Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/04/2024, 11:50
Static task
static1
Behavioral task
behavioral1
Sample
00b30871f683c1d5407c71e8475f5285_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
00b30871f683c1d5407c71e8475f5285_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
00b30871f683c1d5407c71e8475f5285_JaffaCakes118.html
-
Size
28KB
-
MD5
00b30871f683c1d5407c71e8475f5285
-
SHA1
ce27aba33b6a3ac43659ce5add222766649d1270
-
SHA256
4430fb65f34195271c93b4bdc47bd9bbca9ab97c2eb58359dbfb6697fec932d3
-
SHA512
ceb16533372647904e0d9f8739931f132277b3809373fd20f6ed361dec8d317df4044d6e8be6f04f4e3c07cc723ae3f0d7a95cf9327e5bc81d6026e45eb938dc
-
SSDEEP
768:On2F3F2Kz2uMzP2c+kV1qMYOO2LqmfbCIo:On2lU50OILOO2Lquo
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{519DB9E1-03C3-11EF-BD10-4A4F109F65B0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420294159" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1948 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1948 iexplore.exe 1948 iexplore.exe 2664 IEXPLORE.EXE 2664 IEXPLORE.EXE 2664 IEXPLORE.EXE 2664 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1948 wrote to memory of 2664 1948 iexplore.exe 28 PID 1948 wrote to memory of 2664 1948 iexplore.exe 28 PID 1948 wrote to memory of 2664 1948 iexplore.exe 28 PID 1948 wrote to memory of 2664 1948 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\00b30871f683c1d5407c71e8475f5285_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1948 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD543b5bab2050ede2bd6f41449f8a732d6
SHA1d17093c46720eaf1a761b50ed03f143b812e3126
SHA2569f98b2fa5172108bc7267eb5fb3da9c620050fd10cc37a735e74a4dbf5588f81
SHA5124a9baaea1cfcad73efb16ca762603e5c8324f9e2646ffbb73d08ab92f22e49e609be94540d1daabdd4fc26452ec28a41d5a8fe1262634a8d9339c1ebd891a5fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c5992674441c7cac3b78dd92be9db9e
SHA108918a98cf3c586ed68dd74fed6a98764bb14681
SHA256bfe55ba8acad167d4d810e3324d124d644131db00ca0ec02227a3117f9d0337d
SHA5120073078082971a88987d2f1bfdb378564aa64fedcf74d6a6da77bd06db284469e38151100100b2897a70caf2bd17bcafcb7b663db7883cca6e4ef010a01ece72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f95b7a88d1f2a47d1575f6abc0e8c5ba
SHA13fe80165c7e74afb8bb1bd26350aed374e492dda
SHA256412c25806bc39104e67d9d5351da298a57b2aa36a451b4627edc39c30423d10f
SHA512156c8c725d29b9746f96952acd6ab5010b4ed472e78e1974cf6ea17690aff960d05571bf86cfeccacbe1bea58dfe2654f259daff092381732a657e96e3d6b9c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5720b179c01e3d416548f81a1e2733320
SHA15e13f01d6d19eaf32e44d3a34333e69b69e7406e
SHA256aac533fa42466b24db5705fced9aa8cf1e3d7144e25a6e9e595b267edc7ccc67
SHA5125933bafd251bea4787a8dab7b27b3076e4e486a56d6b532bbc1bdd0077f3c5d3b1334e5118af82ab40141b0bd9a36d18951a9f062ac80a6469b2ae42c4103f7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588338880208afe038f311a12ceead5a2
SHA1cac2b44255a520e21be44baaf03f3ed42e520b70
SHA25664212a947a0d0371efc9a1fde3eeafdb68bf88d07bb93f49a73aaeff7bbbd013
SHA512279a4ebaf70d8d628c352c91bd2fda98ee4fefd9bd5e389d96fa2b525b02f26a852294eb0791e4f8a19d06b4aa26dd2141f4fcefc122db72da3f2b4cd877dc52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe895ac0c138620912b9d79d07d0dccf
SHA1921249f1df32699ac2d7726abc75075bf6f9705d
SHA2566905a243efd957be9f71f977f4e21b065c3ae9b0c66ecaf6f59ceaafa2e87816
SHA5124e0cafc16248e40b674ff63e235fbb5d5684eddc6c3d175e7996a798769c02d78ea42c7e13110968deeb03cf4195c292e30a8c735b71ba7a9144a004c9b6bd7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55cc75d01057c8b983552136519164e29
SHA1e7e22a14ddef2e7c757c035f294e6b8144b07ac7
SHA2568e03d53c4d70a04c36101c3d15b609be5bea6862e28aaf2741d6f40b37704e7c
SHA512b88b2add73bfb03b2e11f699c03702470f6d644d17b7b9cfae5ff5f9c19438f0f2de65d3421ae775f898c883024b5c098ea6f6437d1a73a78dc1fde31aaea91a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c469a8f98735dde3bafda698d72c49f
SHA1a0c82ef06d92bd36af46e2fbecb43975d60e2aab
SHA256f9400ab9bc9348814fe41c78c29360ce105b7bf7699683d7d19ca8223e3b75ab
SHA51207bcdb20503a7a695df43e7d4d4c3ea922abacfe22dda5a1e67022ac9759aeb88aaf1f26b485c2b434674a2499e5fa89d3ed44ea9e0ea6b6b5a68d83bf3f8b9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2c2cdef83a0e55222a661f30ad49c3a
SHA142b0476ced43cddba545cb945febff830176104a
SHA256740f0360bb9b6e25d8c82503806dc43f61051906c0fe4d5463ce6b7edc7e2a66
SHA5126dc1c69d4e6f234fbdf445acfcdb7c92a27bf268dcc5ce0c3d9d60321982d0736cbafdad03d0cb35d44c35f926e68a7b39f67b263017ce554289591adfc42074
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5937000066728c1a119fccf6e0e40a7
SHA1ba4e87d4e734c47e80514249a0ba95863fcea1dc
SHA2569a953a808fda44a0eb18aed157e88b59a8f6caa53adc7658941cd25ed6cd579c
SHA512a3bd747088dc81ee2aa4d8a66af18cc02ef0f1148076b78a83f13c9f59d1eaf7459f6de7ba0bc33eb8c18ac592f4b3394945baacbbcd196abe8d1438f32a6b45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d04742115ac32facb9fe7019dfa6a66
SHA1ae2dd71f2678a966830afcc343d857b8bb1a19d2
SHA256bdf58fa36dfc71bd7f0afcc4ad4c7af4e4a3e2a6e74830bf6bb24bd19b5db18e
SHA512f7eb067e543451756c961c6c1ef40eb23ac253adf69eab8619ea9e0078d4bb5ca4feb7601a3ecc163378299a0feae4b3dba7ac5f58e81d0458db41fc4735da1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554d7396bc19a2c5b66590aa48927fd6c
SHA1981ef69bb2912e6a8fa63dcdf97b2d0a4512866e
SHA25639b0f0d0c782fe1a57f1dbae41760c2097c2c2d2b5b3a7d0d393eb13bfdb0c75
SHA512cd2fe73b50a00c7ff3aa1dbc8589061f13d2ea92d79a8d10ceeb0c6d794355929c551ce7aaf0464bcd1b4f66a1a4201c859d544e853a6262b09a6e6f879c074f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538f0aee1c586d20e296e541a2101be8a
SHA1218ef0d220d7eb3559138369e2e7f8464fb3c337
SHA256866b5d6452d7185d6078e9aed1c32cb7d1d3954aaa0958bd628beb0fffa2f28c
SHA512c9ac98b4429516257532905fbe7d73c14125a53fdc6671e57c0dac82f45a29ef2cd5e5fba50ac1a5d9d390efafeae2ff272561d260c56f6d676b53510469dd85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d49abb7918a45b51450bd476a8c477e
SHA1ec92f1adb76695f2110f33994ddaa310c67ef19b
SHA256bffd63078b40d68a8b5e363c697a55a95ab24a1c0d067649af55b1c57de2fdf2
SHA512afebc8241dfe0d4163434aff2faf19526e46b19fa220b6d2e8efd546d582bf0d1ba05844b16f442d4c744bc2664b69903d604928b2d4bb6cb5e33a1d9f76bacd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5930f58b5be3ee057a30f96b869341071
SHA15d13e059eda1088ac3a7282a3a62445d3d96b4fc
SHA2568fbc31a0cbeabde583cb0a97e8a5f6af1e667aa378d98c71703a094d277e9f74
SHA5123136e48d6888e11103c211e59d80962fba14ffef03c15e4f91b7e3eb10c33ed531d8ad630e7783d18733b77e2378b084cad30066980d57b2a6ba1499cf7e59c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b81e7856896439e007d36fa184718037
SHA1685a87d70d6a59a191bb480e62c75e3f74f0cb6f
SHA2569a5556e4a60b41edc88f847474153c7097416fb222b94553549d6e17043b5484
SHA5123f69f3ab70d58c20eac028f0e2824546fdb456c1bb346f135a69d9e37723bc872c4185e797651d6b7a09d71f29fe492225e48ebb2b08dc61080c64124cfb0012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aff178abba387e5c8e7074d5523c1c8f
SHA109b5d37fa2f7f1a05ec02f57ef2e0a1646b44159
SHA256baf39a01f92e0c406cc5153040b34ef10317782e08f67d4f269f119f1eb93da4
SHA512f80b78bfaf1478968bd63f957c4891284d2b23c34645daa6c462f1d9d28033e1e22486fa6b3c41053443420294c0138f241cc698120d8359599f0a81f9f48dfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d566dca895930f64d08df8bd9d269a6
SHA1890172e268990454adda27c10fdcc05a629feff4
SHA25689c2f2c24f6d7cf2bc63e59559857e7336c0a81df104f9ecf1b6de9d56f9b447
SHA512b17a5d25790c83dead16ecc6abb5be8e1b9cfffcd7589642426c76b9f44eba95455396c9cfb059c4d4754155f289bfd41845e5f5be4169567ee2163b52c84561
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5898243925ae73e0029ff2112691020db
SHA16955270668c871f6619818228647208a758196af
SHA256165011dc2240806df91a4f4b9808b8b59b53124338e7e9f40773b3740ba8ab21
SHA5127c51a11072f3107cd36b32a33913f425109823c93b9fd5784c559112915ee309acbbd16e75a31b4abef5c6451689ca4c265ea556828c4087b334ac45e6e70da8
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a