Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/06/2024, 18:08
Static task
static1
Behavioral task
behavioral1
Sample
b47d39701f94c965323a6b340c94bef7_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b47d39701f94c965323a6b340c94bef7_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
b47d39701f94c965323a6b340c94bef7_JaffaCakes118.html
-
Size
23KB
-
MD5
b47d39701f94c965323a6b340c94bef7
-
SHA1
02af866c569cab217772a24add070866e056c4ee
-
SHA256
764fafacb704c9177075f61c300d664e25ad778d85863aae19a7fda4328f4fc0
-
SHA512
75f391e579a4705de199ebc50ed792843707711d7de253ba169fe6d4d1fc15c6e00362cf7541f384664ac5b579dc56ae32f9d755215ac95d5759ce9a603249c2
-
SSDEEP
192:uW/ob5nuNeenQjxn5Q/InQieTNn6nQOkEnt4unQTbnhnQpCnQtTwMBzqnYnQ7tnA:UQ/GFd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6F286F31-2C0B-11EF-8356-E61A8C993A67} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424723177" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2964 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2964 iexplore.exe 2964 iexplore.exe 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2964 wrote to memory of 2112 2964 iexplore.exe 28 PID 2964 wrote to memory of 2112 2964 iexplore.exe 28 PID 2964 wrote to memory of 2112 2964 iexplore.exe 28 PID 2964 wrote to memory of 2112 2964 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b47d39701f94c965323a6b340c94bef7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2964 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5146a077f4a63b875bf38d708d3888840
SHA1448951851a44ee18c90abd1d01d88aec5a553498
SHA2569ed2d4a5683c71b0fc1bccccb50459019ed8e4030e5a04de53a7d1519acf5c77
SHA512dc9eedcc520c50cc40721494d2603279a672b418cae0c8095c8640fd30c237adbffda31a9ed1907bfb1c25ac7b715a4e160a9e19876b151ea242f38f69a1a63b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a221eca64e0e4b6f546b3ef8691d5526
SHA1b386616d5c9d71087ba8d18c7d929f1d6df91a3e
SHA256b251a65f903a2cd3ecfcac1b6c08f8123621d8411d2d661b00faeda8ec827bbb
SHA512e3cb9b20a7dfe419c31bbc49f6e09759d2bd4477516c7ef2ac650f247ce2dbe74308ee7561e48501a8c573fdbe3dbdb750b17dddca103e42e562e7b2f0eee62d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebf510057804a170fd6cc9b4a1b6f629
SHA1fb06e8102a72cc6c470f73590a58f3c544844b41
SHA2568f22eaa045220e9de87299ca3344cee78836a40036315567fd7146f1ae69e54c
SHA5125c164e70467a2a8da03897936aad2b59e4636950e15841e7c7b23f1678fd3d19d52780b0396f6d635058fabc0f2b107b33e53d77db1590f31328f46717755236
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f7f77e824aad5e81d6376cf833dc4f3
SHA12b7c4a613e398b4265109bb3746b837c2b28dd1f
SHA256728ce50cf815e6925b914392bc5258d20597d9ee82cbf6663ce374b252ccb6fd
SHA512f3c1f0b9bf0d4c494f6e28b59fc979d451bc38f01840c99e6e1e8d2a442d7d54b2c0ff1d6905f0a97f9c4be50d2a28ea4a7f75d38ce23e8dd977d0fe38efa55c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a20f3aee06283b044ff64a9c78da90bd
SHA140bb207f707dbc36e04dd55feabd561fda8d080f
SHA2569d67dc6d6440432c85215ddaecd27a6271bd2a30642876456af9a98928386b4a
SHA5125d84ae5f119571f86ccfad07e0e1a9e9775298b28747a15358fe38890f743812af18101e5e36168ee0fdfbd7b89168cec586f585aa16c132927d564699c1e910
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524f2be0ac178592eead0041e78090dde
SHA19e1ed1f0b3f4b0c934f60ecea8a777d075b2cda1
SHA2569bad5a024c40ae586240eb1ea2c4f4c2961044b0157b2daa6c7dc8bbafad10ab
SHA51226e052282e9f1692c1c7909965940832e55a30936c3f3b6fba13b1718e02aa6c528502a3254422c5e046f7a54192d3649a553fc98ba6763e2593d8321dc2f35f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fe83eded50101069bdd25090c2cb33a
SHA1f4805fec0cf884faf5cc4482bcd4a4cace8dd1c1
SHA2562c23fcf0e9a13673a44de8bd630868181bf5c2e00f5950200b06e9bf144a5017
SHA512442095757a9dc37952422cb63a5af0cd775b657375d09621425f6b80bccffa84adc9e983f0a3e5ced137fc0c109900270554571b15ed51bd4b6d68bb6de30642
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e44ec2705f110ddae6570205058f48fc
SHA19da65de37f8fd268740418cf31bd51df477e97eb
SHA2564802dd6ca52dfd3b3a9ceccd251edd3a025d63af2f445dc8dc1ff5112869ee14
SHA5121869eceafd4315445ae623404eb2872134f91a69559b199706d4015eaa22b277c9bb9d7834399f78d6e796cb5b96795b3f71aa650e0b8088f9d95c6179382d53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa4d3238460c70658be06dcf781be684
SHA1bdba37928886076cf0a66c9d2a34b81965ea3833
SHA256fadc204d0deb17bbd4b4cc4c8825f06ba038f080d027548726de056da24cd5ed
SHA512dbe69338f8b51933691c5a59fc4371a314dbde48b81ecb02b7cc006197be043d2a3768f4b6a0eaae40c486f8bccb1777297436c3d2fcf7bc6b035d4dbd817039
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b