Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
03/06/2024, 11:39
Static task
static1
Behavioral task
behavioral1
Sample
91a550784b6e76af97d7eb55e657994a_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
91a550784b6e76af97d7eb55e657994a_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
91a550784b6e76af97d7eb55e657994a_JaffaCakes118.html
-
Size
18KB
-
MD5
91a550784b6e76af97d7eb55e657994a
-
SHA1
0eb1397e6e95bd8a0aac74a1c360b267d5c4e3de
-
SHA256
4490d5fa8118a19bf6626db7e2708f548ba62a872181ffac485b6220b1492cff
-
SHA512
a01a96c8ef981aef704e00d7034c16a1bdc58f3b0845218b15ea38e16e4a2bece0b3b9ea57f8f9888fa938cda9a93740615498e118f4be215788f55fd1d70197
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIU44zUnjBhQ682qDB8:SIMd0I5nvH5svQ5xDB8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423576641" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F281D601-219D-11EF-A339-D22A4FF6EED8} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2488 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2488 iexplore.exe 2488 iexplore.exe 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2488 wrote to memory of 3000 2488 iexplore.exe 28 PID 2488 wrote to memory of 3000 2488 iexplore.exe 28 PID 2488 wrote to memory of 3000 2488 iexplore.exe 28 PID 2488 wrote to memory of 3000 2488 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\91a550784b6e76af97d7eb55e657994a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2488 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7489bb9449899a3c647031a5916dcd2
SHA137adea89a3e0548a245e25dd759d78926ebc1d90
SHA256756923b2ab297db3ed32115e5fedd28601195bf278a9c42a5a9ca4b5893f3de5
SHA512d940f7f4ce2cc4b95bb23a86cb3fbd32495b3d7c9f3cbe577151c7cefc877cbe2dfeae2b464f85e06042014912acc00da8dab5634ed50611ba65c30df92bfb61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5971485e19d4126c87803af3b274b72f1
SHA1adccd67777e7e5621b3f9ce9e6688f6ca7cb48af
SHA256ab2de5d21b836e99fc2e6d95be7bdaf2e1eb2a486f8a067e0c6b1155b4f90dca
SHA51274488ee1cbd09c61f42d813c23a1bd59547c3a92eb7a0122d4eca80ee175cdfd2b45b9437bf3cb00699f458d3e35b7a45852e6fc349edb7af8d9ba44d98dbf46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2ba51d352c459f63fde289f807917a7
SHA18f08ed413b79b2b3d5b49a8c50089533258e79ff
SHA256f6128833131b594dd3485004c1847c96f660eb946eb095aa0285969921dd216c
SHA512200feb0e2998d8e56ec55db2b05833a0d6e23b694d4938351b7f4bc9dae6b9e3ee334a4a7d2a1f52ef357b85abf91e07e92790d2faea739c5b85ffa0f578be5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5537203af2580774e2976c342b636ac81
SHA1f9944af82df00aeff607af8412977d361a14b873
SHA25604ceed867e5c25e03ec3896f6131f8f6e803325a4fb121f9353818fbbca2d9c8
SHA5126f777a5dc91caaec944a11af71449f4bd85667f86dd6c32110e72b67b990b3e9695b4c70a5f94e4958e0e2527503ed9fa0cdbb0d3a97e0e96a2d7e051979a8ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5834b6c76058f9bb6092d661fee5adbb0
SHA1292749532a40e88d42c0f93d3c8bffccc93069b9
SHA256adfbdf3b89b3d1a0ea55f3500537dcee3f67105054d13f7cefb57a97726342aa
SHA5124f8ad159fc865661c6f7c196cfc99b3b4589bddfc7b20017700c4903b831097c88e2affa53aa2c0e32991e4de429e01fa8047e54a44bfda1568de487c85402d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2610a3883b0c66b22a073eea3ed4f78
SHA15e3a204bf581b3fe07b0dccad59df121e3b13828
SHA25694ae84d382849524f38a4414c6f0f4d6aba7b158143f252bdf3efac0c2dd50d3
SHA5120258d385d6367df84af28de8e47ceb9361f3c8ce4b97527c466458c85d7a1c828c3f44bcc6fa3f9a10e2c4eb14debd4a1534a0bf6c7d60c69d830a62d80a5673
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f76f998bcc95eec4e21323d9f3ffc419
SHA19705e3a2a501afbc41d70399f8bdbbacc78538e5
SHA25635a4213cbc8fd0a99ae58093965f2e1dc603ffbe51a68b9fc6f02de7cc597e7e
SHA51290c48c3bfeda10f86e65d01a8a2acfdc10f3c3abbb365804b3c2f7a2fb634273fa8140049b2bf08fa4bc500011907ea108acd8f27bb8c1d8c3d1e1fa9c662941
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b266f2c84ee679011c227a97d253b3e
SHA15d59b63a52312cb941d5238772a830f2710777bc
SHA2561bdb1280ad41aa796cc265280bc4a342c61806e608e88a2ba99f4eca17c42997
SHA51243896ce421e933bee1953bea7871d3c5be6532ccffcaaed6a1713884381581db35a046c4add7c1ebdde219425f62eee049a48a728e61a04eea8f25602d1a77b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551e8a688010f530af2057f7e437443c9
SHA14742b43817f6126ac06515d1de19aa05ad5413d7
SHA2569df3162a7cf9bd711b75d890c212734b85aa11bbd2eed7729b326369bca6e0a9
SHA512464a31e02899e36dce725432bffd43db16df03a4d360bcbf4f4d4e37cae51caa474957563bd905eda70994a95b6809588ac886f7af49b1169da29722abd9f799
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555f28b9c3ef4c181f321cd91e1b7930b
SHA15597e72382df25d093f1073648fc4979786b2124
SHA256fbc857c58298406c24f69d6b0b2e11beb6949bc853bbaed752bab27ac3cf7134
SHA512d66721b93a50ad4bd9c61e7526a09c51eb8c1934487b31775fba5b48bd0c8056c5b9f29efb9b20ca1b7bf6f1cc5448a2273d07e924cddecccd606e2f4266777b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b