Analysis
-
max time kernel
136s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-04-2024 13:17
Static task
static1
Behavioral task
behavioral1
Sample
00dab2765d9af0b527b49acc2588ec34_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
00dab2765d9af0b527b49acc2588ec34_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
00dab2765d9af0b527b49acc2588ec34_JaffaCakes118.html
-
Size
49KB
-
MD5
00dab2765d9af0b527b49acc2588ec34
-
SHA1
070cc7c72e97b8d44c651cb85ce52d4c238f33f8
-
SHA256
8606b198cc1d19b2c7d0b74ab85482d5c9d8eab8c4b84f5f1be8bb95a6bf18a3
-
SHA512
bd61785361f58d82b17a1424ba13636213393cc9ed983690494a814648ea795d7c683e8336daf5f3723ab712dee76cfb8e9185eeb08210e1ac236cb3e37750ce
-
SSDEEP
768:TPlHO+goxSC6q6uSPve5jgCaOecGsF4Q+AZqT/FURqxqGvUpouyUvtlaM28ZiJFq:TPdj1gCnecGs26ZqrFnwounIM2VJFj2
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420299322" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0a2976bdc97da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{581FFE21-03CF-11EF-B2C4-6A55B5C6A64E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000b7de1b2bda64b6f7fafe15d5719530ad36854602da45bcaafc0fbdd6f43760fb000000000e80000000020000200000006449a717619c5560458bac6a600ee6e4144bc8a71345da7efd492afa28b3a1542000000051425011aa9b30a3fc4b5b699f01c28583769c4d7f5d243217b967fecdbd57bf40000000c89c63471249de1d00d621d9ff46416713ddb2a6bda631eb865f0f342597a8b06362718bdc68af6f26606b5695e84fd1740eb01c5134d58480ce9e3535caf7cc iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2208 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2208 iexplore.exe 2208 iexplore.exe 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2648 2208 iexplore.exe 28 PID 2208 wrote to memory of 2648 2208 iexplore.exe 28 PID 2208 wrote to memory of 2648 2208 iexplore.exe 28 PID 2208 wrote to memory of 2648 2208 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\00dab2765d9af0b527b49acc2588ec34_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2208 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2648
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f9beaf2796a974eed4d110934c34743
SHA1f43e8ef7b88200eb5fda06931137d4217adab5aa
SHA256293226dbc77b4db99bb2a6d29ed7f926f5220540c446a46b797d80bdb3205d81
SHA512d11e9239fdf319f03f098ef9f458a401bfaf6465a66f639a58a244c4abf2442c9a6311fbb6eb60c78d964fd1c10f01a97a2c5844efeee5b5d7bbede2ee76fcaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a937956225537438ed29e7ac355626e7
SHA18238ec1c4cf54ae1402b206e81257861148e76bd
SHA256d3d30f0be8043fcd6cadb24e8cc977fd687255939289a44858cebb33112bd89f
SHA512e4c4c3e905b3d6bc0dce067bb12ad44b04ae473a0bc7e82c52fa8cbfb5da5b16220219f449934ff2865a04d29fedcb46d5b4b6a0b9d75c8ce0b27617f29c9643
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb79187a3841cfc2f7e4a8f3468f3b4c
SHA12c702d06cb66da79d78bb2226723572567c5e816
SHA256b4a2c96eb5035403370d19d35aa0c6b6c8ceb02bd55cdebca26433e9c1af1bd1
SHA51250d1fa4b32ec9e7720658fc0a42ef4f40d97aa636f8a90cb8db14f03b866777f2dba6bb956ea49b44c5a3a447d434a66a82f315ef7af1f804b19c2d2f6698d96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ecc9f81681670d84e6d822f695f199d
SHA17d47c2c1089279921490050d116daff85f131c47
SHA25614778b2fd8af60e7b6d896a96ded22ab1d0fbabba31cdc705cb08cc97fa6b38b
SHA51293aaa10d222bb97b278909dc6b097e3bc1c74874bf1829c87aa62a843fa942369c5c63036fe5437f264c75393d0e3930fce7c383225d2a76e3ab8fd967237e06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b9106944cea1a5c4aefcd69b3adac32
SHA193743cd4fbbf0c092dbaebce1450e65dc8819140
SHA256a4c57ef1469df1f4b178d1b69516a17dce20236353733ae858fb6c8ff7368999
SHA5125cd985b91f78c9ff7c384c2a429abe19219e118d6bfbeea540788405507c55070a94f3017ab4109a5855bed836047f0011f441643196e206cc5672a1ed253674
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56783973e5f3d2a39641ef50b417eda77
SHA1d446ed2078e1e7ebf9aa1fe1a888c22e9cc48228
SHA256d2137fca5dbbac676fd4f7ea2e9b3ac1f0ea59ad87d4dc0a151b8779c6b9857e
SHA512abca38e0b44b6fc9010d3e2e012ca385cde79bc333cb4822f9f53bb8b8d423eb7a803f1a666c248e1988079a98a792e15ace9bdad730c7c0d10ea3f026826044
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5487bb28adcca468b5c3ef010f43368ef
SHA1897a2569f454b32f3ca90614eedb06e6bfb75e6d
SHA25658fcaae8adaafdf1070fa3fc22b9146de1c4a321487bcbbf5fad93c1f4380775
SHA512fc72c1fdc3d495430f2c7b6125b7c9e23229dc3fe428a7c15f0da68119c074be94fab21e4cd15d476ca3194fe5d4fb97f4f2e9c99094c7675eadbfda8e4e1fc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5866e07d9d3a12fdfc3f0f977600feb1c
SHA1dbc8cb720c1ed7906e360972a5c22f27ac7133ef
SHA256e40e5341677229202dc0c83c36e92df3c33c55d18d6c5a64b16ba53ab1bafb98
SHA512943f8919049b152606a2783bea13a7ac9cddcfbb8cea31bfc226c16e6ef66067bc5d7dfe8155cf8b6173eb809b373d28358e7fb752653b0bf6f7f7abfa8872e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598a7a37495bbbe7ff38ebdc3940d4f0e
SHA1fe41cdc920ae7e4a3a30ea800dff4213607b4616
SHA25657b5569bcfb1de1f484c04e49870c00973e4c81b9eb9f5d96fa8e944eb87c35a
SHA5127b17320ad817885c613bdd49286b954ba61a3ea56b9647b286864f19b8c8a30e58d15f57f02a52db55dd1834c712926d27cd5fea3f2704a35ffa131b23d79388
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58aa613649696c7138b141d0590ed0992
SHA11c0b42ae9632fff4461d76bb3ff09f4ead0faf67
SHA2567ef793ee6e8305750f2b63c508d9b714b3e55e51c4815a709716a1313414bb6a
SHA512a7673c59b586505c613e42356eab84ca52dd6b1ecb187ced23464ba4d3f5961a3f5ae369d04e4f3b5cddcbd2554d38f982b314aa9b9d0a5151cc52122c86037e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6e956c0e7fb8192219befd273c066b3
SHA1e51e10435d7777d19c0b4e7dca55f0dbf0d1ae2c
SHA2564fcf2fed318e05ee0f8c937db8f7261c608ede3f7f7972a54735c70dc5590309
SHA5121ddbd39db57fb17ff167fcdfbef79daf399752f60197a762b08c5c43ff47f0e6dce97b1380f1ced9fb31e3125ded81cdb00e433595625a1f4f4c6d479e57c21b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508c3478df5d429bda9321e6ab2b31d18
SHA15f3b15f233ac425366c9077574463bbed0011350
SHA2563a3a870e3159575f8111155383fc350b4261ebe73be8d6d6acfe0bfe74643b66
SHA51229f696b0f053c6c63b744a384c860b8e373e2c92698326bdc79513f73fb7ca283ee1ebd4fd7d47b445a0538cc68f36244aca212dcdbafba0d6ac25bee8148083
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2444c0673931b1b4405a68a1f2129ce
SHA14c110aea431d7859122f47fa0c6f67a1cfcc57ca
SHA256d5dafd99f90cad3a6468986e847e98fe66366f4381798bc61668d631685aefc1
SHA512790285d8a8415aef07c85e7e018658c5dc541fad1e98c99c41e91984f68278ee3f52941d931e7e40ef7f12f0c33849a3a64836a737a1501031ff131de6e3fc18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5119a8a1969712dccb97cc1c5b0f91a1d
SHA1299fb044974333fea4e8eea9af7df40bc7924794
SHA256bfe2ccd63e74c447b6981a39746187e3dfc535e45b4791eb4da2a031d8272d29
SHA51244728e03dca0060c878b441ae762d891045c6b360568cbd63b077db406cb984babf059fab032bf9986d33132ef65708e49f730703b3a3be1d916f85560230e5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531534940934c6502ebe6d7f7b4bdd995
SHA1ac4cae440c296dd52959c77d9dae83749d9cd9c0
SHA2564e9249d536c09c83d0d98db8920a3d96f367e7be914fc7e2e8873fc4a7e5777b
SHA5128e5a352762d0188aa62dccc49b50dfb5887354bb1fbd7dd2cff2fee5aa23386a248076ea0ef94ed0049235eda421fff7aaffaf5609b18b4d2097bced4303ada2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564ac693ac593f9e66baed25d10181a1c
SHA1ce1f21ba1bc6b1bc83831f2fb6586dde6c3e08cc
SHA256768c2b4e1d1cafa1d0e9b5f6d26133ab7e9babb7faf311344bd85637b1fffb5b
SHA5127ae992234a204a2da03a3655abd59510e5a88211434571b2dbcb8e636730f53c41906a785c7589a2e766fdd43034f3fb6c9454fa37cde88fa357ff5eeeb60f92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f702fd679ca37663698c3a0017472729
SHA17affe63a9ed0bff232101d9abf5dd76d13f83ee8
SHA256c4c2747ac603d05181ddd13021685a1bd5e7ea0435db69d8e2447dd50ea7e733
SHA512e234ac32c6406f98085312b22549fb3a167a0175fe7937bf2655a6170cf63be62c31c0d7b81a3a383bde58301d14f381068f6185d0db35463140dcc705a92fc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9d7e9974f6c42f7fda9ed6bade699a8
SHA14d6981022484ff1a1c2e814e266851e90ffc8214
SHA256819e4acdcf348e36dec458c4f096d92666309acc9aa44bf82b471675ca769109
SHA512d49ed1d11c92fa8ed2c0a53d1365c69a8f1e75e6cadae8a24456d5a60f67ffe57ad8275a3cdd26d3fbfa0c36b587dfcf826e30ed7dd46c7cee1013180eb98883
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a