Analysis
-
max time kernel
119s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/04/2024, 09:31
Static task
static1
Behavioral task
behavioral1
Sample
f3322047971f974b170dc54ff6161cde_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f3322047971f974b170dc54ff6161cde_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
f3322047971f974b170dc54ff6161cde_JaffaCakes118.html
-
Size
6KB
-
MD5
f3322047971f974b170dc54ff6161cde
-
SHA1
eeb2b0761e0ba5c926cef607fa7268dc49ac6417
-
SHA256
dc1494ed3fb130ab44f3e90963b569394645222023b057f5a38c83be89580dc4
-
SHA512
c0eee1ff30115bd71767a3472c57b74739eed6dbf88d356e67ad3fac64235eaac9fa5a684b36d9344610caafb8fcddc0d3c007d46d610b1dfb97af7e5db3678f
-
SSDEEP
96:uzVs+ux7aYLLY1k9o84d12ef7CSTUEZcEZ7ru7f:csz7aYAYS/jb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d94d2d3723739f48802cd6414eea5c7e00000000020000000000106600000001000020000000ef4b62b651961d0170e010b012605baa9d3d67866da8a03cef45d33793d19dcf000000000e80000000020000200000007bc1050eab4d24c1831c3772e84313f29a2ce66c4761196a95d64acfdf5f211120000000f8e32b1ce8aacf8e9e23791d90d99b103009f70ae0f768e550182c091a19b1e640000000703b443f4cf3ebd92c398ebf5747382a6f174c3f0ac6fe8c56ce0238b762ddd495d69ad430f45dd287efc2122cfbc8c8a11353bc8f0670bc6e17b35e8d216c4d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0ccd7ffe08fda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2A9B4751-FBD4-11EE-9D28-4A4F109F65B0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419421785" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2220 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2220 iexplore.exe 2220 iexplore.exe 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2100 2220 iexplore.exe 28 PID 2220 wrote to memory of 2100 2220 iexplore.exe 28 PID 2220 wrote to memory of 2100 2220 iexplore.exe 28 PID 2220 wrote to memory of 2100 2220 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f3322047971f974b170dc54ff6161cde_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574adfd759ab2373dbd8e404c50b1ef6b
SHA1e7116ca9871cf7d382225ccf722d2a400663d59a
SHA256d2b977b9af55c032dc5a1cbb3c6a6fc5ee5c4c0c9becdd63cd893f6899650c7e
SHA5122a88c2292d5fc97cdfbb27583ed43aade6c17a176e0883c44656b750e7c2035cdec8b72a8d52c9ee20d2c89d9c873a53ec243fadecc609bd44ea666ab1a1c83a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea4c99afe3a9e876978d02b4867e00be
SHA1bdec570a495fc1f3aa31ab4aaa1e173dbae5b75b
SHA256310bec78f4ba68ca94b88033c39e0fc10d831339060875d4594f06fc6c00fc27
SHA512c55d7b5f0b81192106501f52262c782a398d7cec30bc2df222f764e5f953782fbeafd1df1051fb193dfeb9dc25256d56e12c9c4e59ef3e5f4b9ad8f14444e33d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517920a771e5d5595fea778c7698cdcab
SHA1903019f224b10dd8dd5b5097e127ca93772cf49f
SHA25687bcac5fef74b97c9c0f6d9daaeff8ef9723844e0aa1ae74ea3effe8647b5b0a
SHA512c40afc5f2a62130c555f67298fccf0d9e24adf9b80193b54fcdb89c689805d175a3b1ca1e7a68dd711a8e0da686a22b62496b2c71160a4fc917a511e540129a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d69afa443dd3b8fbf08909abcda5db15
SHA14e9ae1abc7b3f85f6f43b6e696d6a545d599ff6b
SHA256e75dec65526b5d32fc333075ce192c4611890d928da9a7608222913a753d64f2
SHA512cbb3224586bce65c33942cb52aaa376af8226929baa82182f810256b8bae089f64907b6babb5481ada0083cba72c9c82d6f2fb874f6621118d3f46fc04627ce9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53476dc1df8ece8b9045e25932ce91ea1
SHA10e078c115144485e76325e903a8f3f693b805274
SHA2565d14a3d77c2de46e4962c864d25d4246fde7bb75ce6152890d4bb4a55f21b982
SHA5129d5c79e4fde8867986f68f313e131e4373a38bd4abbc25cc48b7241e45150a78f61c9d9874885099150458e56cec844ce70c27ec416e994e7f30deb91b626065
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ded668ff9158bb790ce41495aea32605
SHA1fe23ca2d9f1531e20c62ce6a0408271585381ea8
SHA256b4a227f8e246e068df8d8d788af35756385a26b1915cb7280bb78891128d0b10
SHA512a90d259cdb300fd8f3e296ce5f51b0766399c61e25e7ff0e8b2707c680a6cbe1bd298379b8bda78546ed575437eba35ff1cbc7c58842f54b1bd35ecda7a67e22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a089050e15b9c506102caf6bcc7a3cc
SHA1b799faa752fa5fecb6cec988cf432ee46bf61fb3
SHA25633746abc927fd4d4ca59ce25b385303b89f44382bad07995c64491c213840412
SHA512b246dd8cc0ec18ce5d58d06db71b20df2271356eb745cbf6618e733accaabc97434f96e7fe91fe7d6a61a9197306a640209b0d4458f986e5f54257e721fcf60c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efc0f8178a2927a22682ed44ad219177
SHA181594214e5e46d07f034d8ae9a6e8aef37a6b097
SHA256551c30cb044ffc7b2dc51f8245d635ed239a97abdd97d0ef3500307ac4956ce2
SHA51253e5d8aeb8d378cb519a01b04308baaaa4a3b688a44b4fd63f70a16af92621a087af49c2afafd9474f61190868b1d54fcf613c86258001fbf346ee26b3c1ad4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf04c18e9a37c542e9f46d20bec29062
SHA1f432b6ab81e2f7121e04092be205258e28612005
SHA25688757d71952c9bcaef54fb97bb804d86cc201f2a7f8d7064db750be41d0970c6
SHA512a009af853a251976c04ffd667b2434f7725c90233121c93a8beae9c296b22e5a25263fe2c00465d175e744fcc52e2bd4b29c31f37d816262bdb2a8ce43a35c42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500630fc05d86d7759c0af137592f1305
SHA14187b9aedf324a7b7cab583394f8577ae71fae26
SHA25648c01a8c314506737851882ffb15ef7dabcf7ed8c04c64f969625d6f5d041fe7
SHA512d961538854b0f51cbb70fdc0e8eacecccf3b8133b3595685c8b19a6afbc57253154cdd221487dc51247658f6b2dae36575b4e6f4d7276fef0caec34bdbe01c56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5642c869bebefe0f6aa3704f2506a2087
SHA12c4947bfc85791147c9c9ab035f49a68be544e06
SHA2566c19d1d7b09eaaafe0e6fee347d4f1ba803ff49ed60f5e0a122f028983713f39
SHA512a28a2765bf5d79a7160a4aaef3ba8ba240dd7f9111e5dc7634e84f5fdb63be84143053495621a4de43d6f6a450242e16f8f95bf8e939abf6475c1a0edb538cc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9ddd6cb778cf8eccbc8c3f6a195cf52
SHA16046fab18a1003981c7dd1b3532bceca17fc1166
SHA2568cdc1f276af7f5f25d9b7307d4ee65ddab1d46e69d2b634f7a0a0dc9e5bdd0d0
SHA512706a9b954e88a3b0ef69f99fdfe42dbd869f81b60477e38abc9e360a136d792218d672ea858d74164a83ab394072c011f2e1d7120de3a9b1ee44f9d5fc4771df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2b4965543f57a7efea2af5fc7f47074
SHA1fe05e4c3cdd5e51a4a6377f6c52b2fe8b85c6384
SHA2565aba296f8ec009f6ce164dd9888b5ad4cad36e478e438eba684cd41dbe765f4e
SHA512a7b2f1f8be6da91c167d67ea74fd62594dc839c4d04018289c858bb72e4e7fed81c90407acd8cd9258a980c21f0abe123f6c4fdf84533b1e7330761262aa9791
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58323bde2fbe394c63af79c981e6e8a33
SHA1679d6ea9726930ad515bd6d427448be5caebf6fa
SHA25653bbf26a87a7740fe12016a911e66476091b4265b5a08ce48c19fe36cb4a40ff
SHA5124b3f368adfbb0b6d9612d5a6ca36487e5552a20d8871d18cb4144a8f36c6ed02e7d22bb4761bdbbefb3c7a67197936e83a760c885569f70514e0bba7eb2667fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae456536c911b5fb8798e566fdd45c5e
SHA107b1fb0aa4da26f168528a8f0bec86192ed8770b
SHA256be32f943792d6fbcc829114e76f68e22d70e8adebe78e40c6124f745a0651235
SHA512ec62c685f82506b5967358424a7a43ed734b6748c58ad6018842a6a90bc5671476b5fface4dc9da5fa32463041fc9a242040c1029501f8d8d3886a58df11989d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3559be68afe8ad23e70ad3227bdfd78
SHA1661b870635318f61d6c66fd09ecaf8405a408f6c
SHA256b10a0f2b9a17c900037ba87652372884aa0afd95e700431539559d2efbe2c4b7
SHA512269072c8b2dc1106d3adc376ac962f1d5db231a8ea729d5be5cb039435b2b54782f587d9ee537673c88c8c17e0c5e1fdf3525258c2254028428a8d6e3c46df3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b68ccd3ef9f73f4c156e1d67cc9e9272
SHA13340519453ffd2ed1c980fa183be052a6539cc05
SHA25629917ebf98f2a2244233f5849f14b85835872722c2bd94a0232fda4532c638a3
SHA512e6d641d7ada4f6f5f37c0a5bd62c45e3378b6179dbd0d39ffc968802f932c9dc936a0a99b8142886645aaf523539df123d3d2b7ef73d971a8030b43b6f296a44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527402d3bb7b76b5c3f3912fe0cb54d7a
SHA1b7a707d12c0eddcc1ebdcc5e9bb12c9223ca23d5
SHA256516db2b27eb5382b7344f3dbbf8892f388a7459b7515b1dd5231fe88e0264537
SHA512ad077700b0f1657041138e794640b64a8ec2dad5e01f11780fbcd81bb5c982b659771885868d62d7c3c0693c0ee514b84632378843c9c794382a5e8f1497f89f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a