Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
16/06/2024, 04:52
Static task
static1
Behavioral task
behavioral1
Sample
b1ce1fd57012aa578853796b70be55ad_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b1ce1fd57012aa578853796b70be55ad_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b1ce1fd57012aa578853796b70be55ad_JaffaCakes118.html
-
Size
24KB
-
MD5
b1ce1fd57012aa578853796b70be55ad
-
SHA1
0138f81370d2d9dd472e1aef5b46fd596da380e0
-
SHA256
508f846dc68be1c50edff0e8dabd063d5568dab379813ebc74ff97691d511c73
-
SHA512
17776d9447759ace82a2db97b28c6d39c0163892e40ec2eac9dbe45ca4fb17073508b8fc1a9833656a67d90ed7509cf6a7928d9cc592ac30b391654d177f7b07
-
SSDEEP
192:uwP3b5niNMCnQjxn5Q/8nQienNnCnQOkEntManQTbnpnQaGLnLnQtrqMBHqnYnQP:FQ/9GEA
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424675433" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{44E6F531-2B9C-11EF-B848-DEDD52EED8E0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1200 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1200 iexplore.exe 1200 iexplore.exe 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1200 wrote to memory of 2864 1200 iexplore.exe 28 PID 1200 wrote to memory of 2864 1200 iexplore.exe 28 PID 1200 wrote to memory of 2864 1200 iexplore.exe 28 PID 1200 wrote to memory of 2864 1200 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b1ce1fd57012aa578853796b70be55ad_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1200 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2864
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6855ab262afd6839a1fb9bee46d49a1
SHA1e4f03cbc5112e49684074f2d90774b1862ed9686
SHA2564461c91d7d353d06b549d2e996cf6356181aad29f9023b38075c7612dd8068e9
SHA512a3a0729d8bacef56e1e151e9589d49d46ce4c1a821419557c9366cb1f5f757600398e0ca94c76450b06651a18c73dce04e3bcd30a10dd1ba35221c89b0d9cae7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb193377436b33ac7fb0e15c3b0f22d7
SHA1f1a4a3fbd785ea7cc0e0f52aa741b4a4a14bcd72
SHA256b0d3ebb546332800957e5911239b0ccd8bffdc1e914c8397f55123bfae5a2c18
SHA5129a11fccd0b2c208b027ced4df8033455962bc15971c3cfd1b3fdc0fdbbe94623f309a99e1043abd2ab2fea37a0572c8cad4201229ae8c42d16519f3840bab9aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5015867dcc2f4f4d9be47c25af7948cea
SHA114479d234b651b9f76257ed142f54452caf35872
SHA2569e75efd7ffc02b364002a1439dbc7f78790f3972f8b586289d16593f0a98a3e6
SHA5122cac8506fd9a4df35cf437cc9e2ccf091fb71b132bc93357f591cac33b1b02eb9346eb175073578b7f6f3270bd7a7588b029e6480ddbfcb1df4b6119c6646d2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591b2b432c5fb108aeb92345c69de4fd6
SHA1f9be8f77e37e72c700695aa52c12d1c009c42b48
SHA256236e7aed6ce17dbf315b5a325e4ea3b11e0414edd1b389966eaa5d80b65fe240
SHA512bb959c88c91435be037725b994f53a71951f845369f8131b85e8b766849d7fdb07d0b572ff219cdf99a8ef9488355ef50e44fc99adad3bfd07aa2a5a39967285
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5926fcc04cdec0dad77f154289d2735c2
SHA1a03724f66860e629a081f09e2ff0803efaec7b5c
SHA2567ce808f917198dc630ac4282af253320b7426d5fbc596a7de9108ece92e95cdb
SHA512158489d096a9d8bbf9c2a295a7d9a5a6d32beb67250e17ccc250b79f7da3626f47b0ce4aaa236bd116e9fae18e89fbd78567b2dfd4bbd29ea4f719ad94bfce11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5246ac3e450d8dc465d2b4308b2c1e172
SHA12e838ddf06cc236806f0e43b7f5abc7f1abf5414
SHA256dae2c8ea8550ffa468ba72f3943a472317df2a7d6ad31a63d8ada1b230ebced7
SHA512ec081e6e9cd6b6b8a6c23c1aabbc12413ab02d50d6dc0aac56cc7d1668c6457b5d13e8f9d6eb46d111567719780a315600cf0487cffc99cdec79cbacad793151
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b22d997a91408a8c1861d1f24140d285
SHA129d22db91761fcca46b75093e1d8fb9899b60310
SHA2561ef784521ca5c000b7edfb929fc5dec86d568195b791ab01249bf025489e1e10
SHA51279e07c73ec10418fb1214c020cc93df6ea14410fad60316d29e25fddf6dcda360c6474460c432e3d5fc36abe67994ea306247f139b7481db0f75b92c77492653
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541cb85749ae94e99f84cf6eecb78c69f
SHA16a53b843662f372484a3aa5514c836bf91f72883
SHA256ad654d218cfaf40c31464b41fa6b922cbca377b764683b6fdd1dc9cdbb2f64c7
SHA5124a953e143f1b11714260a855660c4523e27e352d7e21cfd382cb1b236e7a5626f41fb7f681aa176acaab5bd204adf468091a59892b02ab9c0b45a2f9a9da5c13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d498cdb5f83a97951c549f5c7d06df54
SHA1d5c34c97829ca3f1248ab2aaec0a2b48316456ed
SHA2566106b58794a326325f60c8aacb6a8f854c7f7875ad9643a856dea0efa98bda63
SHA512b1613a2c5768375143d76d0289d89c9ef9b8ecdb34053506eefc137c97cb98905b68259631a2515d5be110f93e9ad5d807b138a2468c3d0d27f01331c46e5833
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5467a8380f9e21920398055dcb0b1a7
SHA18b2febbe550f9ac9b12a2cd0d3f46e4f6a557c14
SHA25671f64c9c2d43cf7bc3ddb72b1addab4ae7fbfe1ac5ee2b57be88e307424f4a85
SHA512aa91c2bddb0c7fc076c02df6a8f1dca64f18b78c883428ace56fa5da1763de3427d1dc408b51224bf5ff6e45cd79c7f9d9dbfab47edff6d6995f9e2f2ccd8f5a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b