Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 21:15
Static task
static1
Behavioral task
behavioral1
Sample
81f3dc3b354ad16931629740e28f1a93_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
81f3dc3b354ad16931629740e28f1a93_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
81f3dc3b354ad16931629740e28f1a93_JaffaCakes118.html
-
Size
27KB
-
MD5
81f3dc3b354ad16931629740e28f1a93
-
SHA1
53a7ade12e412cae7f76b0afc0d182dd898afe7f
-
SHA256
8ef074ae4f2916a7cc0e2d87652609f1923d23e22f53af293ca3ab5d29404b5d
-
SHA512
f126bd863125e71fbf62f3a36fcbe4b7950e785b25723eb99c1f780294e0873277abf18f8274ad9f26d99263df27884e39f60e0cd77fd8db9350cd9e4a27887e
-
SSDEEP
192:uqo/L2b5nMKnQjxn5Q/vnQieWNnNnQOkEnt5ZnQTbnNnQECJVevo7NtdFo+NzQ4C:naQ/GygcO40h
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9F49B5C1-1E00-11EF-9FEE-EA42E82B8F01} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423179217" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2860 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2860 iexplore.exe 2860 iexplore.exe 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2860 wrote to memory of 2484 2860 iexplore.exe 28 PID 2860 wrote to memory of 2484 2860 iexplore.exe 28 PID 2860 wrote to memory of 2484 2860 iexplore.exe 28 PID 2860 wrote to memory of 2484 2860 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\81f3dc3b354ad16931629740e28f1a93_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2484
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e70a2be18ccc182ba8581c2f3a85494c
SHA1db3f5856ed6dee329f4cc4da88e0c537d521b30d
SHA256918743e8bcfe91d58daaa293b4cdec1f31dbc0d2d3e63303c544ed731bc8d5be
SHA5125332dfcb3f1a89b796f10ea04f93e238e1d6caec1e9d89fbef27b4f55182d7d45c7bb99e370179e22193be32b35d88ec2c0ed1246131f23566465c4321010657
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5c4692470baaf25bc18c0c5103bd157
SHA1fa888eb98ffc60af4135c41dd890109184b24013
SHA25633822dfd7190f500856802414bedb0541dd06b8c47f399e815883bdb1a4da085
SHA51264f8b7e8c39e10f9fe8550348221ef1addaee2339ae4abcaa21c38ed23a641658803f3390d5bc479b97ddaf99f41ef6aebb251ad145a15c607bc7ee4ec34353f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58434cc586e31118c92fbe9e2d7e61ade
SHA173a48a1fe5bc37b194222f8c44eed9bbea84b13b
SHA256e6345bea4c267b418c58160884f896c4140a4da53e60f792343b68ce31ce132c
SHA512d03ee94f3ac3ec3851ec55a06339f4392605ed0d11d2bf60f54816dd21e6a13a39bd4cbc3477683a758ea462144e1018ce4170bba531791a404f3b43b12d7737
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c1413a26952d0ad9dffbbbd233589b0
SHA1b540fd821fe52897615fb26904c6cf5bc363f79c
SHA256a3a0d18a3182add98bc05a00ee8784ff03d038ff899fa3139de6593b6b14cfda
SHA51205b6bde4966e00635355276d2a798472960ef8f457176526c71c5bbcf51c460abceac572ebc3b49ae3eb10ea5036a86e57ab644dd23b38ca75370ae774e92f39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af783086f31209f8afbbddfd5493a363
SHA14e9fa0921e765fa3042287251f1cb921517d707e
SHA2569e02fc6ac09ace943d7e978d325894ba3cf471064c601198c88328d167cdefa2
SHA5124d113b476f0487e935bef7b5d7d65d4f876d01807774d69e3845d8048e980321713abb23b0c86b457337070012c5b204090aefc95c070af07eac75330f87c9e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595496ef5413f7715aa42af807b9155d7
SHA151a01335ce2a39c1d24bd4b8432ca972755e57ec
SHA256adb0553e3af61b52a0f03683ec28418b8b94541d237661c4ba0c086ee3cad0b5
SHA512db350929e494ca0680814659d703ed83487055b9f17ad59510b1ab74caeae2e4736f546582a23cab87d22116ccbd2f7c761dd4b8ed0f27347f5182ae077f2e6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecf3a648f54ff3636bf5bbf32d0ff132
SHA154f090c889aa764c085b13545db126c1f841c84c
SHA256b7af662188dd29d5cb32685dc447a01af1567094cf54b169afc0653653344201
SHA5120c56f51de452a271fb7289877430705b5dc5e452af790ce8c76ed08c51a3e2e2b1585f5cacd774bcaa5e2ef5671aca9ac1e4745ed8a7e8cf8977c23cdbac4e12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5844f3c09e4671943939118e8eb314177
SHA1b876b0e2051c4bed61ed35247b508abd8459dca6
SHA256bfc07f958066534d70d9253a41b50edd27e60cfc4638990ac4231c5e53a58715
SHA512a84296549f8b3335bbbed01837d5d871740a9997d106139e9f62fbc866e3dff64c2d7dd9a8faf3a4c1f1b71f5a79256c99662112b27aac68ea79ccf3092726ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c0d9a5eafe5af9a62d73c77a40560ec
SHA144dc3c83d2fca4ad5a3b9b9121838fb088075c4c
SHA25683a39534d66487f260c0f179d231354010fd445b03a968f8a7c6d9e2b170ab94
SHA5126e5b8aa7aec08d5019bfd066274c3350f78c276e678229ac69a9e25977b9dfbd54606e725aa50a12ebb6eb3837d88b6d510f5977c0ced0e611dcf7df64d6c064
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b