Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
13/06/2024, 07:27
Static task
static1
Behavioral task
behavioral1
Sample
a46a9c3e8134565009823610c856e03e_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a46a9c3e8134565009823610c856e03e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a46a9c3e8134565009823610c856e03e_JaffaCakes118.html
-
Size
35KB
-
MD5
a46a9c3e8134565009823610c856e03e
-
SHA1
cce459ee36ba9f5a7d43d60a9f9dda45733e0d39
-
SHA256
2a17c6f1852fe5c0e71924b2d06fede27408e5c93a597853dc5cf0950eb2ae3f
-
SHA512
bfec5b99a2d8b2057a137af104d10027bd0e855b7c29e229279abfda7b0596c008b4e1d87986f3075c40e5b1717f256da8d72d208c91b1bd4fa0c2dc51b16942
-
SSDEEP
384:RsqTjOsDRiXYCYsRCBFcnAeOQ/GxFlsTxksRCUFgtCFFYNFs15FP7pFub+Fxe1Fc:+heOjNc9bFXYf
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{56BA87B1-2956-11EF-AB87-5E4DB530A215} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424425497" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2980 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2980 iexplore.exe 2980 iexplore.exe 2588 IEXPLORE.EXE 2588 IEXPLORE.EXE 2588 IEXPLORE.EXE 2588 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2588 2980 iexplore.exe 28 PID 2980 wrote to memory of 2588 2980 iexplore.exe 28 PID 2980 wrote to memory of 2588 2980 iexplore.exe 28 PID 2980 wrote to memory of 2588 2980 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a46a9c3e8134565009823610c856e03e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2980 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547261fa80be57973f7f64f7afd0e26a8
SHA18e34097910331f35628aa5cd0118449e000929b2
SHA256efbc567f8bdcf82c3af018641dd74216c85230a2e4bd162315b561fff838e6c9
SHA512c49ba17c8b38c03adda15fed9774f7c4ed8acf69be9bd217869c9fce8e781814f091b9f6a4ea3e9cc3b495576e2638261cc0360a060cf8a1891b1de8759041ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7fc92aa080f3c6a0886c0f9d0a42b79
SHA148852707dd64f358e804f4ef12b2b9f898d02bf6
SHA25643e9a728d6af182678554c24764208b20f34eef9f6138a53c5b6a018526196e2
SHA512d61d074ef10c97e3c8dd243efb6c68c209a770e77074412df0afb212d8dba8a33c1658dea7c0af89159560ec9f8577f4f55b15cf408c30989aa85a92918a800f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a614cc0c6e2073efe4d3442f233a5ab7
SHA11eb09fe3a82b3eba2bbcb876d6552f2407d1e837
SHA256b9e1e3729c0132125561c4f0fe25f77591eaa3bc60f42a2e4e4f8f4be88841c5
SHA512dddb30461f23ef9c2a7c55f9c910dd490779fa1639143ffec8fe9ab6ff9dd434f3847085b0f03b50de18827611caa0c16e2b5000c33f0950df92d43b5b8130fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a72a711240a0fe531a7d8a06262636d3
SHA1a4eacfc8d6e46006b737dadbc17be5cca3c5160a
SHA256620232a5921f5b0db8c155be3bd8da1b59b44fd51893c7c17a5b388d580c16dd
SHA512047cc41964e3143efe198b9ece0cbfd3fbf3aefd717686819a1c19860164c39dfb6179e966dc3f1aeb4229185c4bfee8b47f2e2c661a8323859bba5c14120e39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d385fef9de29674ec5078aacd8664149
SHA1250fe55e6562ead28193527f56713dfcf3e17afc
SHA25682327adea781d5e09039be158438b3f133be42dd17ba7f4a1d4cc9eaf8da53fa
SHA512ef7f7bdc8c820d7abf0d37606e2b235714fa1bea28503a0ac5bad9720d6a6996e26a7feb84d1de50594aa5aab45fe60dd221ed2895574e859868e971d795483c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac2bb748388dc629f1e8326246902d77
SHA1152aa37e3f926ae3ff0608dbeecea54102b9ca1b
SHA2563f157ab4dba26903265c3ba18c57dfbe98a90d446dbb2f553ba93b85266da283
SHA512102338e5bee8c054fd61e0a568412cb1ec39b609b4427ee0316cc745f10e9deaba9ee930c80d6dc54918b13cd847f18b7bf328d4393042ad515949b69e1a538f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3f29e57fa4a5a5b612d2b7fa4a14191
SHA17536e341ad8418f58abb98434bae607a27d565a6
SHA2568c0768bf32587c080a5e94b2b2560439752659d2adba5ef84f35dd7021c5cfc0
SHA512888d88caa79b15900edd55e9ed3cb33331aaa74373a60acc74b6f0117654ca945649ffcb8b265abc9274cd31ab054d5d2ccbd18dfa20ea17ab289a5f97d5f188
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a39f655ba8cd5da38461fbfeae7926ed
SHA191ce474f303dc60a84d9bcb0eaa8fddb4ffa8425
SHA256844f64293d5bcf98f7d04266dddcdf0f7d1be6be157440f0fe91eeb3eee6f49e
SHA512e71f514ef6a36eebd99f5e90b9e0e2e25d319b5bf394704ac480ccad44fbbbf27c9c4ef97cdd4760dcf567e878ced2659f558fa1ae2689f8b68e0ccfb02ff9f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f8d398ec2c64e16f47d33d3eceea338
SHA104e473d3828615fa0672df5ed08a6d9a7eb9f911
SHA256c35b5d1980cb58aa7afb074d02bfea9bbb952a96c056ac57e91ff493d2e53701
SHA51296ceb6dcc04bef028a69b0b7389f3ba3b86120ae2f791e377ef3b6d9956dbd27e0f7d56c79cfcb8c59cd85abe5d1162fd177a9e7a6fd51c416b36e24293bb7c3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b