Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
12/06/2024, 16:21
Static task
static1
Behavioral task
behavioral1
Sample
a14f1d0b043ed6c3427a2efa094b4976_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a14f1d0b043ed6c3427a2efa094b4976_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a14f1d0b043ed6c3427a2efa094b4976_JaffaCakes118.html
-
Size
20KB
-
MD5
a14f1d0b043ed6c3427a2efa094b4976
-
SHA1
e51bd59fd1cef2881eddd3c026c14e695515c621
-
SHA256
29aef2f2aaa56dafaa7348eedf129cdf5653525500f4a0f699d70c60edb69ce2
-
SHA512
b593b72e5887a735f4aeacfe7886ed917b9c2ba6542b136850a6c2ab1acc9950c67a7ac50d144ecb735e33522beefa29a72d267c1c165e17739d87a392b10cb9
-
SSDEEP
192:uWj7b5nTSnQjxn5Q/PnQie2NnFnQOkEntRVnQTbn1nQvCnQt0wMBWqnYnQ5TNnlP:hQ/WKI
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424371179" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DF469801-28D7-11EF-A155-FAD28091DCF5} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2316 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2316 iexplore.exe 2316 iexplore.exe 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2316 wrote to memory of 1964 2316 iexplore.exe 28 PID 2316 wrote to memory of 1964 2316 iexplore.exe 28 PID 2316 wrote to memory of 1964 2316 iexplore.exe 28 PID 2316 wrote to memory of 1964 2316 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a14f1d0b043ed6c3427a2efa094b4976_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2316 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5915865154591cfdd2d0b4a34c604aebf
SHA1dc7e309d8ac9c51e8d4521a0fdb249993dc71d5d
SHA256036b485233ef5097626617eb4841a24ade69922594b2326b3892c53e3673aee8
SHA512c7b31d9349d2f51a4aee229cc2c500c4a15d967b4b257387f7263855c41232dc6d5679f3a05fc63d7fad03b466bf3dd14ef5f66098b0fb4c82d484ce5d034d6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5064a89ddd20c227b3dd78b224f1bd909
SHA1fedf681cc1bc8e60a1a34885cce4edd66a8d17c9
SHA256e0bbe19fa917fae69bcd90c31045f74a3603f0672ebe2c1eb37840596eb5aa6e
SHA5124bccd32b34c0776bb3e71dbe08b36cda3677acae427485dcc1492cc23ece6d74ac955627a81edbb7f0c4e0ef7cfbad307f42c4c05ef72b4f0705e0f4bad42cc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5687cc0e2d05e6ead6743884a5d51b6ef
SHA1104d6c925a19962e400e8b9e99349e8eeacbd747
SHA2569fd433c9d6ca136a8fd59810a88e44cca66d5eaf3136f2411f692c42f27639a8
SHA512241d413632f99cd90bfb697e0938384ffa1bd453ccd518fd7860ba1f230e46cfeb56f328c8a1e2ad15bc250d0f9317bc933dfa75187795f881356871650d9704
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dd4d850c0cf658fdf2d36f3918d3e71
SHA184aabb82b2b6aa6a77173d28e98dc35806753342
SHA25624777ce1816ee273234640118d515ea42c924d95c22cf823b85c03dd50b3271a
SHA512e16056bae18a5bbccbd744667e7b33740422d5d39fa064e1d84921dadb92a2b5c324f25f84133d50a62dcebe73ecd0d7b8b414cfa9a294ed74bbab7e23a51f72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9b4c9056544c401e07033ad9db81bd0
SHA113f91ce83e931a54698006c031375aaa73b62394
SHA256a24338006bde1f76c002621ff0528b759b8adcbc81a3dec01047ef0d248776c7
SHA512efacbaaf1a70a377d139426b518c7783b81c3de95042f3be463536edfd7c51d8058170d78a4b26d453adc7b4c1024c1dcf7aeb9615b6b88aa6caa7da74058c81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53706009c33e8c95df35681dd196bb03d
SHA11fdcda9d909a8c6e57475b6d3bcd1a2edcad5267
SHA2567b97eeb459404fd8b1fd99416498062959aa4926a3fdf6147d35e192e329bf54
SHA51247697f592c14b17c4e4eb65cfa86b9955237ffc80289750455e9bbaafd302fec8211db83c7c524f99190f25d54b10ddbf44c962947ce9be15e2f1a8c9b8bb114
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ac79b46200922e8619decff39bd442b
SHA1821e9340fc0da23e63ec211addfdd94398f4b906
SHA256c67cb1351810d4fee37927a2add09dd16d6d40aa2467500d2a7a054fd7ca8912
SHA51280104fa1e6a284d85fbceb5c6f5f06ef6238b0c0392543a6293ab4510c32436bef5ab5eac61f50ea597a0ca9461d4c64127aef91a262ad04d310768ca9c392e6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b