Analysis
-
max time kernel
138s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/04/2024, 20:13
Static task
static1
Behavioral task
behavioral1
Sample
ebe5e956a57f08ef3048791cc41b019c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ebe5e956a57f08ef3048791cc41b019c_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
ebe5e956a57f08ef3048791cc41b019c_JaffaCakes118.html
-
Size
19KB
-
MD5
ebe5e956a57f08ef3048791cc41b019c
-
SHA1
efd4a5a4105fc528f79266ac072731fe7427e87d
-
SHA256
65afb5a4e8d88301ba679d0ab523c674fb8d90485e7360f22f8956d4f94d2d41
-
SHA512
da9661752fe2fb6cffe51136a85d7f0a186230c73c59f02bcc77f9b9a07f4776eb21f8db8b9ce9cd4ea5153e775901540a09d8a076ae8c87c7c52e2ef3913367
-
SSDEEP
384:SImrQr0rQw6LudX/s8HgEQkQwzGnTVmuDNTjTe8Lw4WpOc:SvrQr0rAudHHQkQwgTgpOc
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "418941863" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 202a2fd7838bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C325D471-F776-11EE-979F-5E73522EB9B5} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d94d2d3723739f48802cd6414eea5c7e00000000020000000000106600000001000020000000dc7c816b10ad47cf02c039f4b7c5a4006bbb4334320c33c232c1920b76d24348000000000e80000000020000200000004bb0c58a078859be1c7cfc964a89e63fc434b8ab90e52673af318899a790bec2200000007e11a47d312505552d1eea421fe224a4f6900da3cbfbd82d44c311cf5bd2105740000000f5c86ca40881c728350f8b927b3014c7722f8ef5bd4462ef4df18fb49fcae5a658866679a9493b6089d403c94af2266dd69b6f9583e7e1cfb0829f6e73808152 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2868 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2868 iexplore.exe 2868 iexplore.exe 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2972 2868 iexplore.exe 28 PID 2868 wrote to memory of 2972 2868 iexplore.exe 28 PID 2868 wrote to memory of 2972 2868 iexplore.exe 28 PID 2868 wrote to memory of 2972 2868 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ebe5e956a57f08ef3048791cc41b019c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2868 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570c6ab4771961d3780b857f2d7d8f67b
SHA14de2a7faba58e1e2ed0f1fe9d0bbbd02e349ae07
SHA256aea8574a77847687451e0089e6479da6f62e48f626429bc4f755e93093399932
SHA5123dd32677258de61beba27067faf6571dc7011371bf0c1ec35b89fb14c50d58fbaec391947a0797677cef5ef497de89fb567055551b2c08510dd3fde05b515423
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be97d2e282835efff873e98e5579f804
SHA1a498fed79c5749b9580ce4ce0fcfb7282b576616
SHA2560aef1b6c25ddb291d74df851157e1c68a9ba7f0c4534e13c714d0f0be24e0023
SHA512a717afec502141db9dbcbe2b8651503f5c3b7f8bef033c7f8f5e540250539c985cea18bf4e887cc1929eab6a843ab2ecff88b11cfcab4cb87a376c6714a767b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533f4c38efa4ca368d937fd3d1660697e
SHA1891ffa97ff7817a23e0248672047e70c6ae99040
SHA2562fa2aea1c8280f8a011ed5116e557bdf03212b431fb9d4338c74ad205838aa3f
SHA512ad6420e1cc968ec1a0be8617ebadb622dcb9a9b8785628b2ccf3932798eec83a6671392e9ed21887ba16ef4583bab101aba8df7ec3f9dc328254c29ba8a90768
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56eb818e83b688b610eeaba5dd3cbbef2
SHA16adee2901d41a7238781864d95648c431dff4671
SHA25608fdc3df34b0692e29c38257f254624c58f3428aaa351c3838b0d8a3fdddb662
SHA51298ab477e6930ad5acb692fa12b8d61c58bfec5bd8824afff74750130efb64374464584e8d4bcf1259bcde0f875ac7c82be1ec9b3973005e4ced8e0202f620709
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7dd469a375591f4237f04b1911db9a6
SHA1549f878a874bc65e034c3427064abcb4608d9fa3
SHA256ef487608d55588bcdb777847bec3474e5a069f73f3485d61ba664660e1eef63f
SHA5125cb3c26ca076f2b9a35455c74c2289a6f151b4aab15227ec3c410416a6789bd1ef61fae835870586f1e08dbf5cf27e358d0c6a01652e06dd2b929c9a653f4769
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b71ac7e7a0feea6d1e82d2d532207901
SHA104d7bdf32223f6ae4ee706e460a99f97b5656823
SHA256d35da5479895c3b8e1c0f877b52c106f5eceb49ce42feb7059d296352c772a94
SHA512edcd7d6611a85f52ae7aa8c01c3785cdc8eff865c1b15e67deacf6c3a83f4866f5e3f9f52943a61b14a3e8d7283a9ecc27781ae66422b1c0ece7ee405ae6cdae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53364a40f8f3130853e7961ff96e8e0d3
SHA1257fdf5dba9ef5c55003bef669ac44454afc883b
SHA256bf2a9019f7111b767518e628072fb5aa0aec89949b41da49da6e0d5ed096ce08
SHA5120d8ef99cdd46ee8168ab9e5556f0dfce29fb916c447734ef0be2828b84fbf5b7ff5c30e849e245f683d03a9e93f9f0c587fa7df5a907c5ca211c11e8ac8e90c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa272f07ec1c0ebf3739c9254c0fd529
SHA11713352c5e7258ffcb00b24f40c911fd63f0582c
SHA2562f72a0198e71235567bebe64a8eb25f0987ae8048fa3936ecdec3c52b841516d
SHA512556f97c6da0b8609a209a25f2a169783ecf768097396820bcc6599fd0d8963a1ff95385469fd76d61e7ceac202310282ee80c7e1b8fc0c69a9acd497548a85bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52dc8e2625a2046f6d7fe879bb0bf3c3e
SHA1685b615aff2c9f3f56a033974edcc63f19db6c82
SHA256d6fec780aadac777b192f409538d6a788642858f08aafbbda935ebbfe30e5c9c
SHA512fc9178b9a3f1c7b3b70411367226103d09b7328a3b6a2098c81d307757431b004b563798557c5ea5a4b3616e30010c251785eccc0ff434200ec12be0be5f6996
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fca4798f39d996aa2b64ff3c3d451383
SHA1e64903d09147d809a3cb0ce3c533e4bb64799f2f
SHA2569064a473749544833a755761eb4fc5412cb069b801cfe9fd86bcf0818e07e455
SHA512e351f52711af9801f7ab1a4fb5fffa32ffe0500b778c2de860093a82dc1be24b1306100f9a4960a01ca30eb1df5e073d3d21718a64651a25cdcde37a5415acf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552597864e4d3c04f1c010568c58b8c5d
SHA10d464e20c8fbb62c01209930c4b1b8672208faf5
SHA2565e5584c62d4cf4d0e6d29c0cbb72fa0bb273048b68c5ed4acba8c8cf75a72ac9
SHA5124eb2bfaa8d89f6255971ba80e19c7f60d62200506fa0de75c05c711a07b073c002e39e0a1beb3e0958d58431d9cc15be1e76c82090c0a21faf352bff9bcbfe12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53307a3768692d5eecb8f1a066dfd0d35
SHA112965556bb0c21c94c55db912a3c7b2fc2b58f7d
SHA2560ef5ac9371a71799bb0d3030bf6e7e212e8bc7b9ed056f012551390dafb95157
SHA512f87c6e8b35201e9bb235e1f55fa3ab86b773e604945bbbb2ff96f24602e26fa769b2301e4f4b5b134f39a07b0ff73869214d53dec6b116af53b00d561732d3e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6e88b585d8dfab2d539b940d676c38c
SHA11f1c285e281d052c047f99e1e7bdeab9420be47f
SHA2563d31586f961e56bf04a53474d69b410567c9650c8eea8c054f1925a9e37ef8b3
SHA512f1f83292dc508d72271b992a628981f8783062bba5e64f46110d2786e0c137f35fd176eea8e9754f4ac3ab0c43bd746d4ff3aef6a6b14f17e2cf04200250b734
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56046e8c5bd370fb29a3154b68ceeeee3
SHA160b595f7c40b72cf33e877b10e07f4b36fae4b2e
SHA2565c95f63a88c5053f11bed63af2f5f2e342cb626693626a34dcaf7bc55976f786
SHA512e8603e40ca0a178c8eabfefb99e10b67806714c20b56928c2afe649250b2ba6679938a967a8115cc633626c212d577845a0aecaf2164d229703de357fc7b11be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d605e88e8fdcaf2e231133a1fb2dc3b8
SHA1418825384a5c5eff97787dcf80c8cb67cb72094c
SHA256789c070c5b51637c4ff0fc9178db5114ff35e49d9cdc32685d0414e210410590
SHA512643609bd211c302d52dd12c48e895dfa7637b69f76affe6b470366dcc775ac3ecab34976a91040a1a6e2e4fa0a82793a8fc2699f5def7815cfa67049c9926ae6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1abeaa504b34b7895784343783491ba
SHA1c957813260014b50a9bbd1e00aa5bc4ce8534647
SHA256cb44b2bc2f1b88513ae3a9be163f784d9c902aa9ab6334024eac8b6ab4d0e87b
SHA51282dd1f699fdb20acc830366347146b055b64c932a4e0202a1b41728e87207ff3e6cc85571d27763162aee8a94a1082b7473850447932a291b824f19586744b96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5190d7769be57bbe31b35c0d509470680
SHA11e398f3c118a2904b0247439513bced365d8b3fb
SHA2564f9698fac8971c5133553b4b63e1ded7e1f1d7fe3166ce92e58abed3bb7b593c
SHA512b87c1705e924e042c51c2e19c6e1c0341ecd3b996d064ce2984f37aaefbab31637e774d13243aeb336a3f49a14a6c613b5927344189528324fd17a07861bfbc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c864e137e66d10a73e1a859497ec486e
SHA1056440f8c073cd6ef20d9dd10676b69199ea6204
SHA256c6f0a6a768fefb7ffd38de078bc39dc1bf963dca8007d4e07c8d4172d7c64e5d
SHA5123ceee1bf69587916be3a8cd8a2d8546666f1957b26c8ac667794f69de0a5ce3a672b54b86f4f4fbf934edb9b5383acf354f81415778e9fdaf367e2538d919b41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef8d26a9a9164574ce8a78325cdc3c4c
SHA1b737c924c058e49658713411c678a478e0ea0b49
SHA2565b6c8bf8b328be1f1d725ae017569c5be2350700dc0866d361fff8ec5f1c0870
SHA512e3ec00e69a313bec9f8e098023d7dfdcbf8578f645204e3bafe5ccb2ade63a2610d423beff492573bf9a36fa8000f3bd0476f93518da295cf12ed9ebcb58da3b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a