Analysis
-
max time kernel
118s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 21:26
Static task
static1
Behavioral task
behavioral1
Sample
0f95a4cfa88b7f7740f05b9b0b2b1927_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0f95a4cfa88b7f7740f05b9b0b2b1927_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
0f95a4cfa88b7f7740f05b9b0b2b1927_JaffaCakes118.html
-
Size
35KB
-
MD5
0f95a4cfa88b7f7740f05b9b0b2b1927
-
SHA1
60b97ce848fe5bb8e9cb8b826cff9bb58bed02b1
-
SHA256
42ca0029f06d1d1cc723df6810fdec1e18fbc7d7cf0f48bcbf7917cf627ee695
-
SHA512
d45fd75f749911b13be35d1a8cb564ed556411a313cd0182d29fed4662918bae6a84c0742ca855fbb0b69b49310ddb8c603f515559c309e9f658508d6179f319
-
SSDEEP
384:2MxwtieBssdbWWGUjCNwxvRc98RWxehVa668:HxPeesJvrzvR882e/
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6091916f46c7da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b436287934ec54aa402aad8ad62879300000000020000000000106600000001000020000000cbf22955972c6109cbf89ad76946b82c50bbeae4f26daf0a98a48815004b8c7d000000000e800000000200002000000033f63504a29ca52bd083b3d3cacad10380d0d688cee94659f07b3236168e4485900000006fe92a5f091e40194f0cf9868f1bc4232ec55aa5c04ae381b4292724020904e75c4bcc5a6eb68e152c24f3251f32a82796f9c767418afcbd19716d083244f60c9f3c32ea145bc7a6f5b2be2a39422e2f7a3da2d9dc13a7c01b09aac54a7f2934e6574de2247a9ce522d2843621c4063459e6fe02b3d601cb4cdbe619c034bbb198d490ab70c3f7175d1375642015fe25400000005cebb3153e844cb23d344e422fb6c0bf794c9fb9f86de6f727b2be1308547b11ec7f9712fe459568e62ece305736489dcacaadc529ad05bcd535569d78cb1d07 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b436287934ec54aa402aad8ad62879300000000020000000000106600000001000020000000b1260fb0a3b5e2f57a0825f6b5fb6d20339e65c4087ac0d9eaf0b947fb578517000000000e8000000002000020000000ffb91f261f425e7fcdaa990b1b2d1f47c153c55aa217b920b9ef3db075fcf2fc200000001d97bd0216d6c26fe2a8e775f66788dbdaf2a262d65f01cee161413631b23bd540000000155460645c4aaa231764f313cd0e85ec83205c8b7057a65682708bf8c97dfbfb41f9087afc6b5f494d50f737b4b6bcec3e7de0b732690ffc5af12631f8267223 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425512648" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{90981871-3339-11EF-9FEE-EA42E82B8F01} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3024 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2904 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2904 iexplore.exe 2904 iexplore.exe 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2904 wrote to memory of 3024 2904 iexplore.exe 28 PID 2904 wrote to memory of 3024 2904 iexplore.exe 28 PID 2904 wrote to memory of 3024 2904 iexplore.exe 28 PID 2904 wrote to memory of 3024 2904 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0f95a4cfa88b7f7740f05b9b0b2b1927_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2904 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a632fc7e09cf6227d4fb399edd46ed0
SHA171226db8e3893cbe91d95034bc7d74034810dc6a
SHA256130f69a7de82daf43d4ef44163e9e07633150cb1dcfc9e181f09a255b1db2708
SHA512331779978628f5105fac00ffd7055aa037b0f6d2e6bfac70fc76cf87d5652da3d377f3dafe2eb5d2a04886f417da298f9b0bb6bd09e36aaf00bd38939ceb1616
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59646eb68d27f6324c952b5c2523b5aa6
SHA123666c1610f7a0e7c63cc5cb41fd43203cf12b46
SHA25689189ac8952275825ec1a8cd4b8fe9e20f86323570bb21c66f43086a21ecd60f
SHA51231be4d47aaec33c15fdb33537c5d2723d50c9413f581416ea7bb6dccfd1efc3f81d26157a694315892c350bf5c966df64812d3dfdaeeda691486b93ff3002ae1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a88d1df61d7502311577960bb78ec534
SHA159f24088ab576081a4490cf50ab61e17743d1c34
SHA256c4a8ac647da574a270bf10836675fe9734eb9d5f4ffc70950cafd655cdd6caa8
SHA51293c5b00e62721af132d17b801cf90f2d51b4d05b2310ed941ee7bcf9b60b6ff95bc085d33366c9d2da7792dff0e9b16439b657a10dc2b13416da9110982d8ccb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5420512798b7ff6467dd972913bfe1e23
SHA164142361555b8269d209a06016afb0fa35247606
SHA25630239fce75577487116235b54b1ad7feb49cb7626cd3dd28cc38e14133d3a435
SHA5126ed7753e64cf77c4687341ee4b6a767c753e978605d5db977472be7abca876cd8161274d45858214155590024bf5e6e1779f559480a6e1e501814b855eb3ee1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55137f8629b996a0a82b302ed907239ca
SHA1aa3d33181d53646b14a7fbb58802ee6f0523a6e7
SHA256759d7175b3035a585564d96c6768478a7d57f1b3825dad24f9299c43057541fe
SHA512a52d19dc4c4aa8bdf68cedcfea6fdfdfd0df2bf20ecda1898dbe5847b1e28a359a87e016afad68d33244951aa71c6fe8e8021ac0ae6775c4c6d872efdb3106eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bedb10e0471c249e6d5789aa39bd8f81
SHA13018dd0a7d742a16db1a417b93cb169a5c865df9
SHA256e5d29c54ff421c29436d4132fd5b33d33df6b933db59912a0f3eeef1825a36be
SHA512b5571a5d548335350752c647ac8ad3b566457613f1ce511d7ea39cfe348b666bac7ce31df1d8eb5dacb3057304d4e062ec64e56da11f2bf884ca82af3a4f2408
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530464f9add266bbc980f9763149dfe87
SHA1a3fee590adceef015c56abaeb066e1fa2bb1d105
SHA25601c458ef6c459da6eedbe8d4306a707f2cddbfbdd8b625d8c955da63746dd152
SHA51204e80ba6931216a63c62b242c4088e3d8d3a195d8c47c31a39dfce0800e180fa8c841ddaf1614194c878ccd36a3e24c6bbf0465aa8d466e54a27b6debff7a640
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562e77f9ced45d5559b6cab9fb652f0eb
SHA1b96c63165602db9d6d987c17b67ed7523b7647cc
SHA256f0dc409fe791c64caf7492920c073e9a10eabef2c1f7d481cb4d80a470be0d6d
SHA512e43f2c0bb302fb25141fd41622436848c64f5d62ccfcefe4b14c482d5d8762c922c048f9a6acc2e9889d602d470db7c233121933c9890e29d5655b574c68a873
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b