Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
15-06-2024 00:17
Static task
static1
Behavioral task
behavioral1
Sample
ac30d58600a9762bcff764a61a13b32e_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
ac30d58600a9762bcff764a61a13b32e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
ac30d58600a9762bcff764a61a13b32e_JaffaCakes118.html
-
Size
23KB
-
MD5
ac30d58600a9762bcff764a61a13b32e
-
SHA1
43dc49a6836fff30b48b74455bcab4dfff4f3854
-
SHA256
8916c2773589457cd85d67f74993065d37e791f68671702fa2b32f87aa5b7c22
-
SHA512
bbc46d0d67f6142bbf037512a03d7e9b37303507fa0d7039d816de313d68a16675a8e77d787c460d6e704126b061bbb8845cf81f9b174c282af7cd5ebf004f44
-
SSDEEP
192:uWf0b5nc6nQjxn5Q/HnQieuNninQOkEnt5BnQTbnNnQYCnQtcwMBOqnYnQ7tnuY8:xQ/EMZ
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AC2E9451-2AAC-11EF-8B56-EE69C2CE6029} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424572526" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2184 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2184 iexplore.exe 2184 iexplore.exe 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2212 2184 iexplore.exe 28 PID 2184 wrote to memory of 2212 2184 iexplore.exe 28 PID 2184 wrote to memory of 2212 2184 iexplore.exe 28 PID 2184 wrote to memory of 2212 2184 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ac30d58600a9762bcff764a61a13b32e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2184 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6089845cf8ab6119c6891da244a4937
SHA157c794d6edfbe8264365f8ef6b7e9c4975eac759
SHA256b6d0a35b8f27710935f64b808f02e01370d14c4b9ea56b3797c7cfc7e52a3587
SHA512100394fa37b5f9997f4d9e3d4dd6c0ca0eec67c7095dd20c7f8a696400109bf05f8afabfb7491fefae47aeb0b751ad0d14d9398c8ca75ee500bfe59d831523a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bf15621fcfd98c9a6360132bc9ca23c
SHA1743b731460e2511acd9276b8ccd135f6a86559b9
SHA256d31bf777383a48e184556fc21160133d8dc57da66cd40dfacad23a1d539ae0a1
SHA512680e08a3206831c318c90117708d968c1986d1d2458d34461cce5ccd3f3415c399b465606e2bbde1692accf3cf6d47e60aa19857b8466ef3f50f7a8c85c7d290
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54715bbfb5216c52e1d8ef5c1cc3e4529
SHA193ce645729a1c5d4c688ecef0b6db23f6ae7e942
SHA256f89906cc42977e53f43099a5fccb8de3c38a54495271c213f2849a8454a9ae7f
SHA51241640c0545b5238da93e6af1a0ee54b57cd693ffd664ac316da2f447a5e40b1327c8d03f11414f3e169a20e5c05d335dbc3050568acdae1f602caaffab759fe0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1092b2d349c72f0382a6b5322741ced
SHA159094c5e07ff90041af03479b3fae68870473193
SHA25675a1cb162bfc0cdc3d2bf278c22f687f3359f509992f4a48d69eb6c615ad8db3
SHA5123f0efe5d873ce709f8a6806ee05f731e37cd303cac994818c1516c51dce6d5b09d557f94b5fbc38cc4f8202d1bad239fa58e5c4f16d4842d2d4f68338ab501e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507abcb64520f8ac6eff5308a5b35eccb
SHA1b6689fa5af2e85079fbd1b799716ce47912b849e
SHA256d303b1ac17dada385ce98614e61021978517920ade403d1593a87fa6b05b2d71
SHA5124760131694b07bbe14ba15aec5f5d140a0f78b4168fb151b2d82b5a04936bd3dcf63ae63be10b83adefa40df4aafd65ef059cb18a99cd99309eb35e311b5416d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e699838ac64a89ae08d806ae8e7f94d
SHA195634236002d1a492f81d2733889f6f36a06b463
SHA2566b9a8b05da326ac9d643d7c0419b263bc28a6f85a4b8932399d925a6c7d9a981
SHA512bf085bccaeadf37a1c7252eebf1c6a6361c99230a9fc10d5fe78e22c3a7c653c6545db1baf5eb4dd8fc1b2eaaf19a6d7aa0efdc1434b04bf69feec083db9b828
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571d82ab641d164fdb07087ed24381480
SHA1e505d8daced8ef4d23254dcd36b821e8f052d7e8
SHA25650904fc3b0ec172c0707973f8b7d3c08b2c5dbccba188fefd7d0444dc559875e
SHA51256737031faae2112e80d020ab4fa10ed2e82feecb801c5f8a555605932bfc9b98b37001b1b77ec2cf514195f2438f26dd950f4fb147e84057b756982a9fa5ffd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598165847dd562f421ab788f1ac6d7221
SHA1267431c735456e99a12167bca039fea11898fbb2
SHA256ad70ef0064eb8d7605abb709aabfe26dc8921875608b2c9b59ceaf237ef74247
SHA512af88e9701e3ab0cefa9d19ee80c5a1a46c5b787a9a8506b5771a4234d8138534ee970d29846deb3bc9c19da0167beecf8982f169aa0df16e4e305667f81fbec0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b02f661511c47168011e68bfe97f323d
SHA1b2898748c75e90153e5e7428bb8bbd9305f1ad04
SHA2567734efc5854436aa1cace59b38fb2fe4bcdd774d071718acc801dab6b41f25b3
SHA51243bfa9f53dd0404f46f98955d25e5ba838301c7432646d32892b4b2d85ba1025585d3e39a192feffdac41c7979ce7e0b8e5c21aacc17036b8053abb129cff537
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b