Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
15/06/2024, 09:46
Static task
static1
Behavioral task
behavioral1
Sample
add62b9b0bf7b930332b0859894ea709_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
add62b9b0bf7b930332b0859894ea709_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
add62b9b0bf7b930332b0859894ea709_JaffaCakes118.html
-
Size
23KB
-
MD5
add62b9b0bf7b930332b0859894ea709
-
SHA1
f77c790251b0d1c00ccee62f219ffbbd7b397f82
-
SHA256
803582a3c056af03a061a3168a0a0465e95deb42998fcd7afbc11ef86455bc9b
-
SHA512
f5ccbea65c8804bb098e7e5c5556db61e1ea70fc967b5545fa242867f7dea25322a044f670eea1785372e05eacbd9f01c8cadcb42697d2770df004e5c5483965
-
SSDEEP
192:uWXwb5n6mnQjxn5Q/pnQieUNn2c9nQOkEntXHnQTbnBnQOCnQtmwMB0qnYnQ7tnH:vQ/ccXWiF
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{145AE0C1-2AFC-11EF-87B3-6E1D43634CD3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424606631" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2344 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2344 iexplore.exe 2344 iexplore.exe 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2344 wrote to memory of 3044 2344 iexplore.exe 28 PID 2344 wrote to memory of 3044 2344 iexplore.exe 28 PID 2344 wrote to memory of 3044 2344 iexplore.exe 28 PID 2344 wrote to memory of 3044 2344 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\add62b9b0bf7b930332b0859894ea709_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2344 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD56f3605be30f563260a2883c798c600ab
SHA1b4e3b662b3256517f02cc40d32d3c17696b6c5bf
SHA256f1efdfc4ed0a0681208681e9d23b256674be73f40cde5f9411fe4ed3f09395ff
SHA512c52fd6d0906960a3a2c715a5419bb875b323735dfe4d8b237522e1fa54cb35b16bc06529a1c5bdba8d60246320be820f9e0dab61682dc95a8d5172db512bf248
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56461d2d96f77a6fe86f3f3e40d5d2aa1
SHA1a32fa38a39b4f8f4fe3c18a2aadf64195b4fe129
SHA256a69128228c7c42985b584fa6f9a5d1e118019714d300c183593a00cbc9459f0c
SHA512743b8717d841208ee18a854f76628c027c50f5be8a3ee8821f4f89c58f38d33b3f3fd0a14c1b6ec30a8a26aa866e83c843bafe313a861180efee56a534de350f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb89ced72423f2ae42674dbc8d3dcc67
SHA1dae7c980688e1da026361e4cf8f987a6d4796184
SHA2561f8edaf0a54f7f63b27e44e40b9787554bf334064b69e9146fcd27028403d4f4
SHA512bdd3038ca37906d6267aaad0010cefd2dd9b0fc6db0e385f4fbb92d8bdf5bb4aa8ddc915597384cc7845338325fa1cf13747dd9d8b34adb7bde975e28df6093d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7946c322f54ac256b855bb10face69a
SHA1a6b47d9cc11113f947bac0e6bddec2595f7989fb
SHA2567c67e6fb3112744607d72abf31976c8fbbff3cfaa3e0cc4f2a89a579538f8fc4
SHA51266b5ee0ed5931951ab0f342fa6ab2b483da589faec0e5cf15f7da38176811e5dd643cf9201b293e3b75e5dc48007957c371ef8da0fb5976a8ceb0bc54f707466
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538ca3848ee8a2e8529816c35b2e050cb
SHA1aac84dc4e7205fe6677065f91631cfa41e35091c
SHA2567869a0a47af1606676703f1a1aaab6914b6471671097d47daf65b77e989e53c7
SHA51266fa2fae081a3ed1c5b3dc25e85b18ad0bd141c8e4e4cb05c2d675f8edfb274c7606514dba1c87ce79cde986d8c56e5efe88f1989fe75c2eef7732452d82841e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50918b77d8007703e9b12429f17fc6077
SHA1cc33f03a189df7e4ef1419764e66b95f2deae477
SHA256748ce3e61b03f4b54c5c79b673c9eb93ddbc5eee34a04002d80131bcee320b7f
SHA512786aa680334b0b3fdd89884364763d9525dc6408e43c5deafbb589d239bc30c255dc04065301898f71e30e24fab68b1d38453d65a06dfcf7e6cb92e6fb3644fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5673d64ab785cf5f10e2316930527a2c3
SHA12b4df3144001ae98c5463d3f96e177c15e9bc947
SHA2561561112edcc77d0b1f83df242e9cb46584909ae3801fcb68b6bb3671dbf5e464
SHA5126deff155ae44451f35afc364fce5407bf6551c875143e983fa657b2c8e12d6003263944e54feec58f10f1ed58da2b454605232550f393331cc39b01acbe28633
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2fbf1603a384b5c8b8e3697340204c1
SHA1ce5c572ff313c7952d4c813278e6b9f54db5648f
SHA256d7a2ebda669b4a0c9957ff894b58dc0d8ae45a6b6dc69d5c9511da10262dc1e8
SHA5123f5e30c434a3730d4be462172896549e68d6b54a93dd9134a3c38ff207ae3ec8ce1c840a6286fc8f451543a0795bb9bf8cd716095c3146afddaeac6c591a983c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56beaee4a74092bc7b6e6e1dcaf2d3174
SHA14a712ac6883d39fcd7026c6ca73a759dff8c8c86
SHA2564e81363f376daeec9e60817dbab0c68a4558f1a655e9adf1601a7a3500a8c7ee
SHA512c8ab84c2c4035bc4fedbf8ad4d2bc6964fef25ace4cd4598fa365270f70d4cdd56ce07bd1aea156981910e5416155030b851e403e43410b2ee9fafabd42d62cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c3e4090cc08a9a68ef80e3f05c2f9ce
SHA1ea46e1c07b29466e9f47471501008ac12c441bde
SHA2564d5aa9442731d697ff91d4c449b5ba363bc2e74a6aa463abb815ac7efc2eda59
SHA51277752c14c7b8fe1a406b81abf0724949d09bf332e31d36131819fc35e1c40cd96622434ef6fac94110e4906a92d9e4b5a345c7f03bf7549cf9855fa89f52db44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5c5f8a8aaf9294cda27f16fec92db3066
SHA11668c89418aa8e2d6a8f919bdd90d54441797ac9
SHA256f3c3a2a73e2d30794b64568a8c25e55f024bdec18fae2d61afec136e4cfda139
SHA512332adfa0171b5292561e74d6cb8f79648a90eb75239ce8d9c0b4e9830b79d6d136fddfdd069f33e99ca12a6f3c834f5a549a0bd56e8505ae30c82899c6738a9e
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b