Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
31-05-2024 12:44
Static task
static1
Behavioral task
behavioral1
Sample
870cb1a1b08486a1a1cfe57411ea8840_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
870cb1a1b08486a1a1cfe57411ea8840_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
870cb1a1b08486a1a1cfe57411ea8840_JaffaCakes118.html
-
Size
18KB
-
MD5
870cb1a1b08486a1a1cfe57411ea8840
-
SHA1
eb0298d3faf7fbecd39a3e094adf70e02e662aac
-
SHA256
22e1622a41550cfcdcd17604717b75d94b328136a62bcf73c925803b5a340fc2
-
SHA512
3ccb14cddd0f0d03237e327200936b79898fa1621db4f851e2a87a865c936843be833b756cb8b3b4495770f27b7fa51596c130d933c5060e3baa3f829c2c4402
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAI042zUnjBhKM82qDB8:SIMd0I5nvHfsvKfxDB8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8B5C1A21-1F4B-11EF-B0F4-569FD5A164C1} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423321347" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2192 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2192 iexplore.exe 2192 iexplore.exe 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2192 wrote to memory of 3040 2192 iexplore.exe 28 PID 2192 wrote to memory of 3040 2192 iexplore.exe 28 PID 2192 wrote to memory of 3040 2192 iexplore.exe 28 PID 2192 wrote to memory of 3040 2192 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\870cb1a1b08486a1a1cfe57411ea8840_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2192 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56222b48457b8c8bf0d6373bfa40935f3
SHA17c974239ed3ed0b385b1c329ce604651b1c10193
SHA25667aa9ae959fb0e1e720c2605feba559c7df2fcbcf0318fa7f52f03ae9a94b1e1
SHA51207d08c0893691d27b2b5be109f482c5de9558619b3eab09991e4af6b3d262c757bb743fe0c6484728313324853e7fd5cb1aa489d8367baa3c7d632b37376ff70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6cb7eab4e85251013814554d81a1b38
SHA12d2b188a48063ba918f1506076f786c656ecdd22
SHA2563eaa29c412d5d245167e861d9b23ed266a073576cbc051f4ab3e0e8bf257310f
SHA51249e94118005953adc3d3c8c9647f972e10919072d4e392f128342b955adb07fe7c0860889115199b72a7afadad2f0b6ff00cbff51def2b2ed99c14cfac1a597f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5b03920aa872ce5eac47bf0e4d0ee85
SHA1765d5b7eaaa8d06417a3f60f2fd7015543d5fb42
SHA256db2582bd6e76ceddaf27393c86e7b461047a05119643876849d49a6d3c879171
SHA5128dade563443c38b3d0af057db0e25642cb006c85f0df96e56e21904fad73824aec94df4e0e39783337c03644707d869fadf7460ec994c24bc7c9b053af7722d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51002379d0f391a1f83e45fc1ee1617bf
SHA1c41d7a6a9b603665f7ce675615da25e79b3b37ff
SHA256392902b3f8f07b7d0bc1d204a27c2e988786dadbd9ac9c8ae9b6accd4d41b005
SHA512dcf6720edb15741700eece15536c75dd8df05537ec5b379f3499361c64ef8ab6eb785fe579a8b9911f920529846c2bedca3db1c879e6d6e7734593b638e7319b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506c1ba23039cb9be4e2062faf75ada9e
SHA1abf7e81c2b8bb9549bac7eafa009f0ac7ef7bb1c
SHA256d600fcf9ca9b06f0ceeab4125bec27e156ae1ed2dede37a9aed363aa1f84746d
SHA512644f2b3d501af722f901e6763f8e95c698737da0681de8fc0bc02f3f5d221b16952755ea9a9067f4112e10ba5c426f81e9e73cf100d4dd9c3d46fe7bfacce73a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5130cd41182572e72ef992ea14ed0adf9
SHA1172549429ff7ea5d85ff8b3e5579c6c0037ba955
SHA256c512bce31dbc57466c6d0df0210155716ac25d720d35d84ff13b729bb8f6059e
SHA5123fbd4bb782429e7681f000f8d717f920d1884c9048a4f71e49cbd70f9be77c3d6c4884f79dbcfca2f8e247cdecd3ed9d07d50e850635d2438068c61632da4f30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534ddf3e85c18b32e057344fe97168649
SHA1d09c3c71007ef4f7cf40230a346a29c5d8f6e796
SHA256b3b0a7ff94c6426a9b3ae400d33670fd631d827630f6dcd8b371adfbcbf6cf51
SHA5120f9fe3687ec0222e7cd680207416880a59d2172c916df60fc11125c6e363ef4ae0d9f080644e7cf9a3d2d7acde58fa41f2f2c48e3ab61ffa53e4ab303e1b42a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50109634b546b4093fe3a68c87910e3eb
SHA13eef73bb6d525cd2e3c89b3ef86d82aa34253c05
SHA2562076bb1706cffc5ee26b4ef45ec9e2d789442f8410c40534dd9b02bfc0190eab
SHA512319af283393a3030182ba6735d955011ac6158afa1f2ef190eb2a9b3f79733343d5d9b193aea3f7ac8d980ca7e8dbd348c560db5aecd5afade39d1e45d1eb59c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b