Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03-06-2024 12:58
Static task
static1
Behavioral task
behavioral1
Sample
91df0688bc96bc9eaf1c52d523caeb85_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
91df0688bc96bc9eaf1c52d523caeb85_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
91df0688bc96bc9eaf1c52d523caeb85_JaffaCakes118.html
-
Size
23KB
-
MD5
91df0688bc96bc9eaf1c52d523caeb85
-
SHA1
b0e9af11814e377419842d3d8f45c089ece13e3c
-
SHA256
66b957ccb66aa39bb798aca2ade2b517310abcf1809297327ef81985f0cf06f8
-
SHA512
43a4955dc6c6d0c38ba29e9453e79d8c618ab713401b46a9c20b897770affc00bf207105eb7ff5f6813ae47b1c243a56f301990239fea750f7a078bb99acd974
-
SSDEEP
384:gAszZ6bbuXEo0MbSTtg7LD1Q/7zNWDDRKaNTnPa4B7l3Haz1eLZml:gAszZ6bbuXEo0MbSTtg7nGzNWDDRKaNs
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423581393" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{02E32161-21A9-11EF-BC57-569FD5A164C1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1132 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1132 iexplore.exe 1132 iexplore.exe 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1132 wrote to memory of 3052 1132 iexplore.exe 28 PID 1132 wrote to memory of 3052 1132 iexplore.exe 28 PID 1132 wrote to memory of 3052 1132 iexplore.exe 28 PID 1132 wrote to memory of 3052 1132 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\91df0688bc96bc9eaf1c52d523caeb85_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1132 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b66f641dcaa2572bc9dfe086974f6798
SHA1c87ff53f9bdd13c477e4cb361a63203a449f0580
SHA2567ba28445a6a20bd0745d19254eee26eef40e404072c90a395e307c35641bab65
SHA5128e5da145646675e9fd8e60d70f510f468d453f5d7b25bdd943f20b4be551d7291951d647e7ddb0f31447de913a0e7e048828498521c2df25de261e503d6ccb44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3faddceb38b7c0fe813aba00454dd39
SHA1123dd95abe3377b5f19cdb90d753232534bd13cb
SHA25627d517e17d5646d5baf06e6ceafa791a3fab469aaa74105a0b621ab3ceceed3b
SHA512489cf8e1d8735f72e705b61ff336eff9f5c65e423dca655743c427fc414e2d1d7410ab64f2613d61a44ad18faad9835f29de077d9ed5e4d949cf8fd676d7b00b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dd3c391b14d62c384df46c65d4ed9f0
SHA129ba2c65ca09ea8360749b1ea8a80520e0835511
SHA256a312eabd67dcccbb047f7a6bdd3b91a552c8d2f7318fb181faa1e0bf0208f130
SHA51215964ddd7956725624c8414ba491feaef2a51f97552c14965a24927b2f852a193219c43cf496693c4416e4cd6c5a7c43a08293684c8b77899f1387920f8b5d4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5038e67acdc6391fee0d9d4fbb9dcfcee
SHA19ef8f0501610adef8b19cb3650a2360c45f8add1
SHA2562d2e84f6e8820c79f21ce1b9c041508a161812c9ccbc636d806779f9ee5173ae
SHA512001b0a5700e118a10718cb95ce68eae6a013748b7b967f42195b3c6a085f974a3e011053202f4ac04ccc5e48d798978f29b2ccd9b8f186a9802bc17b4db13d6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b827fd10e39ecde9d5f8f3343882fb76
SHA1094dccec32d3f69365bf98a9aa93f3ff41ed53a4
SHA256144064fd06258d22d5a192ba189fb88db53ecdcfb3f76ed33a4fa6eec379e754
SHA5120ca9a1a79e338a43924fbd26bf8af0dfd0f61f4e4fd5c340713e6b1e52ba028645c45bea7b8de172a16b75e4909c71267bca1cb0159b7b139f8289f5d5e25405
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58488ec8e7ee741fbb9b2dc122aae789b
SHA19d2d4358306efd95f2a230270e3f524717a6eea7
SHA256a8b0561363064a48b5fdb102d69589198b9fc8dac65cd4484fc3c977f4edc5d9
SHA5123717107357eb908f7a1db400359f8a333fae5d1d4cb621b1c97208042a767263c85b12477e2dbb9ce6df52756ff7c0a57796075b987c0eb3fa781bc31e2d1aa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5192091475a4ccd54e3a3aa3a0e178187
SHA1626da846b7158c243766e3fc8ec241b41a9163f2
SHA25659fc81bfa74b0feeebfbd53b31919a70be958d3be10b3b901e660f51051d7a60
SHA512a0d3680968e7e500f85f84da3d5d8e0a8f3b7f2d741cb83b6913bc5ce73d2f7fe028a385b052b148c9d2d8c84488b549f8e0990b6ab970a82b3fb008cc184993
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa0176066ca65f17c015c7a126b6447f
SHA13af905cd4a91fcde1adf90c8b3286d17c89c56fb
SHA2565eeb93d8310de3db12b0f15f7d6941e376af2feae9f86afa31f674b16fbcbd73
SHA512d3dbfe017565d06406a2209eedca458dbfdfd1d10120a4b5752da05b159224a20ff74be9b37b12005a03294c539f3d7d1c93f26d19422c7d0e112e5e811c9b63
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b