Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
03/06/2024, 01:59
Static task
static1
Behavioral task
behavioral1
Sample
9031b5fe0e0012f5dcf95f7d866b4138_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
9031b5fe0e0012f5dcf95f7d866b4138_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9031b5fe0e0012f5dcf95f7d866b4138_JaffaCakes118.html
-
Size
27KB
-
MD5
9031b5fe0e0012f5dcf95f7d866b4138
-
SHA1
361751fee5d1cc48612e578bd39938cc90f1f014
-
SHA256
3a5674cb91003f31d6a046fafe0ba4f164ed9637d7261916a706ac8abc48d024
-
SHA512
5b63e441194b87f2cfd3ccffd15032b6e5b04c44781481c39d96f1abdbe2dc669583a1bcfda5fbaa223084071ac6c6c5ef10db0d522de7f1067bfdf58d5805c4
-
SSDEEP
192:uwzIb5nICnQjxn5Q//nQieONnYnQOkEntRNnQTbnFnQ9ecym609S4Ql7MBuqnYnx:tQ/MhaWSLS0Pj
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423541821" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E028B511-214C-11EF-8E44-4635F953E0C8} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2988 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2988 iexplore.exe 2988 iexplore.exe 1312 IEXPLORE.EXE 1312 IEXPLORE.EXE 1312 IEXPLORE.EXE 1312 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2988 wrote to memory of 1312 2988 iexplore.exe 28 PID 2988 wrote to memory of 1312 2988 iexplore.exe 28 PID 2988 wrote to memory of 1312 2988 iexplore.exe 28 PID 2988 wrote to memory of 1312 2988 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9031b5fe0e0012f5dcf95f7d866b4138_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2988 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1312
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c2f5090f7d20fbb494e8cb930a789f9e
SHA191c9daebea5a4e8348d10a19495d49bc06cabb24
SHA25633e7bf744e909356374f5f09c3cd3ebb0f1a7b7cf5ca68f1a2958fa80eacdd87
SHA5127e76f76c9e550cbc01ac1db53b41611fa41d202b5b9fd61d6fd6db15bc32c0437050d10dbbbf4c0c80c8510de1492f3fd26bca86306c0c91160452677c95e8ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5491b78ba52d1b41827f7ef6401aecb3b
SHA1cfa3f0f2d1e64a71db055ed0c78307560146f5f7
SHA256e0f02ae0d879cc4f1a6fff01975e88637fc22d8eb3bd65912810f0ad979ac296
SHA51247a55efbb9b54d85f315655fc8f0e06ad4a1c4926b412ee2d950d66277373af1e0b021beb454781a1d24d071d2823a2376664bacd6e3a7b0b2982ce261f55959
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c5b09736dbf9f986aec358f0c3c7602e
SHA117396aa2c06763d65fa8671bf0e6189264b673c9
SHA256a0a9a273c5e23a7c5d3669cf98785fed399c10fb977277c144035064a8a4dcbf
SHA5122c1c65a7c6297d4398edaafd6b02082dd2f30b2a5a80bd8faa54e86c052b598f69203131292f8a83ab3ed467177a262eb5587193296d92218d56f075aa193036
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b216e7e6a2fd28fe21326935b38b1aa4
SHA17ec8141d55eb5872e298c63a06050bedf4cdf8a5
SHA256ab8d3871be3ace3e2279d1eeaefb943c5e144f7956d9f4ecc9559091cd819724
SHA512731d13541968dc7e736d2f31db2681cb05c3469b2a8482f42797c8c6f4240c12b0ad3dad5ddf9648641ea7e4d8e11dbff6cd4133c8336ed29335df31bdfa9d7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD592906eb2a958922975c884cdad1ac42e
SHA1fab012bea65f0c4af7584449f856bbc2f3ac8f8d
SHA256b725d4bb790e040136dcf490dfc8d04c5b33334d6e7e61f087a8ed2b121baa28
SHA512828ce763f55f29d05c25b84b03bfd28dacb1b8f04b1da27def36f640361a6123a2c0d00123552b5ed7c36dc60b33747c35867e30a6bcd8674381b1522cb1c67a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5233a54d353d59ed9e289203e98dc0b2e
SHA1e0e9bc1e0c5c29c71b6af83be1112141e7dd9f6e
SHA256ff6f3eee2db94000fdfd56adeb746c75a0c5f2e03b718970d8a27fcbb8303248
SHA51269cd89127cc7d9083c7212937fde2e0a23f8a3e9981c1e2c383232e7adfc2918b753db8e48e76bb67dfd788a7ca371b47c054d5bec23a6e0a12540d4b643e954
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ce8217e58067b3087431694424e42867
SHA11e818e8b632f0049720e72518076934e68420dea
SHA2569486b8b2bea1c1a71226f31b65a1375a0e8728e90d90a750fcfc1e99419586a7
SHA5126f2df9d6eb8bdf89c29f5de87aeb3470055a7d65ae3ed49ef6c85f8be543f5ea10d11b98104f8e4d6bd687b9438cf172911ce60fb68d4cce8590c377c6ff2a03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bdd5de03f913d8c3aa9f651d88d2d96b
SHA118445d23bc45407274fa6001c412ea7d5f36d6c4
SHA25621b8591872b986cdc75b4b176de824250e21f805d46577e65d74f5cce39fa26f
SHA51258ce51ebc55a0240a478b3075ef81f060764964e008e38950dfb059aa9a52fbc75f377db09829b4f8cdbe5e899eb7346ee5a9b8f789ac8c72ff86abbe9f841c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f317a39ce79a888a6d267a1a01d44f78
SHA1efacedb8d20532654c2b00841e37c0d34c30c89e
SHA256d59109f3e36352d64e96a43b56db99f7593f9c1cb625af156bfca8d381c9a6e5
SHA5125a6fc29fecac62a6b011e593072bcf7aadee873f30a7c846d5da25f7320090c39eeefc25f805c3a9dc4b07820b8d02811c7460a3a1155c6dfd865f63dd884868
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b