Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01/06/2024, 03:49
Static task
static1
Behavioral task
behavioral1
Sample
8948257f83e069c00b40ed594cf650c9_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8948257f83e069c00b40ed594cf650c9_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8948257f83e069c00b40ed594cf650c9_JaffaCakes118.html
-
Size
64KB
-
MD5
8948257f83e069c00b40ed594cf650c9
-
SHA1
16990f5d0f61753a6ea26a497a41ce951969d063
-
SHA256
13bf998fc5d6d01ca83c33f2752459f1d8c5362bb18f274b93c68776312df8a3
-
SHA512
0553a889043711a183fe27bd7dc6be6ae7bed5a2f079ec09eea49185c92883b4e0ae811cab0524439f0085323c5292f4288e2ec61b507f40d534e2b9bcf35e4d
-
SSDEEP
384:mQ/P4ISPPRh4JlLDSpbiF1JvmP2DHIskDln+5udtaN7subADyfntwewX4cjfeBuL:T4c7LubiFPvmAeQD7ayfme5c2uIfq
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FA8AE971-1FC9-11EF-9FA2-EA483E0BCDAF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423375651" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2192 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2192 iexplore.exe 2192 iexplore.exe 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2192 wrote to memory of 3012 2192 iexplore.exe 28 PID 2192 wrote to memory of 3012 2192 iexplore.exe 28 PID 2192 wrote to memory of 3012 2192 iexplore.exe 28 PID 2192 wrote to memory of 3012 2192 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8948257f83e069c00b40ed594cf650c9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2192 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574dfdb6efb8ce9e7609def8c795b46c5
SHA1ebbe03b36891bebe91db0f754246e3f517df5b4a
SHA2561a1b41cc73d934dfdcf44fcebf6024338e8dfb3dbef89dfe733ae9e2079bac3d
SHA512f775595ad20fa4257ea668fb222f2c8705cdd40a57da37e4c637592952506be1576aadac1c6d1714802d99f1bec4662fede6a4f5edc9a7939b37dfad31052407
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c21f84d3236b896862845e4303dd7a0d
SHA18da6622e672ca387ecd94d9c49a7533132877364
SHA256cbd1291ab43bc48157b5da53e2d15c5eddc89dbe5df84b2b634e08de7928f231
SHA512e69bc4a2bebcecaeded58d21394e3fbff074a493a01bc62cb43a7711e8380346da7b655d0a71f683a6ad5ded65721f93803fcff4309394be14e8554ad76fffd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dbc5b29edc81886b73b3bdb2e681801
SHA142930e0fe339229679533daa95cf9ba738af8e09
SHA2562a19a6c14f32fbb090aca1e7f99dd3436870c94690d38f1102f762f7eebaff10
SHA51279616de3146192dcba9678cf1d3f79d56d4add232c0cef3e6272bedf5edea1b9ddde61d6385fa3db97907577d496608247e8d10ea304bdd657b26cfb5e8f36fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adc78d9195cc4ddfac00c14a031bd277
SHA1d0a14e47f330b8e055327d6912ea715a07df0703
SHA2562dd349db5d1b55d4ce440495ce9618f57b0711a67f0de7cf953d383df47b31cf
SHA5128f81b15a62c4747e89bebff6f8be645cf33fea81398e1b73416b5b1d446315538d8db8526bd3f851ebd38cfe4ee9b1ee094b2cc7fd90fd36e8f606432c2c1166
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515f22ed66531436fd8da96e9a4cdc68d
SHA1e171fb01aa1d4e2a0083107931ee152bbf76b3b8
SHA256ba322d7b082168317ff748f46ca3a7f5fc9550cb0d3c34b826c6f75c97b665c0
SHA512d960e8bf632a4bdcc54c3cd146e5a9dadee03ef81256f75721f52df427a4e12665fc605b6902430a726402c61ced2934a4ce5239afe72bcf4b3b9f2446b774b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5699c4c0b1b9db613327cbc699d09eb75
SHA1813634596d66d0c84bc07fd044b7cb7ba25e5998
SHA25674d5c625257a41f93ee30fd1177de184046a3d9b636af5f0c6c1c500d1a95dcf
SHA512942df5743bc866dadadd1b78d2c11c200efd6f455168e04002910f70cf67e9a69ecc572369756a4df2827a06c3978a590dec501da9386ec7b50dd957a033e906
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576d895e5cca4e8ffb097f3ae9f780ccf
SHA18664a7703304af1653b9e2b9d3853bb2f1cdb12f
SHA2568028af700a2e6833a0e1aa7ede27a9ab5b545c1e6ed21ff6a97aceaaa637c953
SHA51225a0a7f613404ac29380e632fc34eb25e5dd84342302fcb9f85349a4315ea3920dbada758cbca888219ad3abb9aa59b18ac0d54e16af554bfc734c67ae1f8ba8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec6b9b2fa174efe5ae3ad08e50cab8b8
SHA1b88b432bc1689e196ae27f74888266a68bdc36aa
SHA2561c698ab20fa55ae1bba5ef0e07df17bdf119c3810b35b44c2dd0280ac0d0910c
SHA512d87b2386b05137efb533e6aeda1030ae41653c71073a5b75ba02c508d663d2c815d3d935dc25fe42df56f624aab9dd32384234461b6b55f6425ce9738cff5dd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58254ee9431b0eb62730fe350a9199bbb
SHA134bbf7edb5ca292899a5b25c76938fb7f30950c8
SHA2562d3e7f9d22db9e81c6fe44233bcbaa493dbf13e672b12376fa6cd9db5902ccf2
SHA5122a5fa09653a51ab72073af6e2e7a44e6fd437514249dc224b7167aa0b7f3995b1103920e4827800ce2af53d384c588025a00561d0555fc84d0e0c05db9d578dd
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b