Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30/05/2024, 04:55
Static task
static1
Behavioral task
behavioral1
Sample
831705560c4cfde8a22cb961465484ae_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
831705560c4cfde8a22cb961465484ae_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
831705560c4cfde8a22cb961465484ae_JaffaCakes118.html
-
Size
25KB
-
MD5
831705560c4cfde8a22cb961465484ae
-
SHA1
126f557f5e273debefe9f0ddd173301ad6895f45
-
SHA256
8372236f5b7dcc7ef773e40652953e76f8f8d82f1e0dcf2168f5e35b32dd6744
-
SHA512
18022bdf96232b1c192fda29b427de39e7d85033ef0c9542c2b4315dcc778cb17ae1a8ed0f9a94d039839d3ce80a857afb06e6b095d79bc0f2a3689c2df214b2
-
SSDEEP
192:uW/syb5nFinQjxn5Q/wnQiebNnXnQOkEnt0SnQTbnFnQ+YqCfA+pdEi4cwqHXMBA:1Q/TDbbOA
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E23030E1-1E40-11EF-BEEC-D20227E6D795} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423206817" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2288 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2288 iexplore.exe 2288 iexplore.exe 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2288 wrote to memory of 2804 2288 iexplore.exe 28 PID 2288 wrote to memory of 2804 2288 iexplore.exe 28 PID 2288 wrote to memory of 2804 2288 iexplore.exe 28 PID 2288 wrote to memory of 2804 2288 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\831705560c4cfde8a22cb961465484ae_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2288 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd9709cf36ef8168d61468d24e4b93d3
SHA12f67480f1152f01714b7dd89398eb4e171ddef44
SHA256e08e60a3c0f0958eefcb36bc4b992538621ce97a67440191a87b9bcdf1cb077d
SHA5123273984f9faf85fcb5832997cf3a64a8904f6f04e10b417abc8bc488c40e3cc088bb75c94d548eb8f4b5be1aa2cfe079c499b5f20962f195010ddb74eba9d631
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55214e26c1419c6d73ae8201fdd862b08
SHA1192a1ef99765d1a9fa56fd1a67ab5061108da25b
SHA25626312b129cca95d8778146f77d5c7241c923bed4eaf54e8955f504783b62f7a5
SHA512223caa2b39eca5697b1674100bad74cc9a43b12558771442459a408181d704ae10cf8fc5346b0eb72a979588c59f0bb1fcde4d3219c1e91700f2738ff3ba0cdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e75adbf7ad6e0856813e232028dfa6c6
SHA13398af1166012da1e46d8e7514425d58780bb34e
SHA256ae92da31207ab7597aafa6e1bc08da89faac1292f53e3005beb1e12460ecf45d
SHA512aec92c9cba5aeafa330d9672fb250f38a8ac455329899449ac8218f4a2493ec1c8e844e61d63c998c05fba96a52e4fd34d9900fc6495a3fa03ade3e84717a252
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6c67d0c0e3d46adf69ce50520710ec7
SHA16ab27118d3772c0c6fdceb7bcc6dd3dc7602716a
SHA256bddbcb8b44cd0e42c8fda3883109deb722efb499c61635c8899c8c37cc35ec28
SHA51240af1f23f8632c87946794de04f08d7619b6e378ebe6bec94d96edc37741070a33db0e549ae86629892f3bcdef34a4c7b5757cfa841ba2496d752770b45edbe4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e78e183b0da0e7260cb5f3f4970ef3c2
SHA1a5fd74b380b2dc1318d0085e047761f4ac2f2b3d
SHA256d4ea8813f784c877f8f72674ded87f85a26c4bdbecba0b4aba8cc8a4f3ff5c31
SHA51270810e58cb179d39a16a496d968ec3c6a6fe1b9bd85e6dcd754660f44887552fdc6a1b8e844c0445cba6e6e5ff7f65bf01abf63187fe053519a03265f9ef811d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf9c44d5646adedc6ded3bc305134e8c
SHA1296ba89c1b47c5921f94634330bfad93008f3e51
SHA256ab69f49e4cd373ec0f7457475d5b8c01b1100e43572a02c0f3253cedb8fe3290
SHA5123d2c1700c94dcbf23377f3caf71a0deedb94e14e70275a7356645fd9a1e4dd44a0af5dff70e7f26b229cf9efab55fa8850a982ea448f719124547a70c118b8cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553609873e8d54485eb3483df2fb62428
SHA14f358c462ef6e6fd2da11072a74e84c6a9aba7f3
SHA256a9e7709cdb963399dd2c9192690cc3f500cd0efdc05ca85a33904ab0837d698d
SHA512b2df3497259a8ddc594d1b2d1fa22724833d9ced8de4b77ab7f4cbeafaac71753d5f943b388229cbf2992e5bcf629750942e894bd5954926d24864f0085d2a22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5728bd8d5c96be4d9df11ed87b1575017
SHA1e8f0f25140b1f6645fcae83ed988ca9e6d8bf6a0
SHA256014e7c286190df032f7ed5e099d8de96322f3e3e7376aee14b25e4ff9b591af0
SHA512911fd2744c6fe5c402ac2372b062e1ced16d7abf2f78138d98a7abb36e00a2323a81b1d4bf16f6f5d6ea78ccfe97033e857cc38b1e4e0dddf2151202378f21c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52edbb83b43265f7fdb3b7ce2cfa398c7
SHA1cbcbe837410a5550c897dbc4b8ee29d1d7848fa7
SHA2564301745503990e601a68188c708d3787d8b474bf1be02c77e9d3f322be43b9cb
SHA5128d902bb3adbf1a067c958ca01486517d1c502963b31caed31e41607cfea3cfcc49a0e4b6d361eb9b3bab3204dbfbf89e4405c6a31d9b89ee0af86c6a8114a561
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b