Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
11/06/2024, 04:49
Static task
static1
Behavioral task
behavioral1
Sample
9d062ba01be30b51214c4939b91abe7c_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
9d062ba01be30b51214c4939b91abe7c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
9d062ba01be30b51214c4939b91abe7c_JaffaCakes118.html
-
Size
19KB
-
MD5
9d062ba01be30b51214c4939b91abe7c
-
SHA1
ec5667fc7a2c2331b72257498319115f452059b8
-
SHA256
60bffa245b9552c0380089b9851209a71df70e80a20ef604eda47c97e63c5993
-
SHA512
6d8f8600c333be136b9c6ef1608537f8cd701605fa744ff26f1ee9518c327accfd7738eabf8b992b967eb53fa9033b3d06ca7a3414b7d52df4d888272a9dd9b5
-
SSDEEP
192:uwryb5nLYd/nQjxn5Q/7nQieyNn3nQOkEntdhnQTbnVnQmSgHMBSqnYnQ5nNnlnK:IQ/6qZLS
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0B8F1571-27AE-11EF-8554-DE288D05BF47} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424243262" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2036 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2036 iexplore.exe 2036 iexplore.exe 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2036 wrote to memory of 2744 2036 iexplore.exe 28 PID 2036 wrote to memory of 2744 2036 iexplore.exe 28 PID 2036 wrote to memory of 2744 2036 iexplore.exe 28 PID 2036 wrote to memory of 2744 2036 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9d062ba01be30b51214c4939b91abe7c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2036 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c7955638dbe3cd094bb7c0d93e8f01a
SHA159b35d1fc81c39b911ccd346b20d2a1d52ec7f93
SHA25671087dddec9a0fc7c9ac867c333477d0e0ca74ca6c26b771e6d41749dc2aa568
SHA51240eb6a7b9ebeffdf50d6ae8b489803573735b6bda09095e252bc53729ef305371224c4ae8beec7a3de778f1ac60e610ab7453adad057212d7ead1e850dd256e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574f03742fa008dfa84d6224f1a7b1389
SHA18971e03067a20c39832682ba3fbe64308e9a2ef3
SHA256b859731c6355c35eb8b7965f14aa569fd018c18566ed1a6471dc31b00ae290b5
SHA5126206250e03c13c8d9e917afda07a71dbdfb2adca73a9e97cf7d584447ecd69752d2694cfbc1fd02204869b0cbbcbeeeda92729b2bf7f608bd3792e16b2a3d8a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e232bb4a3a7e12d4ddc4e95b97e43257
SHA1574f4ac3d0a9f1fb84b99b5e08a336f9714040e9
SHA256be330e1bb207856d2e9037d61e8fb99a108487a169e98e552e74669efd78d2c2
SHA5127fe48425614c9e536d19ffa3db2ca6d5a229bd56d8a428c9ea842d4be7fc18e94c460c2250c5409b6d393dd10795c13c3634aec97198c1e3ad1a76cb16e22920
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5a5bbe78ca31a809ee8dd601afc1c6c
SHA15c3589c690742deb887ed0b673fe7db3ffcc23d3
SHA256fd9b26657a81f1dcb0303d1c090f1ab9b56f19fe084a0effc8b161c6421fb09f
SHA51267149409f45a1209a4201ca65f0c8f5e267eccc64b65c8dd6e5f8b7f3a73e6142f84b12b4f204c566ebe05c127c55a5a17551637161c7d0ebd171a10a8fe884f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547ecad8e91daea5199bf194461813af8
SHA107c5aeadfb07db9082e5610c2c230252444c7254
SHA25649c0ab42158768fe79f284575122672e43711509b52bf84225ea0a4dc95b0825
SHA5120d5dc15da6ece87395cb2b34249570a455ba61a6dfc97655628ff5980343a2805947f853a0a671d6852f3e6c0d91e4b4895ab1e1034ac443da31ea7561959f31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5357d49901271390d4c8cf04f4bc96c98
SHA110893ca816dd9d45d084938ab48cf33c065cecef
SHA256352f7b321abcd405a05a0fdedf64eb9ba8574dd4dc812079f256d437b67253d7
SHA5122487fff42a1c74d22a035915382ce653ee157aa48076a417388d5db7b395aec9cb5dd81d5c1114d5f58500e65fe3eaeac50fe77b54c30cf82e8db918a4d7ff92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbe42d0cafe616e4d444b3523649151e
SHA16e1655a1a25bce2dd4f5ed328fea714955b2e5a1
SHA2568af3ae09558fb5aa92dc25fdbf2d7517295fa71d9ddf0e4a625155e97d8ef936
SHA512790899a33b5af7d797095aab2a0a7871479a24dc0a7539cbe1f5d4a2b10a3ccb4b9271d001c7f811cb3bceb5563032f1cecee9b4bd8c34102ad387c85da4815b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5515e133db1cbc2e1a0225e1dec4a7e24
SHA166ae81e3e352fe02ad0540916e7e3e35dca94461
SHA2560c91259291d14f1187b35096f9717d89fd2149b31f4c3ab41c3390e7d3476aa9
SHA5120c02d6ac92427d46f6b98f876f96562972d88a35a6ca4be73e2e367328ec2bc703c256041609ef30c32d643c7e41735f38e1f1ad5d641381bbc8ffb094f42586
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b66db4513787d4eaefd5cef3fd20dcef
SHA1cb49837f301507a00023ddf4daf4c6f652bf8707
SHA2561ad24a558614f78822cb4a47856f5cc80a3618c2748e3ae20d60756d09b76c72
SHA5121ac960ef425fa09781a5c6439ad682577501e88721b40a41e75ec8ffc3f2b91dca5aa2e9c12ef563ff12abba480aefa1c219c764718060c2c526a0f4a6775009
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b