Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01/06/2024, 18:38
Static task
static1
Behavioral task
behavioral1
Sample
8b626833de00699227138c4a148335d0_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8b626833de00699227138c4a148335d0_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8b626833de00699227138c4a148335d0_JaffaCakes118.html
-
Size
26KB
-
MD5
8b626833de00699227138c4a148335d0
-
SHA1
0d0443283672b74d1c9a2eac1ec97c79d9fead05
-
SHA256
3c99714a246b830aa9e0a9ce8d6ea60c8dffde91b57f68e7017eaa149b96bf37
-
SHA512
a6b36208d03c445cf6ad91a47a0203b60bfb4187c3c6edddb469cb3bc8bb3fd3b0c80e11c16273224ea731c497fbc14a88bddac87bf5600b5d69efbe431968fc
-
SSDEEP
192:uqgPLub5nUCnQjxn5Q/XnQieGNnSnQOkEntRhnQTbn9nQMCJVevo7NtdFo+NzQ4X:nqQ/bygcO48S
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423429010" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{365CBE71-2046-11EF-A7EB-E60682B688C9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2304 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2304 iexplore.exe 2304 iexplore.exe 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2304 wrote to memory of 2688 2304 iexplore.exe 28 PID 2304 wrote to memory of 2688 2304 iexplore.exe 28 PID 2304 wrote to memory of 2688 2304 iexplore.exe 28 PID 2304 wrote to memory of 2688 2304 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8b626833de00699227138c4a148335d0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2304 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ba4deb1197142e9b69b489f62714dd9
SHA13257c0d4598b4032bb849eba8f179afaf9ddb02e
SHA2569364e6e55e6d8b177122d7194043b74d459a294b8e850ed89bcd901edecd2b99
SHA512814bf03528a88c7faa7583a05ecb345d9f6d8456478f503ab0a3ab9ee2a480c0f0b1360d03b7d0a459fb52ea96e05368235312e1aacce9bf167ff235e14d9d96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f63cab3a4a7673332c0a20d97ce339d
SHA122661f62ed09fa9455cddf3f852fe177784c2c0f
SHA2564079c8fe586c30cca125f457b5094807c1609b7b06e486327066f278f450293c
SHA51218399b29e4198f5c06acb3f46fe830e38760e7f5c19d4adf8f77b09010fe75e3135b82690605f90715764f664ad773a52abbba8acdc1abc4d003a5d428b5b259
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff6d8957dd4d82a7c6526256930a35fa
SHA183e1b6b1cccbcec04ab167f0850a5e6dcffadc75
SHA2564e9790683af49ce0ee38f0e31b5a7492aa76bb3130644c7481963ae240f20bcb
SHA512e8d2f70636f059c3c95f4594d0403e05d2f5e55dc354d466e9aef01892198f5d6d413a5fe1150f50761cc5c0119b8e2defc5c95dfd8464a4aff9e08cb7037037
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594d923101f2ca6747bc30d5be0d3ea67
SHA1e2bb46d03877342a38f77ca529a31ba5878a4216
SHA256f0571a834befd6d69ba0868ad67f89ecc1fcf2edaef8d4413791764de29e225b
SHA512a9af6fabb83032c9ad5c652cad16ebabfbd8ca6b6c417c5e0591f87f83aa648dfca95719490b210c3829bfe6d5a15e5b71dcfa5565c460e3d87d0e6e5fd01de5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdfc728a9ce2620ce5e22b6fe6775702
SHA1e48feaa9c08d18bda39110eecd45b179456acf1e
SHA2564a9929f3109ac261eae66125417f4c6f6960bf8b1b0b8a4e39f2162f728522f1
SHA512898edf03a3ddd45e5d18e649bfc3452a94fabed2251286ebb7be39f23860551f5ea166aee546ed4773a8aa3e06b49a222b8435a55fb4d3d1d9ac1a3baebbc279
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5470ce520fdecd7db2e06de2ed8c375a6
SHA1ab1c91f813c82bfd4dbe2db80f6093ff0db51039
SHA256733253d881487b75bd5b615eeee53f9a02003a880648aa8070783f3490972ca7
SHA512bf4c4e9296d4e9519961f1b5cd9d49631db7fa2a1691b35a67a1983ebcea6fbc171451e4fc652a4226f0bc640a578b3942b5212bb787c62817f991c86edebde6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd6a24f13da289e61df73337901de0fa
SHA1f36ff80bf970a4839ec4e7a1d2243bab1cd8b184
SHA25601fcee7161b31c1b680a59a3d07bce59f9cf7c6eae1e16be9146ef0dcf3e16ba
SHA51227862a9f7bc74687aed8c74101e9d09c407e66bb27c4d3e4dad8512cecb0b64aa7b56e8287bc07d01c09ecc68eaf9b1612dadae850f679ba1d329ae0b27f8300
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b