Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
30/05/2024, 23:31
Static task
static1
Behavioral task
behavioral1
Sample
854893d8dbaa305b7417d491b1fe5252_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
854893d8dbaa305b7417d491b1fe5252_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
854893d8dbaa305b7417d491b1fe5252_JaffaCakes118.html
-
Size
23KB
-
MD5
854893d8dbaa305b7417d491b1fe5252
-
SHA1
48e8db801d8ce2e41301023eca4058cbd276c58c
-
SHA256
ed91efff30153e81d5564b6497d06f2355b21e9359a0d87f12be06f9a06ca05a
-
SHA512
9ebc63a10802d3a2a21728d1a28a2ae07a7b6790c6a9c298c0ffa605ab61e700eb490a050ceb1632914c226cdb4d890c47ce241bfd6f2a3e63c42c5af6b44252
-
SSDEEP
192:uwP0b5n2WnQjxn5Q/VnQieQNnynQOkEntbTnQTbnRnQPGLnLnQt+qMBwqnYnQ7to:LQ/mGfaN
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C1B6ECE1-1EDC-11EF-8E44-4635F953E0C8} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423273763" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1688 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1688 iexplore.exe 1688 iexplore.exe 1932 IEXPLORE.EXE 1932 IEXPLORE.EXE 1932 IEXPLORE.EXE 1932 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1688 wrote to memory of 1932 1688 iexplore.exe 28 PID 1688 wrote to memory of 1932 1688 iexplore.exe 28 PID 1688 wrote to memory of 1932 1688 iexplore.exe 28 PID 1688 wrote to memory of 1932 1688 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\854893d8dbaa305b7417d491b1fe5252_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1688 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1932
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56516e23422e2ec4bff3db058ac4c0c8a
SHA1b6429fd003f561070dc557e16ac732b1d9e2255d
SHA2562cd3e1e0ed00fb76731cb1390d5ea0bdc62d3b10aabb50813cc421f91d70ba07
SHA5126e827a6f63f637d147b126f0e67e81ee5bd2297a9802ce353e29607535e8dc38098f84be3a006409849cc2f6ba6551c5fb7e962c9eb64278736b25283294aa88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1a0a53c3437a03834f82095b14b16a5
SHA16ef6d90dcfcc703d6171a5fc60a355d1d31834f3
SHA256a0c1fe0071de4537f9c6061c8bebebd1e41d5ef5ac57d96700769a547fc15c68
SHA51207a23bff6cb0a5a98a931f647e3944eda16856446e2c0bfef8068c669aa480c05d914d03684f9c7076238e73b3da988b475a23ced74a2bfd17b589e57bab70c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5af77d5589661fb4f3aa690a4fe7b20
SHA135c98f40eee16ab548ba6596603ab5b7356d117c
SHA2567d25a0551d801ea11a9cc8639ec774c2e1878c3229a39a5a1a87d6d5ab4a3a80
SHA512b679b20d6ba530148cbf728bbb1ffaa3efae8f8aefbc27758dd10fb855a35c3f1690babf7a69603fcc8f8c6124d5becf44c47d81bbcc026586c46473c588abf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0985abdd83492130edb20944e45d407
SHA172afa2dc380fc8715b3e91e4b59b52472f19e6fc
SHA2568a0c03d2b21e953510c167eb40290e2733fed5bc478519008911712cde08795d
SHA51276e7cb03bfa110759a979e4645dff2e32ea198d3bcd7e2095de700fa0f2a96c138d0758a28aeb0be96d3755879f7189071cc882e068f138371441dca6fcbf232
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac76f339ffcbdcb4f9fecc5509ff63a3
SHA15189c48b92c91f77ca125b58491b8adf3510b8ef
SHA256ae25cba8282e893667677354327c700b671ece8889081b57a3587dc094b6d95b
SHA5120ea509e033bbcb06e017dc481efe24f7ae405e03d8c2d923dc7cc8260f134691f93b71c1aa8bac1bd3b2e6bd5afd593ac49afdfd20ab5c7b248f630e4e8251a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549af54fb4ba8f5f65f7776390fa92155
SHA1febc86e72768d6071d8fbe15719825476f199e12
SHA256baa7c6032a4e7372f44c1476a733f06a0243f729c0c609c956b98e0ff85ef9b9
SHA5127a9e5688302a4e73f2c8e99c4b30a3b33262c86c525c642a7a153209ee4b29a31a02dee3bb405745e834f2271c6699d1ddd712ffd489b6009e9bc4e39b65459b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebf919de0db1d9daa9ba630f5a4a8fb8
SHA1990304add8ae45a973a139b667a09878b5e6f4b8
SHA2568687463a5dad402f834c6b0d9b2a5ab2932447cba7782f634df2f2eb1cfec922
SHA5124933910dffb7687d3c47143e40379540424bc4870dc35d8184d33f6aa35e8e58b28d0233e87fad48261e1124fb65cfec41556a20e5f88968608c76a3474dba24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f889e09894f55f3bb794f430d3a8101
SHA17354a17cdbb1be6dfac551127be0e51b09a093be
SHA256299a593776742a94dc96d42bbf241882397aeb71dcaa240daf51715f0c47b51c
SHA512e2992783d7a3dbe1db27006b422ff04b5f75648caf92f4a054c9c63b08f7d7bebb6e608fd0f0dd8dccca8451f7f2ad6f6bfb85b840845ecfc7ee2beeec63313f
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b