Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-04-2024 22:36
Static task
static1
Behavioral task
behavioral1
Sample
03c82b98ddcd7ce28c290258bf9da499_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
03c82b98ddcd7ce28c290258bf9da499_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
03c82b98ddcd7ce28c290258bf9da499_JaffaCakes118.html
-
Size
91KB
-
MD5
03c82b98ddcd7ce28c290258bf9da499
-
SHA1
d5a647ef9769b25acc53f2f5da05c619dba6675a
-
SHA256
9cb02d2771cae04aa424fe0a4b8796533d4a9d9915e60d4185f4242a6f5ea1d3
-
SHA512
af26090db7063652db8ac3f504f29d528e6eeb30272fea25b5520d3fcfbeb7894c9012c18fed5aa201d41ff57aed6b0af1a2db5604bbc78594d92978d7393615
-
SSDEEP
1536:FEYRx7uQn2NYPYC6sOO+R8GlXONG6en5OrE22F2U2CkcT2H2F23y9EIrN0oqf2yR:lRxz2NYPYC6IHQ9Q
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0595160f398da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000001a978a66f244873d51ad6e8e164713aa01b2287248f7b359af2e00f01b9d3c29000000000e8000000002000020000000dc1f3607bb29254f469b79affe1d6e21f192d169831bfece615056dafc5b2c8020000000ee5f0492cf8720e909b204e69a9202aa029d0fdaf08aaec102f0627608c87de340000000d26d246a8c9a9af5976e0e0d943ca83db1c477d02875d4ae1a57286210b82db9f1082fa3bc9727509589c342fddb5bfed81d5c7780475915da0f5324c691e51d iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420419238" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8BA832E1-04E6-11EF-B85E-52C7B7C5B073} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1728 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1728 iexplore.exe 1728 iexplore.exe 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1728 wrote to memory of 3008 1728 iexplore.exe IEXPLORE.EXE PID 1728 wrote to memory of 3008 1728 iexplore.exe IEXPLORE.EXE PID 1728 wrote to memory of 3008 1728 iexplore.exe IEXPLORE.EXE PID 1728 wrote to memory of 3008 1728 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\03c82b98ddcd7ce28c290258bf9da499_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1728 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5aba7fca52f6e45c66b1b099921cf9009
SHA1d18f5b3ce8f2ab93eecef17f413dc64e5ac9e8fb
SHA2562884ab2b4b90f80c2965d998ac91d382658f09ee16df4f65554c17712319d2e7
SHA5125e90f1772d06232014b00d4be099e9fa391f3a19bf050e316c0205ce41aa5e43f5bd023369c84c26ab48a9bef6168507093252afe06f1a48a4b81fc54c41880c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5bf2dcee2b96522245dbc93d784432de6
SHA19cc278672e4b1f5df1c73e90cd728902c77c85c8
SHA25683b8485be612d33b4a2f7c50a651887209beea2f96675b7384245ef7c582c297
SHA5124ade3fdca9412b510a2a4af6c47da4e3e628d8647d1ac437ba48e07d91b1ac0c411dbe315a89dd561937d7c41a3102c28576e3bec8826c6dce293a245ac60777
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD580c31095020f1f07b49a0d4ca1db6b46
SHA1b2e51028c40616a09ab607d0458076fc537a26f0
SHA256fa305060806c387f9f0858a8fb5548b580e87159214e3523c5470183d696f93b
SHA5120f95d714eff6a7c8e0697e6d4e33176415d0b7633e65814ef80cc19bfd360b5e0e2032a03da1000eadfef0d1aab7a0c98b377061553dd9c854dc2428620c9709
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD59f1cf2f792321f815177ac786657e2e5
SHA106f72cc10a2f402eba5e569df22d5eae972bf8c3
SHA256a689800f7e1d7e8c07e55584d409a736e8fcb1d733fbd29147045c2cacdc36a3
SHA5124905638399cf6e18b9136021c696665eb36686c78e42d16bf32f8867108ef4475f5a2722fdd165e4541d0941ccfd62b05b6c0279eacc2e124e6476e02a2211d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD53ffd3b59f42691717c0a6fc33071e557
SHA132672522b5acd9f26ac0add2db42d76a4a61a9bc
SHA2569a225ff5d6fbb5e0d8cbc60c37f1894d8b8086b99c7b186d2c8db514a6a93e99
SHA5127ef19b8b5676ca9849b08b81172b50cd975ca83b94fab7bc480cdb7e1c9b983f1658f550fe86f4cb7d6ee804b870006be69976c2989ddf9b04a30896a9232cf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5888e6449cf5c92797a5ca0aa689bf3f2
SHA18013d3376784d5d005d06bb990c8fc7b519f4766
SHA2564ede89d4bde974e0e20dc29832499efa39e256b6335bc0b782373d5ee233b7e1
SHA5128f9e35511af4d85eeb005526d7b40675010247ec797b065e584e04d81e2336c2f10f198d656ae5a04de0b5b7de6eb97b6a4919c86cfa9de95c3fdc228d172924
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD566c0e53ce3e58f8ec8b88ff9fee87197
SHA10d7e9c64663abc4d7d7ea451f7e939633464662c
SHA256af9ad232979c4df0b97635a2c7939e3b614515b190792d519807571402865667
SHA512fa34d739b79c0b8bd777311124c1eab6fc5e1edd25e3e034275f59374cd2189f123b1cd9d41273dc8b8dbda4a947aa69a41eb71cb271c5c68c75d1aad3885ef1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5115450a9a95473e35c05cf438cf7e4ed
SHA166b569a89767456f1384bb7082f78271b4212c1d
SHA256b8e4610be684dd1b08ba6d4e511d8026ab350ef17ab9eb1640e52c5325ec60dc
SHA5124d57f9ba3c9481171b62b198fc8a7c607a30f05e0f22da581facbf359de0dd6f49b7de7a55c365882cbac38d6d42adec308e84a6426c4e54c0311eddd170e1d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d9615dceafcad07087617d39252a99a3
SHA190090968db5f068e61effe8c3d5bd2095eb08954
SHA2568bf52ae0f11bb5ff17c7922b102ec72b98c6722e83c0515c692179c8a93a3a7f
SHA512f3c09047fe870987f79b93806c8053544cc5faa3395c10ac9468ed775673405f4e0af9c67b6f53c2c3c1b416bbdfab409948573fe88da050cbaf8f4f5e78d046
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD56ecd1e0090e3e78db4abd64008aad59f
SHA11413b1a47416e6701f76e5c6c5014af9f914d10b
SHA2563938382b122fb2682d2a8ae6b94338a62f7dad4914f5794fc6b178d6ff8b8869
SHA512307251dc0ec4d9ee2ad8647bbc2728d082c2f66aa6a391616f992fefe00a5f8532aa20f2c423c725e90e854a1d405bfef9ffaa794a69a19cca1ba82580f84599
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5f8c4e2308e0f766ee3a9511e7502ce1d
SHA1ebf8bc009b843224a7a93c4b451d93afa1096ce3
SHA25694ae163fcefb1506f15db9ce0e7fe5744d5cf618ac76416e994ded77ce2b4556
SHA512bc8d8d096b239e83b17c08843ad0517bb028c35d117630fd438c524960229a98a52a86f2062e7c9eacb6555779077e393248cc6af1f0e02eaf1c01c84facb3ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD552056f826ca82501b2b7a2e7fdde1653
SHA1e1a3a3a2395a5022181e1d8a58b64323fd82d518
SHA256126b8933c9a7542bb881069158a83ca9796b1075f5ee576393237d27a13830bc
SHA512f7fd7197d8e6a8520cfa36d3447f78e5716737bb38001292a78cef175b968907e55653c4de65eadd4e99197dc6caf4e387e59cd47e0b6670fc30164b9a6e1ec1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD561bd3682ae2d8ac7921dfbd69db945e7
SHA1fbe8d6923b114a54bfaeff7b71b6f502478c66f0
SHA2561ada18087289b943ab65ec67871a2b87e6c96bd74e25a6869b68e8a19a55cbd3
SHA512eb285c84ac93124db12352e310f913784e16860fa2b34de69a7a24f01b63bd0a49517acb8199e8e6a956538b4530787e8891b563d44690f6b6d7e5dd28efb6bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5cdf66326dbd755cd6a692b787429a4b7
SHA1352935b0f29f0781e07c1d11c4eabd6e49aa0e17
SHA256aded11716081be5061c50ce9a706332aaa2d99398a37a5a8e11212f2e4a2056f
SHA5129f13abd2dde0eecd176352bf9d3eb2ec2970638a8e386d821aeb9c9d16fcc1fe30f3c6abbe5a59620d4e692f32305e26321c9e357f045c21ea405c360c35e474
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d3e8f27c204bf95c319306a44cecd0b2
SHA1f42148c94f57f687d857b097e2ae3ce171088d96
SHA25636fcdc05bd5588b0aacddeed37187042158c40f918c89d1eaba71dff06ad82d6
SHA51232f859c10ecb74a4f46aa5b296ff6bf8a046937b8b9a4974c573f92ebfc3b593ff7bd9a7dc43ae198dd1a579c46ef11ec7d39eafd1ad6c731daa55dac827d7ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD502c80e1ed00bdece1e8e15ae24c195da
SHA16cd33e3d66bf697e623d45285988be97c85f2924
SHA25657768ce09590662f05db030fd2182bc7ab6e20e96ebfe89b60c7f1612ccb7fc5
SHA512054223965076b4e53394df17c15d4b2f9d9724d95bc94a5619236623582b13dad695adc9af17b8a5d1f9156c97c4069ec2875b7c8d47b98f87c12e34421b579e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD59768f5b462bbe974e1f89c475405edc4
SHA1b6b1247683ca5c2be85f7149cc3bf9568fe07bdc
SHA2561e323395eac84ba7057da56da26761bd7b14c7f3f91a02445f5bda5fa8ca12cd
SHA512a9bb594c6312fc98b5b49d388228d703eb8a9cbc5617a68f79ed3b4192559799be9704cece043d0d99b56f431b4fa608e49e58ce9e454df720c7e72caa2c23e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5caacc75e20c454f06b6f8ea356c11de0
SHA1308dd5461747ec1d56ef8f190cd3699feb5411e3
SHA2560b871349b6d03b5d6d918d23dbe5c86bee2ffb7128df7e225593739738c437b0
SHA5125961999f6b8958d665f6ad393b119c27b62cebf61ed14c078bb359ef6d0af04a3e38860c2d9135a1e6fe14ecc1a4361fa389cfc2b440031036d52ab48c4f819f
-
C:\Users\Admin\AppData\Local\Temp\Cab3AD2.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\Tar3BA4.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a