Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03/06/2024, 11:46
Static task
static1
Behavioral task
behavioral1
Sample
91aa770e64cf7f8c7af2bb2cc59399dc_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
91aa770e64cf7f8c7af2bb2cc59399dc_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
91aa770e64cf7f8c7af2bb2cc59399dc_JaffaCakes118.html
-
Size
22KB
-
MD5
91aa770e64cf7f8c7af2bb2cc59399dc
-
SHA1
c8d07f0b8cdf39837238615be4ea2e5101d3534f
-
SHA256
f8590263eb8a275c53958185a6a73e44d4740ec615688adc40c33f37430bb773
-
SHA512
02025307b1eef267d64513fa4a253fd96e3dd21c7c84c94f74708c361c3efd3c7d8442766f5e2d02168432ff5f7983ae14de20dd1bee36634d9bea2d766ef3c1
-
SSDEEP
192:uwf3b5nGWnQjxn5Q/FnQiegNnNnQOkEntTLnQTbnxnQ6v06J4RnQNjMBAqnYnQ7i:MQ/Yv06k67
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423577076" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F4F8E3A1-219E-11EF-8698-5E73522EB9B5} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2804 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2804 iexplore.exe 2804 iexplore.exe 1392 IEXPLORE.EXE 1392 IEXPLORE.EXE 1392 IEXPLORE.EXE 1392 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2804 wrote to memory of 1392 2804 iexplore.exe 28 PID 2804 wrote to memory of 1392 2804 iexplore.exe 28 PID 2804 wrote to memory of 1392 2804 iexplore.exe 28 PID 2804 wrote to memory of 1392 2804 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\91aa770e64cf7f8c7af2bb2cc59399dc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2804 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c994593b9ca0088e4c366dc6517f9b28
SHA1273ff77795f56a2e831ba3070e01f0355de9714a
SHA2562adefd3ca439fb08ce81a4c1abe0050acc9ab4ba30425fb35016407119cff200
SHA512a095dc4b4a06bccd592e14bccc8a274b55764723f73f133d467abca081838f8503f499a3ec28818147adf3bbba96816fe9aecd56fedc00a297f36f7bf39e2e94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5597f5040fb27a90eb43646eaeeaafb84
SHA14f90639df3d72aae6bd80b12d7e8e1a171bb8fb0
SHA25667805d9edbd65cf53f104d447af6d23339166821aeae6baf7eb5841e3fc421c9
SHA5125796a9dd4fd578bf0c7a8d2046ea1b71c08a2da178da1006d400a24949182ec67eca9938d6ca0258f86a3b4338a1f0be6994bbf25d7bc619360212a93c4376af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511177496e2b2223037bfc276f687c321
SHA1a35587dabd3a6fc3753d6c61f41e1717d6947a99
SHA2569a33293a1b3b06a9d4c1ecf67c0d02c47e8181f02ddeca3f5387bc5bae338b5e
SHA51257f0d38047887557e0585a37c91ade48ce0c273a6e5f5d108f2c78eb7828cd0b20fe77dcf31d758c050715832d404cac349ee4dfed3b93c51f7a98aed3676b6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512d7427c13ce6526b49954ce4a2e0073
SHA1f549f81b7d1d636ae81bb3c1d34ba06873a64fa1
SHA2564df74cfa6f95387c1d9de0d5b062e1ba687545b8ab658e5b84dd1cc356f7633f
SHA5121d1bb89dff151cdc7b6fccebd861b67da0e47a99cfc41e88357a593055fefa8c57ca17d5b6f97dd0bc656a844fcb0c97ca0008b7638d457166bccd2f3e8020d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534c1ecb4ef66763468a7e4697060cf5c
SHA1aa7d984cf929e1f208cafd6f5d0038ab75e747a4
SHA2568ab05d1592121c17cd209d4c946814ff11cd6c7bc65b21b0942bac4b55eb689c
SHA512d4ed41cd25fb8c5aa65aa339632cf96724a7d58d5964500ccf6573987f386dea86b3b783e9b7c2e45b234ad69d998cc0d560a68c487a0a2b9367cb5c4fe2f178
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5278c88cab732c7c3fce67b2f4aaf7ac5
SHA1bd9f2fe1d5a5f3d0af42db8a60d9549855c83710
SHA25681e396749755c3032e41f1dd5815ba4b63d7347ab57e1f65099ed73650f4782a
SHA512e1935ad9a99f1163adf25693b10c77e2cd9f6239ab7131eabe94d38cd351cecfe5b033b6c8793d204676ba38b9b7bc3700606fbe644c74d0b4db5c5141199a32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdeb331d50758c91eee95599ec02fd96
SHA1b2317871589c2eb0400bb98056b24b758b5bae28
SHA2567e35fab92d7ea5234bc5d0cba69e5b7a6467d117d143ddf0f7a027f23625c41a
SHA512b851492c5c03106e6a18f207659e5a214f7da35c5808c49cda543cce48e7665dd4b635877460c6066439d4d01a7fbcc810415a6baacc510ec61ac21dd2c29c57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54427e53844c29cbc95d906d614695c3e
SHA13a914f702f6f44d182100921f6b6d50d7a75f501
SHA256020e28a2a39af27b32eac9b9463aa457e237c8bd41c43b105b5177a32a834cf0
SHA512dced9757c0521b2d56c526b79b79bc332ebbcf46eb306d980ac7bec1010b302e51e05b1733d9b134252ced8cead41173e097dca8b166fcfbf3305d58e94bd6b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9b4b59ae9e68b27e5d75b2a7853e2d2
SHA1912c2e789d5e319aee965301f0cfa00bfb17931c
SHA2563063f2d8bf8a02e4bdc30661de07a212bc2acf7dd78dad6135cec7934458955e
SHA5123d51e3806b3e08f5c6c788d6e3a1e9df3db194948b440daf849f34f9614878cad64f3d08f610166ad0bbfe8f8c2942db1d7f2bc3b9ef9acc31a1c8274bb00ae0
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b