Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
15/06/2024, 09:29
Static task
static1
Behavioral task
behavioral1
Sample
adc4a654f3eab460822b72bde4392989_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
adc4a654f3eab460822b72bde4392989_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
adc4a654f3eab460822b72bde4392989_JaffaCakes118.html
-
Size
27KB
-
MD5
adc4a654f3eab460822b72bde4392989
-
SHA1
b27c0cf93c78d724d6d021bfbc574a5b575a73b2
-
SHA256
afe11f15331a8861f8be695d3fbfb890cd8f7f17de2f0a290dd8e02a53a2ab66
-
SHA512
eff23018c8e23d327887ba4619f84aa0cf520f4f3b21d450e70a1f70cfb79a2789c438a6a833a8331cba7f336d435961e9f0acef7cf8a7ed613dcd0e9090df57
-
SSDEEP
384:RpUbn+z5uLazQRkSRXeV9Paaphd4fhYRJQcAex+aTQ9m1DOMf77W6F:RpUFGzQhQVXjy0uZa8OAa
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C64727B1-2AF9-11EF-9BF8-4A0EF18FE26D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009f667d865ee967469240b8e9ffeeb1ca00000000020000000000106600000001000020000000ba65ef898bfa5092df9fe8267162cd9274c3080daf197c323c6a9d087b07454f000000000e800000000200002000000005b9ba372bb04c01c20b8e2cc3c01d7a1ef2fb58cb23667d4dacf40b86b555ad20000000b4e4fd98d6a3a25ae2894e536f643d4873c76f76fd8a641ab126638aaae6d25640000000c107cab526136b27fde17b5151121636cf284f27fb1b88957e52ab8a2c5f52faf370cc152940aa2ea681f45bdd449c0396591c85dbe9c290915b47037ab93d98 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424605641" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 108add9a06bfda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1708 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1708 iexplore.exe 1708 iexplore.exe 2040 IEXPLORE.EXE 2040 IEXPLORE.EXE 2040 IEXPLORE.EXE 2040 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1708 wrote to memory of 2040 1708 iexplore.exe 28 PID 1708 wrote to memory of 2040 1708 iexplore.exe 28 PID 1708 wrote to memory of 2040 1708 iexplore.exe 28 PID 1708 wrote to memory of 2040 1708 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\adc4a654f3eab460822b72bde4392989_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1708 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555fea348dba32ae947bf4de73501afaf
SHA1e65d9ae4d1b5b606a538fd06f65389b59f206367
SHA25613ff001fe66ea2c9f81004e6aa1d3478874f4c81dfcf3bccb1a420ff8c1a4dcf
SHA51207829eed6e78817ff20b56add5d6297824386809f897d7fbedd1af5f901000f7f4cb7619e4d2a59e9f1ae81f177661b56dff1368864f050c2ae7bbbcf427905d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e927860954919875612f525728d7b67
SHA15c47ddcf353b07ba7911eb63bbfc5a3d399cb4c6
SHA25690e9014820b8592ff74b232a309a2a3c1ec99087e4b3bd98d93f56d1f51a2445
SHA51279738690ec52acff77eb0716f7bf4831d4b47c010391b6cb18afa5cabfd276b592f2c0101fd97c993da562adca87a213f542d4914571c178d7c627a4e0353dda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569464eb9f7bb11eeda6097a288a4ecc2
SHA1a30e668908f768b68c1f9bf12248bd13896bbca7
SHA2560679702d5675154692a8a449dafd8a053bc97d1b64b5e55261df7d584f5e7501
SHA512d71db181becffacc988c917bcbee664c819a0273646153a1aa04f774f7b5660bf506b9c78c9f6fc3b62d0cb9408fbc9c6a1e92859b3a3ff592b832f460686201
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5792018716f26a1166ba3e5ee356a0bf2
SHA152097362d8ccdc904ef1aef7fbae0e191d3c593d
SHA2569af1388b1648f426661de536d906374d7ccaf4be0103f3786cddec0e4c0280a4
SHA51278a4677a69d5cb2f6be7ecc7fa37d3edcd41940fccc4bd58b334199ab53eead90642d69d7b6d823b37e24afad70a136def1755b560de9d5047a07d8fc7d00cb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b56b357d6e69d841c343654946cdc600
SHA1464df1e998b5bb65867753c7a2d8c5547c11422a
SHA256a9c314bafc2974f7c4bfcca92c583d05f48510d8fda3d4b9e9990cf7857be848
SHA512414d85f2ce9e6949660fbe46c838ff80597beb9c9c1c86c9dc023409434506ed6e81af564ca746224e002235af0869ea10e0823dc4dd54920eb5f11afb9c6240
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50575d92259310b6f7cc9a03af2766a71
SHA1c5f0e6d9fb013d5fabaef8589ab60933137de0b2
SHA2564e510421e81bd4252e6aa5e9abe68a4b5de2d49e96263461ff5902aaa81f75da
SHA512ea539c0509534ad3baacbade9422b14ee95879928a5094ded714776d2992a43e0b81fb083c142c982b69f3d748b9323b2e9762752f9ec7bcbb6d55139abe30a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57792af6ba4fe02cdbd06c2cf079ce9c6
SHA1bec2ded087e8b5e6567bf859064df69cb35a2864
SHA256b79ff1966dcf9eeba01c29c19127b89140ff73f632b7ac0669a3a6abf17c3c16
SHA5122fe8a3232286e3b2378f61f8802ef84b4e05c168553ce1aae1e08ab12fb8a60110a8942ecb05cddf979af6fc924ed3d4b6b22aa842075d49bc906c531f2bea60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56730015cff24005612a2ff6427a975fc
SHA1adcbf499e321cdba2d3693e2a06620c02b0bf3b6
SHA256662e06d440f49b3c6f5ff151858d74f4f3e34a637e0900c6520c31d53373c86b
SHA51293122026bbf25f9350283ff0c77d9e1c7d7270909e27f632d3676c7e4cf93a164baeaaa684fbf089a5b30ce4e71fbf522266613696271b051e021301dc4566ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5274fa520b4168444bfc30224cb833c06
SHA19d41abcb535928598931c5fe12044386d24b5e10
SHA2569154359b497a04253143c4230976e0c53f89abde87a7d4d431832a9b195f6131
SHA5121da44044149d4d6d022cc63c203f17938829c42b34e97237792e9c931475320409612e58722842d622d94d34a1d02ff4315caefaa3b00ffe88586742a1ab0ca6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552e17bd48001240d4a84ff534c7019bc
SHA1de749a16db4eb32e03b6f1649282a077daea0a86
SHA2569587d93d46a13d7d066957e8e35dfed296844e8c35d7d6e53419f01b5a15467c
SHA5128828d42e4cd4e91d933785d83bd62afcbcbafbcf93dcc0181b299963b6829a4062c5a8daea1268bd7cd2df8883fa785a4e0c188e06cd1b3ccf13253a37e0ac3a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b