Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/06/2024, 15:32
Static task
static1
Behavioral task
behavioral1
Sample
a645766369aa0cc77a86a7153e7ac88b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a645766369aa0cc77a86a7153e7ac88b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a645766369aa0cc77a86a7153e7ac88b_JaffaCakes118.html
-
Size
128KB
-
MD5
a645766369aa0cc77a86a7153e7ac88b
-
SHA1
a850c1f64354ea48f507be57894cff5de2e590b0
-
SHA256
04b8edd10d56d6664af91390cca6ef395e7c375807c3130cfdc0f54d502c0971
-
SHA512
0982034832b2c30a6807a02e1a1268af3c909399d35d73ae119c81cc579ad721e0f0773dafc2ac7cb5385bade03641e6d31f270f6ffd0d952b8e97f3b452fafd
-
SSDEEP
1536:SOgQgImE5eGtoJcyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJA:SOgQgRcyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424454595" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{17D1BB11-299A-11EF-8A7C-66DD11CD6629} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1740 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1740 iexplore.exe 1740 iexplore.exe 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1740 wrote to memory of 2868 1740 iexplore.exe 28 PID 1740 wrote to memory of 2868 1740 iexplore.exe 28 PID 1740 wrote to memory of 2868 1740 iexplore.exe 28 PID 1740 wrote to memory of 2868 1740 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a645766369aa0cc77a86a7153e7ac88b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1740 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5af61c0e3188834ef7080d0ca2523b0f3
SHA1284b1ca6ec0c113f76fde005138a7b52a914ad98
SHA256a60f188c4a6e5114bd603e2a73db4e17d2339142416a6834266ac9d32d630f8c
SHA5128cddb1691ee05ae9bdd53eb3fbe894e79d78ab3ec941ba48daec8bfeb0f32ad94298027ca999c95e07246f4bcdc55fdf95fc3887556abc42489bd3adcf8383c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52a2d7da6cf731a4d77787e57353bd17f
SHA14f66578f29ac1fd50e2845cc93baac34a1261cbf
SHA2569206a915fe1276fffdc16e3694f06e16e20bef190c1757625db5c25432f877f9
SHA512aa6a0caf2c593aaa762387804107a784e3bb712ec72cc194144d51980bedb2b78a8443bcb90364bd40e1e5d48e9fd74141135058a627873d256d2ccfb82b5533
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5046e61a3e3a3f3a2672b1eb77f7985fc
SHA14a7b19f2191488aaf45d9afeefcfa1e4ff6136d0
SHA2567d17183e9f221edd8d5885aa872f31f96075cd5cdd287e12ac913417fb75add2
SHA5120bfb31f51b503561a8cf7c2663c5c6156c37cb501783e476abaf9f73229a41b699d7e94b34a1482cc1fc0550273555c7e3b97329eb4f20894a292bdb6ef9d02a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5410b0c858515131547bb3b60ac7b67bd
SHA18e5a910f1ef4cb5353f4e3c79284ab59c6ebb47b
SHA256ca4ef70ecdc93780e21bb41567167b00d91c9ce724f8ea600af36c53ec1858ed
SHA512dd1b3c317d549c5dc94906099977211f126abf46ad6ed2f003bcbb293fbfdac6eff69ced5bf5b664fa1e2934a73e5ed0f4070148a7efd5f97baba889b3fa7f93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56b1fe53fda0475b82369b2b4eb715d25
SHA1f946337bd720a3be5c80625809990cdc839cf879
SHA2560cb5d6895f7e4b62050524924ba74d5fcc2d8c65795e12e044af1cd0302f5e0e
SHA512709f169f98358b40ad7dac18b93045b288fb4969a1ca551771e74f9f34ebc9e103f5270506a773bbc1d2763898dd2d291c20de745e77d479c31176be518deaf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5400452fe9702420e691ae7c0292a739c
SHA10723794e132c193f9c1a1c9c577eb5da7ccade5f
SHA2568a6eae212e9397c929eef8994274e27274d366ebda3dad41421c4f94c6284d74
SHA5123cdbca27a19f075c70baedc30927a6d34badabae7936089cb30729e26cb66bbeddee11777964a28743aa249bd05f9e24e125e5d65dd130e67c5c2179b73af4d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52ef078944a199db4eef7995eac255471
SHA1e487ec884cd37d8e29c9301f8a4956941e149479
SHA2566a1b2be1ceae7f39529459c53b803f0e7812d7c6387b420c994a8b59978f32ca
SHA5124fdf274c36e1f0e35a526faff350d8617d0eeeb3ae6d8ac1b10d27eed40e3a8cffc85db92b36faed96ae28a4692efc3495fe5d0ccf3251cd54ed761a0f50f45d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD595bf9d0e78265dcac82c9b620b5a2e72
SHA15bced593e8754d0351434bd63f00f20637eccfb9
SHA25660dd951cc59cfa46b1522778dfc9eeb14031d5301904a5b3de45453f9785cdeb
SHA512d45802d3c9e4e8f10c64ce5a8cf7822c6fdf7a560d6f5bf5f3f369683177c129fd89be292ae70f189c1215577b6e3200b044624831c4293c0148362044961963
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b