Analysis
-
max time kernel
120s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/04/2024, 05:30
Static task
static1
Behavioral task
behavioral1
Sample
e954609bded046eac570bc868666b38b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e954609bded046eac570bc868666b38b_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
e954609bded046eac570bc868666b38b_JaffaCakes118.html
-
Size
13KB
-
MD5
e954609bded046eac570bc868666b38b
-
SHA1
15bd81abb32a3ea76139c69a6ef7de284a429e83
-
SHA256
58adc1e3c55bf56191555a2c7244e929d3e5c4f7fa5cb75011cb91e9e7357611
-
SHA512
291f2915009a11f9f3eea6c5f36bf0cec7bf305093ce2f6545583de554bb4e1fcf562ca1bbda06bba253b4c98aa5eb50e65a26d01671d201e6f69bb0403689a4
-
SSDEEP
192:jTo/pDjMEILXEO9+RQg0+yzs16JfzdhIYLdYVG:XoxRyzs16Jf/InG
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000c12c25e2ddfb54dbf19c8710c230677000000000200000000001066000000010000200000003f40852c4a4cf0a5e6b85a3db9f2af4657a1a771301b43eab95b8ebad4556873000000000e80000000020000200000008805162cc4e4205512c7ef7098e900564cdf6ccd0ff17edd1b56e4fbf885ddee2000000042ed9686b57568f4471beb94630a14bb79b5a5bc10262d2198e091377cd5feac400000002943101cc485985c92e4bb58cfeb21c9ac4d8f62c1eb05a44507ff649a59b5f3dacbea42a4653263309ec47abc2bdf54b3c7b9a234fa637d9aece0092f0205f7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1025e7333f8ada01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "418802496" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4586CD21-F632-11EE-91D4-52ADCDCA366E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2148 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2148 iexplore.exe 2148 iexplore.exe 1956 IEXPLORE.EXE 1956 IEXPLORE.EXE 1956 IEXPLORE.EXE 1956 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2148 wrote to memory of 1956 2148 iexplore.exe 28 PID 2148 wrote to memory of 1956 2148 iexplore.exe 28 PID 2148 wrote to memory of 1956 2148 iexplore.exe 28 PID 2148 wrote to memory of 1956 2148 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e954609bded046eac570bc868666b38b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2148 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a80f2c62f0822d89d6a03f3edd25db0
SHA1b998f50775e0b2dc120b064290d7609e84e0fc6f
SHA2562095e7ba5173dc346f418156a56386601cd4df5e8282cb3897a4debf79847b8c
SHA512c313b6ea99d7b9001dafcdb5c3d17850ace5592fa57d96969f6241815e6d2b461272657ee1acc06ddba3f2ded293300494a4d3f6517ed57fe10e3ae3bce7ef98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc86735d6f689f6ac9b0d98eadbc0f01
SHA1053da7b0124348fa9d125678f9530083d2402596
SHA2561c3761b98238d1d72961694593272eeb79be091636cb28fb55a1e1d12f2a080f
SHA512c64232d667270e6937080ded1349dd2feb65b407623e9177cdd31c16fa70ea881ae74501b62afdb8f82373d8c5e77e4432c92bfcc468975e22c31b8164be5e98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d53a3e5cdeb54cb9ae412bca9d165be
SHA1615faa7c5e67b477b51f6982ff2434e67ea6bbdc
SHA256ebcab1e3a7344e6a91556432ca663c8a72bb94e387278862e787217596a2b1e2
SHA5126e7886aaf5e8310a98bd99b15b5194e47ef77b2ce09201c37ae4fd3c6d1f683bc719881df6c02b0b2617e2fc9a2c02bd06211bd4a145f91c782295af3bef425b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5df565005b62a3b9396c9f6605352a7
SHA114f81c41eeba324ea99ddd1c9a758384b2c1b8dd
SHA25637d801154cdf9486635f2a01a77146fcfbced232bc560d5ce6b5e39c37545342
SHA51279871084b2556c4690f221ca9018a208fc10d29abaa4f3e2cf9c0ffd8ced7caf75c5dd0d5d9e19afe39bf9df4454fa0ae6ef64cd74210285de7906ceea125844
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57417ec4f00426304c1e1320951256f11
SHA18c67951deb49cad5ea014a7cfd54ad655f33d4a7
SHA256e9dddbb05f8f1680436b7f04379436588c022937a7326b007fdb5c60fff0b957
SHA51217b7ac5937f12c9cd0d7df41efaebc0bd466423a3c30e09b2a53cfeccf5889531a28a4b3367bb44ba4971b74217980a7e7e4f3972fcba573fd9116aba9f97b19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d09911f02410523f8011f773aebd8c9
SHA160badccbd304b6d0d1baa2ddd6ed2fe193d710da
SHA256af6e726f1233590e11a0e62b2bed5b7f0c6989e192b821dfdcb88a0ee07cf0b0
SHA5120c872028fb577cb3b08ff10b8a52aa57c4934a675c63935481add24b41585c71a2d9e65b31890cb80d8130a70f51234658ead46c100b65e22562c7384011cff9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea57666f05af11f77b0ea9cb543c94af
SHA198df6a96eb09ef32ab9aa1926aa0a25bbf31a650
SHA2568dfca359a1eafafcd05fb02cca1c84b9bcb67ef81f581ff924c7e4d9f6f15770
SHA512c5984ba32f53c92117a4a8001fa2873cae7a97c88f45299092ef52de4c4c12ef51653ad57175467bab20ee036831701a133e8bb5b733a5d4cf60aa0cd9dc57b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5029847c0e5cb05b476dd5102741dddc3
SHA15f642d0f16c7c00f45dba2503395f25c5bc2a294
SHA2565a64562b0eeb1ee888bddbb36ef9f899d5ced3759d78299bb7f400204a36a3e0
SHA512e1382a2ac107872e5605efb0f0c0809de45753c8cb455f602814c34089fb1212652a0bd3072742ee49cf97450ad32311de0e1df30e58c4b575c7d30df5ed5014
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59951d348fdb2bdfb3f686538feca02c4
SHA19d94c8332e75820e1cb7e21edb5aa68c5ab8d432
SHA256328e7aaefcaa339506594733285b3d49c2c442936170f7b1b80995453f2ba156
SHA512d7cc31cf01b71b67d237a683885fdb8283da2cb423ef25eeaeadc301e50add01796b64dcdafaac5957a161f9498ae9340d830e41524eff9bfb81466c458434b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597c1d9c16bfe724fc1f934ce7c63cf87
SHA14d6f631346564bc59a02f71fbd75e8d20cb6f1f4
SHA2564af66ab4542b88db8e0c7d2932467a91477afa92f11cc620f2cba109d57f04d4
SHA512791672019907ca58933c7e6bd6c16e790c5e70e2252e89ac349aab7d1bd69263f42ec429bb6c2abf6f62f1b3569b3a5fa0f0d6451b06c60dda4f535662c313a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8a6e9e7679ee11f344a0ee3ec224b61
SHA1daf9edca84e4ce021085b2b8d0e493689d85b72b
SHA256c7135c3a80289356f4f8c7df1b6026869f5d508b4b70c5afcbc075452f592c55
SHA512d211c5915be496bc1898e7fd6115ffed7f797f4f189fecee54c722008ff6681e62f1ab7db7a7677b45e2f640298eb9eb6f4e15de6eff73eaf314bda35f8f4ac5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5f6e289550d9b895554226d0fe98072
SHA1a154d75ee418ec2fe237926f74e1a0755a1e9563
SHA256ade419a0096e8ff48274485b2184e09293bd43bfad2151b25c8aba9a444ab2d2
SHA512f6fbaabbc1a001ce2e20a559d38206a44d41bead596a089da3e73530e3341f2570285aad8b0324c1a884d980679af859743ba30a9b1184842684d882870c59fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b579ec17159aec5999f579442a53f5c7
SHA1665e7778f049f24224c5992d3318409873cdd351
SHA25649aa653f43c18823420556523dbdd1608646b6c61cdf020b34c080b3b4a8dd35
SHA51277f06e1ad665415f1811526eb2b3bc8643a8e08490b857232937cb4aa6feb81810bee7221ef848a76fca9ea0e1b127e7375d2be944f5a9ec5425f1b8e7250876
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca97836e694ec94a9617454521a95366
SHA1e69e12344609b63201f8c25700413ab9e7eca6fd
SHA2563ffd89b1d3d43edd1bbc3fbeab8810fe5f128fad46231df20e170b461afdc54b
SHA512b6725caddd6e49a6fc03015a9227fbcd346107ea777f0ce4e33a70a6b2f91982fcd9d7ef6107d8f7267ae20910b644c25fd654cf7f297f097dd6f531dfeae5ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5793339daddba1175a25458cf55a5847e
SHA1823159be5d6b61866e11e064c54d02bc6df01825
SHA256cebd4709c56b9b05ab5b2122b52e476a3bee68e4d9c5184d12feb91ff7078f38
SHA5126654f8b4becb4bc38d9fce7af87cf5a32acefbce4cf0a4c5c78a17eabac96346a3ba8893987044ff7183a13daa1872df6642f60b11df952c69be05f343d78717
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f13f63c68576ed790505b133aae0fb5d
SHA1ecacbf19fd97780f0ea48c386647a282801fbfd5
SHA2562b588a8ce6bcc120b0c59de7021a8908956c919e3c7f7deab35eaa344f91d463
SHA51200a8ea662c30d5fcad253ea41693a2c95995ae5c7c74922b4bd94ebd606c68e0706abb366f96ebc97109c22fdcd3a4eee9da9ee3342c8d53de10eb4a7cc878b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a5d286900834f060beb9062e045b220
SHA1cc38d57c8a8e441472c59f0156dc3e5df0a44c46
SHA256c8dc7e886652729715bd80baac6cd672613c5349b50558c6725c655f86b52f12
SHA512c869e576b0046091d448516bc4f771249a6a89d7be9f08726e0aea7d814e7e2a039edf482191f957ef43dec3fcc91a020d2dca16471f9b4a85fa525272676e0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596b3309d9e9a33e0cc2c7af8fe7fc311
SHA1407dc7590fb2652a6f05c4b6e15e5841d7c8f9b6
SHA256189b4e18be211a49722136df111520bd1fb9274a2f1bc687e8cb8cbbce48f4be
SHA512254c72b8497de168c8475e451323a689037d888b8185e6259d34a2647441fee71e3ad207747a5302fb4839b18f4748022a34d75bca7513bc387f5413b349ef11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc89be206fe49bd7e8aa9f3afccf82e6
SHA179b7bb950bb688c4ec270114920024be9e0982e4
SHA256689fe1fe3e86ed52368d87be6cde9a8968f96f9fd36d3cea44a2c1d6906b9308
SHA512e4469dc1546ac03b97015318deea942a0bda61b3ffd9f9d086ea002a4dfe077f8f7bab1c0d8e9de652943af6cf128bf3184f0f31d6c733127bb09f54fd945277
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a