Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
30-05-2024 04:20
Static task
static1
Behavioral task
behavioral1
Sample
8302b7b94ea8a2e2ed5baa219d3bbc61_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
8302b7b94ea8a2e2ed5baa219d3bbc61_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8302b7b94ea8a2e2ed5baa219d3bbc61_JaffaCakes118.html
-
Size
22KB
-
MD5
8302b7b94ea8a2e2ed5baa219d3bbc61
-
SHA1
d76ae9fa33ac7fbbb77a0c57abf10a4e1b8b0523
-
SHA256
d5a1ff935cd52f7095c22b011b93a646eaa5a12cb6365595c8b9c9b1fbe01b6f
-
SHA512
f270b5b01d6077c7f1c1949744240ebb255c37f87d44a3a713064f8fe85ec709fda3cb93f2883bdc7ea3f3b7034f4e38cb0ae92ed1eb9542d96fb2a97e1d2a39
-
SSDEEP
384:SIrHUbvOWVjXRv00vcAVESxUXOxIerk43C3XMhs+nzrwUzkXNABM2OAguXPMmhHC:SEHUrOpcKXMfcZnld
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "13" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DOMStorage\xlimama.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DOMStorage\xlimama.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DOMStorage\xlimama.com\Total = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F1F92EF1-1E3B-11EF-AD12-DE87C8C490F0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423204696" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DOMStorage\55told.xlimama.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DOMStorage\55told.xlimama.com\ = "13" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DOMStorage\55told.xlimama.com\ = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DOMStorage\xlimama.com\Total = "13" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1728 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1728 iexplore.exe 1728 iexplore.exe 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2908 1728 iexplore.exe 29 PID 1728 wrote to memory of 2908 1728 iexplore.exe 29 PID 1728 wrote to memory of 2908 1728 iexplore.exe 29 PID 1728 wrote to memory of 2908 1728 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8302b7b94ea8a2e2ed5baa219d3bbc61_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1728 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500df802fec4930392ca75855cda1ffa1
SHA1851b21627cce9b495af9afc81536792adde3fcb5
SHA2560108323c294e62df1b63463c8f15807114256b89afc54895c5c6555908f246f0
SHA5127a3181ee68ad229daf9d830b61b2a3523017534f772bdd59ba18143357832c196cca7d8abac1b0d8fe6b33cb6810623c964918386907137da0c502ad2885d9e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5956c18b0bde1f48613e83d4faef4c710
SHA11833bfadc2c1626c8b88b1b83ac7fb84d49cdc87
SHA256dbc9e39fca52aba3f0670c2c7ce0efd5c924a6a0fb04b3db22a535137f276a65
SHA5123160ab2c7bf3cb6bc94e6e47d5144e686ce0104dd35cbc914cbf3df523758fd9adae760ca3d6e24330960ce0a0dc9081a0bbb301c5551eb89d8e1e235277d7aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c94b3fb03df05887cc7bfc4f8fad6417
SHA18be8bb9c06671291898b4b169f5af15430d7cf12
SHA2568ee74a880ed9612683a6f7e27e08c46e4cfcf4afe53fcfa1283d80d22d51c5f9
SHA512db167e11d8b70dfcdc7d366ded25b66f3004e6c9ae025f48307c3982f814ec16398d169e9d5f614391b96d3b59427040e3e9edc9a988e5b216623baabc4df8e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598949663bf9e4a2e4d132ef2105f66f3
SHA17b161faf65f98901a651eae20cead37781df8279
SHA256aae082c8b808a8c3da286aeb40249f7b5ddfba2516db5fc4709e5d6f1e9933eb
SHA5127f56257b8e952211737ee0d12e072fe90c2ae470f90c052b09b6948197ad2f0c1b272a72906f230c3c835b667d0060e4af81402e95786b0b06cbcedf628a1f0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547934540f1074105ee9f6b5ea9720c26
SHA1af3fe689f872a1528a01956ec3d7dd130a3a9011
SHA256ba19234fec0463ea971b80dea61ca2a887735208daed871485b32bb28cfce02b
SHA512d739e3e2762a93f599f5deb8954d5347879c09557e8a2b9d06ac85a64905bd46499fbb02553b04d4152dbf70a96efc526e32f59ad48e39b64d443ea608b23050
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596924b589d94619c6060bf5fa2725be8
SHA15fe4659596135ddb1cf636626701d11e2bb6ed7d
SHA25687d6b1e3fb4d155e17bac84a9cebdfae547ea59ea57ddef1c2af38a4fd20a58c
SHA512670643971c15515a67ff92e3354c0a45b5d788e95f28a0d9981327fec874d86c4004ea75c79371c588a88ba81cb4dbb1c7ee9147128a3838f1bd330d4e7f6242
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a02bbb180541c80db0b586c6fa85176b
SHA15a15278ba6d0e3553f5944210a43f991b0abaf98
SHA2565d9bb0b6e064b6b5232a736b5dd97e8578162de4f829cab571b152ee53af00eb
SHA51246cf4b235b5f51645f2e6a6269c6012bc297ce1b0cc2be7c5b686786b3531ab7cd394e82629b123c4f087d4b5e6da84d831753572e26fd80d7990ac32fd56fa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b61ea134d5b720faeb482aafd07f64f
SHA19d78b2229594b8d34003a672e398af36ea8aff19
SHA256e745365bfcc06988efd56e0e4edc8458add6f56d8af4c83662cff814e19e0d20
SHA512836fb5c55ce068734d771e8f8cc0518251f61a9987126d32563fabcb5cb23694ec38980f75dea5e90f78499722877600fb1764aadc2764ff9d2f6a33e7172f4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59953a31fef251ca2d1ccf173ea83b21b
SHA14a91b57d987adaf342bc9176653748745c5d219a
SHA256f9800bb921387186aa9443521c628da37e00c940e1d3f1c583d95c0c556bbba2
SHA512d533362a963aa5948965c3002ae8a5ec0070cdf67cd7c13ad02b6c4a7b9b68ba22afc7c07c5eabcab50938d40eeb80287e993632fb5c2a72acb7e9a9156d3f6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac82e86ebb78028c3ae0bf3fb830ed8b
SHA1db1c1dbcddd031dd74813798af2ab8b1706f9821
SHA256bc5c12a7d1cf445236db7b1d9837e6ae9cf84a8e4f09a4563f8e9956ecf03995
SHA51250f22cfde8c6b3df3cd8c99a986f4ad2a16fe935854831b43c588b126b85e970a407096a640e47bd41903c7e7d1d9f62df132db03836b4a040d750458d73381e
-
Filesize
13B
MD5c1ddea3ef6bbef3e7060a1a9ad89e4c5
SHA135e3224fcbd3e1af306f2b6a2c6bbea9b0867966
SHA256b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db
SHA5126be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b