Analysis
-
max time kernel
131s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/04/2024, 21:38
Static task
static1
Behavioral task
behavioral1
Sample
fb382150c283104282296138ae2cac06_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fb382150c283104282296138ae2cac06_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
fb382150c283104282296138ae2cac06_JaffaCakes118.html
-
Size
109KB
-
MD5
fb382150c283104282296138ae2cac06
-
SHA1
bcb71094a08c6acdc9d5d5628b6f339b0b341573
-
SHA256
0784cb4ac612990bbb06860d55228518a63a95273740403de578cd7c12242a5b
-
SHA512
b01f50cfecd8f9db8d213d9c2df13e7083369fede1c4a71e387d5384a23266f32b0cb436b801a5bd11be747479370e2dcfcd7b880bf0e22c333fb6f2c8f0cdf2
-
SSDEEP
768:g63iOOdSbN9qcocgquJOnJnT5YuKvju9GL2StQ0dFE3HXVs5:SY3uJCJT9TC5
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a70000000000200000000001066000000010000200000004c7a2df435123387c0a149e0d6ff6ba85416c542952c643d17b0e28308120a5c000000000e8000000002000020000000e8ab6adbd79a11b0226eca3c8215d9e100a63789f219ebe8f8d7ba0eb80f72552000000035e3b4bf7406268454c53129740f4ccddfcd000b34b584676eac7502604aca3e400000001e960e1345b05646b422274acaaa16f7179b67061be00f820e980a6ae6eef8446acef358c018bd9278d6a26b096ff529509ac2249d613245fc9f254838bad06f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{22416F81-FE95-11EE-B804-569FD5A164C1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419724565" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20654105a292da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000327e89a66dd6c0c8156d5adc65414e168da5aa35b0c1155d66b0cfef57b31807000000000e800000000200002000000039eac2022f637d192996aee6f0d8a9572776457c531b14efa42d0473decde6c89000000073c8df8bbc7b8c041540d3021c58a0adc41cda181f47d4c6b4e81ceb940fac5c1966a319e22d8d3c6ec87e00c7d191f42e36e7164bbcf452aa41cfcedebc3b2f0e49d8a9530ee22dd3ce582702986b15b2af980ce97cbcc902201734a8397f5543db54dbc5fa50b88fd14066cc79375f60905fb9f068f2784c44cd35af44b9ef3a94672c5ef58b04a087569f09a1fd6c4000000040749d123c2b72f7d2ede3f0528ef6bcf629caad6c731847f85bd766d41fdc80cfa56bf84fb329ab637cff457f7dce40d428efc34cfd38929851c2d598ebdf01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2972 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2972 iexplore.exe 2972 iexplore.exe 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2972 wrote to memory of 2136 2972 iexplore.exe 28 PID 2972 wrote to memory of 2136 2972 iexplore.exe 28 PID 2972 wrote to memory of 2136 2972 iexplore.exe 28 PID 2972 wrote to memory of 2136 2972 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fb382150c283104282296138ae2cac06_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2972 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2136
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5b9cb188f8e47f710fa4d8f1e737195c7
SHA103ec15da064d2249b9e212503f94d8c7b4cd7ba9
SHA256f5eb2f80fdef3fcc4cc0dd1375ce8a1a2fa328baca2c5ddf71f1b136e4cdf465
SHA512b7d9dec74287d08cd79b091d7d8211d510e5accc723fccddcc51e34c547404f6f941d30a15097e17db0effe6fc17253e0cbf715fadf5f8effd405db1dcd8f334
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7c74323c1727a13377a431f0cd70422
SHA15f51058c27ba6b2bead4209bee69b50d0d3a10d7
SHA2562c1437ee30974f377bfc0d22b9c8681d2600bac55bb03069043430ba099277b5
SHA5126000bbb2b2f73abe93880223dbca68765e9d07ea0ed39e8bd800cd92e503394f3194e17e157c6278e138631fe964c3958dc96d30caac713dfe7b9d86d8058ddc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd0342c29fee52d0c1ee4672f0a2f543
SHA17a1d077f53e1f438d28346c5a1c89131a5d2ce28
SHA256a5bc60af7196ad9e037f7368e925fe10336451a7aaefe558eb4821519757d121
SHA51219a1c8b38c844e5b594c5141b277760fa7b69ea3d11408cdc21ca7a6ffddf4c877a6ad9746499c80dcbc9122a320716de4717ffb3ca06becb2ec041cbea7376e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59549a6de1c6473ec5bcc90657c2efc26
SHA1019d934e306cd260b06ca2453c3305ed0ffdbaa3
SHA25681ef7ee4d4d0df570ce095389ded408527576f0b06d454efa33ee66d15b454ee
SHA51222d92547f9876e13b118912ca1872c2663f5400a9c8193fdb008948d12ad69620ded1a0addf9f54bdc3e8acf5778b66887c3d9620ec8ac5f9569ff5463e102b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d2e579c9d139f65168a148984aaa32f
SHA11be1afba734f66c84dde04340a80bfe2609ea3d2
SHA256d8ec7c9e2edd4bdceb78e31e95ed97bd77b644f5993dbabf27f6d370f52398c3
SHA512a4127f5ec31edfc0fdfc5fce00a5e2bdb488eb7b37e1960c00b5dccbf0e830ca973d33bb12e7163ad5df262b56e93fe7deaa435e79c119113cea398a069bbecd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586517566122f32103ee32b904121214f
SHA1a5bfdf952dc8094cb458aebdd5b9488311cdc0d4
SHA2562d10f0ea46f06fc559cde79b9b47e20b8d735409ff7d1460e4f98ede283429e4
SHA512834c89f153a181608d835a34d243ab8b4b7b0569decaeb6e0ac04d6fc048696d90a312cef1d609e6dd432261fb89b332894ca4b1c224322438ea2ac220a1043e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55595438e3847aef9314724f319157741
SHA152ca29595f1b9e5a131ce5a9a5005a0c6cefd46a
SHA2561e73432ade4ae2a0cfbeba02f17516e4c263b4ef4cce2f96fdf71730011cbfdb
SHA51264cde802e55f8716198c443dfe10e4a2461d8eb26929b6a7034cd85659cdc8abe069f630cadd49db44c40079fa49b86d93f696ad35783edac2bd46f2d5f68a0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc27e259f458d937c0c587e0eb7f7a95
SHA1bc16de3c3e5c97dba058eb957382a17fc38668a6
SHA25632269e576d674c224aab59d9f63286bd1feb4fa4819f7d76f80ef1f0f0f60ab7
SHA5126f2524659fa71c5bb1e7b7933c12c14334de0f289028e12e9b6f16397bbc969fc6c99bfa1121d7a671c28468fd3a9bb845d9bedc09f66d8d21ab11fb15144d90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac853f3f60d2078782a75dce64939a8a
SHA1559e2e21dd4f1499a8c5a4bbdff8d11c9066c3b6
SHA25607d0cb676d8e8b4f20c8314a43a108683dd19776c0587dea3c9a42ae672c7df4
SHA512916fed71f7408a3f7dd714e98f4332f681319654279247be3d465eec2c7f3babbdac492e469d777d0376fc278ce63e1a447f98eeef97bba1e29f743370a944d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568bd73f59b3d6f3dd85a4c030f0832c5
SHA1452740ae1269f7faaa097eef7ea00c6c25cb4f75
SHA256f2abafeed87ec23c90a46cc1b922c4c50aadf5c4903836e7c9483893757511cc
SHA512b0ac19c6e57df4eb593f1a6367242b9017cf9852813bea070964e54bc65fcaa0100350527ff57fd6fc3f476870d20b160d4bdf91579af593c608cac0e33671fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b49294ae24888c37570279970cbbc58
SHA113883f267754853281a83f71b699174775d4a79d
SHA2568b5f05b5667a53e82b71fb204f6758231f752c53d694619f220fa4f1fe404fa6
SHA5122ce7b4b5238d41b5c4e8f3b0a9767c2c1c113baf6b4b80aeae0a8519b9410ad71a9f147e5f20f59862e963865c7d0ed3dc30522089f45a4ec27af8ca5ddb1523
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5094c45b4f229ee5bb79203ca4bc2c985
SHA1b22596500e49ef5139a9997787f4ca267f3c98f4
SHA25641fc0658be26527caf2e8d980ea83e90ae4539fa8d3ef262e3c81f6f4510925f
SHA5121f4a6b1e253e0812dc98c5db204be9d781018bb466fc425599fa62fd499c701367370142358a99845ab1a9a9d3f136e9c437fcd40b5ad149baea6068ab05616c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5ea250003c3aad2e2a46056d674b7767c
SHA1c13347d45b5005f1dc49c9070ad484b370f6bb3e
SHA25662c64d95e0e270b988ac37661632fcf09bab2aff1f437e83d3e7f347915bdcfa
SHA512cc0155aad2b0f62718224769f187f50fba7d26edd5fd7d9842b9fb933b8b52bfc3764b15da31ffc6f38f372c1a24af130c1002ffc8edb5f7f85bb7f35924f90b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UA1HZF3D\3604799710-postmessagerelay[1].js
Filesize11KB
MD540aaadf2a7451d276b940cddefb2d0ed
SHA1b2fc8129a4f5e5a0c8cb631218f40a4230444d9e
SHA2564b515a19e688085b55f51f1eda7bc3e51404e8f59b64652e094994baf7be28f2
SHA5126f66544481257ff36cda85da81960a848ebcf86c2eb7bbe685c9b6a0e91bca9fc9879c4844315c90afd9158f1d54398f0f1d650d50204e77692e48b39a038d50
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UA1HZF3D\cb=gapi[1].js
Filesize64KB
MD56ffd2caf6444cada0f100fd970663b2c
SHA1c9bf7e821444237d9a2ea5f4bfa27d878a60e8b2
SHA2564aee83e54bfe4279080651fff0c3006f4c70972182c7250ba144a09baef0275b
SHA512d45276e607e24c510c6ab74f2880194475361702cb0562339d897e973307496f57724793c4a8a66a260b15ee225009e21ebac51324cde7b2132eef66c864a479
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UA1HZF3D\rpc_shindig_random[1].js
Filesize14KB
MD5c9ddfbc43cb4fae24b4cad788abec29c
SHA1171e5fbc2472aaf9058df419bf0a7b512fec9d20
SHA256f168a6ce38a1dc352c36d0d26a04150d5c4b250f0c72ee7e7372220adf10a4d4
SHA5123c78b63b6be06a3b22c38d331aca000d54ea7dc673a364a9b2f7e33025b14b511776cdb41d5620b8ea8127e8ed8ff6de45ad30484dd331d5bb2308b47647226b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a