Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
14-06-2024 10:33
Static task
static1
Behavioral task
behavioral1
Sample
a9376cdfca7a49118d4bba7761180a62_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a9376cdfca7a49118d4bba7761180a62_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a9376cdfca7a49118d4bba7761180a62_JaffaCakes118.html
-
Size
18KB
-
MD5
a9376cdfca7a49118d4bba7761180a62
-
SHA1
d65fde3d0153f6cc6af0823d6912695bf6515cc1
-
SHA256
aaf4a40b36163cb2b5140520bdb49c6cf04c8f544a2228054f670c15abe4dcc9
-
SHA512
47700c16928583abe1f62052ccf8e3293b8c45b2e4e471e656b858688875de80bf06d08c69f7c0d85a545c6c691821ba068d66daa5f88f69f6e802485caf9113
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAMl4tzUnjBhHZ82qDB8:SIMd0I5nvHrsvHyxDB8
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424523101" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{989A7301-2A39-11EF-A0E1-D2ACEE0A983D} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3056 iexplore.exe 3056 iexplore.exe 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2432 3056 iexplore.exe 28 PID 3056 wrote to memory of 2432 3056 iexplore.exe 28 PID 3056 wrote to memory of 2432 3056 iexplore.exe 28 PID 3056 wrote to memory of 2432 3056 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a9376cdfca7a49118d4bba7761180a62_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3056 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2432
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d804995235b17703c9dbde9de21fd76
SHA1812ca97fef53e4c9808389ae049337f209f63db6
SHA25655728fdc2df9f524bf12b9dacec1516b4d021226427b4327e811f6c5a128217e
SHA5128ad5c8763f7ca80460f284abc2af9ceb1558838bf9b9574d001442e731a94332223b4ab78f6e23fd768fbee92e1c574f93c14e0ddf87326390ffd62ac503ed79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554c16a165fbb5e1ac75b1cd35b5e6dd3
SHA13663ab37ab7383b94edc85849ba104cb016a6b58
SHA256b521e2692e3db25bd7b5c02cb97017efbb978e38aa0f28323c08351f671823de
SHA512cb9e1060527bcfbdd0ba1db8c7c54711c5bd7e8daa5f181845009157ae0f235460cb0f79d313c60683d3353c19d5f566c8e3d7152154264adc70e67fbd5b7fcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e58c9ee6e95aebebf0db68c9922a64e4
SHA175320b5dca8fbc30a74198de4e49fd36e315b48d
SHA2569fd7aa22f6bfb1aa09000fd7667331bed23ce205aa0909c603ae981726be0c28
SHA5128b63d29ee68aecbc21dcd99c9e22b6eb1cfc153b6705cf4df140384d616efaf0db2f1e0af91f856a7561cbb2a20c013579bac3f05f6c7be687c7a0946d8d496f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572b36a4096a7417710c461cc215ffe46
SHA1c3d3fb071bc29a3a874626be7845ebc22d508568
SHA25627fb21f0236139b0ec9ceb7196e38c778ba31dcc548ce07c760e7865dc6755ce
SHA512ba1d112a7b489c79bd9599d67c018b72a985f2c59cf591cfcaa88387946ccc20dd3804997a0bd3f8516546ccaa1aa6f7b934e0771fa00ff676b3b8de05e223f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55806abefda734055d97fb6001b14e675
SHA1068dfbd84681a6345c4e1bd98a9c874c135807bb
SHA25683165505699e5e5b3dc9bc42761e79c490803077853be177dfba58fa0611c491
SHA51205bd7c503810bafc44f3bfe4f1ae2000a2ab33947fe4e63babf370aeb0d76bcac903029a47defb1770ff78f983ffef00f6bfe01fcfcfce646306513d0e0da710
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561f168530ef55191a406e93949c8afe7
SHA1bf227921575aea0dd1274a4500961cfec2f0185b
SHA25605261f513a308013931aafaf1584c82e04e95e026b4296e35840a50cee394f90
SHA512b734ab758512339109af223725c78710270480b30bf4cfc4843b8c4a67c36948990fd4e248152b460c17c7dcebbe2ec8f160168b55ad6e95de7bbfdd879d62b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7bd6b606875d8aabb46b7171bbcabb9
SHA17e23c37205091521cfe3d789f89a0b7a57ef64e0
SHA2565dcb55d2a472911194d5d73c7581f9da91b328e04259394cc13b445d48470aaf
SHA512d8a7115899580808fed71054ebf731761f5f9b4f3745b7376f52c9d0b88dcf60597d9fb99a23d1f02deafc89d43ef96a2ad07644401bf15bfa1cf22ac74463d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5043eec78a521fcaafe80dadf8f5eebe2
SHA15062ba3a918a1155b0ec476561d7776d889ee809
SHA25632663589d5cb4e296668e42817796d6e8998e50e485a727b7a3dd850308f21cf
SHA512cfe22c242dc048c98aadac5ec4317bda90a3429ceb720a3d10b40c01991f15a92747bb04c0c5ec08f7068e50cd72954400e21acce45ce9447e414268cf537704
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fdbf0ee37e8d1bbd57c2d742c92018c
SHA1ca88d310e8f95c81c8e17655e501cf27782cbe35
SHA256bdfe0ebc12e33faa5f5c90abb0a12e8434a9ebe8692998937b8bc6a21b35a942
SHA512c8cf8b308afa35909ad4edeb7be4519c599c2c17bd773e26a99c0beac5eb8664edd25cbf3a5f334485d2114037b59d495d0f993fe7288d72c85ec8d72206fafb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b