Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
16/06/2024, 09:57
Static task
static1
Behavioral task
behavioral1
Sample
b2e56f64745535860ba31be0793d19a2_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b2e56f64745535860ba31be0793d19a2_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
b2e56f64745535860ba31be0793d19a2_JaffaCakes118.html
-
Size
34KB
-
MD5
b2e56f64745535860ba31be0793d19a2
-
SHA1
5f347f5a13e70064222337ddff5f21e4366eb6e6
-
SHA256
80b49e918dba46b52f9e8fce1c311cefe84e61f277828c89463834fb7270d1b8
-
SHA512
42b99146e6f4616a1eab4b675102b805a0ea22661517b022efe219296424ae334f614a0af7eab67c73c06ff22e0fda18510f266e9d510284cc1d4776708dc0dc
-
SSDEEP
192:uWT6b5npunQjxn5Q/1nQieQNnJnQOkEnt7/nQTbnZnQYMCUAJGhDXHgmdjsH36CX:oQ/eaBZXHgm5sHKCFxjkzya8kOWPy
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424693723" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DB43F671-2BC6-11EF-9ED8-52FE85537310} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2792 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2792 iexplore.exe 2792 iexplore.exe 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2540 2792 iexplore.exe 28 PID 2792 wrote to memory of 2540 2792 iexplore.exe 28 PID 2792 wrote to memory of 2540 2792 iexplore.exe 28 PID 2792 wrote to memory of 2540 2792 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b2e56f64745535860ba31be0793d19a2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2792 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a78fbc1b98b94ca60cb063dae09afe44
SHA102d366cb9d749b3115a3e14e3724c25a79a58c81
SHA2569b85605a739daccbf6fa9be82cda898011c191ac7dc30d333dcacc58c559bc5a
SHA512416bdfd34a6364e4f1ecba0824cbe2b02b58074f64eff974c2a09e70ef71f7db1a094c8b043a41064848c070a1a5fb2bb9ebd8cfa9db9e0185008184d82d9eb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8243243cdc6a61923003dc35a408fb1
SHA1cfebaff774797c29b33802d8907cbc000da87d42
SHA2568c06dd3daabb90cf769cd9706e667811adf8599285c8f962a342bee9f1fc047f
SHA5121ea62a03c0a97b09be5fb5d39c2ff00f1b87979100f3512f612e485ca5cfc86f0245604c3bb1381498bf1f52605225d61838d1b8f6e3afd703752ed3bfce10a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55edabd2aa45c8a79023745a83e1fca8c
SHA1aa45bdf9760184e8ff252d69865da1b8aa560cb2
SHA2563a73e1e3da70fb5a2b32fcdfdc85cb44f52d44627ba641c890ba673b021b3de5
SHA51221c7b53712309f02b7b42668ce80ca50a0b970bacc53d199359605d07862bbdc0c0cbe9d261a208f2a0174f089c13c0b7139cabf05024209613a65b48fe1a73f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599525d149d0ac7dda589116e32ce7e60
SHA1eae791f53fe48ede153e574f20c2e1afc2d1cea2
SHA256f48bc08946574f3be70a19a76fcaeb6f6b1a22ed867e4c0da0b738eee8c05e95
SHA51232658185a25d13b7a2de49f74f44a06c1b7b690cb1a1bc3c0db987c1ad119e65d608b4f63db05f89d5f70eb2d1907a7f7e47b1e576a10a7db2b3887b164b3177
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7e4732623913ea1a20aaf8a7d60fb1b
SHA15dc7e6a41a267dbcc23b88bfd07f17ae0687c0ad
SHA2563c2514e04510a5e8d4fc7f312b7972be4bbb8dfc0c031b07799063d517fd72a4
SHA512a6ccf71c1bad2143ab73e7967edcfb21bb907e2f8b0f6c362b56f89f2eb9842df9c6a3a09dfe7820c520bc62578e0aa6f0b9de6b21f96ac112aad98a5d8017d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9ace14d7221b83b8af1451b0f644935
SHA1b11355cff8eb19c44350c5847168801e9f240f8f
SHA2566c64eaba508c1233a01596a117ce6e73b5fbeedf86a66b83e55e2eae9c6977f3
SHA512251b834798d20c6a53b0e4f7a8dff66efb6111ca0e119824ee1233fd67b860a494926ec7cc1d00f21e7a11970617c90c2e2c82b32426893dc9c2d5e3a9a5172e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc60c4a56826e37ab8f1940ea5cce6ce
SHA186f30f48b4d781fed9f525df0fe108820c581725
SHA2560f656fd4666a41b5d461388df30d0685dfc3e1fda2f1544012d57114eeddd5fc
SHA512ea8a9fe6bd2736cffc7817fa01e06493cf78b4561d092b7e266372791d6884b639f3eba3c14ccce2b3837975df595953432a9fd559371dd071d9029b9a0e1d36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc01f86640028732975a40c484237654
SHA1f8abb8dd50467efbf093a5b276feaadb7b30b088
SHA25667f2c4fb7235d486ad4da0665d39cdf388da8629477135914fa9c86f755729f6
SHA512cdd456dc695ce6465d8fbc500286cbc56bd5bec97e85c45b505f574bb0f20ac8f6c36ea0b610d6f6c5d61872b2d1972848bc02a44ed27b9603590019261e5503
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3a6bd2d9ff07ff4035d03e4d0a577fb
SHA1656a782b94767ad0240cd6ac995f0d583812f4fe
SHA256f3dfd3dc496acf1d8ed0b81d33500dc2efb000b24327260830446c87c78efd30
SHA512a6db6407a56ec8d7bc9a577998acc1e5e2d67ce7025cdcbfd578afa4b43375ebd1a9812c9589d97c5eda76a1f7425f998a794222d3b5aabcb132f52d6c93dd10
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b