Analysis
-
max time kernel
120s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/04/2024, 21:25
Static task
static1
Behavioral task
behavioral1
Sample
e872e18a5f3336aae7a4c5d43ef4816c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e872e18a5f3336aae7a4c5d43ef4816c_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
e872e18a5f3336aae7a4c5d43ef4816c_JaffaCakes118.html
-
Size
33KB
-
MD5
e872e18a5f3336aae7a4c5d43ef4816c
-
SHA1
b4272f4b21b7b8fdf1b2bce1638d41f0965fac7e
-
SHA256
d10b573dcec3f24744f68415f526b96c1eb077f112929ad492e32ff94b09fa02
-
SHA512
e22170694024e74193e219e6f3bca1e1e4abdc93ba19dafd1e3faea52d123b091acc994fbee35d537d9c6913edbd215f9b042e1738d4dee3d84fd97d00264d2f
-
SSDEEP
768:QIRIOITIwIgIiKZgNDfIwIGI5IVJ7SqIRIOITIwIgIiKZgNDfIwIGI5IVJ7SBteS:QIRIOITIwIgIiKZgNDfIwIGI5IVJ7SqU
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20be3f58fb89da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{82D53B11-F5EE-11EE-866F-4AADDC6219DF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d94d2d3723739f48802cd6414eea5c7e000000000200000000001066000000010000200000009580b02a20e6e1d52069eb537f20dbdd1f5d5172da9b41c1e3ffa78f3e3abd62000000000e800000000200002000000023bdba01b746c310d849c2854a4dcf8cc5d669fe04cae527ce89d31d01e3c2ab200000003a334c548ed15482b87e406fa815d5fd56705088eb7baba3f463755f5261f3a7400000002ccaf68bb9c9d832a61bf55cbef545cb6b3224098096dd3e5934c9555e2e0e948b357e37c48c2f724b8251b508e01e8f6623af33650abdd8b041dcf72ccac651 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "418773393" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2148 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2148 iexplore.exe 2148 iexplore.exe 1664 IEXPLORE.EXE 1664 IEXPLORE.EXE 1664 IEXPLORE.EXE 1664 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2148 wrote to memory of 1664 2148 iexplore.exe 28 PID 2148 wrote to memory of 1664 2148 iexplore.exe 28 PID 2148 wrote to memory of 1664 2148 iexplore.exe 28 PID 2148 wrote to memory of 1664 2148 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e872e18a5f3336aae7a4c5d43ef4816c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2148 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD548101b77f291d572ff49f4e3a2c191d2
SHA118be4edf73c1ce05b6dff32ac1eca2b055f08434
SHA256657347e6453147e5e29efd42b41edfc8d347e336adc0cc7dd8c598cc7f6737a5
SHA5121e366146985a9d76fa096625c715bc52f73692de6c569df0d4b82b7058a4b94a8e0acea8efd5fea0f922e91a05950f936d5c5ad8a2cc36c81267e88001fac4d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54020bc3f88de26ea3f806fd3a01b2bbc
SHA1030d2fcecf8230a5b60bc4b1446c52be8ae279c3
SHA256070df5aaf93c8d6526aa5374b7f93a987cbdb6a7a0c39e58535c1e6142e95b63
SHA5120b3fa0d5ff5e0b2fe44ccc8c6f89b28aff5d3c2800a7a2b44bd868e2eadbadb62c8b0abc5fc293e5add7a5a3ba714e19887d6038e426cc6fa3f86d5a155e9d0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b70ce13ff6bc83035031deef834ca8f
SHA118bd5eef35bcbe7c25b60b2dad8aaabd2aaf2e9f
SHA25692a9bd549a6f3a778f8af5cb5179c1beba4a60251081744058e3bb7a6530e3b1
SHA5123861941342ec29333a6741765179db653d4b4e2e9dbd98d362ad49649b2df6e8e9fef65b5e4c9714532c101da96169f45b9b17a2155a45418008f290b93bcfa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df17793b9f3363a588ebe62c7db392e3
SHA1eaec930a8f6387b2295a947626798a66a97b937d
SHA256d2b6dd9ecd8d04ad9f14a1a9ff03e3d8530ee46f1c91cae1c098100156261979
SHA5127b0003384718eac6d9a7c5a6b75cf68fe95db483c5500b596e856af5c90a2f1f93d5fc767338740f60839b6d2ee58c6c2ad0dd735b0db57c8c2ee9cc7dcb6a08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532c92da219a147f5c7674dc25ae4e3a3
SHA1aeb26546284b3201720e31fdab2d278ea57a1a55
SHA2568332dc07e20c77bbb5bd191722606fa8dd8d9e0107e63bf8d2818f77f025bc5e
SHA51264143f1ca3eb2269240c3e594b7922888975641dd2b136e0344c84eb5fd106f9fd4138799d621acd0d816e2e049fe66348a9df5bedfbc3c21b44f421899772b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f854180b90243aa4df189b8767a3082
SHA17f419635192a5fa629231644895b6302f0ea461c
SHA2568c774f361de2a63f07d1ba8be748be9ae540c471ce7dab71cf4848c4c7ae5e8f
SHA512a20747eccfc4a79f53bf93fd740f3acd2e9b2438344872b807e766a2565a100e651fbc2c7d7f2914f1c98ff51438d7d2026545f812dd3e7bec7c54d0a1c98508
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ad31d8bd8c309d7cbdfc3b7ad52c9f5
SHA158f6df9c4cb6e45ce21f04623e8a75fcbfc7df3f
SHA256a6e0d4dc47cd93cb5ab7ef62ce178f9855b2c2c666ba272d4ba62ee0ec5d52b6
SHA512e6b62ab8cfe8bbe1c86b5f3380e38559622d015e5b09b182c50d72963ab33d90f0521ba73926fcd12be34f099d0fcbb3c751c9d275593e2801810e3bc7e30d5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e490ec862a39726ddd048905a950e531
SHA19d55437953d04a7837b1626f4a9a0cf527eff797
SHA25662aca69d86d59760622b6d87cb3d2e593d8876d237eea0bba0177effd53178ee
SHA512ec55828e724bd3342e4d2ca7ff4a9abd8f276a12148d4cac724d8c2ba59c229a5e96e52b94ed78d20c34c494560a25730d0f87e257237f0d6d4596f85d792a5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d5d6c0d401229188a2b18532f71c7c4
SHA13e438b47c2d74ece48589782642894f172aa4405
SHA256be3905b23080cccf3dc42d119370d4f8dc36b38b5ac9dcd0d6a1c58cddc25305
SHA512ad3f7902fee1b154ea1369232bffae4ae14bc6ebe69d99a7f301f49c06f13cd3376974e46fba40a9c2bdc8885950ebfbde59855abc30a8dedc4fdb90d7eae775
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b32c5bc7f0d52d42d7fbc1042c325e2a
SHA15aa145883d430c64f0b2f1d8afcf5503cbf2842b
SHA256b10875be3407b6bec860d5ae881dbd7e450a1729b4e38ed8520985688fb303ab
SHA5121dae1ac461966b64659f9dd47b707cab063cc664be278c15bf45949ac7578a8ad331a758d64c2f31cc24f891bbd85faaf0d92039e26933116cdcce6b5590be4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab1cbb8a4bc287e4c30cdc6a645d407a
SHA150a085544396c88051fbac44d6569ab416ba85aa
SHA25683d2de55bc0b340c1e91e97631a0baf315ed6ba2cb557ed4151b82e010f5ab03
SHA5121cf9ac2893d70e2419533e50b2e1c8454f9b4615af7e41a7d14bfc9cce85624aec2fc6d39d10cbd20a278e7b3815e8fff0ee1d6aaf285f7965c43606a5e86d33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e15a8b118ffddebc1020d72059c8e0f5
SHA1b3e2b39f6aaf5cefb8907f048a91f6e90b902c8a
SHA2568deb8d26f2b2046fa0a4bcc5cba824182ac600b3f3e784217d890cbdf3499836
SHA512c6bb632306671a49e78197ef48dab3a7fc7bd984ffeb7c18f819608f2701417ca899aebdcd7e5db0c98bf2b5f0ed9f857abd19579b33e76e9f8fb5f4727420ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555187f261cb0a4603f4bed301d5764d4
SHA1620f79a1c4a995c6ea27a6d481a1e94016b9f2e0
SHA256c0180df25f6b54793e64327f6c41179ae5fdc31a9038c5b38d7a17f44e33fc94
SHA512f146dacb8c5d13c811d237ab7219cbd8e5cdd7d1024d636c8e68918fbe912e2811ababce81ad49e72f2577582334725d32cef15d4ebef417c0f6092e1f97e9cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e712ed3e3fb485ebdd009a69a17999f3
SHA1a769834d6c569a3ad53f2317463e4b2d609fe06e
SHA2569a2e0ee83e290960ca751c1faa52fc009e582b306d686193fea30fffb7811e61
SHA512c237cb59f05882cc623d80b384d129d6e3be0cde5180da520761d49cbc6401fb057567321c368523e070a10913a354488eed37227342fb89eba0a5eb46c6a551
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5cf2ca123c56ba44d00683a88e4b3d21b
SHA1555b3f3b069a0b2273346529575d181de5c4548e
SHA25693f9dc7813b9397db73ef75338812ffefaada83712ad982ac59e2515f1316617
SHA5124dce259b235c54fef00a8e92fbf5016e67ba9cf8bf132ab5e57db4a32afb7566254b05b1e3b6076cbff01c4a6f3c93e26269f1d21daaf02db1fe034e7e60faee
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a