Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15-06-2024 13:49
Static task
static1
Behavioral task
behavioral1
Sample
aeb7c5122d03c4ddd4925377be6b01af_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
aeb7c5122d03c4ddd4925377be6b01af_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
aeb7c5122d03c4ddd4925377be6b01af_JaffaCakes118.html
-
Size
28KB
-
MD5
aeb7c5122d03c4ddd4925377be6b01af
-
SHA1
c7df45dd24339310daa9a951379770988526586a
-
SHA256
26638e3d4facd6c30157f43e94cffd85a959204e61ce9bb406e9843c4fef2b45
-
SHA512
46476e16053fe0b15e0e5803e70da0cd0aba52f8d6e01d66a9c7acdf63c72a337197b84c3ea9aeacb4e599deb6f10f68f9246d0857891affe65903bfe70814de
-
SSDEEP
192:uwzYb5nnsBwnQjxn5Q/3nQieONnInQOkEntZtnQTbnlnQ9eUam6eFM5GxBLQl7Mr:PQ/85y2MawSN
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424621221" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0C1BF9E1-2B1E-11EF-87AA-FA8378BF1C4A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1688 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1688 iexplore.exe 1688 iexplore.exe 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2732 1688 iexplore.exe 28 PID 1688 wrote to memory of 2732 1688 iexplore.exe 28 PID 1688 wrote to memory of 2732 1688 iexplore.exe 28 PID 1688 wrote to memory of 2732 1688 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\aeb7c5122d03c4ddd4925377be6b01af_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1688 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5881eece6945a75ae3e128df64d714e15
SHA1542c632c0c917fc06e3ef22e6f8bc11cb2d91b31
SHA256f98b1d86d7dc3a3f73f21a52a60cce3b70280905ea6a86f54734bdb6a7ccc98f
SHA5124eb79d31d4574db82e9397105bb54e657d7ac2badb6017b8814d9a4cb6184bd3cc35795b11e2f4160e505d20b2967e388011085c6534dce0cec8a5643017d79d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586f3f3c808f714967aca5f83a030e4a6
SHA16554cd83fcc9daff5c8d95fe1673abb412e9e690
SHA2560c65c95ee0df5154efa5b24e35a4caa0941a743416bb356247d8a28e311162ea
SHA512f1189ec7727193596a123340d83b9d3528767b3bc304d0419d0ace11bb8c496191b6000f31906b1f934dbcb8c8be39ca0ecf59d463daf2416acb090f17ff596a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530af3e153783a6d717186eb207a234e0
SHA1ded4dd0ba3478aebe6af14ae193d2d9c7ea02881
SHA256c0edc562cbd09c11490689174411b89987f72eb742a312417179935681448535
SHA51240077da484f8605dde5df7ea5488f43450def85ed5e6414cea1af23a47d7267b3e9d2a8bdf8a09d2af023d32a9cd1e704c13f52aec1f5572d7b65c7a015e9d92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553ebb70d0be3eab3e66916b38cda0b2c
SHA19cb380e94aa896cecf14bd5fe78a404585a2e575
SHA2567ce4698be1f7398e79fc4f4b6e40db326c1e326911e4a5330fc5b23a25184bad
SHA51277e54cbacf2c687b7883bb3c8f2e6ebd6805ca0e65f64f67d986f3ed4f7c1b7c82e68bba86a9ecd440fc2611d7e051ab8e6730cfcab2153163ff81c414b7f575
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f247d3774fb38b60daf46292e600d91d
SHA1abcdc122d49b98972d83225c90d8312a2d6ff924
SHA256550acaa5bb4eb168c234f230883acb97819b964b63b0269b2ad40a2fba02842d
SHA5120fa9289452e57458125ab40f316c1faec5c56bb17153730e876d74a64da42680a2c338a74fa8a3762064a598e4c0ca14cdb64addf5c1566f1765429c38550abf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59439fb88dd7ba33494afb5d85c482bd8
SHA1d1baf4532bd878b1b950283c9d3577ad53654116
SHA256a88124d76e526c1d6028a29e75074dbc3d88b47984286eac7f6afd8adc3542d4
SHA5128c62b0f06da2786d76aaa4dda139c3a95f3fc1f9073bbf64df52fddb657c2a6e7f2c84b8fc544385b638b44f127ba7fb74fc984e66d5c797986a89b537d4a1e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b36cee98fd56f6ac0116c8c209785e9
SHA1b8c1dac13aa6d716fe80bd21d971ca7f64ad6bab
SHA256df9861e7264b0ee01e935394e561fe574c54269fbc884f259cd83ea777b3202e
SHA5128000016c18f0e71642e2e08fa182534956b7e8e88585448e9c817793b9424f7f135b75ab041dd0da32373342be68379ccfa5a6f40a0ef56fd2f89279eaf0b02d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5826ddd8628763f5d24429e21b0e6c0
SHA10f95c791968d522faa6b99ab1e4bca32a37aafed
SHA256ddb4af91d82d6630641a3080f7522488d1fc830d20041bbce6254275ddd4ac82
SHA512830169d42b38b70e8b3db1f023f9bec0b918f49a72738796674fcb51196365531cba1eb1a303a05f9f88c5ecc62e179403bcebc9123a36d50bdc7358cd71bd09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579c23fa8e507a016dec77ec3c8448653
SHA19dc346a79c359832e513cad8731105efa5fa0f56
SHA25637b63848f8d7b1b2d9486094352d4bd653dfc1f0bdc3f10059c180894c018242
SHA5129c0a37772b065d3b29edc64d86f7a7d8fadaccc68693e4fa524bcc69ed1a4d07f1ddcd8475174942227d4129c78d8cc4443859ce40cb258fa1fe2eb42ab877f8
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b