Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17-06-2024 06:53
Static task
static1
Behavioral task
behavioral1
Sample
b74926d2a7d779643d5e230a44929024_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b74926d2a7d779643d5e230a44929024_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
b74926d2a7d779643d5e230a44929024_JaffaCakes118.html
-
Size
23KB
-
MD5
b74926d2a7d779643d5e230a44929024
-
SHA1
8e9c6ddb65f3455b1af96a8aa74133366c455c16
-
SHA256
d761a35f14d7d6ba584edd0035cb1c6afbc15adff04aed192547f8ca63daba49
-
SHA512
31ed41ee38a874a600e5eddad7e446834137f7cac7575e35cea85865e67c0fafd4c151b472c5e3784b0dca389e538091e8325529b6ef5939f83a885964b513c5
-
SSDEEP
192:uWiyWLkk4TTgb5n1nu6+2TlSr5SzXonQjxn5Q/zsnQie3zNnMoUnQOkEnthuQTnU:kQ/qN0
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{586DCA41-2C76-11EF-86DB-FA8378BF1C4A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424769095" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2080 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2080 iexplore.exe 2080 iexplore.exe 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2348 2080 iexplore.exe 28 PID 2080 wrote to memory of 2348 2080 iexplore.exe 28 PID 2080 wrote to memory of 2348 2080 iexplore.exe 28 PID 2080 wrote to memory of 2348 2080 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b74926d2a7d779643d5e230a44929024_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2080 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8e25b2612edb97f493d7ef1e679b9d6
SHA13ba7887b0d5c51af6acc2e0d7a82d141cac5b2a9
SHA256c2a6ee9b8536751b6dd2281dcb83ab388f23185b03ac5d8e2acaccac5047c359
SHA512930e397d8a65367cf880955a9183cb8e13c9c238e2fc6996860a90a4a18b10391933d9db34b05334dac717872520407feb4a81d31c73d3b961a4f063c7ec9716
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c8b5d953f7bd1f1a72517bb27bcaa76
SHA17fe0491caac16c73c43b86e6a2b8374864c9a9fe
SHA256a165a958faaaf5a57ace006f8f84980fa8c0b3d87c283defc0d1e7a87f899fee
SHA512ef0d82443aac899611a88aa006b415610dc22292f2a3dc70ef7dcac9d2ada66230fb0b11976277a0ee8cf42d362e2ccc29a5d9a6fffcb35463afb01c9dcaaade
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0e6bd872e72d28c940fc9872dece5b9
SHA1c5f178cbca4f2abdd4ae76f7ee333403b76e79c2
SHA25687e4ee3367dc67df353d918e98bdbd62d35425147145699a8dc0e1c195da4973
SHA512c195e25958d54ff25e0f9925c04137ae2903b2633056222d4f7ad8cb7098a8b45eb6227e0bc06b40c3d9391dd2692f65603e393ef89ee2f06bb9fa696427ce37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51da4b34c11ec205782f9147a3bfc021f
SHA1eb56544e0dc6fceac6bafd0225de263ccad09795
SHA256d8a6886ea41cbcbf4566aa05468dbefcc89f2f5361b1f75fec4bbfcaec83053d
SHA512cb4504df664a227fa52863e3d46a3bfa48b611bf37935c105cf8dc46d0a3094ce361e66f709947204392ba3a084ef912b20fb8ac228d2ba2c9053b6d5ae2017f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5a6028ae2036b09a7a65d5c07f0bc52
SHA1230d7f0ebd159daa873d225818d4f8deedcfc02a
SHA25695d6b3fe2626979fc2a3e0f9add999ac27e71cd148b790ecdfc07a09cf5c25af
SHA512512bfa077642059233a6691bdb7cbdc11129fa05ab58f0c37afdb9d284bb5c545f05e464cd89c5768bb406576895815d7c015448f1fa807d21cf6a0e0db372f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f84f5aa921e9be19f4b3401c1ab57b4
SHA18ab7f8a2c9c7a5a92fb9bbf1ee4c15af09e38250
SHA256e8261d04c8a201f71c6f9dad29b5dc4f75c7837c871006741948a0e6a59eafc7
SHA512b619df0e647689c9bb8fe78b47947587dd182e4bfddafcfb10cd3c2f420981da0480fb52723354dc36cc81e5513a33eb633f2a712b8bf0ba493853f18e70f0b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db0478de813066c1dca460daa32a3588
SHA16b8f96e021d6242ac655dd0ddde0266bdb41b560
SHA256fe88753693a722429dd217868bd27274578edf8ae6bc4972a589b983c911e1a5
SHA5120a606f84e120f07fdc5125761db0558cab5ea8a65238a231937cbc6482848fb364be1c3a5961b7c22af6d36f3ed9764b968aa63e89229eeb808af2e578a87804
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1fdb7619fcd7efb752c70e7752c9199
SHA1b6f73bda7c419c766ebc2185dc7951e04dfc89ad
SHA25653db663791cf7a3f767ba980b5baaa85f785b078917aa8dbf91a474bf9c5ebf5
SHA51246eab1e1aa658c88faaf8a68de29ad51a2300df736a00c45641d1d26df9b5faca478472ba98cb31da3f88f5b04fd4c840f0576064cc66874726f05b2bffe7a04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c429bf54e999e1a3b42d1c699862c6a
SHA12a48891c5d82fcdcb0ed6ddc1429ba4d02e2c8bc
SHA256f1380ad1d71beaa688ab243c87fee39c12415b994cddf650d63394f04ffbdbe3
SHA512bd1a9c6949ac3e880f50f8ec6896aa80060a72aa109d98b79defd93af7a37bb9b2f0aaf0897118a9db7cc5020fb8f9eddcec731ee2a1b6e30b86e3c471487fb4
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b