Analysis
-
max time kernel
148s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
13/06/2024, 07:12
Static task
static1
Behavioral task
behavioral1
Sample
a45dd2902a88036669f3dec56cc10c97_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
a45dd2902a88036669f3dec56cc10c97_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a45dd2902a88036669f3dec56cc10c97_JaffaCakes118.html
-
Size
214KB
-
MD5
a45dd2902a88036669f3dec56cc10c97
-
SHA1
12d2dc85e46a5e8041a7b5c2d910ebdf418a3216
-
SHA256
66fb0d7eb50cc2b0e5c55aaf1bb8dca661bcad98743130e8833bfea792c3d6b2
-
SHA512
e19181d2cf8a509681be622f09bcec6e38777c8eb6b795c6e94f9e8249b744833984b1e416428cdf6399487e20f191e4a462ab0e9fbd366d47249ba4237208c2
-
SSDEEP
3072:jrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJS:nz9VxLY7iAVLTBQJlS
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424424620" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4D67C261-2954-11EF-932B-4E2C21FEB07B} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2332 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2332 iexplore.exe 2332 iexplore.exe 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2332 wrote to memory of 3028 2332 iexplore.exe 28 PID 2332 wrote to memory of 3028 2332 iexplore.exe 28 PID 2332 wrote to memory of 3028 2332 iexplore.exe 28 PID 2332 wrote to memory of 3028 2332 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a45dd2902a88036669f3dec56cc10c97_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2332 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD54999bf1aa6a69e7686d499dd7fea7973
SHA1e27ac5d215152b06f28ac202466d9c37cab6c7ef
SHA2563fcfbb1c241b56a52bac5c0254e57d076c8d76cddfc847ddefca3ee0aa2571d6
SHA512dc58cfad82775dad420ffd0759c46c7ce3805f0f19a7167acee61b38e5bbd243d5abec1e2043f3985bf8b384974398f7a26b3fe8b8cdcb429069b68d80736256
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1233d16cf4229597d86b08f9efbdc6a
SHA113a6be6cfd9ab38952f8ea5e24e596f0b3b25855
SHA2568c1a0dfd96e5fda29695c39cf7c4080dad84d43fc385315ef09a101e0b6ffbfb
SHA512841b44435c5b7d2d4dd54b30ae6f4956142247af175812855da5445b4bf36a804f1347cb512a5ba0f2af2f3481db30a85650e811bdab25f45359164092518633
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f3f5ee3f333b17aa4af8849d7fbeb3a
SHA19accebaceda6957426e38781871d17561d1afec0
SHA25671a7bbb11ca874791baf78e359fc70e640c37f90b72cc9e5b39b65b81efde5c4
SHA5120da178b7922660771b6858d0cdc3ee96d9f228bfebfbe51970e92e4be719649a36e406a6c46bfe353a833f14a6506f4961b1419bbea2d4648640f3a3809410c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e64b8ee932947948fb90bf52c33c3b9
SHA1abf7359521423350a0afe48d8e6f629a779fc560
SHA256aae76d44880deea525da43d989bc2684476f668d094dc53de3fe13d38c71d651
SHA512e314076b9239b4c3fc0a9ae333e77796c680ab92dfde03b3f032624e40d29bb0a0dc744cf4d2fc908da075e24d6cd52ce3857a484b791821f532ddda65a598b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fb8b5aeba0bd3e70e729fe70bee3ffb
SHA1f73d3c6b7a4defe8a9c24b434fbc46c652c8c921
SHA2563e5fef69f66e395629022f69da33b1b89213c26228cead44c116966fa39ae4f8
SHA51233db332ee609248f51c6e8e5b0168c07f1f013bfa619ce760db293357438508045b830db6577bc345ecec92f22671b39331de7ef119937dd227e72c20651f0bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8f263056b23d0f0e4b5e2bb6e915aef
SHA1c764ba4b17f9e843a22c8d4dcb8bafeb01e0c47f
SHA256df63a03cec884c2ab4c57e19c3d6f1f92ce24727e6574826305a81b04d0912b9
SHA512d010211ad6259d508a9aa25efff03027b2c39835ef8976d7382659b15f95e34233b0a8742e582a4a9a8495eae983aca72e362c188bb8a46c178a4a4db493f09f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577ced0d7d95d22dabbd3953b16dd35aa
SHA19da11312c0651a8fc28c3fe50918db420a2a4d2b
SHA256b66256639ebfa85a133cab0ffa0d6215f2a602e7f9a7bdf4e12c330a7c4e1150
SHA5129e684afa1d517d6f70448fba65f7421eb65d407cbe20fe64bc46842c1f8d8016d1b0c2d560914a5f955d229403feadff046168f8216a49553bca0175e7fdc609
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dde017bf8b83decd55ff848eb643058b
SHA175eca77e194c0ce2fcaf112c87d8360829aabe4d
SHA2560341e2bd7ff6caeba3a5308423311a261698cfdeda77c5f87826f394b12a349f
SHA51236de2e105a9a36d5901dfc749f85f88d2270663135e3c694fd938e3b7c87920f9270757f49b27f60aa4b549ae1a77844e135372e5f7eede63b5263d812e88c42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a3bac912c9f362f2eb0d8438ad0ed3e
SHA1e6ebb2298f7d430f3a08933c6efdd90d30c9dbbe
SHA2566ca19329060f03abd7bc694c4a4507481f4df9e8d5180988ac22a430de63b76b
SHA5125ad693770f535cb7f5e25635168d081650036aca4d25a9e493d3d4609a174b09ce2a48940248ddd6bd50161a443228ced39fcb1977ed654cd3c14297def58c3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e32a1f29cf62981b92bcd45331c28901
SHA1579b61dc531923ee11ebf186128f6c522f42c3d4
SHA2568f060d93fc818196dad61c194870f23fdb300d0f36cb942bfd2a5cb957aab5a7
SHA512433505a527860e276eb0a3e901139b3f0d7ee52470e1fa33a8c8125d297330713b78ddbe87b9347ccfe54e26b9324f3e556168f7b86cdadc63a3d862f7c60b4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5139960218b2636b87fc6e571306c9fa8
SHA1018fc58d76ff101c9533f00638d006a664e64e59
SHA256aa0a24e83865eaf1f2a65187b78c0310b98797744ea1e378143432c925982080
SHA51220e3f24e388fcd8687f3e042450da5f7dddc60f71b7dce5f88b038efca307fce135473575ab8fccf1085253db1a383170d90a5037ab9fdc4227705bb2e48a736
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b