Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/06/2024, 11:59
Static task
static1
Behavioral task
behavioral1
Sample
9a9724a2f59e70f61a2af042ca53cf21_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9a9724a2f59e70f61a2af042ca53cf21_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9a9724a2f59e70f61a2af042ca53cf21_JaffaCakes118.html
-
Size
27KB
-
MD5
9a9724a2f59e70f61a2af042ca53cf21
-
SHA1
2b842e5db2f02dbb254a56eb7e4c1860a890456d
-
SHA256
70119249d03c87fc8e639cae58cf898eae91411039405364627009a7a9769d95
-
SHA512
cf360a5899938d2fce8f0e4022cbd6be9d8b52791d0c034009c56baa6aeae6f3161197fbacbf64570e3f76cd49bf6921264df4e42b2d8182eca7217a8d808e3c
-
SSDEEP
192:uwPMb5na2nQjxn5Q/hnQieUNn2klnQOkEntD7nQTbnxnQ9euwm60BkCQl7MB0qny:HQ/4kVDo6kVS+Rx
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424182651" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EC91EDB1-2720-11EF-8AAC-6EAD7206CC74} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2848 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2848 iexplore.exe 2848 iexplore.exe 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2520 2848 iexplore.exe 28 PID 2848 wrote to memory of 2520 2848 iexplore.exe 28 PID 2848 wrote to memory of 2520 2848 iexplore.exe 28 PID 2848 wrote to memory of 2520 2848 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9a9724a2f59e70f61a2af042ca53cf21_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2848 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b33bf812e4d25ddfd488ee286698d2c7
SHA1fb690ef74c41b6f1c1c94c7f25d8e33ac541cd45
SHA256cd95e9c10c389a0bb36c38b49586b3fb8c41bed5e5056c3f2cbd5eb886de702d
SHA512d4e8eb5ad343bb08fec45ab8c80ec7e25f0845c91d8aa9fc2a42f00c577d6eca5602b74744799cb8b4ac06c7066f33e1b0054e74a57b9535b091a86dcf4ad1b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de42222767d05a11b95e92f234f4f8f3
SHA1741a6dc36e19a5aad939bf3354145d20948f22b1
SHA256274e4b475805c6812c2fb3bda0545213ea0fbfdc09d8d1450b13cffc4ec7089b
SHA5124e35d1fdb8f8f3bb69ec359c375c01206e8f6e99a0bb6b979922d314d536452deece27655260859502e86a09b6e3001fe71f79925781ffde0462289dc5a6cc27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0aa6418ba67989ab3b51df71dce9349
SHA1752152c09a6eb6b2c7a79a707535e401d09a3f7d
SHA25610ff9df0111ec7b9818258318cfb763024afd8fada2144350482cd19b9ecb7ec
SHA512818f070fef36795d7613b470f050183081fa2b1864579cd6fd4156174d51bf74ccbeb4de93a77dc33a83f00bb6da83a7a0a6219ec8d45c4fa5cde02111374c13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb3ec6ace8af91adcc8bd4d4bd93fbe3
SHA1fbe7d04e4cc2d46f6ed0925fe5fdfa946e28fd7b
SHA2562ced645e8ec428100d371802bd21ed04bf419640e462c5175f1d3556d1d65cb5
SHA51237fc6c641cf26cb0371fedee4356253669aee680fee4fa975f57b41052a147a5f12c30cdf4cb5933791cabbb30a59cfe3048bb13e25e0166617b312a6b7954a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567cb21324b1cbf06bd39a4d1989bf080
SHA1be747e6e3ebaae95d5042bf09b6e8fa035778031
SHA2561c6f121384517b0b898ac35d90f11dcf13c9a67903b84aad8e99db6f3a0505b2
SHA512a08f25eefc56dc3368b6da2daf9b25e5197ae18ed1e7ea52972a06be8f49a282acc10a8e034e9d566364afcafadc3c60eebaae1a2d081c70b25d3ada6ca115d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6cb4cd94ae3af4768c2f23f03342736
SHA1c04c1995446408b326e0029a199e4ef3e92b96b7
SHA2568ed4a40e1b1bf8a3ffef3880933940bcef8d80ff36fa778487adfa1db6fe9fc4
SHA5126ecc76227f68005bd88e84997c1125294fadf8b1468c0041093e0b9f256c24eccb6e3f0693e71d672cab83f9e11b657c42983998423907d9c592b0f34d3d9fb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58226b8e5e170d30178c6ea5aa6ee6b21
SHA15bd863dcac0f6c6c1c5c5af8fd8a9b4c039ea0d9
SHA25601d884c67762759ce0dc2da8e479f7032e568ab86adbc6db7f8fdb0b63947417
SHA51238bad4d4beaf80552a8d442a93ee5cc8e48f6ae0be321be9643c5d0eb9cdaa7026b9ca13706a498eb86d4b445408c4aa09d3532dde21867336cbcae763a1f508
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b