Analysis
-
max time kernel
133s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22-07-2024 15:54
Static task
static1
Behavioral task
behavioral1
Sample
63d1ec7bc54e1301b57236aa6a13e63c_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
63d1ec7bc54e1301b57236aa6a13e63c_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
63d1ec7bc54e1301b57236aa6a13e63c_JaffaCakes118.html
-
Size
31KB
-
MD5
63d1ec7bc54e1301b57236aa6a13e63c
-
SHA1
60c4914f4d933eaca6b8c27d1f7eb905bbecbd8f
-
SHA256
3739fb44f2096dcd7096610c4d92760032c65e6da20af39b015115138e8ecad5
-
SHA512
4a0141e8bf0592461ca4930b0acba0a3e3babaa8e2c996229734c83580a1c8962c2f6d52e2ee7af4ad53eef40be75bcb7e409b9e72ec3a6c3c1cb358faf3e0cc
-
SSDEEP
192:uwrdsb5n+XRynQjxn5Q/cnQiefNnenQOkEntIinQTbnxnQmSSxRTv0JU2nUDGPoq:PQ/hlxRTvn2njhCS
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B849C611-4843-11EF-AB0C-4605CC5911A3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427825983" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2544 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2544 iexplore.exe 2544 iexplore.exe 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2544 wrote to memory of 2508 2544 iexplore.exe 30 PID 2544 wrote to memory of 2508 2544 iexplore.exe 30 PID 2544 wrote to memory of 2508 2544 iexplore.exe 30 PID 2544 wrote to memory of 2508 2544 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63d1ec7bc54e1301b57236aa6a13e63c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2544 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b100b330a414347c672aa3d9fb4a6760
SHA1f6ca4ba09ae5d716137f77119cc4b1cb53a96da5
SHA256181e1b9d6ba4677e5dcc666c21694486ad9d4427b6230e47e3f65e869ccf9ec1
SHA512c1459d9c83c1dc7c1e1c184a62c57652115b78dad89cdffd07070c76fbd340d7343570c339b86fdf1e56ba6b157548a481eff46296ceb9ba495f8ae3da0633ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e18ed0c13125080c3f9499f896cc9b7
SHA114374cf666337b1976eedd6c99204545c7623201
SHA256db9d36794385ae58dec1f9bd9078bc0fcde5f35219fd988a8e62e4d45c64974a
SHA51254a52aae771b0150c722900357f697852bc03947d8e1297f2715e51db17fdd41143f1c4fbdc6bdef5a65f79ba0375096f1b27921094209955b2311219ea0e95c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b45282ad65125c6c45e049458b6d63fa
SHA1ddda3fd2eb7483617fcaacf61bac1132277100ac
SHA256606a9c8ff50648d9a591a4c17970c7540bd804a2216fe42080937a07620fa2ef
SHA5126a48272f00f709bd87b6782524fd35f0604fbdc04dc83b33d5fd34f2195603acd0c321e6765f1d69e3879cbb743712191e31dba2962be72b7304ae066d00adff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcd6244c6353c1f80213c37b9c73c962
SHA1e011918cc8574407dd393de5719e78c6745432c7
SHA256a423cf1bdd77c9d2d0b7ee5ac5fd9647f86be26eb1127c339e02372585a0205f
SHA5123ecc5105fcb009fd7f92ca3607507cccafae5e63b22a298179ed9e1d7263807081b533bb6e0d15f59e73dd7f1ded5e8d7cd5a0289210619d56b0a4b197f913e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557ec4221b665443f5f8d0d74abbeb0dc
SHA1d01cee792554a99da95ff84c8a2bdf0800d2c9c9
SHA25655384c262d0de991b2fb8a6e67adf93c924929fef34755e83625b17b02dcbb8a
SHA5123458f6dd8fde1ca696983e9076352c2c0bbdf9773dce750f920ce689f5ea574831167c195ac63a33cf5750431a49c3acc4731966f20620b1451cf5e4e7e5d33c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac029919210b942ccb2535c67e66cefb
SHA185eba98a8eaaa31772663a11b15aac730cce1edc
SHA25692a17aaefa6829c4c93d828c3d7a1483e38343ad35a07a1efdfb173dae4295b9
SHA5127986f13aaf308ac5616fd4c239ae39144b6ece005661304e6f961c112eaeb2cd4d39d6859e969313aac4defe07991d9b6bc202bfd0378e87a6c92b45bed8d0ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5401c7a54fbf930c4cdea529667bc8856
SHA117d8cb7c38632b45df7f43f02c3c7cd37873daf6
SHA256416ac9a1d736c4500b3d59c5158371d75fb12e792a6d1ba57be275d0b4c6930a
SHA51210accdf00cb5ab0537a0c5a5784c88ca2facf967f751dca4ea5fa2acb8a7ecff08ccf77c7b4c5cc583539e7fe8ade68c9fb27d4a6cbd5c9505ca6821e6140349
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e85bcd117fc926abc7f16eb38c9520a
SHA112b71d75a89253b37472290716f60fba2dcbbc81
SHA2566ca81245b354be9d59bf357dcd5d1423817685a48ea2dfa6b5cd16a3225b7996
SHA5122f1c599573e5be9de148454122e1143aaef33e1e0b5d0c482f85444142ef91cc133e1dbc547407d270b33cc9e8b222db48bf630cbcd16986463bf5704656cf5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cfa0b4a692a51029d62b950143380ab
SHA1bbdc7e9980f190a72347986db2d884c36136bb4f
SHA25678b8881001cffa2fe7cd814e2164098cc6229601a193ad4bf9807193df569dae
SHA512e64039039366db5b81ccc581645ca47cad2d47dda95cb46901a0da6fda801d296e1da6295778ca3a7d0f405768b13098d5bcfdc1df1a5eede5f5dd82d7eb1d3a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b