Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
05/06/2024, 14:23
Static task
static1
Behavioral task
behavioral1
Sample
986393019d468eb8eb982c70a938282b_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
986393019d468eb8eb982c70a938282b_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
986393019d468eb8eb982c70a938282b_JaffaCakes118.html
-
Size
23KB
-
MD5
986393019d468eb8eb982c70a938282b
-
SHA1
a10a901f42e6e38a2e793cacf6cbee5d7e4ceba0
-
SHA256
165c4cfe83a90e30d27afe8d372090f334d98086daaa77fb4154e1d09308b3da
-
SHA512
5cbfd23c9c63ceaeedaebb096b4c746eafd620067d9e50c27704eec6ff1ee11b8f2717069127721160b0f75a23cfdba94ffb630452e627695183a421c81f94a4
-
SSDEEP
192:uWT0b5n6enQjxn5Q/NnQieINn2nQOkEntj3nQTbn5nQyCnQtiwMBoqnYnQ7tnuYw:DQ/AyR
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423759364" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{61E5D871-2347-11EF-A759-F637117826CF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1700 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1700 iexplore.exe 1700 iexplore.exe 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1700 wrote to memory of 2028 1700 iexplore.exe 28 PID 1700 wrote to memory of 2028 1700 iexplore.exe 28 PID 1700 wrote to memory of 2028 1700 iexplore.exe 28 PID 1700 wrote to memory of 2028 1700 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\986393019d468eb8eb982c70a938282b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1700 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f74a3e3d42ca7d29f11497a9429c9cc
SHA18ae43f0b04a80a4e8fbdbb07a07e47fd77841a35
SHA2564798a13d84af881226b89c8d04478749eacfe9ebc5533a004d025ef20fe76ba9
SHA5128d0b638fe9f7b953a5a727f3aa09dd4d2ca73851df977e12e05b1ddbfc41d109df6e4abec76f63bf583927530b93301f19cc1cb11742b30a50bb948e728c8fb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b49a335d7508710a11a69cbc0ed8b0a
SHA1bf2091610700b46a113422ee45441b6d7f389a35
SHA256d13d7967c52806710611d820f108564334584034e885e104eb4ee7abfcf24be9
SHA512136564233e965787db2495edbc12785873d499655f865d04bb8e358acbfb4257f6e9bbe612db61ae24e1aed4a7ca5a97d0eec8f66abee03c108cc2027f454a1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5484c70f9e0bdbb9ae5cd5ea01ba1e1c5
SHA15396830c8f4014d72d0f15f25682af7e1fa5fc6a
SHA256df4c4539ed368156c44e5dc7b88419f9da919e03c01a03183c9e9dcd4aeec7e9
SHA5127572045703d1603ecd51d100149e70e2725f092a1efe0a2999c5c888581eaba781301e0cf99d378c7d11f2aee3f537acb6fdcc80d5018a307c57d71a3eee26eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5c84e9afa53a1d81b4623806c9f7b3d
SHA1e148fe7e795de98272bd4bfc00e2e8ea0810c5b3
SHA2568f3b52da868ea076d2ee528ac4e2ea97a8487a4cec7bf04c94aead0353ff019d
SHA5129484447703cc685c69c8a7cb8f0ba932571969e34c07e5b20776ba40cfba0c6f55d16f5cd96ef5a5d5686449ae756aa307630ab7b972ae5cb5954ea6ebd0db51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b03f7481512fe33405e5e5a735a40b3
SHA14c479b618aa751a0c02b48862bce88be494d3f03
SHA25652ce1a28ccc06fd7c48a2b23cc7dad7eb21b3a5b70f5a5dc36f18b436931538e
SHA51251e2ef0fa6420c09a1ff6e3d6427a650c9a867dcab2ac144e6515627351cb8ee6253711605370ccec39804a69ac0e9ebd14776efb7504f70bcdf942818f4283f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0b4d426fe69c9691638980b9b5cb0f5
SHA1736b3f8b99a57b6ba4e35cb51343dd9e5c32a48d
SHA256045031ca5fa28bb38c4d6f95c0b5993a934484abfe9d67295670a66e967fd3b8
SHA51293c5441bfdbe7c9e97926b1c626494abf41d782052dceb63b49cc109ae85b11460d74e3affe3b4b667d14988de1240388ac0832795c4867b1bea62b30a446604
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5bd6dccf030c2519e3e7689d708c879
SHA137c64c6cf99b2dc4863b3f94356f1b130129ccbd
SHA256478e8d2a0c3b6f9194be3249ab1bbe8b196020e36e1e7e2a04be593345ba4ef4
SHA51206c06ec29b019d5a3ae87adba7c1eb26b1dbf4b5bf1084ec3751054572661993b8a187e623a10aaa330ad3805d09ecfbbc7c65b4a6f5c9b935b8aa50eb6418d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f499d789e629da09ce1f19c38a93276
SHA18c4e7096aea531f84c2dd96e72e0583fc31ad9c3
SHA2561b090c4ed60c889acde0a210e7cd928e3f9cf22741915b60e538308ed64a8018
SHA512e7eb54a5f238e85611242a5f2a3f3061245fe2455be4df225d17d5af9e49f82a89c5cc69fe52bc97730274ee45e455495b529a7f38bd12ac039a3d9bd7b054df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4288ed7cf8cedd9536a43c5a1fb86dc
SHA1830551a89e567dd64b44afff9ca4ea39dea38bd4
SHA2562c017eee9e9b7e22f437b46380feb67579f6298209a71c7da629049dd63519f9
SHA5125cb12fcdb5406d2331d24139676f03bca97bc7c4d412a6559cb17286524c8509bd1588f55fe377c90edf49a0a5c4dfe7047eb0febec553ce663268c83cfd4ae0
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b