Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
13/06/2024, 14:34
Static task
static1
Behavioral task
behavioral1
Sample
a60bac3ea51a0dfa1b1c06f63b3d52b5_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a60bac3ea51a0dfa1b1c06f63b3d52b5_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a60bac3ea51a0dfa1b1c06f63b3d52b5_JaffaCakes118.html
-
Size
23KB
-
MD5
a60bac3ea51a0dfa1b1c06f63b3d52b5
-
SHA1
3e29078f0e9690103d124f752b32605dde308ee6
-
SHA256
2d009bb7931eba7ea53dfc9283e2f133064910060f79f9e3a03a142997de21f5
-
SHA512
b109b7329fe662d30c1790181c38ddf284decb6ae528020cb082317177aff7b7658c57bf6f1c3e3bbe26053470ca65c945c90aad21f438d88b556dc9339e486b
-
SSDEEP
192:uWPMb5nsanQjxn5Q/HnQieWNn7nQOkEnt5JnQTbnlnQ4CnQtcwMB2qnYnQ7tnOYA:JQ/jUy2
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424451117" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FECAA991-2991-11EF-A5A7-5A32F786089A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2968 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2968 iexplore.exe 2968 iexplore.exe 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2968 wrote to memory of 2668 2968 iexplore.exe 28 PID 2968 wrote to memory of 2668 2968 iexplore.exe 28 PID 2968 wrote to memory of 2668 2968 iexplore.exe 28 PID 2968 wrote to memory of 2668 2968 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a60bac3ea51a0dfa1b1c06f63b3d52b5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2968 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ffbda4b4dac2c2fa22b9b9b5f186afb
SHA1d5da148ff973df935fc56a33553bc777f7058999
SHA256420a6141bcf3fe9145aa9ed2a8851ef401bd4bacbb3244df1908c838aee60564
SHA5123f4f48b4cbc78cd76f2c088688b896d2873860e30e844ee5d6d97ae3faeb69bb4fc7168f24d889dbc6f3f9bbeb912e189b513269a38aecbc58aa8b6d4d7b657d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f1c5d9e01f7f871b7ce9ed9bc84ade5
SHA1df516dcf1d95c68e8e6d84558a79749852854aee
SHA256196d6dfc94c29ea976ebe5ebadce7b5bd3ed0b48ac6c4ee6e70c3794d16eb58c
SHA512eadd2e53a556698d54fd0d594631509d4b1d9df81bcf7956379db0e29f613d572c7a1fc04ba7aac1cbfbc94c86dcf7900d4fe486da7e8c34589c1c84c15d81ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b4ddb6977165362e6f19e6793ccf43b
SHA19c8bd7aa5b9441631047b2880a053063e7c9cca2
SHA256cf0e55937f91fb359acd8e483736a4ed55d9d5412e0d9b4a977458fe1963bd9b
SHA512c002cf211b479009aedee5178de23100d0e0ffb8f6420c1e9a250b8bd3712f222d205d77b060952a6791bd902261a54820dd6f748c0887daa933f63d02e80523
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cd6f5507e4049fbd9e2866511c8696c
SHA167ff268f02654c7c6a5c4b8e1503d5873dd547d1
SHA25646316f4ee4c8cca78b7befc248207d787c8a37d327a4c25a275bd99a1ea0431f
SHA51246fbaf0c7ff0052fe8f32ff89e27e3b2d810fa1f8d69ae7a8352e7a06f3b415b73f46730626ba68d280a4971eee3bf395a576a3fe7fb887186058c06b5c7db85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545a8e90fb4ba5fc25ddd8348b75ea7c6
SHA18685e1a73d90f29e8f229c381efc58084c1d383f
SHA256e43c8a37e3597cd8c4f19fc21c7d7273ef5902f2237a7669c00e436f21723589
SHA51256b24b0691b8c9554457bc9ffc74184e34c0cd48dc2abe0eee02075ead6bcd6d6d191db05bb29ecc92b33e1b7605056d22f6a3f8be687240ad9c48e90f738aeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5da6141e8be4a9557862c27e59f5dfd
SHA16650012f490b02750ec90c68e003e6db54abd5cc
SHA2560d91a7e0ffbfb2be3098b4264919904f8275f67e01ebfe8c3840506cb5e2fe5a
SHA512334c11e2b6b3539738de3e21b108d340c7a802455e23264501263cf1743626ad5d23afa4e5b72479a3343f327a891b0a23158d634c7a9bbef7e8a97ff8a68b6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c570afcc1aaf6055a4d68de61067fe17
SHA140d17b7e49466fc44df50b5362b8defa8493d47a
SHA256f27202b0519383d73fe94c2b7c8862c94e1a445c0ab18dac7621e7860ee8ae50
SHA5123c172bbf09bb221ae824160958b0005a5fba4ad933bbe04f552789bfae8395c2daa60539356d9aeb12655927862e80f650313e46aaa1a7dcbd6c4712c738f2ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bbdb06f9f1cf7bf12635f6d04a49246
SHA17ca8b543264db683228d151f8444073468479564
SHA25650f5ab1aedd1ce90f44b90d4c5e6dc469e180f2cb26fd377d0e5e1c0dcbc2f3d
SHA5126b2c42e0208ffbe4c3f1077ad517f4d2a9bfa097cc759eeb129c648b5cfaa2121a4fa744a2a8beae24026ebabead7839f432d21489033d0747a9046ac89b0da6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565a7f75220bd3ac731d126d07ebf3f78
SHA1bd0c1518619f40faad39acd5b2bf5c0f5ed66ed9
SHA256abee0e81a1befdb445146dcbcd0a1c3e0f0a0dfc2196303a4cf4b7f7ad7e35cc
SHA512f88e60ca2644cf7508ae97489de0c60b3d0ab8f1a7f99482a33c2ec3150f2ec7c7e21f5e47d843291028884e8e18b8d4e95b6a49efa0ee98eb7f1a00190b2fa1
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b