a669a5e57dc73fc5302a38ef926406ddf55fc7182ae8528b07d950e6aacfcb46f0cf08e4068d925b076a77f29c5f9f0d4b49d8
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b