Analysis
-
max time kernel
138s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-04-2024 08:18
Static task
static1
Behavioral task
behavioral1
Sample
ecf94f3bc8a449b58af4396c553b7321_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ecf94f3bc8a449b58af4396c553b7321_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
ecf94f3bc8a449b58af4396c553b7321_JaffaCakes118.html
-
Size
91KB
-
MD5
ecf94f3bc8a449b58af4396c553b7321
-
SHA1
c376daa69b049edb9da5405263a919cb5a31ca0b
-
SHA256
e13237a497873719e09e778732848eb0f9c707ec1aa1eebb6ffa9bdf668e56df
-
SHA512
179f5db08923ef6aeb64f40195137fd49f0ba004d8906073ab5a319a5c07a91f2537048ba6716ae327325a0a38e98a5655a757c7c05891df5a0b2c208d1714d7
-
SSDEEP
1536:gQZBCCOdR0IxCSmb/L3FOYaemVLBpI+I3pdP7QrVc1vItnqjaVeL+xzqAzRGqfgF:gk2D0IxIJPd
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d05b86ede88bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000c23779bfc916813e4f0c3c405898c75d5c4b231b044b5c5d7dfe86a54ed55a2a000000000e8000000002000020000000091d496c95da3a612a83a9026870d69896d01335ab67ce7d46130a9209c39d2d20000000d79e7fb0c5aade4e3eb82bdaa552bd089f19d1a6c8a7f825aa42575c6df66689400000004e5431eb12ddfde8870f1102f98017ed443a3106ac871c3a67f12ab2558e0a7a557b816dfe455b8cc58f25ae6b910d7588ac0350f4100fff7512c2242efb9717 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "418985379" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{13BA43C1-F7DC-11EE-A6D5-5A791E92BC44} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1412 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1412 iexplore.exe 1412 iexplore.exe 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1412 wrote to memory of 2812 1412 iexplore.exe 28 PID 1412 wrote to memory of 2812 1412 iexplore.exe 28 PID 1412 wrote to memory of 2812 1412 iexplore.exe 28 PID 1412 wrote to memory of 2812 1412 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ecf94f3bc8a449b58af4396c553b7321_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1412 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500a2be2032d23df48e87b9fe4d467319
SHA144065757c7da647e2f254b23c65060fd565395d9
SHA2564cb6e7ce0476404732de2d1933139f14328fe440d7b2031f03c0d8e57e4c2763
SHA512bb54c16e61eebf94437baf42991b2148796d7b49eac35773057de5fca95138178722248a7e01f8ccf1545b53c94b52fef4135a2d425383bb402b82d23c44e54c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fc998260304b05b553784f3e4d27ebb
SHA1f11ed5110ab369dae19f4bcedd92e6840998c3ea
SHA256044703f643b96ca5cb434799f816929028890ff89fb88c09a1ea875945a0c2a9
SHA5127fd27ff63d905bf75837beba28e498444ebbcbcf8f73797f0bb6a9e3d52d2f0a13083f2b19e64c5e6b90a1714225bb01bb963a1b90d1d8ececc4309bf47c8458
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab432f95411cdfb89f28ad98ee59d873
SHA1e75a2feb92dc8e52139ca5037e975b790f1de660
SHA256ea2d2346459da530a5728573e66c5d7f7f72937add10a5909a551833b7dcb6a7
SHA512fe4c45894694c6be43c0d6491b3b6621af4a6de02f98c38554124d7fff484df0dacfca6648fdbacccd0970896a2d9a498901ff115dd8fafe58447f14236ef65f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57da0a23c06c941df4f200def91e2119e
SHA1b40ddc51888737da8047ed9fcdbcb0e583706574
SHA256ee42e2c68a3e161a488c9ea4c0d101f76d987c99efc2caa7a77c7a47ff479caa
SHA5129e203de0fef619478d9d8ffa771ad83c8cf58f16b3c2e03dbda59be3de29738ac38e1151db86c594daf92bd55b28ad209d6eef8d1e83264a53a3c3b3267852b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59053cb76573b2267481015fb81152d7f
SHA10a29e3b9644d41c767e3b093860d92c21543c1f0
SHA25655d4f2ba20dd1138ee97d972d841935018ca3c82170113dda4ba9e7bf91890bc
SHA512290c85eb2aee388b782cac2953697ea2b852a385ea3e184a3600f2c08180d172bdbf0e30bd6e168e8e0564c3173d36abbef5b28aca117f8fd68f738a7922841e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52bb389e3acae8492fefcc9eca74450d0
SHA1675cef0c71354a7fb0a0144314656af82090221d
SHA2561bca1dc6218d11442a6efdc820aff49d85fe0873e58d2c04f7315fcab41982dd
SHA512a5e35b49b4b9871ac8be4fe8bfd3c20dd0f5c229abe47063acf9caf5b3c12e91c95c4deeb4f3e470038c7ae6dab4840de50ebad1ef7461cd63911ed28c9d7436
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c17490ee36c79f1e2bb1c6a4f591adb
SHA1ad37ee40476ff5e245bb0b6c4e45c1ff23486b6e
SHA25663f3034a0d616998017f3e003d65c10f469457a3fb756b175489acbef4d682ee
SHA512840db0698e51bfea28b0a0c8908d7bc1313d3b8ced2a35378b50f0ad48801bbc1ffcf0f57442721ba1b72413d734328236c72073dfc484b8f6323bfb3f910605
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4ca091b768af397d8fe274d737f087c
SHA1debc235b70a0da95bcef4829cb7fb0a6f0bc89ac
SHA2569d9b0d5a4be09b6358c2c6730ffae17b8164bdf19d0dda635230358dac1cc34d
SHA512430c93a2d8fbc9eb9edf3cf6ab363e8ac9f600eb8e03e17971036618795ce20a371d11179688004d36bfcea152b87ed2e812f16fe9fd48815af4b3ba66497bcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ca46218b689ac87a1a9b153a6df3351
SHA1a0dd5371f908a23e4aa7c6ce3a48ccf8118fdd5a
SHA256ad5762cc137c57fb86f28f36c0d88883e1b56ea300c41b00d7b553115ec423dc
SHA512cf88b7a7cb278f35146e3714816290d408e4ae84eca9bc6f7bec86623275bc1d2ebe7d6be7b3e00583a014627c33dd61c9fc83fce358153e705de7edf94a311b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51cd10e087a99336524ef63e5a4360b44
SHA1dbd19a4261bc92feca8d78d9cca4cf35a3108a1c
SHA256401b4e7eabf3756bad250f1cede964ef3fdb5197cb54dd39177538b7798a3780
SHA5124fb3c91528fa327440d07301830deaa57fcf905ad42a2aa5f17d3450f4be280d90ab12758b181cc5d9d20aabcb53c7c32fed5a8cd2251125b2cb6076fccc8f5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5951b570ed721c23a98980a5bcbbaf62e
SHA1bc862ea1f2f052736053b88a342b52dab11258ef
SHA2566e5d6756300161e67e881de9a649e9da8899cbf87577fe55d9533d1b8aa6ad28
SHA512439d07d28ad6938d6b7330c45a9c103e362954e0e0e8157e7f5ad9cf17d8699e725396f77be824edf1c17924728e8067400fe1c1ca51e2037902301874800c98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e502ee4d20a2d904bece397c0d7b79b
SHA1e21fb404814966e97321d4208097bd049edab65a
SHA25655bd2b39c18e4821ec4321df76e7333cfb122f9282f3f0f658f9200e17fdd63f
SHA512af65ef79b7362d7bbd90c97fe70e10c8945ea8408a00995f6d850c5a529609937a74935136e4daacebf84c59a27784f1fbebb6593b6a4383f4bfee179f498664
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518dd651bca2b0799eada32e8c4ae9906
SHA1d5e412cba900197bd0880451d984d7a2dbb9a9ef
SHA256a1d000403bfb334f6e75e90e3d6566f92f7b06995a8579a05209ba2949b74168
SHA512f8ea23f9b4d2f6255ab442cee5673f804f88ba7b0c73cda7ab3bc9669e0f654ca45f9347dcfe5c1747d41b0da5de42c26f21b4c6d1711d9233a6d728d45b6378
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efe79ab74f9ac6279977f6a2eff3feeb
SHA1e17c819a820ca1ee531f7098d418306608e6dd22
SHA256ca5292af8a7c4573f5e86c4b426152a7012ccfdd1e81e32b6e762414dfa0d552
SHA512e8a4cfc98ad098cee4d55c1048d7d60b5be629b8e66f6d6fe11951e655a62fd9058c4b60a3fd5f79e4bac11c718b3b711fcce61f0cfa17c97763baaabdee3f43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57936e0cf1ed7bae4dd44ec6861cf7585
SHA12df848853cfa53835e31beb8110bbe8925a6c2af
SHA25645a92cc1506347f927e291105effffc1322db2ffa2ea8dce2451dd78cf795e03
SHA51231ee56d629bb19cd737301388e96bfc1033fc1f781ada3e29a8988d9f754577c307b8548a548125bcf8e11bf442244e67b41f8b1600b42cc0624f8c8a93f9432
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5692c8249d8aabb0fb70cc1c57cd71ad3
SHA1326c797db65e6fec70140f1aa1ae033fb4a9cd2d
SHA256951a54fe5997ebfed34539864880a1f3e56ee57c6b37c429b9f26e29b8b0e067
SHA512a59d5d711a9c8b25fd8cf1c9e5b7193422095505e590fffa3293bab63a08cc700f1714d5d61a910022faf42501040458431096475cf099d784ad76c191842012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5392bd876233979581c9e810f3a36bf8b
SHA18111f260157a470e6332aa13b7ad6120c2f2623e
SHA256d8b162a781cab4a878242e68765655f33cd24990bcf2891d083f4f19218c7176
SHA5124fdb7a30e5e11794467ee0e9e2d8f0dc122f90e096c13bb54020ff61e66d7ef177358a7a768bc34de43d95503a032627f3d363ff5a87f7d58851d7ae0ce56c94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8a43d0bc6170bd193b21900bd20f237
SHA16515530e8295195569e11a1dc41c91d6f001c5bb
SHA2569caeb9140863f51b643e438650e88305c86217d2a27c635e9ee8b247b55600d3
SHA51254396beeaf66eef7559d4b43871f2e116a67f239c152ea617a4d25f3381017316fd6c97f9592930919d968bc76243d404f96a488007144749cef1e096a9cc792
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d3255c8bb603336fadf45e0f9a0c5b2
SHA13271d858a9f0d5a046461a8a07aae8708a432c64
SHA25641cab239d6d76ecf3fdadac5e0a9bd8511e519a6a25c476639b77ac914dfd9b4
SHA51233912cb02a72e88029d93efd904562471e40132ac4feae8ec0b2710d075bd10937cbae5bbd918e1072dc3fc97f3864f54fe791165c16428215aba50249361581
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a