Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30/05/2024, 11:45
Static task
static1
Behavioral task
behavioral1
Sample
841e13a1a29584ba745592db604902ea_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
841e13a1a29584ba745592db604902ea_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
841e13a1a29584ba745592db604902ea_JaffaCakes118.html
-
Size
41KB
-
MD5
841e13a1a29584ba745592db604902ea
-
SHA1
9a9fbd3612ded8a10dc073c7614f0164bd8e3d1a
-
SHA256
a9e2bedc17f7e121df13c246e6d816b7b1fc77e6fbe40652173031adaa9766c6
-
SHA512
bd23317130d5af6212e276ec4b5c516a6ca9b3a0a246185303857ffa79891be710c5a1af7a0e5fbeda9b730350f957fb422e65cc450260fe2d5572dd964914d5
-
SSDEEP
768:SVKjRuqkMCMpzKvYKYcqkZbwOAJ0JOUH6Q6qGB5mzEuEmeOpum6Dd29RaOMZq/T5:SKoOKvnKGbwOAJ0JOUH6Q6qGB5mzEuEA
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423231387" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{14A55671-1E7A-11EF-87B3-6E1D43634CD3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3008 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2060 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2060 iexplore.exe 2060 iexplore.exe 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2060 wrote to memory of 3008 2060 iexplore.exe 28 PID 2060 wrote to memory of 3008 2060 iexplore.exe 28 PID 2060 wrote to memory of 3008 2060 iexplore.exe 28 PID 2060 wrote to memory of 3008 2060 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\841e13a1a29584ba745592db604902ea_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2060 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5069fff703785237d68391dfdd45fee99
SHA1daadb4ba85d6deff76fc2e6a7a74be9c2a55fd03
SHA256e12f7eb2eac4b314aa7ebdd42f933a492ecaad3c9ee2a7c6ab6921dde51b7dfc
SHA5129bafd2f04b5ebb3a3614c1dee96db8542e793af54bf2ea7a9a24724bf5960f24ae89c980e251537081b962e192e9b7a352cd95c9ad5c164b127a2f0ec24d441b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d048788e7f178530a2f6dbcd3c2a7062
SHA1f24fd966629eee13925afc74575f50d51f0b45d6
SHA2568a942d6a2068b16119fbca204aa4268c608e3a3f04b9273fdc754fe774a497ac
SHA512ba3f316f14ce72db58d798eff5f3eb6544566ad15f0e7575a19c5bd64b6f895db7b4642722a93c927c8a17a4785c06cd3d47aa9edd9dd392f0707c88a3b8f302
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e8d9313d93f7a4f7f747423ec9d861e
SHA1502629baaae2f05d96a798bf09b98f8b2eb9dc54
SHA25624f799fbd64ff4dbd356594483aa30bf70e07b80cb0184e6b976ae2189b9ee61
SHA5125517aea9b89ec1aec4d8b682ccd6d98965db70df4eead870a4fb2938572fab70d41f96e99813f437f6bb87e04184663d458652a0198b3712856dce48016df2b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533265a4d3ee8532a7050685a7f242aad
SHA1fcdfc19db38d0fa0f5af693de16e66b795d1c09d
SHA2562c741c103ac0405067becac339249964750814f336cfca34ad2ab5b069ff5b21
SHA5121cd51e203108d0ff33baeeca6fdbf8d94d7190a37446b6e33f210d9650c4a01cde8eb5017fcd58190ae050bed67a26cb2189c1e711602f50727f3fa6ced6c7ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5728ac5e3419a729500800ada3f5fbccd
SHA1608c5e604e5462d5767bc628dae23a5152ba2a09
SHA2560ac9fa92c565ba5018eafcf5dc3152923e66cfd0e57bf6daba253afa0c1d1282
SHA512d9024b6cdf72387a779367e89e0bb53ed100e0e1f971c9e612ea31e8219de0857e2707e8964242ab3bae6dc415a213a0925c98f658675e1e05d938e14833d2ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5710b68bc5ea9948deb3c4907bd837731
SHA1513ffd28ce04e5dbd4e46465e7f79fc83327ab6f
SHA2566128eda9e6b00ffcd4cbfba591211bed92748101fde63532ce5fe1f9585a66fa
SHA5127eee15eab86281cc6a775987bde203e2d98722ba32b0971016919df3c1d354a48e4c856b470d4688781307751e64227337ce412d96e257126451c78841fbd19f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff46ed16cf62d0d2cf776cbb119d9ad2
SHA198c3d271de1c7b164467eb6e80b9f790f87e9228
SHA256af621ddfaa4b9d73f0e827658318ae2b91cba361ce76be36a9dd91049d89d7f7
SHA51215bc13d28eeb3e877b9a32661ed1dff879cf40e8e7c6ab1b2dcdfc438104279bb944179b02a58632ae410ef16ebd1f6f38ee429f1202fb465b43f3271bb11c43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558ab4a19007dd726897afaabfb945c33
SHA1bd256faaf5a4e1e0fb616ae8b04c055b2b8a1455
SHA25627e864d65d1f41237299aca11bcb52ff49432d8a075b140531dbd72c0747c33a
SHA51215bca464d8de1db481de93def9de3124e06f3185bdfa93c18293699556321199a9024557ec748dc2ea4468fe2190748f68d7cf77bff913a204c4111fb4335065
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572ede0aa5d66ab0fcf5cbce6bb5e23b3
SHA19b8e7c71afef16b96e82f320cd3c99b58525305e
SHA25687e9910f290e6f16ebfbb80824b0e0d9c2496c743802124aa8b6c94998730980
SHA5125d84f3e888037c863fa8084bd1123b4568d727f1b43888ab11726b0ac0f3e11795ffe28981bc3b2b34d8f18d1b80fa251fe3e21dc35dfd68a99569e828fb64e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dedf2c6fa7b9ca8c0314adcbe242a9c
SHA164e90bff866a21d52442a9a8d1cc520d382d421b
SHA25658bf9bf84f2618cf9e1037b4bf15d2846407d5984646301b5fb074bb96438c3d
SHA51298c8411d95111deb3ad4c406c7626809f35fe69cd7ef4ab7d35ba1372ebdf7f487a3eadf5868887dceaee1357fb93aabf35b4b3c58227bbd6bdc1b206089f2cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d89cbfeca939c3df3024fea14253c93
SHA1ede3ccba015f20e362df9047d69f6d7709dbeafe
SHA2564c27cbd06d184638ad908e23e72ecf8aa986d4da9d83fa8626a17f5623c6aeb7
SHA512b3de5795a694b8df263f42b927517428f8ab4a9eb0d6294aa31bad6870be761f57f3fcb97f86dbe756a5e4d8d01021abc48ed3b000eeb5cc54614d9b662cdb9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513ca0164b23a07aac9d84dd28e147bc2
SHA17c03314d68e325ac6821dcd1ceea48fc986fb51e
SHA256fefc1b993e581638a46d962d3eadddb7df0a795084dde9e4055e34b96432abe0
SHA5127157f0fb2123c5bbcb9cab602d055cdcdce2389efebb701b445f4d61e2e11e43f13a3842a7831ab5b242307329c46e179e6f4f02db26949cda88a060b1d2db9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD52e57d57a5e3967370e51823e17f3ed18
SHA198523a0f8c437dffa3c70e291866e46468453241
SHA2568d1830be71c1c7329cc0ebb4b9e7339b68a61d5162deb3057757a0b1827d1d09
SHA5124d1793d3bd5363c6133e277f56361f10b7797947422a847ad404440cc1db4a16fc1cea9f5036af1bfa3240c39c72cf16fc844585942b66ea488fe3703bcc9a94
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b