Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
17-06-2024 03:18
Static task
static1
Behavioral task
behavioral1
Sample
b6858060e9e106ec4e1a4673e6051611_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
b6858060e9e106ec4e1a4673e6051611_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b6858060e9e106ec4e1a4673e6051611_JaffaCakes118.html
-
Size
35KB
-
MD5
b6858060e9e106ec4e1a4673e6051611
-
SHA1
c7fe5d54289efb187479ee1b259d0c53122cc9c4
-
SHA256
22c5a93dedccd869d8ff5963c33580acd0149d21a7f68152380bbb00bb671f76
-
SHA512
77280db32e5bd5b21911889e5c9d4d70b9a094e032134fcf6f936645f3c63f88da5c98f435adc0f158cc19ff17085abadc9dba39e41095d1f5e769135ae230b7
-
SSDEEP
192:uw33b5nxJAnQjxn5Q/8nQieXNnunQOkEntounQTbndnQOggcwqY9cwqYFcwqYQL+:xdQ/rMp/5LPt6TlSkYTdY
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{468014F1-2C58-11EF-A68A-46FC6C3D459E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424756180" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2372 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2372 iexplore.exe 2372 iexplore.exe 1748 IEXPLORE.EXE 1748 IEXPLORE.EXE 1748 IEXPLORE.EXE 1748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2372 wrote to memory of 1748 2372 iexplore.exe 28 PID 2372 wrote to memory of 1748 2372 iexplore.exe 28 PID 2372 wrote to memory of 1748 2372 iexplore.exe 28 PID 2372 wrote to memory of 1748 2372 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b6858060e9e106ec4e1a4673e6051611_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5aff28252803ba5278200b9f37964e3f0
SHA1e0d462c383d48c6c069d79aae0285ca2997c282b
SHA2562bf96ab84ffc9f8d39d9006f9b3be9fad97b4fa72f96689ba878acf4a6790f22
SHA5126a3a5ff4a1a0b0b60cf178e7e5f7b8b5e8a3a924bc3289474911d83c3502cfe685236871f35bc0c74c750da495cc367f81b6dcc5162755cf51b654ae6e8691d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b48f65bcefd7b6190541a2788050ab6
SHA14857387bce7be0602c6e07e5486962e79f788717
SHA2566bdafba391c3ca59d25ee12038030bed78369c2e68657dd6f6b840738000dd4c
SHA512f06a1215dcf71b795c9dd3e8cc6e659e3c3ba98bafab2a51da1d67b258ed1f18c8f0d618198079bd781a1e91288126a8c090582697e81ae5c96fdf290cfc3330
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577e196e858df137c5738939222aecde5
SHA1914ce9d7cdcb2142c24947cc0699fa8f4f2fdd96
SHA256a2c1afa0984e53f646356bd7fca46a90154b1b6515328f3554760473dd16de39
SHA51232af4e35c4f041e8dd47b729b90ab9619877a4695bc1e2bc4a4b36e05d7c3ca5bed1717c22c139dc3aac0d87875bd335999c021fb68019fefb0ec5001a0d1130
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5956a28923886a36f32cfe78c7d403b
SHA13d356c9d320a7d0394baa4b8d9b72bcb8c5c1f3d
SHA25667911867a95212194b8f6978c7cd8a9ca6c2bded810fa055afa4988bf24b4796
SHA51283cb54d412da6b5901ed746ad124ca995020bdc33e46e4394558602fd1efc54efe55af1009c3be59171c86da558ea85e9727de8f6e1f9ecbcd6f203b3f2a6823
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5084cb4a5b63d8fe006c3b5ec9fd4eb35
SHA1036fd73662322d0791276be1d19dfbce5d7f1e38
SHA256d7d8db94c420ff2890e3afc7ffaf2d512eb123ea7603da138acbf3a5bf5a732f
SHA512ef1e3672597ab89a8c9fb63dd2c8889445179d3c1f66696ebbec035f414fb2404f4a7dab87744b417e6c74a52ccfa77f8945135fb89d016c39774ab5c2634f3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e72a0112d5342138e4f4143c8e01109b
SHA1a634248979f295a682f5f6a32e11a738b4efb2b2
SHA2560253ea72b831639f31c6871902804a431a88fc6f7b86726bf037e7f96ff484c2
SHA51200e93563c96baddf2bb3e5ec876ace4efe5327fd2007a503c4ddbc09178047453b359c4f0d5610fb894bd64576fccdc0ce57d35fc120c432863d7436235424ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fc7ba19f6f886ee93bb91c1c43d10bc
SHA1297efde1d45a8797e16d10db677669fd3e246a51
SHA256d823558fb28051f2e3eb4da29bc0c70c29ed608b800dd5f1b070b447bab3e3d2
SHA5120cce6b718f55bcab1a7f9608f8a9f007a1149c96af5ec59941b4621d1cf1744f375df8b2b438f1fb14d12a4ce6a45df8433f553b184949bc8f1d4bab327cb507
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb89fa98f4e5699328dc7cab5e9b0a29
SHA17fc4df4a2d2230e61e41ef26b93ad0516c8689d3
SHA256349d363b27d400b21ad0bb0c1c4ca26ea7116bf21866ba3b7016d904aad3a4aa
SHA512840225f5ccfe6dab5f6ff8ae864678b30caa03ead6372d1d572b5e8a36f6fb5f0f258945686a95f19f813aeb1bbc22a9f98ed46917c90c0f0b8a08cc40d4e2ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f7be5cdb8df6f8e6f7b79136352ace4
SHA1c7421e7f916db0bab5a45033d14122b1cc8d53a8
SHA256e7412e06247d9c559954022db7fa1e4c14ca69f796c7602166d3aa06f8723f27
SHA512ca9f69232f1ab25daef63334a0c6e06ca7cd6415f69f33089a54eaa8bca0984fc273f073941e4af460be0773d6c48636816ce1cd86cae61f56196cdcd79577df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a56e73f3beea2f64924d343936fa8112
SHA1c5cbdc51609732e2fcb8166905a9bf09bb4f2eea
SHA256d4e5545b981e1e64ca0184e24ae09a9a84ef809d3d04c4a7303ae94ff52eb22e
SHA5123d192262c8c1e4b08a174f35205124350e8da7ada817c6f058be7f438d5aeb4b1ac97a1353d1d49b1ab45c0b6dc421edfbe4307629924b658090c1917d47e3d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5d02f6ed4c73871a791bccc46df13fe90
SHA1afe315297c26449d5a23c5f9a7b802e922090880
SHA2567d20bc23e1c91dfe811efc7dc5fa02bdbf3abe252822cc1894889a5cc0bacf0a
SHA512c74a64fc8ed0ffdf11256f7c7a1de71baa12d8b6b8bbac7be6529f09855da19d839f9a80cf58d5f7605f26d616655d4f186d97e9ba38361e12191fb2fb37b481
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b