Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
03/06/2024, 15:27
Static task
static1
Behavioral task
behavioral1
Sample
92434637f1ffb42a90c49a60542c16d6_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
92434637f1ffb42a90c49a60542c16d6_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
92434637f1ffb42a90c49a60542c16d6_JaffaCakes118.html
-
Size
43KB
-
MD5
92434637f1ffb42a90c49a60542c16d6
-
SHA1
9b2701abec89cbbede38d8e5b27bbf5e7da66253
-
SHA256
77f5ffda152571c419727a4210f8de7ecc7bec25b46b5ee12bdeb879861d4627
-
SHA512
3b46aeaed3fa9240179787dba6bffe2d0f5badb0cd07c3537bdd9b4bc50b3e1014c4a382735504ee348b598c94b09f3200962a98e3d090eb404c3dee747053ec
-
SSDEEP
192:uw3qb5nrinQjxn5Q/l1nQieONndnQOkEntfJxnQTbntnQmSsx0QMCG5gGiUON2wJ:OQ/lpYBxHVmbrX0i2kU
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C66F6761-21BD-11EF-AD38-76E827BE66E5} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423590311" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1860 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1860 iexplore.exe 1860 iexplore.exe 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1860 wrote to memory of 2548 1860 iexplore.exe 28 PID 1860 wrote to memory of 2548 1860 iexplore.exe 28 PID 1860 wrote to memory of 2548 1860 iexplore.exe 28 PID 1860 wrote to memory of 2548 1860 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\92434637f1ffb42a90c49a60542c16d6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1860 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5172ed05c56f7ba5ad96fc4046add5c2b
SHA117271ff5b27163d94cef7335c899402bcfdb9718
SHA25662aa521734640e653b94623f2e4a6c1965b91a23ecac414ae87577e5ca3cfdbd
SHA512b91bd1faf1f2d97e780c4acf0687ba96c2bdad75b8a5c580c12892ff4f287f56136d501ae3fa0f53eb539cc03f688a055285dd357eab4cd30a7f66387c939082
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c40970c8db9abcbd4b7500f3a45cf5a3
SHA106c8cd3483b70c13ff4574d58eef73f5e82baa78
SHA2568bb66f5befdeacbdb9be20ae4ff11ec94ad45a961fe181a5922039e32cd7a116
SHA512e1a6a4b8054cad1ef3b3840e3109959f3384c83576015517b445333733fac770fdfdedc17486d9a66865a2c64f3856f861f51e100bfb7aadff9dff344f75fdc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581354de29e345fe0bcc2a3e1fee81829
SHA1528cd67595ef1311687aa2060cb103facf7f2f3b
SHA256d83f6e986eb36c865312612988f2bd0bf35007b05b1dbff1da07d9e9520ea219
SHA512dceb72e0b5c5d12840380643fa555096d587aba586c6ca222d89fe599fca09d880485454ed0271ae547f30380dacf928c4536101052afd7635a915d71c482835
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50344c29bb83fcb885e3c3f965a5b0b0b
SHA12ef3056c78c0343480a271aeed34b5f659e96c91
SHA256cf3a1250700a9338caf469ee426d44f03283c9e799594dfce6ed71bee86c252e
SHA512e0a1d11c76d317d5c78909911686d2b6661984933fd00453fc716d9fdb0ef901fd065be669ade93b79423b0dd9c8f9eaaee1d1b9907000cfba130cd03cb098ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd4d6bf86b32c05254f8b5236291e31b
SHA103ef0fd71535b4b80494587fe40a7e15ba787d8c
SHA2569926b5e0b707b3b1d8ceae347db953cf2255c59662dc4be8d63448b18c1b2488
SHA51282ff070ae2e445e262a963ec94ee78ff36b783fe6cdc732244c9f4a43e1fde9be5e9625a87bbf431c57d0c02a86bd9e847d34657a295289c08560124a7d7bf20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a615c636c16023ec86c58e00274fbff3
SHA10206c586f5ced3c84b3eca856a44c60f1ca5c27d
SHA256457521f1866a5b54708dd57c1b0043ab50ad91d91c073858a61673d2eaa6c07c
SHA51299e17b5846fcb0730e777c993494914c6cf8e9a7b5e09ed2de800f69bff685237affebc03cc7b616edf6f838832b021b46de437231958f84977d6d81b978e8ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53940fbead81cd5dde870709f6617b078
SHA168bd980a1bfa277cdd8028a065b1e51bcd4b7300
SHA256ec00285bae95f10e0c30df8d2a8c917e0f5a5c29f99ae9684ea137193f98b949
SHA512280ce3eeb56427ba8c2db572cd27b6904729e309c8cf49b282c0fe6a8908cd024c57b56d05307e8eae732c70e4fe8fbeb3112b896057fa0c9c9041f916c686a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510d0f38e2b3ceabbc4ef38ea35875634
SHA191000892e640182924d8063607a7496f0183613f
SHA256004c25748628ed0a3fd049f0904a09253af4a09d6082adf74800c02e8f26dcc6
SHA5121e98db9ba93a1c72566c85a38f48bb91b08160bc01245a7d227c8ba7c4cff2e4c7ce967da1ed06290710ad7a27ffad10dcdfdfdbebde3e4a6d841b33fdb0b948
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b