Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14-07-2024 05:56
Static task
static1
Behavioral task
behavioral1
Sample
4495bccbd300de5f329ec4d71a6f728a_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4495bccbd300de5f329ec4d71a6f728a_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4495bccbd300de5f329ec4d71a6f728a_JaffaCakes118.html
-
Size
14KB
-
MD5
4495bccbd300de5f329ec4d71a6f728a
-
SHA1
fe2fa8f20556c1100a49e29bcf66bb2ea6b25e81
-
SHA256
f56e6f71b2dc8a0a3b0400afc430544d072aae88b2fc14df8efcfe007e9e3b98
-
SHA512
6d7a13e7e759dd327b5b93dff17c48ad7ed034756d897a8a7832d7be5ed90e2e0a2fb1a0f408df6e9e375fefd74d3a7ad72ba437822e73169518cb18ad353aa8
-
SSDEEP
192:S+x1WD7dhEKzkiYt9ShhAwZzj5zt2BsPlKAu2tUrmEua5JiUErh6U5:S+x1WDphjzk7t9Sn5t2ePFtKgaa3hd5
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427098434" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000716b8d10eab97b3b692df10cd1217f62ae46799cf5fa02313bc6b5448566757e000000000e8000000002000020000000102e3ce0d2a2412edf2fb31ddf79e7296cb628252efe5f8b8fab42f3018b46f420000000c28794620a2a39a3edd2939f442de8e928e0f0fa3815de5329326492fd894e7e4000000014a4bf280fadee5b68161537adb4ed06043d6ae8383eddb92daf4b5c79e57a1d9d01fe5b056664113859caba3c16a76bafd7682adbed24666776a6d8cb74e66b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C2085531-41A5-11EF-AE10-CEBD2182E735} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f008c0b4b2d5da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3064 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3064 iexplore.exe 3064 iexplore.exe 1940 IEXPLORE.EXE 1940 IEXPLORE.EXE 1940 IEXPLORE.EXE 1940 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3064 wrote to memory of 1940 3064 iexplore.exe 28 PID 3064 wrote to memory of 1940 3064 iexplore.exe 28 PID 3064 wrote to memory of 1940 3064 iexplore.exe 28 PID 3064 wrote to memory of 1940 3064 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4495bccbd300de5f329ec4d71a6f728a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3064 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdfba1cbda5737b20d2df216d458a1f1
SHA155195ae61be4e52e653754d65c98694b4cb34de5
SHA2563db0924fd8e0baf154ec127cdd11a63ed58f58e343b937121a1b729d3d6ae43c
SHA51238371763b6436dd8057cd299a06c783c99d60997a3dce1c67e44dbca0efcecb9f91f0cc4e14215380e59f5c5eca9d4f532dcb01292b12fcc57fc720273fdf530
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5742e7d215d2ac9dc48d9e2ddf06f62e0
SHA125292314847753d589c9dd58ffc6b443636c1659
SHA2564531527dbcd45f775759a66c5dcae2891e507331e3ec493bddc3114ea6cd8dce
SHA5121ab74a90ddbe61bfbc3baf1373821598fcf2a6bc9f64d6f90d5ba87c98c65ff3ab4abd1da47c53b8cd50bfdc187890b76b13854d45ac8332b825d7c7436e6338
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589b0fcc2653eda58386d1b7cb948b6cc
SHA139d0f2967b2860801eba3b91f2126ddcaa02eb21
SHA25686f9c14336356f5ae2158def25f263c1b853deb6fc8f3aa70094b1b9c255cf40
SHA5120100e2496900f03ef9d2994f54c8f315a90519f5ed31ef2f9d89600fda1f954b5ba0b514832577bcfbaba4bc310b82983e625c8019fdf1bba200f6e7f53f9c4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5757826f67e84683d6ffb2e6a6a49d808
SHA11b3d80f8357bd3619a70c5f772fbb364b7a6769f
SHA256d90cd0829ff1d2c057655b41a9ea98d7b23a8ac154eb68f1fbb4e26f5084deb7
SHA512c8314c2c58b568ff2a2a7acebbee07c7097d87a80254f97192715825765b09d90357bfd162cb05163c8408d5643556a00418201eaa99082123d852d9bf7869f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6a7e9c76fcab731cab01df316e1086d
SHA1547a91056cd9acfc6a9c9f915fdf938ec6002431
SHA256cf4b26d199cf99e6f9487f65ed681ab343510c2700ec2ff1b6f4be771f56b99d
SHA5127187460222b08df3287477de2fd85a0b11be510fce655c547fbc2b50ceb1338dd81658bdf75cffde33a28b07e7f1331d90294189c952855dc20dfadac9187ae3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c2d651c867aeddb08d09c2bba1a3589
SHA120d8caa0ab50eb6ea12e06549fafbd47562282b8
SHA2560b90a60edcea5355d2a49965f3d700b99fcea1f477b256ef3b2cd68c7ad09179
SHA512b2138d7e3270067798b0e52c383c15663143ff4f2d92b174397bc0d38834d918c3129ffc34e5881a7e319fb7fcbd1a4e02a8291f1e6e89e496b5b53ba7c3a2ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a596f8c83c25feeaf9e85578fd646e74
SHA19588f1e335ca14188eaf520d5b335cf07fe962fe
SHA25632108c6243f35af2fe9ac02092f0b397193b6f5c38b455030be23c6375e04cbc
SHA51273728b58e9780dab6b3a2ecafcd835649c0131dda6674c4c16ec969e9703b2200df1e223e1cf192d627edaa818eb7e7d75810da9006773b1da528f44cb70e1d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d38b21b7e99914a6c3b80f21f8736fe
SHA12c9b91b4dbdfb917a9a5445103a758eff61d4287
SHA2563210b1c4cfcb47f3507f88b91de082676349d77e31c708f58977f0e4c1d270f1
SHA512caca355cf18a8b536b7acd1da2cc6ee69479232053d0e83ca19a12714a0439fb443deaf3c6783cb038bcb03dfd36faaa6822175f4eb5866fe0d64050630ae101
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534322828159c3c4ea0b669c52e92cca4
SHA12c5746c30ad0af8f669edae294408f3194b295f0
SHA256226c117e42fa0924211e505428a68e0d94055ad3bbe3650d42d224617a57cb8b
SHA512a73bab53027521842440a5db28df1b9d4d0e9c5c6fb1e84e7725998e133b62c735b73d3c340393b7d9f0cfd6d6f95737af0f7c1665b2bfd817fd2ab582635e3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3d1e49cae4180c075f12de9d9e8a054
SHA18cbc0e0807548c4c08b566d983f58c1191021360
SHA25698d71ed42042c48aae1cda85b007873f23a79df80175d77643ee36c0eee9b533
SHA5126d225884bf4deac16b928f2bafd05583e7bdd691ef4c948aa73f5504ad11c495713056702d6c01ab6325366bc34b6f7c6acc9ab707124891c7272cbd7bffbc07
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b