Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25-06-2024 10:01
Static task
static1
Behavioral task
behavioral1
Sample
0da617471bbcce9e6f84a2d01ed404d1_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0da617471bbcce9e6f84a2d01ed404d1_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
0da617471bbcce9e6f84a2d01ed404d1_JaffaCakes118.html
-
Size
32KB
-
MD5
0da617471bbcce9e6f84a2d01ed404d1
-
SHA1
531a14f2d36ec077830d0bb99e159fdaf95e482d
-
SHA256
0fe6e95dcee1ea052e77e2e29481d3ad6c9addf3df029d1ee9c3b750e67a91f8
-
SHA512
b04c4532692b657466f9c209cd9c6633d74db0e261ce561a13627f67becfad45207e98e7100c0fcc625ddb9b5c7426180abb0ca31b14f990f616cd69d382b565
-
SSDEEP
768:KqWJHe28BB4pM2maYurLKYCgJaRW5PUQIhGndUQXa+OZ4AL04mo2k3eK:KqWJHe28BB4pM2maYurLKYCgJaRW5PU/
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DD4150C1-32D9-11EF-BB1B-4658C477BD5D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425471544" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1952 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1952 iexplore.exe 1952 iexplore.exe 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1952 wrote to memory of 2312 1952 iexplore.exe 28 PID 1952 wrote to memory of 2312 1952 iexplore.exe 28 PID 1952 wrote to memory of 2312 1952 iexplore.exe 28 PID 1952 wrote to memory of 2312 1952 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0da617471bbcce9e6f84a2d01ed404d1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1952 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2312
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515c2778a6eafcdf97011c43bcc3d5e4b
SHA18bc760933790de6cd57ae1abad91087d41af84ab
SHA256d791798c7e0afa2ffa26d534a3ac927c85f7652de4d2c6333f47635ab972fc6a
SHA51227911f5171267c332b83724ca550a9979ed119b110e27dcee532e06791b22764e8ed5e2541584725404def782ed1c16a53b6052aec5f627ba70566ecbf7cde35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c2b4c5f78b119f208e621f220849d0e
SHA11f16bcf15c0cd09d8d9817702de977b670c8c332
SHA256cac626f5e536850f7268d586ebf9183234a493136b13759291f408aa23310d07
SHA512e3a7865e4aed4b1cb90c2f9c566b39e9fbd95b3cba6a0a7fe3d6540092260d3bb2b01d1c0bc725af9fa9d990406d18e639f78812c7c7a4172d65ae17c7787a15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f284eddc9467e2bcddc8d4b626c200cf
SHA118b8bcd79ceb1706f3d94ca0583ef0a8b2b6e24a
SHA256430fec912ed549ef169b1a07b0ecbf90d9a4f4737717c77012b3fa2ea08ea63c
SHA5127cbef7006032ca5d99c8451dbbd27ff257cb22b8e2d8e4bf03f5c48becbdb4f27f6ba51e12f8529b597f1439386a2309945cd4faed25793caf7cac5a1b1ce676
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bee3798f999eb21434c5ca4344eea650
SHA18cb8ed3d64a9fbc1c746f155528ab5e491d77167
SHA256fd7d8d26fa59b4410abd550853b6cdd3d7c4a6d5083fc6ce6f9a6b0e8bc0bbe3
SHA512f93f2514ab140e96ea4e747a5f79644eb744339a280ff0e35cce1c33a302bd12c6d2aeef8dc445a9cc073e271ed2f6e5d9e1b18ae1ea2cf8024b1115a96669b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58aee85548fde9924a4c8962705843a09
SHA1397a7f7a89e2e15bc23a657de5354c504a69f0fd
SHA256d36eb5b67f406e976ffc009ee5f2c571380c41e8ea53620530fcfde756de3e69
SHA51293b51e5152150fffce5c2c8e1db63b31c496531e10380a637d263859e036522631b232c94a7fbfb494803d32184d3bd82c40280e768093b6820f521db5469538
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b959c837b37b37a7a286b86ccc09f40d
SHA1675b73a7386b959bdc7453239644900fc1f0b32c
SHA256f36619646e082c0b8ecf88dd4b90b015f5a6e383374b681bd4d127efd6af05d8
SHA512cf5fa162764860d90194749429f94680864ad38c901c3fbcb327f2b58e9a2296381be9119050c315a9787d39f4bb0b7425c21a22da5d7c84f08eaa2e78fd3818
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567e81c606fda93801ea30e4c760b52ef
SHA16d2abb4db3714cb7992c2b587c19440c9469e81a
SHA256c7005dc2dfedde9d21cad29ae1f4eba30dc54b2e90d7f62fc0170eb8aee88768
SHA5129e9f9b6fa0986d0bba5917bdd2faac6ec64ccbeb43d07df820c00fa1b1637f057ba75016f04ff0a38e7499fb2fd7602e8065c97ae6226412e09015a6acbf6f9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50db4687e9a7083b4cb45fc91eb39fcfd
SHA1763f91136658bb03d4e8191c35fb99e34088bd97
SHA25675cc0ec54fe4b752b79d1dfb6b3b0d002ccad1786151d1a32006dc661217817a
SHA5124ccb377329dd8e3bd0d758d98642945d0dbe21278b94d42892143a9abaf5e46fdb8a05d8247a2ed7f8c9a817835e04d6662fef83f49235b532fa6d7a6a3261f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3bd6199a46ab278c94c9d40eeae6572
SHA1c9f3f6201697c65b38257655732da3cbee6a5065
SHA256e3365509c6c683a00234ebdeb045ecaf161b99549c93415f52db962aadeddc4f
SHA512f716617cde8ee1e9b13ae3b388829f0df007f4791df572f9b1e59a6a51e17fb334c9c47f3ac9e300bc5b3e803ea2b3914b7b95cae2f94c3531f2238b908810cf
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b