Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02/06/2024, 05:15
Static task
static1
Behavioral task
behavioral1
Sample
8d002791fff48246bcde64814d5e73de_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8d002791fff48246bcde64814d5e73de_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8d002791fff48246bcde64814d5e73de_JaffaCakes118.html
-
Size
19KB
-
MD5
8d002791fff48246bcde64814d5e73de
-
SHA1
967185ee6660a7e605a255f01e0a4d2b34b33e65
-
SHA256
7a328bbc0371727e078dd40f450c016f8dc2c2ffd6010dbf336484eeaf80922e
-
SHA512
af7606bfd0a8ae723ee43873b04589bc066d75b466f105b164b4b98e6ea25c67f73c9732d1ece0cbcbf029d9d242b8786e4c48317bcab2887b9e62e7c45accc8
-
SSDEEP
192:uwLab5n+d0IXW+nQjxn5Q/thnQieCNnonQOkEntntJnQTbnVnQmSgHMBiqnYnQ5z:0Q/Bq6N0
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423467221" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2F1365C1-209F-11EF-815A-6A55B5C6A64E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2184 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2184 iexplore.exe 2184 iexplore.exe 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2748 2184 iexplore.exe 28 PID 2184 wrote to memory of 2748 2184 iexplore.exe 28 PID 2184 wrote to memory of 2748 2184 iexplore.exe 28 PID 2184 wrote to memory of 2748 2184 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8d002791fff48246bcde64814d5e73de_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2184 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5728fbb63380066183d4799e7e6d72d7f
SHA1691f2f5ad0e6eafa9b4ed8f772e472e793eae7dc
SHA256e90d37cd462e61e8408afa55e6733214bbd8ee6c6a78a88be19e3ee2cd548279
SHA512bc734439e87beecaa9a8a007b9cd7cd03318feea6ecf276bf1af6b229b486d824d0b0587b61759a2f10461a21559e4d90bdbd25881f8b1410063841b6520de02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5990cd5d79d2635fceae4eac41c9d925c
SHA1a25b05287b44ad3e576e5172e708bcc51f93a44a
SHA256ca2cb7dcfa03499a2135f45905e82420347dadc807c796082ab39f5399ffb3b0
SHA512dde6f272789bb1fa948973e11b60ae5dfd5d9122c2ca577539ca7bc29c495cfe72486088f53dbab7fe3847db6294de148257c078bd3fec7a7b070b377e176c8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5167a002de1fad896dde18d9dfe35e481
SHA157486f8149dd2cd2ed8601e695334ac56f5bf70b
SHA25667a2c3bd545446269a361f4f8ce874cae618da13f5379fb13a18a22fe9693820
SHA5129c1ea1410d5c1a204079064c04eb9ba776d786c2884dd6dabc77a97813b3499b97c53503cd6217dada0a0f5c815048712f762d24157ae9a995a7cf50c33b3f97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558644b4774e0e4652a3040c5c88836f4
SHA1b35ba6c0cdee56304c8be2f55c5e6b2d2661dda0
SHA256ef8dce720f08feb6d76f344fedceb00da60d6417699bf1d0599cffff9293727e
SHA51297a88ce926514e7670277e13d3dad2737ec525e13f654ed98844ee1b34ec7dc874ac747ddb5d2c650d2e0f1c824244904eb4b4f3750cdf7cc924c2a2e1c49eae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9f33e0a9a68093c7881753acfcf6537
SHA15cafeda21dbd8c407268e8936e283d8b2cc556c7
SHA25679891e6658ac0083106a0ce6caf7da6bb44e3d70bcbf61ee1c4874961ccb1bc5
SHA5124c2b963cc06805247137b0e81abf47e4b0e2e6b9dbbc46b4303d3fdb81655300c51d6a6191c609aec6da25d386983d3c95f290f4d28e6f133c51cab52803077a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e82cfe170149818a65e42fc23dcab2bf
SHA158fe3543c6fd616bef75bd4f7008cefc151aae1a
SHA256c37c0bd1067ec536eee487d0911097c5ebee5f18eccbe97ff835fc9fc7b38b40
SHA512efbeccbae5e368633e3135f4e1a1d15015198d914b22e1a2ef244bfe3eba85189b2df16c76e5c812d20843b9c52232fb4a959d4c73c5d6f094bd3fc9f9ad2a2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598fc6c9e27cccb666bf538e5e7398b7b
SHA1c48aec5a6ebe6a9f51a4d30957608820b909740c
SHA25606690092994b99c264349eabcd870e305077a492d5b7facb91a4e058f318804f
SHA5122810e4e1fa9d2f5da4627936166ddb4daf405866f4421d994d66ae21c11e201dd3042c44391bfe09cd562271326c9f2bbadcbf945b2c0dd4950ba2478b9fd40f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574881e07cfaa72477470be8cc95cd674
SHA14d865dbf8d7943c7d79cd60132a60a5f60a03c96
SHA256a35448730fe432013b40b7511baf592f66300a8b95ab295abdfac03f40b8a8f8
SHA512ae681181008819c624ba5b0494288dea1e2d18dcd0f92eb1524a08122b96e4896946116b1e6288e75ddf19345afe0b720a2a74073497f5655fa20168d4aeae59
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b