Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
16/06/2024, 12:53
Static task
static1
Behavioral task
behavioral1
Sample
b39b903c28d9c78513dcdb6e4f1afb9e_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b39b903c28d9c78513dcdb6e4f1afb9e_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b39b903c28d9c78513dcdb6e4f1afb9e_JaffaCakes118.html
-
Size
34KB
-
MD5
b39b903c28d9c78513dcdb6e4f1afb9e
-
SHA1
6b5f25109cd14c4727e3ba58b7d88f4b2a95d105
-
SHA256
7a47d980ffc041edffc4a455e90abdf4c2de5e22959523e369e20b2db4b62b24
-
SHA512
ba52c7ae649441455b332b57f3a11dda298eb0860171481137fd88d341043f6486660e13525bc859177398f428dfbae92c91255224c9f05035f3aa30dc2f3794
-
SSDEEP
192:uwjYb5nganQjxn5Q/HnQie2Nn8nQOkEntpNnQTbndnQOgHcwqYKcwqYecwqYQYe1:VQ/P7mg5Yee1i4hXbTkN
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424704276" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6D4C9EB1-2BDF-11EF-92B8-52226696DE45} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2196 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2196 iexplore.exe 2196 iexplore.exe 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2480 2196 iexplore.exe 28 PID 2196 wrote to memory of 2480 2196 iexplore.exe 28 PID 2196 wrote to memory of 2480 2196 iexplore.exe 28 PID 2196 wrote to memory of 2480 2196 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b39b903c28d9c78513dcdb6e4f1afb9e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2196 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2480
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5985cd55426ca12a5d546d50bad828b6d
SHA1f58b95a36d6d16aa185f012aa6a3f8eab6a3ba42
SHA25625fa3cd9de0562b20235a21a98cd9c266933ea97d25be07cf857efb698b494a5
SHA512239a62298e6c492c15bfc681289e13c0205627264182ce8a41b6174faab264ee21a31cc9089c83691a10d61315383a942508f2c01bdf3bce6c7b5dc2d75a7e09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d95ff7173b52e0f8f5d144207dc06d64
SHA155e4a24924f19a6962c24740e06bb78f44d30e42
SHA2564ec475e74c416f72e71e0791e2da4450e091e8ed7d99c504f2824d76fcffa7df
SHA51259f0e7639566f66a0ce07d3fbaf8828ae39a7eb044776b896b7eda22ca3730bf5026dea10c689be291921bedfd5e31d4bcc6d2279cba7aedda4d6ec84c285901
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ce8289a885b5af4961e61df82762b3e
SHA1de806eb30fc925d54bfe70ae623e59990065b734
SHA256ee91209cba577a923e261516698ff254ac669bdc418eeb76182d905e9e89578d
SHA51258e207ecf1c843ea2e2ea521d238978b5e6a3d535c896456b16919939f07428b8957d84c779edcadbb13dafaf33bdab982d116dd5674344be13740851ed195ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572a955a521838d7bc674ca5f20abbb29
SHA1ed9a817b1245074a29448f8d971f681af223c01d
SHA2561b7872bb0afca20b9fab10e0c4d4abc8208d3c13ec87ba61d0d3b867654a2853
SHA5128ff0089c31f77ed673b2ebe4644aa9e64b6d0ab1b4277795dfd14b14a5c6e8075fdbad6f5fdbadfca6bf77271fb12944a459282122532f242b23158a9151be1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5787c5c94150aab8d93b1bb8eaa746fd0
SHA1c1f572db9e88f0540e4b32000160e07e327e78bd
SHA25683fa971d195e17b27d6fa4f9278a67d16599e5fe27e2df9ec51399936e90c308
SHA5129abbac6cd8de88c2bce486d9ea011dd7646fc80f8a7e9d89445e99500e5fc0bfad9316ce213daebfacd5f1f5b6ec230976eb2c5afc7fdf24932bc8987815095f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587640c9175da4a6287f7a529f4e8f4e2
SHA14e4edd75230350496f6eedc34aaeaf4bc551d5a2
SHA25696a07a00f66617ba3709d9db4d4a464592508a851e3b71f4b1735304e0cabadd
SHA512666cea55de17c5b592b718ad6f4742efd0be21304e8ff945a8daaceb923f5150490375a229abecb7e5ed13fba001959f27a1f28504e0662b39a232a511d04e23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b0f5b2627202305aac8147354de7b2c
SHA1e35679640af9d35f7a0ef1c514c6d32d31af131d
SHA256b2004807cc618ffbc8a43ed25b393e9e25ab77c106344c5c8b804e96b4820a22
SHA512a7ed58922a313e60af77a0f7eca59b9d042340e587eddca8cb832d7c62c8a008c2454431ebede63f63972a0731100d5341522f825ffc619efae4324a4628fe71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532a8a66409f2d0b2cfe287d0923fdbf6
SHA10e6c37f6dd2b696807b35596a8fae7095ad3252a
SHA2566d1451ba3e08042d072e96aff54e1f09645d159432763667ae0e7c0622787384
SHA512cce791fc6099758e28d12a00c77a0896e2c5f21ae085f65923de19da031c091da4ba470ea7ced370f0bb55feab2811850674cf7db0e52d32b080648292095f58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5914358a390f2573fee245bef943e692b
SHA1460a002d8f0a42b4a93551d212ab09047e5e5e1d
SHA256fa3dc79465b7693db7de76fd10eecbc6ca37ead2812fc29f4439a06d0e59366c
SHA51254e62dfb81c425f66eac3b047c23308e14c9208bd9a3f14af6d3f29ba26a1f03632d04cd98660c49321c45caf9c059432ff18dc9e11752fbb2ee51b09c971a01
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b