Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/06/2024, 16:08
Static task
static1
Behavioral task
behavioral1
Sample
9b4166d9bde430fec392fad080145c5f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9b4166d9bde430fec392fad080145c5f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
9b4166d9bde430fec392fad080145c5f_JaffaCakes118.html
-
Size
23KB
-
MD5
9b4166d9bde430fec392fad080145c5f
-
SHA1
0ce8d3b3b300e9cacac3cc72e65d0fb3b03d86bf
-
SHA256
fb4de5da6b9c4e1a8314e763185e14ffa2f7543f76781d8fb24867de6de5b7a7
-
SHA512
2b700b2cd60243eaa7e5e66c9cc1f37b7e61e4480af8aa4ff0b23faf1911b23bdf380c1e79c5063555f6d55ffce0b35130d0cf4fbf3d892e80bf3ebd74553008
-
SSDEEP
192:uWTsb5n7Y9onQjxn5Q/XnQiemNnMnQOkEnttRnQTbnxnQkCnQtMwMBGqnYnQ7tnU:fQ/um
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AC9F4D61-2743-11EF-ACCC-D20227E6D795} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424197578" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1784 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1784 iexplore.exe 1784 iexplore.exe 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1784 wrote to memory of 2056 1784 iexplore.exe 28 PID 1784 wrote to memory of 2056 1784 iexplore.exe 28 PID 1784 wrote to memory of 2056 1784 iexplore.exe 28 PID 1784 wrote to memory of 2056 1784 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9b4166d9bde430fec392fad080145c5f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1784 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54716cf04de3282d3096866909f862b89
SHA118bef6ed55923002b65e23b9c3dca551779ffec0
SHA25660e8daa7dc6561e40160f00356058bf1c3a495d288a2215f7b76eb3825e08bf9
SHA5128d2c1012ff7fba6865c2896ae9bc6d1ab7fa2fb2586441cbac680bd25a69ac8b7e5aa8e468570db8b9f88f8c6f4cc333e41fc08e4eda1b237aeac01d7aa1f7ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b87be1d0e94eab2caabd0458368ac79
SHA1f40fc748ec0d171d437f98a87281b5148290af6e
SHA2562a75638ec7aace05eb06c10de6407492d2d67e928140ad51f9df7d7bcb4192cb
SHA5123f1e2ada3b15e41d49ea9bbd014f916cae82211db6e4ad314d1b67cd9b7131d56699af522c6178f683a5c15a4fd22651ddc3bc5196356ec48796c80b85055ecb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5450707f9041e3b0e447cbd65a4678e14
SHA1782f8fdba54de9ae05cf6fa99168e6391be49a50
SHA2567727443947ffcc4ffc99d43192909acf8f4c1ba22d0d5c596154c42fd3b2eeb5
SHA51261d5413e65e1901b6480517f25bdacac5e52930874e595b1bd73fb18a7e87593f2e73b498929fd1306de45d95b79c8ea061c047f90d3f1906387e7bb3360048c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d0a61dad020e3566db8c2ed17b66338
SHA1f837217f1aca406f9596fa61a159dcfa5b9f9f8f
SHA2567c0be100328395db469d5464a45f696d8a958fbc33df733cb32a8d3717ab16db
SHA512feebeea142e7409053eae7da929e0ba75e421613efab8f40205e35135c769b60cafed8feeab711882b171e2c6c18f7835353a31312f70f405017bc50c4e50ad1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503dd69bfe21d8fbb95eac7f343c5a22f
SHA126ca369cf5b7ef133e7c31842726d812fbcf27af
SHA256ba4eb51eb54e0aecedc5a4526f5e3e2b04e11bf42c9f86d6a753e809edd464a9
SHA5124f7795e14646d8b23c54da5eb1599b35412715ff4fbc32207ffce5bbec836ae59ff21f0b6781d629111febe4d53c43d2f17df32c2216cdc5153e7ed31b197e8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf75ed12c838bae29f8a3684c4c36beb
SHA117704ba6d0dff438e1b6c012fe7426d16dcc554f
SHA2566712e26e80d6471acc5e86c061546c069191b4559d4c7a76f303497aaf8f7891
SHA512a2268a336eac0ac76286dc90d71159a8a162f31a37c26ef227b7a44231bc4d7bbe432af82b58e1739b2e54c20327e34b1f2e3cefbdb3e46a20188398deb8ac3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558321a63555f97d8ea3203c9fac7f9d0
SHA14722683b6825ffd50e6f6bc07fa50e221e1c9c40
SHA25690f43a17344e4744ba9a10051e54a5d055e946a7a6f2bcd0cbdd0c71f13016eb
SHA5129f92707745d8e4a54d4e247e77560e318f3d111208fa674a422dbc147cc92437332bdf74a5b576f12f9407b083b822732552b905af8d2a385914d72a0f0dedb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c17650992546307bdf045e6fad5ed727
SHA1402fc7b9241ea042cff89b263222b28d76ef366a
SHA2566dd502790623b98f76ddd31b38cab52098ed0981baa95cf3c7da92b39f95276a
SHA512967d4682793a562ec83bbaca935559dcb58f3dea304ba55e94f52c44358a4405037e2929a00362d7ea47b7f055c474300026c223d528f7eb32e909e1612afc55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50878784b7c8fda1d646b70b045d28236
SHA1dad52d4b8f71e8c96f0f56ff774c1839d97db60d
SHA2562fa22112ae36be450f1431f96ee75eac9ee7b669a3255e66a2a0fbafa9048456
SHA51273fc1085726fa64a2d6be72c68c48d704fe86c0e87aed251e7b660f35a996515914b619cd05d03d7651ea4c454c28296ef95bad2d5ceaf27fa780c31c2fc36d6
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b