Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30/05/2024, 03:44
Static task
static1
Behavioral task
behavioral1
Sample
82f0b24a15f7c13dac16acbc7ac53cde_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
82f0b24a15f7c13dac16acbc7ac53cde_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
82f0b24a15f7c13dac16acbc7ac53cde_JaffaCakes118.html
-
Size
27KB
-
MD5
82f0b24a15f7c13dac16acbc7ac53cde
-
SHA1
b489758213510585d204ffdf2746095a810bb9e7
-
SHA256
19dd01f5172c415dccef8239ede213a70c6baed0f1e80128e339e37e46a33f16
-
SHA512
bbf2f07989ed61a7aab63948d9be0afb3b6dc99f82b57d2c0ed1622a7ece12e9d42acb87afe1b6b1d6a3258c4498b704b67cf51189e7f1a5101e054954520150
-
SSDEEP
192:uwPIb5nG2nQjxn5Q/VnQieYNnrnQOkEntzDnQTbnxnQ9eSAm6P54uQl7MB4qnYnz:/Q/5D4x4JSiqE
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F2D4AC51-1E36-11EF-86DB-FA8378BF1C4A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423202550" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1668 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1668 iexplore.exe 1668 iexplore.exe 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1668 wrote to memory of 2560 1668 iexplore.exe 28 PID 1668 wrote to memory of 2560 1668 iexplore.exe 28 PID 1668 wrote to memory of 2560 1668 iexplore.exe 28 PID 1668 wrote to memory of 2560 1668 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\82f0b24a15f7c13dac16acbc7ac53cde_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1668 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516c178a99b081ff8bdc1f839bc4a3c9c
SHA15736205b5cac2929b457b92ecb367bf31486654a
SHA2565a48ea148b7fd6b95791ac5f722c44b428cfa3dbab915e1f8f1d4add6d04e250
SHA512398800f50c3af37ace0e3b22701041cabdf9a80d6cd90542cc8d4a2f06e20db49c41d639e3e1003a38672cb7f1a391cabce317640fc2b3215cce499867bfac4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f1e4bf73a9945f762f88727052a7205
SHA1983ec736ef0952ce5efd42525bcaa46f9c2dfbcb
SHA256e73f51a303d718232fe2ee88c4c136688a063acdd941282bbcdb5cdd1e1a9879
SHA5120378af7228284bf16f016bf5f3ec2660a7e05d7231b93e9ce381e30f20c6f986d19f190cf5b5734362a8d35012260613b56daf3d36679819f9ecd8d3f61e2781
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c51363329645182c5c544f843b639310
SHA136c648c7c5608c6604947afebfbbdbd8ce7fd11b
SHA25647511bbe544bd3dcb6edb8c1cc86fe5b3dfc2701a1841e5b41b2233c7559e7a2
SHA5126f28499791ebac97040944c79f73adebe1b94b210affc613d81b79d25b5bb563507f1f0f3b6388cdc2feb581f9bf4b557aaebc2eb285564d1631486fe311ff02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c08336a1c81eea23fdced3b1efde33eb
SHA16f77b1e0fe1a28d899b77ee8aa699ac312fdcec4
SHA256c66e544f4b418013d224e0a55f5b9db7f4c4ee7a23d96dd5b6a1cf1bc3f60433
SHA51207c5e7c85ed098f0acccbcec00ed1967ec7fe241eea203aae0f7b117523b0ab89b55323f7f550902ab1a03c613ed366bd9e80615947daa2613d99db25c954a43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7c9ac8fc74bb7e3c5a45d0bfea76266
SHA17ffac8203143af056c0d9aff901c8376ccf3594b
SHA256c0b066b5c351321a81285f1cf69f4a2fb190fdc67a16b1092896107fb08767ce
SHA512d3069e3e6d77f9faf1b39d0133a1d81817f72ef243f6734da79ebe2bdff98c5c9f6b54533d0ea7eb96a2e9a37643b660b08d3644a7da9c008dd38fb8f46e22c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5122b2b33025b7f7e96c7cff6df5102a5
SHA1824bbd158b316678e69880a32684d6078bbcd5a5
SHA2561e6fe22bf27a070104edd99ea67c8c828609eca6f39f5ffed2743c29e013eb14
SHA512e2be8e502fd24357829cd5e2d8d9750f470ac58d5ed15ebea40dc2af5ae6a3ce49b46139c019cae2996090168cf9645712c5b71ddc6cdb546d89e456e9522906
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0fca16fa4e53d0e7998b4f1d121f023
SHA1210dd96827e98d992e23aeee58b33bc960f0f44b
SHA25660cb86b6663def5a6fd372908418026a3f5eedd9a50e3c553f7219cd9b5ce2ab
SHA512e9bc2333a4ab7d0148515dfe68ec6925b41ecaa0ad0ccae04837674fe48221548e2c8d91a36c5e206308dba2d162e5dc49775591d948730614b8ec11ee58c16f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b2fdfd08b63db97865fd32fbe370a65
SHA17eace7ba3d3ddcfc2ff76f6d1b807b6cece3a331
SHA256cfc3bce76c7ff1e28abd567fe5ca93aee30ea0e80205a245f1ff2de42f55a714
SHA51223f7536fe65c76bcfa6fd97b5952df33fb83df6bdd82539757ead0a84dec88d8fd3b2cff1e16d17f6bc30d027a819f1a9226cb1d7a05c103952a457d290b2efd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5676fdf511d0c2d8a8e108bf910e60bac
SHA1873954ebe108db3242ea5aba1d58c8d399c67fed
SHA256942aa6cced17f2e6f905781bdc4f281c15dfaf06299d0a49f4d790abbc8e454e
SHA5123c5264f8b2b8392e65f24561c4d570bff475da15d2390b4d2967693165b97c156760780c6c1ee8482c3c86f9a33d76656f41422e4c0b4cceaa69a9900ae63917
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b