Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
05/06/2024, 04:36
Static task
static1
Behavioral task
behavioral1
Sample
97342aeee370547d76920574ede4367e_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
97342aeee370547d76920574ede4367e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
97342aeee370547d76920574ede4367e_JaffaCakes118.html
-
Size
34KB
-
MD5
97342aeee370547d76920574ede4367e
-
SHA1
27c34108598230915f4353cf7fa1a04271c72e28
-
SHA256
021625ce05c7e87e1d652804b8b61ab62a6b2be518ad18d48baa85e5fe7c4c0c
-
SHA512
d52aecc06ce5985871879ba1874ad49cbe9ca7c8e9cc5dc1154b6afcc3a3cdec5113a6edb26765a0c3e9ccbe6f5ef1dd3dfc235d24dcebba5ce5fcb8839c0cdc
-
SSDEEP
384:MCq9bguRFIJi+2aVgJjK51/Q//lkm35bQyQuw/AT/GADOPA5sSsksAZsCAEaiAv7:k5n5ZPrKDdSg0G
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{26AD6361-22F5-11EF-9A4D-7A846B3196C4} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423724046" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2280 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2280 iexplore.exe 2280 iexplore.exe 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2280 wrote to memory of 3040 2280 iexplore.exe 28 PID 2280 wrote to memory of 3040 2280 iexplore.exe 28 PID 2280 wrote to memory of 3040 2280 iexplore.exe 28 PID 2280 wrote to memory of 3040 2280 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\97342aeee370547d76920574ede4367e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2280 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a5fb736da134e0b1b0de5df545584c0
SHA10a4b90854fe841ab72fe15dba58bffaede006491
SHA2568ff06d54cc1c27d3cf6b34e39be62958447977cd9637657ca7aa84cd47274799
SHA512cd8ce8b946cba3485bde3d472658720283ada5cfaf23b1f015bb5bed6b279db215fc22fe30a5b7ff0d0428bdcefae6475ff648febfda661bea1318fa161bb6b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcacebf86cdfb0bd587d9617f3753fa9
SHA13eaea17673e44bbafab4929a3a8030e192219e4c
SHA25619d6bfe9bdd7051e1ae70f37880fd45e61038881fa0b62fbe88836e50ef6b5d2
SHA5128c0b8428ac3469a96d5f2826765015370ce14230c77d8fa55fd98e69e4e4df338dced2abc49b98c3d9f3c62f3fe58fe39987d3ac883e22d570cfd59c532bd606
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f4618ffb71eb78fa0354e1f641f95a8
SHA181308bf3ea856488af5bc29d0291312d49196c82
SHA2567508035b5cf48f2bba362e9b9dbe4647414e911b6cf37eac3639ae928ac3ba53
SHA5121dd6526fa93ca2cad05db32bf04893a956b385fc79517a87cd66fd771d30fceb1145042040d85e9b43bb83a1e01755b1ba72f313bcf6d1eb9c45742e9e5b36f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f92e6111265632388524db0c6ae0c47
SHA176d5ac147b6976bbd6937de3127aab39d4c4ed16
SHA2560a5d4b7c0340e6abd12b185fe6cb1f86669ad98774935831af9f822ef162d254
SHA51233b78848c8b075dd7d1486c6cc1fc9dc53d5410c06336fe4fe2f24be56b9b68a6b36dbb85ccd4e90a8ba029e090190d1c6230c6275dfb0e5c91ee76e4cdfaed0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b16a1f25dff10ead8e4df42168a03f6
SHA1019f91a34da132a245bdda84f7d16cc43f579926
SHA2567200653f13a44c27075fbe7e6eb0fc3838e8cf18257b036eb2e2ac4545a4e9dd
SHA512521beacb62713ae18e61383f23862f02196d34dab9db8a3daff0187f5aff902a852819f25b3451b167e10ce262f49fe8f8583de2a3beb28a65e163d6239eb40a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5301346a6ff01ae434a0d771628cbcd97
SHA1fe8d101d7dfb0ecd5a126008e223b21a20801763
SHA2563d2cabc8fca6fe2057b39c315a1dd2669a119b35ac1bc11cb51848be11917874
SHA512bc5be35e8442dd68fa6f70c7eb0d60b90ed87e14531bfd0e0a2faa376dc3492c9ab37690182067e94ada5531b6877014d4d49d0bc1e326fd8f9ac0013e7c01d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563ceea7153e0c680fb3a34b70332abbd
SHA157698822072de42d6f6d8b48042cb0081698ecb7
SHA2567d1ec5c4560d59405a83c73cf4173620d8355c07409c5bf9b5371ca6176a7d76
SHA512a444c1840bd1f4828577781e339036fad03d2b0f92bcbe5a6e0a7fadcc6550d70a3309a269b29642afff6c326f9fa9ae1dd5cefba47a19562ab31ea49b631651
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e6acfa483e6ff35898237b1ec2b6214
SHA16e8336b2b3aa1813cc284cae68d13857cf854c51
SHA2565b5f7b25358f7cfad8e7baa76fbac84afd2ba224d94dbb5e5eaefb17a96f16fb
SHA512cd1cfe095defdf3cd446418b8af0c6ea62b6e8e84e64c5351d89a2d4ab6ae50d51fb1a3deed0a6ec58d957f9852862e30389bbb0df5f170d3903aa5e22a0b426
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b