Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
04-06-2024 04:29
Static task
static1
Behavioral task
behavioral1
Sample
939ef340bdcf41a88b90b022d424a77f_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
939ef340bdcf41a88b90b022d424a77f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
939ef340bdcf41a88b90b022d424a77f_JaffaCakes118.html
-
Size
23KB
-
MD5
939ef340bdcf41a88b90b022d424a77f
-
SHA1
6339ea190d29b5d2077ca911713a1a067fae5792
-
SHA256
11587f9503b2ece3c7d0d48cf07488e948675abdf834342faec795f33af4cf71
-
SHA512
45cc428e5c687caf9e5990b117f136618dc50a3271f0886a2c4f9fddba0e778518fcf2385be305c4c5897260473ff3ff1f95a798fd71f2c501de5efa5ca87a5b
-
SSDEEP
192:uWzMb5nLanQjxn5Q/qnQieBNnGnQOkEntCsnQTbn9nQDCnQtdwMBhqnYnQ7tn0Yk:OQ/2nf
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423637250" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{10DA22A1-222B-11EF-AD44-52AF0AAB4D51} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1964 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1964 iexplore.exe 1964 iexplore.exe 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1964 wrote to memory of 2524 1964 iexplore.exe 28 PID 1964 wrote to memory of 2524 1964 iexplore.exe 28 PID 1964 wrote to memory of 2524 1964 iexplore.exe 28 PID 1964 wrote to memory of 2524 1964 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\939ef340bdcf41a88b90b022d424a77f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1964 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579bd024abcd74872997eac018333a43a
SHA1f3dc94456ffed67890348274ee7a6f50d5fd3657
SHA256577cccbb954e1cd832c51592c9ae7694acd3613c66fc17a5f8978c04bde2bea5
SHA5120bb13d17f5cc70b749d66f46302134906ba1bf6781e015d0823b0b9d3d247ff03dae702a16cd483842b330efed564a6e5b9b1efb62b2a4cb3017268d8f0e12b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed1e4595f068e1fc91fa18aed684645c
SHA1b434ff7466d5a842fbe7e7bccc293c64a915a511
SHA256a3e516630202e54d2f1236bbf18c18b464c556ed17ea15e5a80721d3eb58d3e5
SHA512e328daf9afd992728b6e6c905fdcaa9d58449e7198463a57c2409f706922bb8b19759e95b915024066674dc4c02f68660260e8518979e2a6f9cdde87911d0448
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7ae47bdd25576554e97fee5b0493b82
SHA1dca24c9241cf3cd14795d70618eb9cf4687fd7ed
SHA256fd83a51f19cdc414c354134d9e1b627b7c3869ec0cf0005b8c68fd8d118a8a36
SHA512bcf3137aa92c21aa26c7aaacf8ace01fc03419025c1f7ebe98e3312e025cda3df3dfe784004c4180f28dce84edf818f2eaa1439f26a77c847e7105656705b775
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580b61f4bc8635fe093bd6980ab8a608d
SHA1ae0b080523ac8d2510cc1e9acfadec91b3272f48
SHA2569e6149988eae7cdae44b2f9986251969eab71dca97e8e6560e7a36d48de34288
SHA5125c59a5f5f92996c13ea4976f2ca1bf8a6c46479e53defdabb90fd37b344a65b5e9dbb6def268cfdd581555de96319cc66c75f69ccc0ea8b766b1a893666266eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550472f5a95b507291666de24be5e43f6
SHA1f613c964a478cddeed9a45772add8e200445e6a7
SHA256307acfce245a3c1f0ad75306e4cf7a560fe10c437c1f7f26fda0f69749cb6b2a
SHA512eb9e88ddc99478372faaec3f3d314cd324d77c8f8d9726a22a981c5a275d0ca99c411e819963e530f0eae06aa451a4fa56abeb0d3e034b9233847962bbb0b4aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9b91139ef9c4330285d67088cf4f0d5
SHA19db41204df115be649f3e747560865910fc0cc23
SHA2561609afc68f830aa6633036a1dbfe84901919fd785211a2c20a686f8a6832a75f
SHA5122fdad8f3545843a017e047894905bb2d5efdf5030015c330772f0bc577efcb84481676491aa8b566ec197818cecfa9b95135426013aeb3dfe80dc8685d546cc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579f8b6fa623c6d99d8de7eec9f1f5ee9
SHA106486176d28c0e93e80ece30dec9314775d56c22
SHA25678bcbf6adc6d0953b5f7bf8045f77b21b262be4a09de2341e77b34413be6d0cf
SHA512507a5b9154560b0b85d657543022c3e140999d72c9625a78fe1c17dc0ff082275523bb6755ba3252e904dd18626f48ecb686ccfbd21fb98b5d338aa50ad47a6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1e79934cd46c1a213543ceec1670a1c
SHA1b4b6e8c2c9ebd63cd1c6d8e07cfd06d7f64e0e2d
SHA2569bdce92142ce0d34cab8a8598f345283078fe894cdb2af120635418a3664e15c
SHA51223dd43061d3bfddf2a8eab550967a98ec71cfea0e61e29824e4f8589b79efeebb3bda223fc9464068bd8b55d8a0bd0904df3209b1cf393ec8c9b05ee5e1e27df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a0ee9f5b358a75654855cac2a4f91f5
SHA1cf131d8356c93a6b62f4e13c22cd2268c3021d23
SHA256f85a57dce51947727b1e0e42a1ec08b17981d5220d23a046efc37a2f8e7fdf6e
SHA5127ff042689430acf24eb3a133a1e4f4c65ddf1c03be7f91b9c59dc1c6a3d797e52f4a9a0e1c46d8d09bb9b73151d5ac61c5ce908c320e9a7d532d1f49fd90d990
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5765ed9c57e19c223808a4495bee0523b
SHA181d13a9baa1e966d303fd1a70c606896b1721e7c
SHA256dd65f08e331ebe3e2b046df2a64e01eff12f48d269808f618de1300e74a8c4de
SHA512be2a040065dba4649a8cb3ec94f9963cf0f3286a9aecae816b5e5e2125df2ee085d007c4761c2669001ae1da23aa0d2a890a170696ecb0c4bd081c5b655a75c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0186fe1af69071e07d7078d9008a873
SHA1557f5848fbdfb0ce87af393d021f64321ec580bd
SHA256614b375d9a23485e4dfe1ac2151ed1607f3e76e49d4574dcbe8ebb8decf0e911
SHA512a2342eb9431bed0886968edec184cf6e2fb5c7069af5de41c1480003acf6edb3ffd1d9e1923a3d74f34016462b76312c27914db2ce5406b3c48f39c63e576b14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598899e8a1fb917cc6198b0a56fded3f2
SHA10340bf4ac46cf04eaa906964445528db6fc23b72
SHA256533170249f87c2dbc0d58dfac22dd52c9fc241de642ecd8aad71a4018b101d48
SHA512694f3250a648ef8fdc0902f8187c8d9c5950e3f9b6aff9994ee4fef121bc192da44f1d9f462e235c739f8013770eed5f0fd3bb016c77bed94fe7bfeae5bece2a
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b