Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12/06/2024, 17:07
Static task
static1
Behavioral task
behavioral1
Sample
a170ac72189af04e4c212933a7173f1f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a170ac72189af04e4c212933a7173f1f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a170ac72189af04e4c212933a7173f1f_JaffaCakes118.html
-
Size
23KB
-
MD5
a170ac72189af04e4c212933a7173f1f
-
SHA1
a092e4625dc1ea5b2f20d1a3e23c57a1dbb5ab9f
-
SHA256
6d6b624a6db324926d719e26017e36656e0d38ac11481ebe378a363f3533c885
-
SHA512
47db3ce6059b59e022a586dee761ca37e6a523050c7b01fb6c9767416fc8433272a8900889e9206972525ea02c7888c8b93e39776935fdd83a8fd0334cb38047
-
SSDEEP
384:WsisWsBsfsUsYsZsZsws9s+sasOsWsJs8shsrsCspstsNQ/Bsxsw2s22sLshsnsU:5V5mknb++zihNx5uPGg1OS7WwZ2ZAGsU
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{41440BE1-28DE-11EF-93CC-729E5AF85804} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424373920" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1632 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1632 iexplore.exe 1632 iexplore.exe 1804 IEXPLORE.EXE 1804 IEXPLORE.EXE 1804 IEXPLORE.EXE 1804 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1632 wrote to memory of 1804 1632 iexplore.exe 28 PID 1632 wrote to memory of 1804 1632 iexplore.exe 28 PID 1632 wrote to memory of 1804 1632 iexplore.exe 28 PID 1632 wrote to memory of 1804 1632 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a170ac72189af04e4c212933a7173f1f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1632 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558d9263ed8a1deaf4a7e6f7620e35aef
SHA1959b89a4a8830ec9f2526ff0a52b9d5daa219053
SHA256fa138e35217ae59e7ef0aa1e4b95dde22c12cf2a7010b5dd3459ca962ddb9e8f
SHA512e7fe2b2ca39d503e55c3284756940b8826f0a3f5268bda1db183de212a64d56375162b7e8f78d817d0bd9bcd6ca52390fb5f9dcd07e75a98c381f5c34cf53b2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfd349edee83387fb37fcdb33e6f6c12
SHA1cdfeb0aca997132bf214f68fe43e6ed12ac30a58
SHA256f6c68ac304e82571811162c925c6c514d2c6dfbf3d9928d49393aaa71a937590
SHA5125a2483fc190ac5aa7d1be065b0ae24231bd586b3b0223ce354107895a2dea24f74f38dc847bf6cea307e888144373ff0f908abdf6827a8552145965d2a638876
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d220dfd5748e155982fd69b681d1dcde
SHA1d45ad6e7e64b7683bbe27885eb8fe5c1509c1054
SHA2566146e45f68cc3d8a3ca6d6f5e075cb37b6e8949051c8434756a8d8ee228e99d2
SHA5128e06b0b92e12b343393d34dca57c99511066426da2d15ad903598aa8bbb97c3f300798afa9c08311f9294da40eb1264b71b11000262d4c62d6604937e5648bba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1486d38179d1a69d29e0cba2d5424ef
SHA1b655cf60254afaad7d04617c9cc5b7453a857548
SHA256089f7a5dc6977ab527f6934fed439131d979c8ed1ace6256406b8be9017e9378
SHA512c2af7dc2eae386c0ed04d1b03a84accabbc6a5a58d889ea9b6bd4a71daa591ff09b65ae73ed780f26550fbab1ffa04bf4a983c148857f22aac224a7b75b1609d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2062da44801d1632ddd9bca1ea797d5
SHA13f0f14bbd4edf8084a7c2efe42d426c8ab25f8c1
SHA2564743bd59aebc0571d681e067ea890968b115197eb5280eca5e52646cd83d252c
SHA5122f7114ba990f4ecf5547d27697935602b9ce1dc7d7cb1ab6687812350e5cd36a88eabbf1361ff80d8624e61bbfa559e34c1a1bbfb0f836a33a86c3e517cdb81a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aada122d6c12841fed9991af25911d1a
SHA184924a1ea6214ccf767e582e97e1805f0dc7ecde
SHA2564f3c44e1032ebff84fac21932aa992daa7fe2cb18518ecb8cc81dc17378b6bf8
SHA51220d80850248452c21b91ae3d6e6febd605212e494d80e80468426232ce998a69c76d2359ef683f5c73b41d2e614a0e166e4eda866c54c7d88e7e5c7e877f7058
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565b4fb810a03df8732a7eb2ed1d43ab2
SHA16b6a23849d73120a61af7a70d0e7d327a18f940b
SHA256c6e3e9b4ee9380a8d8329bb06f878b24d7653a538bcd07db705ad151bf7d3118
SHA512c29cf1fe4a70cf476fa9b33c947343b194f14f3beab02d56399a4c99329f590fc6e69beb38f5105aa083edede8413e3c64786feed78c7bb2b95882987b8db1f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ebe6fd2acea3e8937ec53357f14d547
SHA106a2ea25c5cd84e07c232f75d730f1cdc8613e58
SHA256a30083406778e4d3c3a8c13d3e573597a483c2da2b25175cd787a5dd0fa0562c
SHA512ff77dae97625c9b6fee51d75990019fdda8aaf01cf390b615161253fdad0936f14f8aec3c9f56877ff4e9f30b5dbc030dce9e73e7474a36dd8a973da5f36e773
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb0ddec2827f60007a5dc66ac56d333e
SHA10c174d72682b7f9eb6408624e77275ffe2fb770b
SHA256f740764329667699b4ad4666257e86fdead66440075c74b237dd6e6c99c8599a
SHA512da3e3c8855e511e2ceb7c6bc16aba393d2e54af006fbd67048670dc915ea3f1fe8aadf02147541795298700aaac98612c618e7171b0fd9c5257bc894b6a795ff
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b