Analysis
-
max time kernel
139s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/04/2024, 00:44
Static task
static1
Behavioral task
behavioral1
Sample
c637531a6436ca2c36f55af1dd2f940b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c637531a6436ca2c36f55af1dd2f940b_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
c637531a6436ca2c36f55af1dd2f940b_JaffaCakes118.html
-
Size
68KB
-
MD5
c637531a6436ca2c36f55af1dd2f940b
-
SHA1
d7d89cde07c0aa6e49e8c42945ec427bf9a32737
-
SHA256
2ce68ce9b61cb74931c12d7b9c620b891b6871ce1c6097f7994642ce7adf28ca
-
SHA512
c22c72c281ad78ed277f07cba425dad0f63f0034e3939505742c33350827d5398a8da273ca973eff15e3a32c4c3c1bc8fb4f8338e72459d96a9f0549b4c4ced7
-
SSDEEP
1536:eThiUJwGx8BUwg8zwah5Xgx8wDctqvLINRxbBdGW2PFbevCnZ0qCysR:eThiUJwGx8BUwg8zEcpBdGWEjnZ0IsR
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50077d7bf286da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A5824291-F2E5-11EE-B2C4-6A55B5C6A64E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "418439731" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000ab3617258834123f9e50f5b31829ad481ff1b2d3fe44bdc102be3a3a2ae70ba2000000000e80000000020000200000004a549716ddd45076dd42a01f1476f49efd255b7641457f38dbeb90c49fcefdce200000003f50004e3dafbb5037510d249aa9d98e0a461da6133a81b5e86ec8eaa32ae2344000000033d117e8e52b662b9424f59e02afd5ed9314a1981d8d89768aa457601d35128f77dae1c94ee5ce86ab40d42aa318aaaefc844fec1bef04ab67433371f3602777 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2648 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1952 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1952 iexplore.exe 1952 iexplore.exe 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1952 wrote to memory of 2648 1952 iexplore.exe 28 PID 1952 wrote to memory of 2648 1952 iexplore.exe 28 PID 1952 wrote to memory of 2648 1952 iexplore.exe 28 PID 1952 wrote to memory of 2648 1952 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c637531a6436ca2c36f55af1dd2f940b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1952 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2648
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5478d2656c0ca5f43fd3e6ad088f5e226
SHA1cda1ab6e10da6cd469172dd8cc434df8c689609c
SHA256e2b5a6a9e8f6b1608aea74d81fd2732f33a9344eaa9e1e8412dc8468763a5a6c
SHA5126bbd9209c94e92f71ebef60b872ed205a74a332ef2b50ea7491c64e3e381b04b3a53b7447f71c3cafbd572e04a8c94913aebdc9bc6ae2ffd337364ff3f40b465
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cfb7ff2736177292666857d7995ca30c
SHA184be2aecd1ba0dfdc9e49b886eba6c08d8694213
SHA25622ebb127584983f7642991a31eaf4dbd0b9d201bc6f40f0590dc1173b4b4e287
SHA51290c4a0ce73b1a96fc7268d0375ab74e58ed1d6011a8eb1c11228c4602105e2384e35c6e92cb92cb58a57b160f7b80e73fe4f61123e6e3f1119b25a12705049fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df32170d779a1aa32b24732ca3bf48c9
SHA1c7207799824e5e5581d9462790104db681223ff5
SHA256db6d5c724df9c1249e2ee1851640e309cea32d02ea27920fb2dbfc140fd51cbb
SHA512fdbb03867940dbffc84923192bef81a2a4cab3293e2cd429a195bb7602c048a36721d140f423863c5a94dd3be6939bdc3f3c5eb8ec6a67469b6bf9870b935e54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501b4bb2a3241fa138c9d33c199886f01
SHA1b894b43c47282be45f4faba1de1ed3888e217367
SHA256f02f8d0d82461ad8652b3ebbc8f41c1d1872349878c4343237ecd0861e678755
SHA5122b6abcc512b7f45d3f65e76b67ec0f1a7c5b57b35216db8be9f0faec8b207279b0e372991ed8b577f04d7bc4a61d1deb40a42acd19ddc0e4d43cfe7abc911b87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b1168a707a511269376e8fca5c5dfbd
SHA14b5db2c7bade3a9c923dcee499fcc6df21539c85
SHA2561241afe71bb4a791c41269be0532b248f244318058b0ea558de75a64b33419e6
SHA51266179c4876e3f7390e6da1ec90fd609739703f74d1404e0f794eebcab499a539231bd0cd7a11ae5f4192e3bf10c37385e4d02e6702d6b56a4894b974c05ec341
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549815c6bc70a56c9427b498f2d896bd0
SHA177a0c9264c1b70110fd6e86e8a0c83e04f26f0d5
SHA25693ed64c84099a9f61e01992e5ef43ddcdc71b65d167f39992c69d968f1cb8128
SHA51206b9553a3cad05577a16b629d9a6e6355bcd9616f7dd485280153600250d0c53af3304fe2c984dd9448436bfbdd6cd61ebf1beedc9bbb850dfa61f3b18e1fcba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562d3048e9bf3687215ffdfcf870b1cb1
SHA1df92c37ce546a8b383ed6af92b58ffe7daed4f6f
SHA256382af2e18367d3efcb0a57c64604ecf9a591f754a89bef06a92bd72507fa63b3
SHA5121620f49ad368cd0de6a6118f045c0208081e02f328610adaa5d566b11bbb2ec9fc499d59cdfe0f76a93f0577773139e7d7dea6498d6562ebb06a74374aad6175
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec52db1300d89ad6c6dcc4734548d487
SHA1cc5e1f6f5feff3a07bdaf0c683c336bfb0483ccd
SHA256a93c358f1a783648001f732559d3688e8b8853ea5b216104368d22b04f6a2bff
SHA512952d9b109ee05ede51439d5d5eeb9398050c05713a23a68eb8b4e0bb25bb75cf4b0ea05abae4a66012535a5b110c1965c6497cf756cb6d8ac2172cc913691754
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1379ec11cff0c8319b2ae317cba63d4
SHA1727653e9843708a77f95728f5f89dc17c284f9e5
SHA256d68fd6d4ee7b7047f11f64846de38344a188dc5bc0b97e08fb2cd770ec26d542
SHA512825c4952799e50ccd59770add0a7023c045b83f83caec52a5699cb7115664c425ef574559b950f6b775adc834f46c74cecd21b9db1f345a204b821dde21fac19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5308c7e8747e7dfebefd8ebbb60b46d7d
SHA1cd5e39e78afdd9dfe282be7ba896312de5402b0e
SHA256eda3a50995f936e58bd9006dcd6be9ba56bf90539594d411d0aacaf3152ead0e
SHA5127f541ae91782a4688f13d5b2f080b96e32748124242578d0c1b3bf7359c8b8fba38eeb3f3f657806ecd41231220a3064aacecfdcd8992430bcd587ccc0e8235b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571a29344cba2efb3f2eb73a6d4ad5f7e
SHA1a4480aa21005c3d330ffc4e68fb97087979dc187
SHA256ba8cdcbbb5ce38411facd71481fb5aec7878297b5281020465b7be430f08222d
SHA512711c7c3d33b51bb3f8f0c68f2c836e503e87b358d3b50e614678ebadacc97c81751007090671525903b6c2175a6f5d396f064233ebc0a313ce15615864dea116
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5826f495f0b552282e80d44921ca51427
SHA110bfec7ee56dc9b2d968a5d7f73d05de9e606e8d
SHA25616fa4d898d48944f79eb741e2ba296824b469c74ca402fd6e42414710fb35b6a
SHA512851d914022f2a7d7e527ca1101c47f7f8c5ff6e4833cd5857be1d7b9583072b8617db80a28fc60ebd683f79e08bc168abe6618d5eaba0191ccae3485d4f47bde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6ee72a135b6cef5a7cee0d112a02fbd
SHA19b3f0981018cda9d70e1c07ddf5d9a324199302d
SHA25672956a1e16ab2b959d9b8bff8d9b1143e0e190b7739eb985b989713d4bd6be74
SHA5122305fdefb074477826a7aea1cd65a0f531e437d2fbfa7b6bc5f0d298c2781c5b6f6e9b3375043af8bba67089a14811f8b36e4e64682653b27e85dd2ba84cb09f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5778022956777406a168d5aafc47fc09a
SHA1b6a895918fe43ca088685b8ff46f6c031686a86b
SHA256a8c6c84c40b70f3ce06b9cf24f06b08481818848434ab930b321b40bdb430f77
SHA512ecd54aa4bfd8d91c0f7b1bc4a00c912065c421bd07501bfcc44ba4b5135bf1b8bae4ac8e88d330b2ada974dd0f6523a05e8ced4e85f9676e2426d088a45fb972
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56fd3f8364e870047220af978cbcc3094
SHA1c167bfc8198cae0c09ee9d0a8e4ae138854e69ff
SHA256181f721d1d1eb74ac783800a9e9f671123f99bea9beb85c737aff12f94af19c9
SHA512510cf544c31b69a82d60e9fc9ea7fb868e230d7d6b5abb61f257f58951abbe289a33b30665b09d5bc5a6877cf3944c25d012be03e2588ec42d7f84217ce193d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510aa413047d6df23cea5cc5890215938
SHA1b8c57de67badfc9cf8497d21d85d17bf72dd018b
SHA256257df4ec0f9c96d8e1a2efd9afd063ae7a05ed0acd9c6817667d121268a13fcf
SHA5129d3fd38fd51a8f4a492621d9d8551f808d46c75b046993d135f449251b7cbeec63e9cdbb900b63924c73444efc660ad05bc8ad00c4326e9eaaeb3fbcee1b3f7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b32433015b0ecbbaf27faf5a39348c51
SHA1a1df450a0fc9420a867adf45fb18bf48d16487d9
SHA256931491cdd0e99a5d0ee962875f22a09276a77026c27ce2cad72e1ecfff5903cb
SHA512041534f250434b92ddb2c89cf9e605c77c671d73bc94d5e2531a1aa33b751be1ad008bdd0b70f9db7cb61e050a8d38ff9bf7f14774f24a217a34fca64f2cd7df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9ee25529f418b04f82793897a4bea74
SHA1aeb9bc8d3758e55e0ded2738336751976e587460
SHA256492e9bc69892bcfbab170334252f55bfa6ca84ca52537c402ef51068a59ef228
SHA512c87424d9c4876fae244a8bf2572ecc64532c71e95051d528cb4da4d2e2180713070d5b0e016b5cead2795ea99b72d46ebb85cb01a9ac8cd146f41e8c5d420833
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a