Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31-05-2024 10:32
Static task
static1
Behavioral task
behavioral1
Sample
86b1a52c831e7f64acfb8ced3a132ada_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
86b1a52c831e7f64acfb8ced3a132ada_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
86b1a52c831e7f64acfb8ced3a132ada_JaffaCakes118.html
-
Size
41KB
-
MD5
86b1a52c831e7f64acfb8ced3a132ada
-
SHA1
20ea98b483729146a81a38b6e9b7ba6ea46925d3
-
SHA256
3638e1252f8d4dc45301b169a9cff660d610349375e6b36d8ab6a8efbd703d48
-
SHA512
a7c18aa33bbf1ca61b8265c24376be9778823f6111c88d85f17905d127a1dab67f3d4f10cdd285b7bde9e8dafcc0c4397030b2a7b6e2ab1d888c1c8cce76f800
-
SSDEEP
192:uWTRdb5n03gnQjxn5Q/WnQietNnenQOkEnt6knQTbntnQTXCeAUEoZQhNqoJyfWS:uQ/aFTQL4lg/m84qk60VPcZCUi
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0BD01D41-1F39-11EF-87B3-6E1D43634CD3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423313402" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2344 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2344 iexplore.exe 2344 iexplore.exe 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2344 wrote to memory of 3036 2344 iexplore.exe 28 PID 2344 wrote to memory of 3036 2344 iexplore.exe 28 PID 2344 wrote to memory of 3036 2344 iexplore.exe 28 PID 2344 wrote to memory of 3036 2344 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\86b1a52c831e7f64acfb8ced3a132ada_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2344 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD54ff186fd4667b82eb4aa251cfc48185c
SHA178e32b3060e13ea1e04445d52fa67ea3e61d5e7a
SHA2565c80a03d4d3e06e069bcf34b67663b94c0104564a8d35216fbb50b19869e8e58
SHA5124e7f055f88010f196b72373d6472538b4e362d78eba99f8a7fbed3c185b9331b868e61f77558f0f2f847aab14fab2cef69ea0d9580ef239b421d1f1da381b99b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e7576e7575d8469fb1b7a49f137e3f8
SHA131a59c2284c89264af5e17f047cfdbef0d3188be
SHA25662249acd2dd8a8e6c1579d47d5d61e9413933772233ccc40114178314cfa1ce4
SHA5125555d0d28575d438c83f7ad7a66f7267a3d24ee572ffa9c122848e440120e0ea97df68cfe04ed183bbecb486b56492c7d66e6ffab5dfcafbf621421253b169a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b513731f876b7979607764f8287ac4be
SHA1cb61cf32a93e481ea0668c112c0cd35b897bf145
SHA256f9f248e245999d4446220e813d616b42b71b682ac5ea8b1cb1207a5e7c50f57e
SHA512053481dd1f412e8b14744ed599a50b5112244644380952583caacebe9a93e3259432eeec7e1640c294bb041bd05c065517c502f7b591df732f3ff8c35c5963d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530ebe5bd4e25f3cb8d8483e619a7c72d
SHA1643bed10af5b1e6449c56f97feb30e8a3098a3be
SHA256e8f7c0b1e203eac9ba84f30c0690440ab21905eb6ea8079e1c9b16398fd30ce8
SHA51288c73ba24948cf4448cdfa9bb79a53ecbdc6bc808a5c2008443fe4f60ad07311f4152c42149e9b8f92beb240734e48b985ef0f1d648219bcf04bd1a3efb4a438
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533dfbfa9cec569c5d4745c33e5fa128a
SHA124ff5a0b3a3787497a2b0759b73ba6719d242def
SHA256c25c393528730521e07c9de381b4b6e4e48acd58a027baa8d8fa06f3a1bb4031
SHA512130542249f20ef6c44a0be76b1a4bde9a0ab4b7ce9ede4983eff214948e2e4fb36c25c5d261f34b8401ff0eb2b3c351571d863429619e962c4f72204652843c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5b9b9b481192ef820932bf21993d1bd
SHA1e0f0ac4811917e73960185c2362861fb3275fad6
SHA256df59379ec977d7ab3629fe437fa761fe8f63b0e1f6951620fcd5785be2fbff0f
SHA512b7f6368ea5ea41e307b8ea083b5ce62d30a05dc6b23c85539ae696ee4da4a7b35279fd5b9bba67a1f86c7a1143305fa3964a52eb4b5bbcb32f1cfc658dfadc17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563aff2842aad4e8c4160616a582e00c6
SHA13a46fd7d51a6c22f4822b381d78028e2791c0dd3
SHA25605b8b26ef9fd476eb591b46fc5e983bfcdef34d179da0cfc3ce63b259ec82444
SHA5123178392500cc972b3182782fcb76e584c404169b3246ebe09f5644c4ceda9c60ff9ba3425b13ae537cf46aaf40971cc16207fdca2f5aa2215100c5848d35b954
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3a40c22c21c756e5beda065ae31ca0b
SHA1eb51d43d828094d0c8ad24e471a1e1129de37fbf
SHA2560e38f294d520cf38418e2e8828aceba15ea44f3b9c8286ab8951b57652da1fae
SHA512d1b45e3493002909b9738a883803a36ae1056ab070a9af9c4a197b9c015dca90fe8a5c8938d224c0cbdcc2ab3bded432536a2dfc7109e260da2025474a235a8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2f1dfe7d8979b8b29fb9d3131bab8a8
SHA18965556091a909dc2af1729cf828b6087220c7a7
SHA2567516401a3b9e2db5061c48d357e637eab2d8acaf9519f7690bb91392c5947a33
SHA512f889af89512b097dc9f2996e45e093e0075cdf7692c40c065dfa3a9cd0f34c8232d5629526289bf9e1fef0b84ff91ffc9b8a52cab6c9976de2f5d7b6c1458741
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b69db7ae210ea6b31dee095743deeaeb
SHA1633949985e3e67a4a0361435bd00149f6d93b50f
SHA25659f5b010e7fd2c5ba07e23ddf90fe87802308638ef9a08687e13b9c85cd6c94f
SHA512c80903585ac95cf50dd659669c55f6f690d594398b6e9d0174840fa4c41342cdb711991473a37cd14aa4b23795fa78726b1ae1375e820f593faa147e7f408c7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD53d29cd99e4bd573bae0b1354b4a1679f
SHA11468d985494a7850b99f04f51dbd10d87ee38063
SHA2569a1a46f8f147c449bf55a072bc944b3c06275963605fa25198f15484d9cf1483
SHA5120e429147f061dafc915d1ba8fe0c9968b699ec6d96190ec660621045016e6daf700505cf250d449a85db90050f6a8e4c6f9173e2fc4a335d2ed35378b1f7dd39
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b