Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
16-06-2024 04:42
Static task
static1
Behavioral task
behavioral1
Sample
b1c58d76f5afb4227d88a937634bcde1_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b1c58d76f5afb4227d88a937634bcde1_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
b1c58d76f5afb4227d88a937634bcde1_JaffaCakes118.html
-
Size
27KB
-
MD5
b1c58d76f5afb4227d88a937634bcde1
-
SHA1
b2531371fc2dd78f2283020f3f1c3770d6aeb52f
-
SHA256
d05ef0cf9bc5f379655f619dc80a6338a98b5089a9de2ac917c9867a38f4b59a
-
SHA512
688667943b8d3ae079c99c8921397da87c476948173e7bebf465ad4f2cab9f575c850223a234855d558f1e9c1ed6046bbebc8c79df06e913b7872ba3e9f8cd05
-
SSDEEP
192:uwTMb5nLCnQjxn5Q/SnQiexNnznQOkEntC0nQTbnlnQ9exRm6uDTtQl7MBRqnYnn:6Q/Ho7yTcSHo/Cr
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E71B0B91-2B9A-11EF-A5A7-5A32F786089A} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424674845" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2924 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2924 iexplore.exe 2924 iexplore.exe 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2924 wrote to memory of 3048 2924 iexplore.exe 28 PID 2924 wrote to memory of 3048 2924 iexplore.exe 28 PID 2924 wrote to memory of 3048 2924 iexplore.exe 28 PID 2924 wrote to memory of 3048 2924 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b1c58d76f5afb4227d88a937634bcde1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2924 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3048
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5814f057e088847b26d6ca47826529049
SHA19386fbcbd875f44dea24e88f5ee307054381472d
SHA256c8f5301ff068420607605deca0adc03512502960a95ecbdfaf47bf78c55e290d
SHA512055b82a43c5a19edf8770fe6b8b5df12b9f09550559f238e75c8082540004a67d908daedc2edecd2e4bcd9d6e4f9a5428245e828b508c386efd5bc562910a179
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57baf6ba9eee9a0d0cfd9720371ff4043
SHA1588397b0865eeabc9fa15016b537c71a8686e5a7
SHA256e7793907e1a1eadf59df6ea6438a64cf0a6a255cdf82bcfe2de0de517d7c5592
SHA512201a968b793f902a4eb9f83fa4e6f7358ef6a9531d7d7a3eb7f5874cf08016cd936edc25fc7ba6c61e9c428144b9f3b8bd5f2766858bf2c16fa137e7baf6c4a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa071d9cf6a4304ba459b0a94c4649bd
SHA1e4a63fb66c8e7e191b453515465c8f3cd698951e
SHA256f65e18b06b2b66de8760ab08fba879124b644d31b85deeeec4ba169c66d96492
SHA51278932246a9b2772e54fc813bf2b986b72fd627a7d8f16e7f730aa00c3158b7016b08362eb84b89bd0f594397c105a91b8f688b50dfc70a68f7174e7eecd2deed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4f5ea7d8d930da4d60d8cda6037fc29
SHA1838ee0628dd91744c97303e3cbee0d56e35e1fe1
SHA256ddc88f679812b6b1b3b4ba2d774f7fba7aecbc475f0c8cef404777b80c939d29
SHA512b78202ec0cb310fb48e7e0f05597768920cbf65cdbc69f24248871e0329165d0a520232da7740054548c78fe3a34575a07cf2e0d66b11f4bbf3f89f0ca0c6739
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5108579652cfe8c3e7c32d6e32196aafb
SHA1a40fa9a9ec528cf6a29b8799310fd50c62d2e373
SHA2560cab47d15d6761120e2ae083ed5976c5abe20e660743410a2be0cbd3d20687e8
SHA512abddefd40a05759644805479d9f39b47e396d2fa9da215765cc36c8aad790e41fb3474c1783219b81b826d0a14edac5f62ded8d3df6bc94abd1f4387319d97c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534388ce58b92a02c749d5da886e6640c
SHA1816f5d0f9eb763922a7a040787422b58500700d5
SHA2569966e0180488011b4fa9a2c96c58b02bc971e911f03ef03b9e376bfa0d92f0d0
SHA5120cd633fde552f941575604cb433ed6e6f0d7e8eedf52f62d382023dee35804539c08b7d9b645d0a64536608f55aa3f6561901bc0ada0dafd8a111d9cf5defb52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8e7d1756d4d0542d24ce202c9fff6b3
SHA1241929cee808d583eb417f3510743406a9859559
SHA2564b65c2ab211077b74fd03737f2b723fe4b582b9f48bf2e6ee5d7c402827ea424
SHA512e0d0d23a7d9ba869db79b38fb0feb46208734712f96046db08d39107978f786e3e088035ce12e27a45fba335c221cd14558f08fb0fc54ea2f0b392c62f2af076
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b408a50019d5ff0ab6deab60b7308ea9
SHA176f715f3e59d373a44b5eadaaf92b13418d8bdb6
SHA2569f55d2e9e154c0e2d4d82b09ac78d6c405d5034aeddc50e8deb8d4eb50d954cb
SHA512fd33df258af1746ab4cddb6c7959c63b94e0348efab0ec4469c708ba123010597591b59c824d016c7bbd770873d83f4c6d885291e3aea864acab631778995495
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0425cb33a5214bc8cdd654643f70615
SHA1595f94b88f823e86c3bf403923e8b9050b6eea1e
SHA2567ce393bd602d7ea03c5f1ed0f0f117a6065700a15675cfc865fa5aa8991e74c8
SHA5123a3373f21861e8642e8907f51530e2854fa59ca3dffafd8d8ee11080059904b6538cb55464c3587504cb8becc3aed54da8b1eb0f1c5990344c10b5dcb24d7a38
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b