Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 10:45
Static task
static1
Behavioral task
behavioral1
Sample
86ba183b6135af977880183dd50fef70_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
86ba183b6135af977880183dd50fef70_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
86ba183b6135af977880183dd50fef70_JaffaCakes118.html
-
Size
27KB
-
MD5
86ba183b6135af977880183dd50fef70
-
SHA1
c2006ccec1b70eb86b705fcc2f1a4b7a75b8def6
-
SHA256
6ae093cda92ae81e2b3b4874505f78def7f1d519d909e540b4cb2c05caf92c26
-
SHA512
51c64c6d0b607a9abdbc5176306e10559ee6d1742dc1e7073c85cb4626e1a90f16f2c5496f407f5d72fce746e4af921d3c9700f1af897c08247546e13df5d780
-
SSDEEP
192:uwzBobVtb5n37enQjxn5Q/WnQieNNnZnQOkEnt6knQTbn9nQ9eFxm6uXfBQl7MBk:KQ/1wb6foS70Z
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E80F5D61-1F3A-11EF-B04F-52AF0AAB4D51} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423314201" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1976 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1976 iexplore.exe 1976 iexplore.exe 1944 IEXPLORE.EXE 1944 IEXPLORE.EXE 1944 IEXPLORE.EXE 1944 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1976 wrote to memory of 1944 1976 iexplore.exe 28 PID 1976 wrote to memory of 1944 1976 iexplore.exe 28 PID 1976 wrote to memory of 1944 1976 iexplore.exe 28 PID 1976 wrote to memory of 1944 1976 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\86ba183b6135af977880183dd50fef70_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1976 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b7db3b6dcf2980895b982b44426649e
SHA1af67283dd9fc48fd96d7ff90a9100af552f29914
SHA256e3604e77bfbed1e25953f59fbd953e0fb55e2f03b33ecc38cb35b6e3d392e92d
SHA512747c003710dbdba993e5758d8e880593d288ce260d7a0f005486a0dfe616b8572ad42e70c2754985226b48f7f5ad868e24b285d25ed87b4d34ef5d2a1d25604e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a55ab2b2b5f114a1202ee308287030a1
SHA1a2a77958551b680ca155b7f1961f7285961098a0
SHA256daca8bcf056c93be8dd95804e67993ec18b9e387a2ba4511bdcd42c0df2710d5
SHA512a6036dd5afe8fa2ff90f51be7202541598f78843f3c4b4432b7efc016288241de62280031529c8bcdba663b93c64442589c20ee202620972b5e5e842654429b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54404b91e956ef465f2cbf4f3e383d3c9
SHA1b3392ed0885f0c495d23ffe0bae6e3d6396f4064
SHA2569655bbb5d75c8746e95715ade9b963a9d291dee2267de898ecb02b806a573de2
SHA5120989763a51cce7c4d14013cd0d00bfc6fcdd4317b3aaab93776ae1750785cb7d87592ab5d7bbc30f4694d5cf51d72556a11a31f596f5505ce4530cf00bd8c77f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6195aa6a8c142f884a80ab5c4171718
SHA1e0aaf73dad86d3e9666908c83cfda17c44f50640
SHA256092792f80701b32d82fc7c819801e8db69dfda08f90e969da4deb3b419ab9326
SHA512b546ba4a19c553aec34c1addd9a1afcea95f1ccd85d0af1614741830e37ed7604165469d094e93a518a33872738d0b53a8fae138387e057471ecc101f044818f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e14d92b18697adf733f92ff192f716d
SHA1eee4ec0b2762933a2d87fbf00b30f7d8f7d82590
SHA25657c319e54164c8f2069bc5612e741e882c56639749d43939ee89e36f582c07c5
SHA51266d678d42d59297eb5979ab080dcd0de183d3b2583eacb24a74139de409a9d29dc6029a4060db406668180113c7054537fc4f2cdc93d6be7ea8afd9351476589
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb91da0ddc5bada6fa759a0875dbfb28
SHA180a806feb2dced2b1d94ab249691079e61660188
SHA256d4c3e004978574fabdabfe2673332038715808e702514fac553115ce871fbbaa
SHA51201635130bed10903c3d8148d6a7b8f416a94d188f4b0cf3e0ead4acb587f04395c48534f61a035bbd80f35221d1198cc71717ef3772069f505d71d0ef56ae03c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514af151905438dd7cbf1b18ddcebb0a6
SHA1d44c6daf5868b7ffd89b32f6128946636249b818
SHA2569522e1e73ea7ab64612e8754a044e60252ef1d1a78b15db1166fbb38c8f956a8
SHA512401451fa20bcdb2e665ebb718d80f06eeb7cb792111dd16cc2a624cc779c47208a16416ac4b53eb23f6bde509e172f56fb5d65916af2da537b15c688141ae2d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523908806c82aac0ccf24afe5a7e1d2cd
SHA1615caf40c1b939d139d32ab4fec4109bee2e8dfc
SHA2561b7eb5c18dea7116962a06e78191a4e1af01ae4dca94bd648ea369953a913cfc
SHA512674c6c224644b7803634f915a7729173fe669e22149d16930efbab8bfa4f40b5cdaa288557ea775c6fcef292b643a12e9b5b139d798466d33beb0de8bc0ba020
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b