Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
27/04/2024, 01:20
Static task
static1
Behavioral task
behavioral1
Sample
02163dd9c5256f8618db3f6b92352b20_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
02163dd9c5256f8618db3f6b92352b20_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
02163dd9c5256f8618db3f6b92352b20_JaffaCakes118.html
-
Size
12KB
-
MD5
02163dd9c5256f8618db3f6b92352b20
-
SHA1
1a0de14edfaeb5400bbc6a401f4305ec70383f64
-
SHA256
b1f74b26da843483251ee496405b9f3d3114a4f278e99cf22ec0a2ec8fa60961
-
SHA512
68b02cfaf1f8aaabe7ba2e392047ff21eb4abd884f6df5e4810b27e004d5b9cd86ca7a81e16eae108f5141070da59ff3b7610ec69b0248044b15927bab093693
-
SSDEEP
192:CyiSTEkhBDdjbXZ7JvO7GwQFCVCf73xy1w3mMB2OlEIi7UZoHwD8:CyiQF/jwQFAi7hy1wWMB2MLPY
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000003bd574e6331801892f48d47256ca5f165bb1abe8a9c46c0d8eef7086698745a5000000000e8000000002000020000000ed5505d0aa9a526d01295e1febe37b30ed0b3d33c9196563da9b7d9ebee16f5f20000000a5fdc669e84cdc5e96b3840b240ec521a1b010a8e662fd9788157575ea8cb46e40000000a07718a3291131b51f192095b42812def282108f365ea04156788c50e711e20098b570a042b43942ddb23e5542454c6f7976b3d6fb07aa20def2d1e8c97411fb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6520A741-0434-11EF-8A04-E6AC171B5DA5} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50b6cd394198da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420342722" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2364 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2364 iexplore.exe 2364 iexplore.exe 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2104 2364 iexplore.exe 28 PID 2364 wrote to memory of 2104 2364 iexplore.exe 28 PID 2364 wrote to memory of 2104 2364 iexplore.exe 28 PID 2364 wrote to memory of 2104 2364 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\02163dd9c5256f8618db3f6b92352b20_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2364 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa1151e4258b61904a2d18a3bddff402
SHA14b0e80009ca76fa9b5d2b1ed58b573a7ec6fdadc
SHA256c494f7220ac2c7227767feb7c8ab07b50e5f6dc75d2e346b1f1a73bf080e2a95
SHA512e905279e781d6e170c76f8c155514d27f68af64a87ecba22880982a9c0ed88216a65abb0fb3f8a881d6a92988a3ee94895d07e28dd239c49994992f53c13b6ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530dcf461c84ca5ad091b51c306d117f5
SHA1e1682dcc4351c92d4ceb7ffd57967a2c3bea2f14
SHA256f6cd66f56db48fe0634bc658dfda4874263565c28081cd9ebf25f3bce2c475d4
SHA512570c92d3aba7ef8b7bc5c1f5abaa1f6ea22a6c516e21adea8db1a6dda174ef8230bbfa03e5d0130daf0bb60a0c4d00667f2d3de9a3db13c93ee35d3cb51e40d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc4084e50266c95b2174804118931840
SHA16e942809dcfb4aedd81081c972ab790c3fc4afd3
SHA2560ccc23dd7c48a68acff7004d3239398e43207188e9cfec79b277ea459733e4d6
SHA5127df852e497b052a4a83d32b8b3ab4ceb91b89e830ef2e15c606047ea3be9eb2c245b945b648d8bfac95aeb82f5a493712a3d903983fa1fd4ecb7f2537331969c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58db24acb13f6dc9e630630ab40cd87ca
SHA1d9aab412ffe77d18e93f2b796d5f78378c9af2a7
SHA2565fa67bc9cabf4c0874967156fdd3198bfbedaac611732d5c7a99797c6b43474a
SHA5125e2b1acbbccf4da64ca201f02301dced6b2125fe0aa98e9939dad64a131990a688847d59b3117547f9428b3ac843a38a11dff43a1f8c4f908f7413449dbb3ba9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5b5343a723f86eb700055cb345cfc9a
SHA1e2bb00f692d277962275edb13a3723533cdef864
SHA2565d738a8078fb2db1aa4dc7405e7e62cf68824eedb319017f760fb4ff9fff2030
SHA51212af79c53024a67fac397d3f64a83fe9ce1f0a4cae2b10f8378299af446974c46e52d2f9058cfedf69fdb8722318cd7c9561a35bd0700027ebb7d28496c5646f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e75412f9e54ecbfd82beca02d7767d7e
SHA1a43ea9e75c4ec6445403e2d5aaae86e4fbb9df8d
SHA2560e610eae18f9be49177905bcbf533e10d17930068e5f0a5db6f2ad19b15ed1e1
SHA51251b0c7a80cd4461242bf29e4dabcd42ad2b72ee0e96ad2c016b29b6788bba63a8ca375e8ef32eefc32f54effdcc56889f37f15de1637a7dc030be893b2a6683d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533b062e972ac98e9ac95c039f1b80526
SHA19c2615b4536a73ccb771b2e8d7cbe6ea286c9368
SHA25685daae21a9726af24496a45a8f0b0921a5c80af76fa054636295f3332eb14ac6
SHA512941d3d624b903f86d69e44ee0837194cdb9dd1bcc03eaa1e8b10e5ad90a13b3538fc0338dd5250b26c2458867e1e4c23ae2a90309fb3d3c874b9bc9378da5d4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a791ac66de73f03fae8748f910e00f0
SHA13d08a606b46733d814f9da4539d49824a3f6ef8a
SHA256eced3036eceb97ade8de47526c78085af39e6827a18cb428517ba4f8daa27226
SHA512a11c47ab37b0258248a844384b52a5f1cbb5d90ba0ac8cddc17a23b8c4b31a6b7b4751bdccc09cf9caa034bfb2bfb7a52faebc04eea1500eebca9d36437bc361
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0b61f1bfe1ef7e99c172e37afb55742
SHA1968d2b35e9c560bc7e4465e8ee7b51535ecb7620
SHA256a96ccfd6ee3f9f09885f436d369205c75c5aa1f2061798f0a2a800be373eb4dd
SHA512247087d31a3aef900d73a90b9bdc7ba47600be360dda6cfbc972cb4804b473dd0c74fd1ac2f6ee5bfecee56f76c8a3a7f8a36855aebb3e4f757bae3207a9698a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56abd89809a287ea400303c9fa41809f3
SHA19c864d18d4058e9e08da8a8cd3fa0f6991537686
SHA2568a8a09e6d2237b570d2f6dabd6633be4c6532425c13445c713f348d51ec2157e
SHA512c245c14e9c2e1531bfdf75103313ab16d69b6305a3ea2a650685e9a0dfb9ef8fee316db1aff46182d9824727cbb43d0f4d78f3904ac0ca16d8d859d436ac02a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5324002f937022e70f9768d0da1ea7c94
SHA170009031e51f756d75f395cd2eddc8a23d679383
SHA25622e66f029c44f4fd016c43aff13d7e481cd92941a6b8e48ab2f7802ba12c5be3
SHA512d02ee8a1f0d8ddb4041715f11d3b1de5aadfec856affbd3cbf5428840995c36fa828dd9b342b90db53f90df9c343f39cddc69ae2ee82219e6392e7aa0624b6c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533a352c4291b2cfa9a902eb670248746
SHA1f236449502b265ef4184bbdb0c661a570f0a1a7e
SHA2567399946eb95e09a4cba59bd1fe931e549ad02e167df578d3871c5dd511192184
SHA512a5574f105ed5d4f6809e861408eb4ce03945b1c3fc3229b4ab0904783fe10c8540da5d3ae1d893ac610c4905db6d6d0337046a537e7a11f152fc2859234e9887
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560e2005e9083e69a5319c8b01d61203f
SHA19db491131b5e29252b91be77c23072fca5f5eb66
SHA256b8ca469b7caf535f31acacd6e3d42fdd8635ba78b47b75c8c9c6bd6f7c66596b
SHA5123603dd3dfaaf037d4e6f871c5312695488f6b2865d06e88050144a64c9c759cc6715157333ec6f5f32df55ca6d4e87602a3df05c8ccebffce33a07569cac5fb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc18962f8469626c1adb3080dfc4a0c3
SHA1a2ba99b6cf42dc5921ea9fad1bc2e6fccdc08383
SHA2561caf0f79782989be705a9679f0d988b10c01b9ce577a1f01ffa9f7dc4447c41c
SHA512e20db57643b224a0ce6e3ec6a1ff6b89510e8197af4614487b25edaac05ff464a6404ec55768930d265ffdf6499d09fc59368133e4d7778c4dc9a05d12f676c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a479e1378d5e155767ec826ec70ae58
SHA189e47a5ff1fdcb752f5696bf1d635fff7075f3ef
SHA25685e710ce401a9b52f885224d89cfa00c1dcbd18eb273cf57d2bcf3d1ae76fd0d
SHA512f8f971324f98b230a130b91d4c060d1eef21c227d0546ddb18a551a487391ae3fcecf301c1c687d822b43d9e6414df32033605043fbe402e452c7c2e5266efd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f65293abe231dcf5b90893e6212ef4e
SHA151f5b71bc1679fbe736c8c686ceca8082e1167bc
SHA256db178ee2f57fcfe80983aa68500f1226a31c7d20062592ea30ec6f27979faa0a
SHA512859c4754afe0bb039a1ab8cdcb41e13d18ddb0b78eaad2c46755ce1f699b86e73e0e30399d1a68584307169af2fa8d8f5535f439f4ce85800b4b1f0af4dffa4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ac8cb062b0559b6ab0d3270ed4cae82
SHA1fbd1857a1ca36937d7269e38bba93cec6a5fe9cc
SHA25617e9818795b7903e956c7244f6bc462402eba0b32d86e95ea93cb4df0a653ebe
SHA512a11283215cebb6d886bc041f4d6823e8e6c4a1795c04f7b64c8861a5148ac32a83e19164387cef9e80e846931f12c6e5f68db519a467dd75e4278065042e9611
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f23d079092903d092d6ca5ae7fb69b1
SHA1b8d95a54f962090af36b674a1a46a31d848a72b3
SHA25628c591d78507b60d884ad97aa8a0b48379ce65baf85b26989f2df4a409f39c50
SHA51285fe8fdc519e2ba7581782277ab91a90ce4fa0aa6bf0ccc869ff19e288f7033ef094e85b73085e18166e771eb332f093be468c47672a3429275162abcac99246
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a