Analysis
-
max time kernel
150s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 19:05
Static task
static1
Behavioral task
behavioral1
Sample
8805b22cae50325ab8c7f4f68117648f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8805b22cae50325ab8c7f4f68117648f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8805b22cae50325ab8c7f4f68117648f_JaffaCakes118.html
-
Size
27KB
-
MD5
8805b22cae50325ab8c7f4f68117648f
-
SHA1
2e3d37fd88ecd60531f3b7212d6f091eac576b3e
-
SHA256
b3d6c67fa60fc4d8fa107f06f23b148535240e9bc0f5c0d9f075b1f51d813127
-
SHA512
6fba82d15bd46bdff2bf6e56ac6667b4ff3eea25e232dad5f231e49552cbb6e7cc2d31ab390d350e97793d999b555c1048ecc9a54d8cf9a873702fc9cc6174b3
-
SSDEEP
192:uwr0b5nLanQjxn5Q/6nQiexNnCnQOkEntK0nQTbn9nQ9ehZm6uLrVQl7MBRqnYn5:SQ/ogTKrUSHAO5
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B8821331-1F80-11EF-B1CF-5A791E92BC44} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423344186" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2168 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2168 iexplore.exe 2168 iexplore.exe 1724 IEXPLORE.EXE 1724 IEXPLORE.EXE 1724 IEXPLORE.EXE 1724 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2168 wrote to memory of 1724 2168 iexplore.exe 28 PID 2168 wrote to memory of 1724 2168 iexplore.exe 28 PID 2168 wrote to memory of 1724 2168 iexplore.exe 28 PID 2168 wrote to memory of 1724 2168 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8805b22cae50325ab8c7f4f68117648f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2168 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbf811de73bace6ab174477b9c6994b6
SHA12be9966b0ae406d4069c5f526c08727b5de50e63
SHA256cf5e2c0b1bdaf24909d8e3fccdfa1a9d8d393f9a0120e93419b256e4b7e0ca7f
SHA51281d7947beb84a65de48531e9e5586d53a3a4b7ef34d222f61ce81e32b24c78ac5851ce2c60f146fca785a8a62d9885f0d4d2c5c7c17dbcc05061e68e550d1269
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b895bbf5e8685bd1a438197b3ececc3
SHA1330d25269bbfde2e17f77cedb9cb67907a0250a9
SHA2567c440e22b8d5b5c29764232d1755ca2f37179a3ce681f7a6818f7106441580d9
SHA512b43756b5c8f7fc905fb7b89c0ad2588516be36420987f18bc94e706ac79bd6e6380aacc410777a48ccfd0232748c28594a90cd007400307a582fe6a767002aaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5637ddfb3bf43a91403fc0c20b466c9fc
SHA19ec03677cf80e177b52a421f388a436a3d796d72
SHA256014fb882f62860ad9a0246bca2d95a75e836ce97a58893d3327293f2f3433679
SHA5121e0b6778198460ff9e248a9463bf66324c19c7d5402e57ecd9c26ecda833b6b66f563ab377ae851446d2c409dbd76fdfbe86c0e1ef297fba20c2e218ac8312d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eaa75fe1d5e605164b53832f94399d01
SHA137f93592eab96fc85973c549c8123376188eff83
SHA256705d69b28b67a5e8f3725465d197f1c29dd6608149e6b2e6fa808076f6205d2f
SHA51255401f8da0a32be1f33a4e586ba06f43e1bb957b605090ecb1b5fc74fa81980104322b4aeab53e306a65e28e71d273da7f060eadca72b171fb382a77b5faa756
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dddf1a2e16d9c67fb31b171178909be
SHA1f80f3819ba9e4d2679de448d29c814312c961693
SHA25695aba22d0192ad986ab12e08750f6a097505488b65792fa5e6e54c1cca725f5a
SHA512ff693fb374c55d724da2e048ca4f5ea726b56484e5264188049f66b349d7cd5739d967da2f15d63b33ba01523c0f1ba14c916694a20c7261d3dbede89d66c1a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f660e122e4b31bd5845eb57a3f2da49d
SHA12c97812f55b747cdf95699168d906cdaf6f6ebc8
SHA256253d04290f72f93e4be177b61f5afb47824b31d59fa8e20e5f0d045eadf7779e
SHA512184567e39eaea7f41a6451888f0807b4e33cc4f4587eb6da6c645a02825151d26a61f7a57f65b81c9027de39a2d5492c3e4f724ff38966fa66f46a345d20d9b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c01da474b5c6ae98acf544e47dbcda58
SHA1ee87d1878d066620a690df4e31c69377f764e2d1
SHA25619a18dc3519dd48adf1b0a660e833c35995ef62a5a5612662c609e0ab8e2d4e3
SHA512898159c4055a6daea1e4768f04d69bd3be4f8e26c78954a659fc7b77fbf50d836b83634c2f63f3336961e0e1cd1a940c246e80c3fd77a5e16f5677178f9e9bd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a26e2f0f7db08e198b9d9b8f2044da53
SHA13a26db375176223083679bb38dfae3084b57b275
SHA256b38d24ba07ce575a8769bdd8b476309be681f31b9e420d59045b9209081bf378
SHA5126cd179c9e4690db589590547d6c04248a2c9eca86c4c2029b014cbf38a501a30e77e421c0fb81956a40472d31da5a22cc2c7ed57da1cf57a1907b0e16daacd95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf6183633a15b49cb4e6b77b42ba8197
SHA1da70fc453fd4637de75075bd73b747a2a2ad39ad
SHA256fe9641cdf9287f1f2b3a744cb8b0778506e95e9cf890bfa6ccfcce5be0860e26
SHA51260d84f2dd5877d1fb577308563514968719a0b6776973eb1239c1b1e5f1d5f900f582c49ca9e03fd1303774fefea41dec80f6e1fbab77597c734e6ba45e8816a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5288de986b172be6b0f0f036893b2c867
SHA169a20069156e8549be1c23199d09df6d2a025dfe
SHA256a58ae3d19e1bdfc6b0772e0d4c5ba4b1a70f1667afde83bf2cffa6c76c6ec199
SHA512f26a8864cc8be04ffc20b2ac382824897843be67f41251bcffcf0767e5fa0cdf6763308fab30cb3bb44640056d0f720b7087cfd34f304f88f60a7f3fe4126376
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5303f3c9dc1e66beacffb98a3b4b31551
SHA198de128b8312c3cd68947ea4e7dd6e8cfd4de08b
SHA256dee3d87860e8adccb77e126405dfb4421ae0641a1beead82ebfa450cc14b717f
SHA512c0cbbd3549736498dcab5b2cde072daf2035d22163cdaeed91c8c53b2487ae8450109d02bfa51229c7a2e61dba44413a25226acd0a0b76ed0de7efbab96d1ed1
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b