Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
12-06-2024 19:53
Static task
static1
Behavioral task
behavioral1
Sample
a21482d975e33611aedcbde9d6138a9b_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a21482d975e33611aedcbde9d6138a9b_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
a21482d975e33611aedcbde9d6138a9b_JaffaCakes118.html
-
Size
29KB
-
MD5
a21482d975e33611aedcbde9d6138a9b
-
SHA1
da8f929651f3268205ad1b9823bac2685582eaaa
-
SHA256
808c8a056220ba8360b211a3e428525d3c9b49740952ccdcfbe03b2132cb3a0d
-
SHA512
8fb4c047b88d1a6386d7e8a25fadb7b731dbdab6a5edcd1a894eb30d63f9e82cd2861bc848e5ea4bf919195f03ddd949514133fef22391a90e38676c5e6a590d
-
SSDEEP
192:uWDWb5ntkAnQjxn5Q/MnQiefNnQnQOkEntMWnQTbn9nQVMCJAYBuz0EA3KSmdHse:ddQ/wPpXl290e8CKOj
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424383909" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{83A4FFF1-28F5-11EF-A499-62A279F6AF31} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2868 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2868 iexplore.exe 2868 iexplore.exe 2496 IEXPLORE.EXE 2496 IEXPLORE.EXE 2496 IEXPLORE.EXE 2496 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2496 2868 iexplore.exe 28 PID 2868 wrote to memory of 2496 2868 iexplore.exe 28 PID 2868 wrote to memory of 2496 2868 iexplore.exe 28 PID 2868 wrote to memory of 2496 2868 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a21482d975e33611aedcbde9d6138a9b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2868 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2496
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a53354c95c8e86b7c841748dedb6c1a
SHA17e7a54d00338179cbe1a16ef35069afb13f34a47
SHA256a636e0c77307d9137a0baadab65012f472d2fc65fff791e00f4bf8f167f1f4a7
SHA512ea93201b4a80c84f1672cc1e2be46f449ddd257c4733ff706bb55b64c1b42ba74f929aaae9ff481fcc4ca09ad7b5378dd8051f6c0939f08ba9000b3b48d88db0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b98666b98fcc27db8be8858c656c8a94
SHA1a2839e9f3934edd3da0cfb95c6ee5e103eb6f0a6
SHA2569d126b1dc0f9b9aca9047b2c2e8a23d688840c7f6bb2077376ebd98960bee30c
SHA5128f0f2c39335c0cfcef7aaa9c25066acdf4afc4ef47550f2d66273fd17d9d0a101e5fd51caa91000d8b24402f36099b5b09342cb35bf435b633206fb2f27638c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd33059daf3560d7fa3efcd16a3082ee
SHA117434b9866fed4bad534fe96ec14bc6c32cda253
SHA256bba41c6e7ae81192698dc131a443f4581484ad1e76a6b93604e2e56faf8d5a1c
SHA51218b442f580c74b26519d1d7526574ae6caad1fc10539a720e22584d716eacf6b67d5c2b1ea6d164c85d5b62e8a48ef1c1cde7b85c41711b6d76c05df2dbd09ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7033c187c1ec8b65224a02ba770258f
SHA173b8798d9a1fcbbca251a841efee4614ed782221
SHA256cebd2a8631ea8a8a5aa7d1de94cac3df5e78c305b2c0dd54ac8ba16df2361cff
SHA5125d729f3a23cf870be69fcf289800e3400f8d1de77824843b29f9f34e2e239139ef6cd9212c60ba50dd3c4e0b46b29218b067d09a35db2266a47de709274d1848
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba7732fde88b92cdda7b171d30ad74fc
SHA179a9b4accfdb941f3f96c823334ff4cd16045c86
SHA256c1f5d9856777d3a7fe3629b81fa9e06e2461ca9586bc2492f439422f7f6b1726
SHA512c4074b45113df75502cea16f7e92d4e3c570e2a01fcf3a7cdb9329d970b62efeeea5a1d61042a4d7a450e0ea769374d00834b11e84e637f88dd757a2c02be72c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567b2155f8d10ab6665c3b595b235106e
SHA1406bb4d6f5998cad395f465be24545474a79dd66
SHA256fdd5ad7a177d5f058c95fa583c3d455ab208cf0adc6ed72e03c079a4bc98bb2e
SHA512266fe9a054248edb880f0cc3579b2b3e1c136bb0e45e7c9b430ad537f2a8a95afed4d5273e9b2b027beae76ee0e198408341fbecaf9801f29c3e04b863412217
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfbe019ce3cb48469470cad22216ef09
SHA189cdd3b5ff054b34669bc97fa22cdc4e67acb45b
SHA256c76aec9c5ae4cf7ac9b924d6b8c6a69979ac232f27436ea68b4663e43ad03d4d
SHA51294a3e00b42afbb417c2145521d3482230a1997e98fcf223e7ab097a5d8487f6b4259cabb88e3e1a15838a5f979724acee48b33b85afe9c9dafb06ce733b1d2c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b946521d9caa016f5d8df93aafbad10
SHA1e2b519a8c2503fe3e758b2c783dc6a6884b96ae3
SHA2560b315f0a3f51bf325b694d4f505a6261a373755ea99a02855f7f01ded8257fa7
SHA51201317be8159ed8c0fb165cfcdb6874c7f222f13b61536d48dd2b219addae95b20c6af1b2f109d640f6a05a856afda8bc667d1a5822b09fb2a2bd85a4e6ba138e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592ec87b368fdb3b610d0875f30aa867a
SHA19f167560848467aac67413005663b8704c16bb18
SHA256628e3b07388fbbebf3c19890e071c47076a0521b26dc7517a323fd249b22def1
SHA512007bd1f37f4e9b2c99aa370ec33e2fe350b3ade5d2cd007723f24750db459ba40dba38f6aebbd24f4b27a3d0f760ea399c5f6481124dbad578079d7e08bd5aca
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b