Analysis
-
max time kernel
135s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06/04/2024, 12:14
Static task
static1
Behavioral task
behavioral1
Sample
e28541077a39068e7b3db446dce1473b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e28541077a39068e7b3db446dce1473b_JaffaCakes118.html
Resource
win10v2004-20231215-en
General
-
Target
e28541077a39068e7b3db446dce1473b_JaffaCakes118.html
-
Size
11KB
-
MD5
e28541077a39068e7b3db446dce1473b
-
SHA1
b0f4a34f4524c1bf6eb06e71467e7cd56d0e6d14
-
SHA256
de7554bcf13fe08850657876382de071f524fd9e6e0afa1c2a6d1a91228ac3e4
-
SHA512
6175551fbbd7c54d1869a6c8ca84f424ce700c9739245a8d07e1f2de3a22e77771058c44dc5bab546564c8e19fb441152e07aff3827d88a292ae33d5ba58e61e
-
SSDEEP
192:nMtQvVksX6/PBCiKo1ajACdmXbmdBRHaKPeuPOKEPVQRC:LksXctVC8Xbmdv6EUaw
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "418567540" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00a58a0e1c88da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{39651261-F40F-11EE-B51E-52C7B7C5B073} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000c12c25e2ddfb54dbf19c8710c230677000000000200000000001066000000010000200000004837b23eda6b05b25c69fe302dfb39f121db4dc5924510201075e26b84df54ab000000000e80000000020000200000007b25de0d10d8db8ee82ef28848aec79e397caa805ef8175f5c7f447df8df19cc200000009cb503ffab0eaeb9e91cfe3d9efde562db56b0fb5515341df8f50b9038041f69400000004668682f4a58d7043e832e879ad78eb51a415dfea455353faf16f575faf77001adfefacd3c95da4a0d0bc96abece6088dd2154e90e22bd7ddc00aff1558af521 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3048 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3048 iexplore.exe 3048 iexplore.exe 788 IEXPLORE.EXE 788 IEXPLORE.EXE 788 IEXPLORE.EXE 788 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3048 wrote to memory of 788 3048 iexplore.exe 28 PID 3048 wrote to memory of 788 3048 iexplore.exe 28 PID 3048 wrote to memory of 788 3048 iexplore.exe 28 PID 3048 wrote to memory of 788 3048 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e28541077a39068e7b3db446dce1473b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3048 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522410a61971dfebe33fab71ff2630c01
SHA1be41689b3e8880a738f749bd686c52197652dca6
SHA2563dbad8e8d4a9f0a48dd665d35217cede19c8317ee63fb27a6b1122154297bf05
SHA5129589e2ff409dd0a184206c7a48586950fc96bf5d415c344f999aafcc9eb83830f3c900c45f3520f5fabedf9f05bc87b100fc79e8cc637bd7bf5e0a598c82be80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5776d95312df0dc48af5465561a896347
SHA1e0efbc7e541f08d98e1df9a5f138eb54b159e6c0
SHA25600f3abac5ea384c8c25bb4708a9bb4da50031734d623c14e015453b259a3c9b4
SHA512e0e9753c28deef99d394cf05adaca1a065eef8c7d06b00997def5eb8b33e289b92dbafb829ec017b7f646bc8ad996af34abd65471cf79bf546a985eed739b6c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5995d34e2e2ed34630301ebd8fcb2b060
SHA1d06d64b072ec37ddad7990ebc12b19289fce5a77
SHA256a04f5182bfa3adf9a4a647403301867532080ba21f1653cbda4e328566d7d29a
SHA5129603dddf29feff69b6d027feda3c282359a7550c7f914bb48472cd22d75e0c6ff649bcae866c8e35276565baf85bf239e13874aca04fc38b85efc139a1f387fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4077d7f6e07d4a5544109b7301852f3
SHA104e385de0f951ed3c64fab1c3e10fb582f7bce88
SHA2566d4960fcf365c43cebbe9c51e5083ebaad4c9b418418c7983f43961dc48a6b7b
SHA512bf28a00be510ae60f3b57758c789107031ecf7a8654a889ea67f25ab817cc4b2360d239d1c9270f609dd352ad752294326d5f9ae78f4880c8dead34932d4b19d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7accf583c684b52b94a1efb9ff07927
SHA1550c4044a75405b406ec799cb299a24f05268d63
SHA256c893840a8fe7031901dbfddd0a667911a4c81c4d852cdd6cd2729a8394fa96ea
SHA5129a2bc1938aac13cdf402775d5007da7df5b7a15ff16e0fffc4c4254ffa7adcec7662092983dcbcf2a7209b7d051f3725d24ed4c456022bbd04410f91a101e88f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a7cebc052edb170a946a576ef9def0a
SHA1b476261b326d117c0d7b7dacb111c1dbfb92184d
SHA2566ad2981388f46ba9c6383b8ce601517b29753b63e61b32361ccceddb6fdaaffe
SHA5120f423e46451088ab844776cd854a9fcd3a76095216fdd69209def54891b874fa79ac566929b7699c62bba31841bea25d2472a2d36c2a2a8803d32096c5140949
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a1b0e43754cc9d9e92d76a52f21216d
SHA15edfa3e8b896ca662cfd5c8928a7c59091b108d1
SHA2567f4e8e46255b102a23eaeeb7b5f2410accb3240b2eaf45d9a452643623d9d5eb
SHA512d407ff9c56e142947307f975ed39d863ee186e1ed94f6b30fb10fb37a80aa7906990961914017599b6980c1bc1c1ce56a6e20d4d94ec1d1c4f4639a558690f14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59249b7c04d0b10693ebc95c72f849205
SHA14f85df7701d698c0987f492af5ab023b4d87a3cb
SHA256335adad086c03c540adf21ac79d001aae99ea42b960ef7a97c35fa2f3512e2d6
SHA5121b991fd45c391a6ea6cb04cb3a53bc42fad84ea4770d04c54dcbf6d5b007ec0bbd74637b9cd835bc7519df83b030e27dfb881d9f6f0cba283a633cebf65a1f3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a7ff6407cd8aa6e42c40ea7e88ea71c
SHA1656f3d9f36732bca7eb31be761a0b546fb5ee679
SHA25674cddbba404a82ef376d1c664b54729fd3e12bf7a446a0fc5cc7e65687bafe1d
SHA512d20089bc6af3f41a5a8850c2b0b1bf9942f005f4aa0166ecbf716eb0ff2e38b78bb3e41354164ebf76b18c8c08ba286fd13b873a3b16b662ef4799d5e69d2099
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556824e37a9e319ccf62aedad2b360086
SHA1785d0a2f64755c2d17faff5a9b99bda0a62599e6
SHA256d41a3cb3f4665a4bce1b9e082265b222b1b0bcd772ec13e4f0107c5f40a4baef
SHA51247915472bdb100c30e974ab47e3db677671400bd4a7c580cb447e4a5e21e14454a38e8b5f7dd495131b11759a2b8d55d9ec3e3e6fc25afb73b660a5ff6914ed6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524105522485f31817e4656e3e726b861
SHA174eee6fc9000602aee4d3c43042b41b3f38512d4
SHA256b636ece64bfad92257a5c334e479e26530fdaa02b1a7e2b868607f49f5e320cb
SHA51246618f7bce0014a882e9efb08ed012e321be07219c169035beca2f3329200bca33c9405b18e43723858942ad3163f2cd81e9732ab6b125e1291cf51eb4002cb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efa64b56ead0a4c6694cd4b89fec1ac6
SHA1caaf19ad61a9a58a8aca8a881cb84e6c55eb075e
SHA256563c1ad3ebecb1cc07cbcb5a22869f91f9ceef1e4a3193c2ad500395b2088778
SHA512737675651b8662916ba5d2898da6cc12e5a2c37ef9b42ad41c9c9e0b193833207cd17410cb0e71e87747c69ec069ed31c451d9132c61a7fb88c76f4c800ad9ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5edab9f0cbcc766bfa2bb8cbbbe034b81
SHA14405c5d98f0a787fb6736b7888f3205a50fee153
SHA256ec990face87866532f6a6de33152cfd5d2fe6dac2826c958c1424935464665e8
SHA512d98207e439ca2e316a60342f1c1ac190bdb0681b3a9c6501c08185e647d16022031b70eab5147f33b65e66f271d2897009e8c886c9f722490e139a61feb7e050
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b30e68179423d55f22bae2002c7d1199
SHA10357659887498488f9ebdbd64c0422cb703d595e
SHA2569ba7304bb5af2d51e67638410714242da41d141271d7626c5b9e1fa122670e76
SHA512c828c219f5fe03ea4a1659fda06b374da9b4b7d5ae9e518d9a920a2736d2c30016d61d7ffdd5604a21edb032e043e0f299058533c0569aa7f4e0ed1e597177bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7976851f763cfb70bd0f32ecb2f4472
SHA19bf32f5840f3048d871c1a2b73b34ccfbaf67cd2
SHA256d40b0dfb4d676826da313272f8dcd80a4dad50cab460e5c62947a2dfbec7e476
SHA512cda63f79faebbfc8748d5e1fc4d677a9ed3589bc358bf03794133437600113f886ee65defdf0d97da4ad3ae7b4441ac37aca3142c79f14443e4be6c0ed26f6f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb1a2f7a11b2be9914f030604d579cf1
SHA1a0d33e66608aeea242732142da1bf52e411245db
SHA2569cae9cd0a4622115e17b4b633f28f08207df345fee5cf13909f6164af87c983e
SHA512b3553134a83f7810a47440aa6dc8cc490ba1ecd45129241b35f7b5b1eac6e5bd81632f8818a2c11b4daf6d380dceb5a4f16467c6e85140267bad1a3db226d5db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e34f9acf0322ada138dd5569512ca6b
SHA140bf2e7a7de5b4c5ba8a7a04680c753544615a58
SHA256bedc4970150b72424c5b74f9cdb49a5ab15420a5191ef6c915b68780813abf10
SHA512552ad34204559e026854a98c9ac210b74fd2e233edb1d99818c195e208ef2df07cfc586d6147248557ca9c9e0e08f5ddac35c9cc106ec1892aa4c74d7c183d1d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a