Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
12/06/2024, 21:19
Static task
static1
Behavioral task
behavioral1
Sample
a26b8796329107a0bd1c1a96cc45e488_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a26b8796329107a0bd1c1a96cc45e488_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a26b8796329107a0bd1c1a96cc45e488_JaffaCakes118.html
-
Size
34KB
-
MD5
a26b8796329107a0bd1c1a96cc45e488
-
SHA1
58a9cd834874e7d44e9ce1e303d042c2fd5d6b7f
-
SHA256
e040508562d0295e547c76e8c9adb89102e18349f7b51b329cde148dd953e94c
-
SHA512
a4f5b6de11a975c755ba62a36e64caf7ab533746b883cec790bd9b70b1678e70864c2c5686d09ee53840d0d70c10fb3277ac17f716567abd87cf290f6d627408
-
SSDEEP
192:uwPAb5n06nQjxn5Q/3nQieWNnMnQOkEntxZnQTbn1nQOg7cwqYWcwqYGcwqYQ0id:5Q/PrOs50i6V2MZDPPUd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424389041" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{75E5B831-2901-11EF-A1F0-7EE57A38E3C7} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3032 iexplore.exe 3032 iexplore.exe 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2908 3032 iexplore.exe 28 PID 3032 wrote to memory of 2908 3032 iexplore.exe 28 PID 3032 wrote to memory of 2908 3032 iexplore.exe 28 PID 3032 wrote to memory of 2908 3032 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a26b8796329107a0bd1c1a96cc45e488_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3032 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cba1b11160be15f183437f088f9f840
SHA1a581e19ab627e4284585cf19d28bb80ceae0d6c4
SHA256323c9742f8278eafe06be3e5d4463f4542535ae029bd67119106378d075fb080
SHA5123e6799c46de7bef45e4d4de966159a04e78889cda9a28b8db171f12362bba70722841e28454bcc3c1d7b8eabb143c695d329d0d610833e7f8db12d53df21a903
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5834e2b950ec31db5308a6a9fb7e4e0e9
SHA1505a61ca6c52ab3298879d4ee38e84f73abf4758
SHA256794e817710b85e636a45b5159b436e8f8f69b4c5c2f2acdc8092eb302ee8ad1f
SHA512282c62c618b8f9549888461372e08592aa806471888a08cbb01fafc84da4ff17d77015b9cc1030049de89ec0bdbd1b960209b1c8d163b18a43e8e77287aa5fba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ccf5dc13db4b8b22bd35cc017852fd9
SHA1e45f4bbd5b2cf06fc3e442a74f324705e9114ed7
SHA256ea59d825cca64a9245ff1b95974295dee7627b9404d6e3e1039c6fcee28bf6cb
SHA512087a210cc101a10fbaa1a3d82da101b6b1bc6e84ee6d518e19feea6bdd7827e52549ea1671447f033cd7477f18857140739de8f7568f7c68ee263efd2126d162
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb249651e37feba5d8c93a5e7e54a1dc
SHA1e772902bab5ee78d0f9fe57714ba8b6941a51a7d
SHA2560ef5edcb0e9abc217698fdb53a90a7dbc725131a08aea4db8a7cc8b3f4e98d5a
SHA51236f17cd8587dcbace1cd030a345dda0a3085a32e04a68abbb49cf4dcb980cf01c1499ac9cd358d833b2679c3698c3084207a881f93030bd067edf9c337bcfb35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afd0bed3ee7ac4aa9b4f6063db23f25d
SHA1a1b727f86a3fd885c9af9b98559cb61a9bddd632
SHA2561304727003b701bd13690c77fb7aab651c0bb6621cb900f36d541b239f85038b
SHA5129f64e105d8131d150864d97ab755e7cab4e040174a99365164f1f772b3184666e60cc5a4a87c851b395eb18cd586d9bd142e7389bd9eafa1272dd5a371f46a5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5110a0593985f8e13a1a5877292028feb
SHA1d356d5d0567c80947003f69853685820b67fc0ef
SHA2560209e8ea25a4a8477473a98b87cfc59925cdca96105346011af9ae72ea1989c8
SHA512cc2bd63b990f66faa0ae827fdc468d175e2234cef9554cda97f234c25a2c562682655a8917efd2014f3c3756265459543d4d425805ba7963a40d779dca1e7742
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5425a109c2aa32f67fcfe0652557d0501
SHA18233feb9724505872a25c22e02ec90587973cd85
SHA2568f7a8b692cd20866f7c57344af84f2782bd6fab655c78ae6dc83c7413e40a0af
SHA5122b6625aeae06260d5f583513de909b6a26a9551082c8331cd149dd083e28ad565dd201477577efa76854463f05696cf0ac2c1aebdb5d647840667c6d4924821e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce8cef1d27d22e78b9181ee83695aecf
SHA1b055045683375a2872df9e4257bb2eba9345e6c7
SHA2566183a5259ec5fb629002d075fa2fb27bb3899aa84b63048d9b8de68e5c1b412b
SHA5128060b61f37fd6be80f58c4ef53be46c32e63b746bf5c2696fa09a47a5f574389f5644d5eeada1d6008ceb721144be407c002cbae52c68d5b261392d57cfea91c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b