Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03-06-2024 14:28
Static task
static1
Behavioral task
behavioral1
Sample
921c88bf72f970b112584bd8209bcb09_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
921c88bf72f970b112584bd8209bcb09_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
921c88bf72f970b112584bd8209bcb09_JaffaCakes118.html
-
Size
27KB
-
MD5
921c88bf72f970b112584bd8209bcb09
-
SHA1
24d1930469897d0bdfd1e0de9a9fc4cf076f7dc6
-
SHA256
a81586b8903ca07284eeecca5c03bd0914dc680895d760cd2cb6743bbee46f9a
-
SHA512
1644257c0195aa2a70b3ecb2f65bce002df6aefe277c59f2f5abe6323ceb4ef17b36cb5063e9fa8d3d2b5ca1b09a8ad00c5254cc373d2d84712a6bce87ae87d9
-
SSDEEP
192:uwrcb5nPinQjxn5Q/WnQie1Nn2PQnQOkEntWgnQTbn1nQ9etlm66bP5Ql7MBVqn9:uQ/gPMc/2PQSrw
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8BDF38D1-21B5-11EF-9FA2-EA483E0BCDAF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423586778" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1612 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1612 iexplore.exe 1612 iexplore.exe 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1612 wrote to memory of 3012 1612 iexplore.exe 28 PID 1612 wrote to memory of 3012 1612 iexplore.exe 28 PID 1612 wrote to memory of 3012 1612 iexplore.exe 28 PID 1612 wrote to memory of 3012 1612 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\921c88bf72f970b112584bd8209bcb09_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1612 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5040df3ceb677cb64cca7dd635ddd2000
SHA14df819769c1300dc4fdc7085165c1f06d32a15d4
SHA256bd5c806dee7cc89d9af2bbbeb9a0067b5edf99fdf054d32666989f46f331acbf
SHA5121261af835dd926eb3c849c9c06546546820009e4727914483bae42870b6d0d31c4f255c163ebf2ed7d8a728a49021639be7d15a6e3c30e4cda705b37a0a7188a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5424a696ee5efe814957f204565922753
SHA15e0ca85a599e8599147ce4e82c0c4c103acb3bdb
SHA2563bfdd143b79760295cf50d94783f2f2c92c04590812241e9eceb400d6ad6a936
SHA5120beeb48600d4229f1dbf38f6222317878f2141342481314e25b10e6b28747a130db4dcef6bcdd36ad5974e4660a12f184a57c425558415fdbf3600f6bd6c9502
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d996912cea0d6214985ecebbae9c2c1b
SHA19b920b3d5d71e1a4aeafbce129ca2f302cdf4712
SHA256db0a6911661c0cb13f0c584642211bdbd5298c72665dcb36ab7113c0b4f619bf
SHA512a1d75751cc0507ac57421b0c8ed25d30f51042758a4b50d5af02ec898b3b62b9f42757c777b4e783831bf6c163f78a229d972b365e5ca8f49fc6b3edd3484f25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b761b53f8682cb65bdb004622a9b75ce
SHA19d3ffaeabec55b1dbd9105ddc42d09222c701a03
SHA256c5920ea958ac578ca39e0e42608465f87adb3660eaec53f7a27c936b13f49286
SHA512de176391ab1ee9e2f09dea820c99aae7fea50a10cfe51c574f7f53db1981f27edbdd3299db9318dcb3bf6925c5747fb79bb5400d3abbfd4d21eb86b747e3cad1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e9f4406af6c8011e325825860ffbadc
SHA147681d09bc76679455c4b9c72ce51e85cc1a58cc
SHA256288eb2907852e96edbc93c03488d2fe0952c9cdd00edda4bfb5cc93193ecd8f7
SHA512a10396ca65755a5e17c34df2a39e301fa8619b0a40513b8fe974b6890b91ebb8efd5ea334181e0a05701b484fd006a714ef2ebbebc40fd768b539b8dc874c0f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7f1128db9f2d0cc3dbd470eb4d8886c
SHA1be87fde81abed2a974753f482c8d63d6c6134c5b
SHA256902ad714670af8024038be2d23fb08a0e110d1904df418748135eb1512cfe09f
SHA512b2fbf4b4abaf3470159a3d3bddf78c074699e84920030308c84c801fd22adc2544c2b7a1c92d20f1758e1811858c883a7b5c9884b6a9b70ea6d88ff59d75cbb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5975f6837d1aabbac31d52bded1d84311
SHA1191b28d6a3fe53e92e9bfa6937b1748464e5ea53
SHA256279bd432a2f65a1352b25d36d6316f7e6eec835b353360c5d861b7fc6e993679
SHA5121d0254273925c884483bd9f46c4a2e57e2a8b3cc49a6654e86d6cdfcdf5c883c87f7e01001c15bc928fe7e83c0dc786b9f9ee28039306e2f9a8969e2ec01ee2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b62b0bc42effa3c9a6b2f829faffef3a
SHA150145640efddf8882f0691f0ce6987585a6a747c
SHA256978036c1c025d8ca0f542bca9f47c03769e01f0109e0a2bf78b196c18d1da21a
SHA5122cad4b213f3088d78e00d9d3bbd7f7ce1f95511d83cccc0ba090a5f20696fcd76c0e115056020365e94895c46ea4b0a192ede6caa21519b2a56a8d954d7b493a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4e8ec4e9a837ae5f91985812486c68c
SHA1b0c95c05bc2c509126da6936c20dc4c6082f319e
SHA2564e5b5b66026541f74241350f4f578618cf5bc3aaa70da79a683d31f0db77cf3e
SHA51276e0079b7a9af4c304399bff26a6b34b63b005620687fa247c4dc7738bc8ff87e74d2afe69e12b81e5f9834714922f4a235257199ba8421442042f0aa3010636
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b