Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
05/06/2024, 16:21
Static task
static1
Behavioral task
behavioral1
Sample
989e55127a233ee27739554fb2932511_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
989e55127a233ee27739554fb2932511_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
989e55127a233ee27739554fb2932511_JaffaCakes118.html
-
Size
282KB
-
MD5
989e55127a233ee27739554fb2932511
-
SHA1
05f7a92a6215a6997e3ca4cc29d0ead36a11bb90
-
SHA256
e0d6faa2cc342a2337503c0fd0c9bf99c8b499690d295b5694332f9749d2092f
-
SHA512
20a245916386d3163d379287cd8cf60d3dc08b5c92dfe8b6b6c696e8669f18f0ca38ef51ce9b489cf89d7a227918c1f579d9f5502c6e7cef1f1c73c281ccc82f
-
SSDEEP
1536:iUVqu3Ff0isuPWB1/L+eLYyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09M:iUdM3TTGyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B2F77741-2357-11EF-8857-46361BFF2467} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423766372" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2884 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2884 iexplore.exe 2884 iexplore.exe 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2884 wrote to memory of 2964 2884 iexplore.exe 28 PID 2884 wrote to memory of 2964 2884 iexplore.exe 28 PID 2884 wrote to memory of 2964 2884 iexplore.exe 28 PID 2884 wrote to memory of 2964 2884 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\989e55127a233ee27739554fb2932511_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2884 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5b8144f817e1ff8f795660c818d3c5071
SHA1a98cb4c913c3d3d04453b23a2c5e74987b7971f8
SHA256b9a1d6b2d01245fc2f27625dd5ea4eb82a86af26e6f91bbddbfcfb97406116b3
SHA5123be2473becb09d1aa9c1a48897af24163c2830fb03b21896231dbb2d78c875c3409166fcf3ba6d5d061850f76097ab532dfaaec54334428b34063dd30bb66f76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a91a115493e885d2698d95d4cc1dfc3
SHA1c3a774f290b62314e54b8d31ae5bc7ab57b9e9a8
SHA25684c5810775bcf64a13e0eb78738ce547b1d78fc5708eae46ca9203b18068fd42
SHA5125ac91f6cdbddadb0c3c72709cfe3a9da2794f0eba696bceadde6a4b13b3ec898bc95798982c10eef26e2f31b04ff25ff2d46a0d62127e36d222107bea72e53af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e870b1f9c2c9a1d98f222fe55cf9b36
SHA17725562be80b919175be2efce3fa7a8255da8e88
SHA256f0fd4670585325ade02337baff47e218cba4b151b0551d53880c76e9ca5050f4
SHA51222f818ca81eba110b90ede285c8e8b4c72bedb63edf88f60ee51edd3c0afc0da5890655415d0b8632060e3aab14ef1df07ced3e50a7207ae94c7a3ebaff4d4ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eea031fed4ed2f0825632f5c27dbe630
SHA10cdc2d9041521eaffdd6dc9d4b11a42e1dd303e7
SHA256e99a4b6e2c33e8974c3d6c4c4fba6a98dcc4ab9df9865734c861b13d8e31b2f1
SHA51234b0b68765a8d90e729edc0e237d14a38331485570fa4e1dd51d86b65e15fde1d22d9de31bb74901424ba65d73fb76dd6aa9004f4d27a65e627eff33d64e1af4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3eb781cc809426d816907a1d8f8f91b
SHA12337b94a3b7cc6f09fe6ad1552652a1dceaf30b8
SHA25630ce84501eda17ab3f0aacbeb1d97601f1033e839ae2a406b4e253a16fc9196b
SHA51296a99192aa31bbc0c4f8ab4e932c046a092658722d0ccf51a59903c1660dfd6816bf51e206fba8b78f5098d26f2b57c3fa63cd3d8e3a15e9b6356c00e254e97d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54189161794c78d45cb1581b955aa8fbc
SHA108014a7c3f1978fd3d5c0f339929b35d94da10e3
SHA256e547ed161cccf3dcbf849895836447cb39207b3c8f17d9e7ea4158e1df851756
SHA512fcccec1415649307255f397184213d74ab9d3a2c8bfcc5cf536333d9d37108dc96b474c4f9e21fcb6ac8f720dd2d26d6e3ee44f4ec5af518396b3d60a0b4d15b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c4373794610ffce85dd74c08a59513d
SHA1661cfc52ab3a5c3342d882f7c55ddf90e47f05c7
SHA25680ec5ef9e437327e468b6911d388f1a1a8c3d72b79d2540efe2ee30c1a525dba
SHA51260d53c56ade579b9f53a553c34ca5e2644c5267c30d5c079f335559bf09b90afe3b7933c6c819cca1e2d606471620a7321e9897284d8676fae2771e912c969b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0b1c3ae46d573849c84d4dfef78d865
SHA1a0c4d95e5111199f0736ffdaa614dd2ecdd5e920
SHA256b15e692982e19770792f58865d1580030c57eae0b107a337c070c5a8ed591e99
SHA512100733ddfa29621ea7d933c5c5bd475e97377229b1806313613028b61e5f2320e764f96a5415ef0ff6e69a2596e4e56b5f6275bd7a4cc532b3344919c54a2c5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594a15a00c85da80ba25c87d6b9eed8f2
SHA1e0323009e0563dffbd8d1b012450821040fca119
SHA256f3892d36691cbe8c63bd409aa41a7eb86de4f03784fa83e2069da60b6fa5fd6b
SHA51240eb4c1ccc90fad59093ca6c425c07e306a6f1a18e4bcd55718a193f66eb357adb2b4e1109cdea1c37a082c39aab05846766e9f3d8fb18c66e082b0c63b7a772
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53de5ce46a103a2a5ca69af9abafdf789
SHA1b32c2dde5af61f5a60edf97667492da4bf851941
SHA256ed318bbdb956a9bbd67b970b651afedce603147c4f89cbb71703844ff1c8363a
SHA512522980eef264bb15d462019cc18f0599f1dca98c43a57f706222bcb97b02ad2b22c9e5edd1221382ce7beb2250d71a97a09cb3eb35907c42ee7f15d2db00cf8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD550e0048f9ad6af649a818622f315f8c1
SHA124b232647d1042aa7a1283cca781e910cc29af9f
SHA256f60f20ce77b3a27eb87e28ae34638b50c9c943a0c530d5c9797bbaf48a8b3bcd
SHA512be1da91779bcda5da14808c2dc03c54fee54da859af97203c33f510de36074ef969a839ce5db877c106d86860aea80fe43819e7a910e9c629f8544d60cf2f054
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b