Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
01-06-2024 01:37
Static task
static1
Behavioral task
behavioral1
Sample
89011800e93eed64928cf4928df39391_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
89011800e93eed64928cf4928df39391_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
89011800e93eed64928cf4928df39391_JaffaCakes118.html
-
Size
23KB
-
MD5
89011800e93eed64928cf4928df39391
-
SHA1
0b767282bdcb383b3da54e534abf743c7a2abea2
-
SHA256
537eaadbaaa1f58a735b1599b57644a4e3be7919f4d85f203bb672aea6bac8fc
-
SHA512
a852203f642f6fead00ceef0a6279e8f6aaf05d33a2e4034ce4545d41322c448516c91a019829c9b467694cdc4ea5ea238449019f2d76432bad79955d424f89a
-
SSDEEP
192:uWTsb5n+unQjxn5Q/GMnQieUNnTnQOkEntIO7nQTbnxnQWCnQt+wMB0qnYnQ7tna:XQ/3+b
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7FB7E0C1-1FB7-11EF-B5B3-EE05037B2B23} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423367713" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2076 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2076 iexplore.exe 2076 iexplore.exe 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2808 2076 iexplore.exe 28 PID 2076 wrote to memory of 2808 2076 iexplore.exe 28 PID 2076 wrote to memory of 2808 2076 iexplore.exe 28 PID 2076 wrote to memory of 2808 2076 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\89011800e93eed64928cf4928df39391_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2076 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b986dd9db743acaed3817f237e8ee4d9
SHA152aa773f927791947e7acc778af69ee1ebe06d43
SHA2563edea422f1ef85b10a15212abc10beaeb1b996266fdaeb9bdf829796ac37865a
SHA512bcdbd06ac3cdae412eeb5b538b897abf99dbf73cd3b1353d9abb42d388eb3038278a06ecb1956e503151677e23a489f1934c5eeb8febf0de5fc63340e2e84688
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b67fb515d175247f93e0c61844904979
SHA1be74861c6e752d968b5cf6ca9b2ac8ab39e3d081
SHA25676e3fb4c01833fc8e2d7548d507d725c586213e1b8d735182929f829fc4073f1
SHA512c5193ead6944ef629d83939d1ac187b94c01b1991f03ddc50ed40bedf17c131f53e3ac464629d890644e1c66aee6d55988549f91d08a014f7e9c106c82257fe7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525e2e04f559842d1d8fdc39e160622b4
SHA10d579e9538ddae0a29f71c76ff29478853042de3
SHA256d534f9bfd7ecfedff4787d32f7fe4f487051fa471c545a6a3e89c0f4e2dcb593
SHA512a695daee37e51c37d9b2df276a8a92c1496cbfa73bf662a015e54c941625cec0ac03539842ede99c579ee795cbefe8b1505991313ff03c4f36a8f0c46287b9b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54077aa12d4c8f0afa4ab94a6267ab152
SHA1542741712a7ab331cb732bce5a1b76a0aef8e6c2
SHA2567ffbeab474052fd3537ec38db41a867aff204774cf04ac36c73f858bc615e170
SHA512500f9a867340d4ef1cb5a7f9e382f5644cecd871d07bf9291156bd56fab4d4e8ede5228abd6e2593d2f04f2f92e810070e9c5a09fa9d9c70a996d498a6ab20cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6c2ef027c47e41bf4d4e8fa72fbf623
SHA1778d1d0b251e81252e7e5ec8e5ffd99e12e0f668
SHA25662e5d86badaf961a4f64c6604bca44bb860bb3a7268ab8f884471d094d325467
SHA512158c437d514ba85f48dfcf5250ecd5bb4d54bac32cc4a1dab2deb2c2ddc0c6e7bc5f9f740c97146f92daa41305862cb0a8595c800e2bca2848d9d7a19ef5cc86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd9f9da8d58c7fe01ac927a6be530954
SHA1c447329ba9858c9d43270bf680899803235df2cb
SHA256ca1d6de2a1689f05da06f81c27a40ad5376ce131ce17a6421aafaafd09542af4
SHA5120a2ee8547e4ce14e8a91f76ac3ce5c3e7810203362e8d86bd1afe0647cc66b92d874ee7c903cd72eb1f51e46cd6bb1431f1339a1b4e10888a73667da75d5628a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e14282f2fa112895c25366545977ad60
SHA14606aa54c763d9389719695295d2eac8e5f0be66
SHA256e6b4c3d80ea9b13c0e7591900482ce967ae8e71042205b8aaf678347af39e4e7
SHA512f713b01038e54d57b0d5249fbb37c2fb056fb63641a0e3ec8fc3151796fab8dd6f08d2fad3e61ea10fe354e006efd790522b4287e25ea7d832b5baa6144e62e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5096cdcade3414a6ba9dd006811b161d8
SHA14dd2753aff2525d37e48358f0b52b702e1c08130
SHA256d6870ad56df879ce5e290b64d1b090159fdedf8b06278746c49de91c4fe741a2
SHA51276aed11a4b25cc607ffe868f7de48764824d4b2e74c810f53ddd2b7418c47dd632b22b6605b077c97c36bb653d9ef72f6604b1705e45d8424d248916b087c0f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a379a85c38f1fded48447cf13f4f60bb
SHA1285fb93248089641b8ecbc001f7770d99cdf3bdd
SHA256b22a10cdbfad7cb82485de03e8d8e82867f6fa9630bd6be1b50e0efef30ec79b
SHA5123b920c098f6ce5d195139dffe8f827599188f7a21328cea86fd684ec9b9795ebe0ddbe1c55bdfdf48616ebf03d94a6bc618e40489d2970aeebc0d5f51d2b6e7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a263853b5eaf52e4423b383c5f2280da
SHA152726d6bcac5341f568248e43021d99b6ae1eff1
SHA25604e67df1ce58f4b38987ca45fd16f1b712b5284d3be0036482939b5ece13dacf
SHA512f9b4ae20f25ace1ef3a198946ef67435fa1542ff8eb86d272583197af9682f01615ed81aec2818e8c6759a8188c0ece9748cac3eb215bd1c3a9ae3e2fa7d8fc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a628ba6bb2a739cb2d36a22c6f9b58a1
SHA105519dfec8deb73a5a3ffa89ac5b177a88716c6d
SHA256d4a282a0aa38085dae99ac861d2cb0c49ab448ba5c88f18f40e5d3aedae4a54b
SHA512d0f3e51ae5b96394f8ef4c0427cb67300dc4efde95b428838437c29dba55c99fd5c58504a41016e4d8ce77b2f88cac5ebc875a64da064d1fa8835f446bad0a8c
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b