Analysis
-
max time kernel
134s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
21/04/2024, 05:15
Static task
static1
Behavioral task
behavioral1
Sample
fe849caea915328dd992db89d9740a3f_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
fe849caea915328dd992db89d9740a3f_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
fe849caea915328dd992db89d9740a3f_JaffaCakes118.html
-
Size
29KB
-
MD5
fe849caea915328dd992db89d9740a3f
-
SHA1
f1ce71fc7d0270dce569125410f90c7ef4e0d02e
-
SHA256
8b587d0580c3b045eb98bc2ec1f4e43db064428310a4f7e1e30fea2ca1f9ca34
-
SHA512
58e172f67245b80482b5c1a8280bfab58e64545682deba70642fbda59503780fe9dc641cacd7d2d81e1fd9001b48590cccd6c3e2241bf672b4fd7d06abe4d3a8
-
SSDEEP
384:UTQ3Z/QTDiNf1Hph091Iq2R3q+30SqoQT/cb8ze9IFa8GwItR6rWCz:Uc/QTDizHUPXN/cQze9INGw2RUz
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9041e40bab93da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{34EAA2A1-FF9E-11EE-A499-62A279F6AF31} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419838414" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000004bdd75b5fd4cfd42a31d5605554918d147ef41e208da8470feb9637f9d8a786a000000000e8000000002000020000000df88d60a14a2bd405a1d3f12977f97abc5f9a2d6f642f7c0639f24f86ee547969000000016d896205e60324c41eafc7e7ce5a097dd1532eb12644acba101a4a09627e7135e4f24c933882d6c3eafeff2ef150fed22d789c7e0b084ecfdd76b0f6f777e4e92461bf2a7ea50e9cc483f8e197a53ea2224ce7117da7a10bad50a5a9c47277cfcd7a37ea688bca8c99fbfc8901095f7a29f783b7af492dae8e47ca33f95761fbbe525ea2a33f41669cd6d6cd141829b400000009a673c46f38e2df703a5b25154fcf116218fb366783afe8b60bef3c1d6e4301129dfd28a1f3882bd2497ca7e969ddcba7d435a13507f3642cdd4e9a42223a069 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000e81c439cf273451d514ed9560c2916d8f63c048d5aa72c541e16832ec29d6b2f000000000e800000000200002000000075c93c54760829f50369367251a46db61e143445f36be622173a6be581850bf320000000f42d17e432dbea5be1b33ba98f0d1c3cd981b22644f57068d20a5662c8faf9b640000000a7a744da7fdb5b7528204b7c2c06c7800457913bbe9a6a8a31a993e37f1141d346eb0293d068c1b34db61fa440b33b8da395d4ff2cda96deadbd17665c97954c iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2000 iexplore.exe 2000 iexplore.exe 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2000 wrote to memory of 2516 2000 iexplore.exe 28 PID 2000 wrote to memory of 2516 2000 iexplore.exe 28 PID 2000 wrote to memory of 2516 2000 iexplore.exe 28 PID 2000 wrote to memory of 2516 2000 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fe849caea915328dd992db89d9740a3f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2000 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD566a7a6d2d38a111866534cdaa11df838
SHA1360b9e849565bbd6ec2ce74ed09863feec3b3997
SHA256eec482d6f511be6015f0fa7942fa20e1b8b41e1cfbee36c0f405c8701c687ac1
SHA512cbbaab2c21f43f0806bab732543254e9d3a310be0cf090aff5f10b774ed06aa79f375ebddb3f0efd5e8066c02fa2b5e20db7754a89a2d6b1048bcbc4d2bcb234
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d71323d7afed327169df08421f238b7
SHA1c85311a64ea6d2108b8555a53c0af3cdd5e93141
SHA2561602f9dfb19d3ebd9adfe8dcf44352e6812f025009e1b88799873159f31afa6a
SHA512fa0505aeafefb6a75286d6e9b06b35b1fda7fe2fd86a16814174b0f407e1cd19c00a49a70ca36309a6bd6628752b45289d79bbeda3b633d905f0275fa99ed3d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5419617738320dd7be4e16733409e2db3
SHA18ea0f808b01c407148e932cfa3ff3739e48861f6
SHA2566bfce0399700159f3a2acca25b21b667046dda40c4966bc42f3050ead8fba49c
SHA51275035d41df71cb8867fa12b8d402d880d2b1572034fd1ca81f9e0fe5f888c31836e7943f21ddc6886e6f3635f34c40a060e14d8ce956318fb3feffd6849eb5ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5322529eb47273a159b1e23ef9985db5f
SHA1ac4d02b389a95e130e698a38e1179be6fd6121f0
SHA2568aa2de387ca155b1195d9d5b624c03156191e42fde1542bb61de7fd5c202fa2b
SHA512369e80ac11a94c0b6fafb70b85c6a7aabee1c603e8d4237544a176ba9cf958c3b0907015fa91b4b6c35c0ed389ee74349b2455df8b58a832e9be4bc5c8f88f32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca9734b1970953f192f5064a9d3e5833
SHA131a052eee19061d2dd516dbd357cd2034ef0ab35
SHA256434142690af6053a9242f94ab87b95fce6f95e0426dd976e07c5bb5701fb0d53
SHA5127e2bfb440a007035c969029cb5a23183fa6e01a501d20a1b7590aaf2e5e634bb41ce136015f8f0269b8e34f4c379cfb353f48df0a41f3d5f6d4e229fc92e614d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d39a3fe2f3b17992fe6b416e2a7454c1
SHA10d5e6238b0d995cef472bd556072580765bdecd3
SHA2564764190b614c0ff01aa412745894c341db9441199a6024c978d42cb1e9b3a0ba
SHA5127f51f9a530651c4cd7c0cf3f97cb683d959b97c34b712ea4f97e80504d2e59531774dcf19f7b3ffd0e1db4464d1652a51213d3ce6c1b4239989ee5347dd67b15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57cb805a703e106b7ef04c7fcb9e9c247
SHA123aeb7987dc5f3eff29d230d23ee95104b258b08
SHA256c3c9b29b10a77c77b7277dc0c999751e1a72fa171cf779b01a3dd8dda5194297
SHA512c78e3c67f546884b4fdc71c4e0de28f6b3f88fb15b52b3c00e097269d1e2528bcd7bfb9d09929cdb336ece4e726ec7c4f39a6a4bbb4c7663ebd9ae6572c9c6f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eac8ca5a85ad614d95e217510fc7708f
SHA16d9690f7edeaf87bb9d1ed1b7909d16c3682e52b
SHA256b3cecbdb9de4a5331e896da078845a33e81eeab3055baebf52c3e8a870ee88ac
SHA512d82425bcf2f4e1af44afc85a4aa421c6636992f7cbe554cc171f47266425abff712e33f05d23082cb589c415ec08c0aed2a27c938aa7899cf188c6c06e86ad6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dca76a1d3535fdc9e6e9e6e03a6e0a64
SHA16f84a93fe2c3614204a37593bb2b2c0ee1e1ad4d
SHA256343a7e17ab22012fdcb4ad50bebd3ac3ce26d3f2104d495b1a2f29026069cae3
SHA512845dec7dceb275e8a7a3d7800f87bbf4c79da964d55101f4e6d10e4fd57043681ead48b3b31564989e4c848d3f8624c48c98e5e9b81871fd308cbebd5dac959f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56022067a1aaa6f6c8e342c3c33a16feb
SHA1b51fdc90d0513262149e1f984890716df91c52a8
SHA2560821cf33ea9c85ef8986b922191aef41409063a7d5d3681562eacfd7427e0336
SHA512ae8a1ab7c4758989f2be15dfa73c9e2c0c21d03ef69415e888377b1a56598d0a676f808719b2e1cdc283f3d610c2ce33eeca7c5fa3496a00ce61ad869966260e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc4317f120da6b5758c4eb825fa9f39a
SHA1e0d81fee7c28b416ef6a84ff597fa7bfdd012f5d
SHA2567a865cdcfa9319eba873e790154c956ec78a88fb75a816478e35a1d4fad0eb26
SHA512188c8db258e048e79c4f67c5590b66b55d8f7eb02bd8535fe655f31f57e7935578ab5a34f03a4819f7605e5a238339ca2bb288a9aa7d04499ffe7784d07d03a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540e3bdc241d6a768a7fb32cfa913fe4c
SHA113d27aeec16519775c130a19cb3887d24101c87a
SHA256e41ad103a23b214d4145bc7ae82fe50ff29083df16e18961768a7d9a49315216
SHA5125ead1377fadee17b2df8559c6a5b683eab77ca983f60948aa7d3e5f62b52c64e9a2fc3a0fa130cb9998bb51ca880390bc93c95b5a2e5feb8d67e6756415275e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d286a3e2c8a3615b90347fe9729568f6
SHA17786e7aa234aa154903a51ca97e386260d3a48fd
SHA2562d9d8cfea06cb55452cebc16879428473fac957aa80b4df66a2f39120cee2fb4
SHA51275babc34baa84cb070b89ac2e8115987e46989ba746a34fe72001ab47f0e9a45a49584b8de82cefb3ed09894cb10a47a4268b0bf6320fcbd9d006fefbb746ae1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5c2c87454bfa3cd64f3d09e3b3f55791f
SHA19f87743164097fbebe4930b2646bf08a73e06e44
SHA2562cc33f7df200ec2be330d110b7cb41bbbeb845edf35d6f451151495045279fa4
SHA512436517678090da95a41d471ea7050d6564874bec09b3beae90547e5e033d9698c171a4824d25c34835578577b6e4ed4d91346f69072c7c5f7c446a15477f3172
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a