Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-04-2024 09:10
Static task
static1
Behavioral task
behavioral1
Sample
02e7793d594ae74f42c7f0292915dda9_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
02e7793d594ae74f42c7f0292915dda9_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
02e7793d594ae74f42c7f0292915dda9_JaffaCakes118.html
-
Size
46KB
-
MD5
02e7793d594ae74f42c7f0292915dda9
-
SHA1
f02df18b999bed8d8093371505da12eb78a27414
-
SHA256
f3ca2cd9d90a22a2dbc2bb30306da6c0dc96a1232be5468dc04c2928a13f019c
-
SHA512
65f890bc25aeb73b9f97308e9e5ca3a186c1c97bbb9b14f54a470dae79acd115fd91b5d37436557f6aa6fba4c9c18d6ea0c868b203c1085ef35c7375ba47924f
-
SSDEEP
384:Ur938FWb52rVs1AqyAn04FdSPqPqeqddtImurs9WqSwkuJ+jk2qZkT6YOpfFTeJY:23IWVpRfH2kIXZILym6YQfFTesEI
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420370878" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00abf9e08298da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a960690000000002000000000010660000000100002000000076cae0c5dde17c63916dc590a5a7a85201299b1b3ea1a9f42e61ab6ef626bd29000000000e80000000020000200000003fdbd8a7a2974600c2ff6d7292165f5703fa7f1a6524429e3d4a9473ebb38e54200000004da12fecd638016b49582a63edfbdd3af9e69f3283a3c9f60952a430e0e4daa240000000aa418c69adab1c6a8d45bf1fc9ad89b69b4d63625f6a81480f29e51e82adb9825472b6a52d0df125a6a722962437eff8ae5003de9d583944d247141aaf8db393 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F360F0A1-0475-11EF-9542-4A4F109F65B0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2796 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2796 iexplore.exe 2796 iexplore.exe 2012 IEXPLORE.EXE 2012 IEXPLORE.EXE 2012 IEXPLORE.EXE 2012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2796 wrote to memory of 2012 2796 iexplore.exe 28 PID 2796 wrote to memory of 2012 2796 iexplore.exe 28 PID 2796 wrote to memory of 2012 2796 iexplore.exe 28 PID 2796 wrote to memory of 2012 2796 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\02e7793d594ae74f42c7f0292915dda9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2796 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a475d1593191487ea4ab4292144772d
SHA1917d8912aae2cd2108d0fcf68f17603c8476ef5a
SHA256327f25f4d66ec6f87b218afecefb276debbe2105698b61a7bb92bc374f92f163
SHA512b9d63fe347c6d1a9275017617f11a4ecda8cc22fdb2a83b353d1f2713f916d88247bfa95b13044bd51b550f86a0fc557c44d00dda80b901cf1bc52fd9a9181ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508cc754017bff27bdb2b184b51f7d6e6
SHA12ee745ab7058d800fd34e7739714a77582fd94d5
SHA256c58909c8309186c397219d168ab7b85eaaec743abe4f6bd90042c78a66f34936
SHA512e55641bf43a32df6619b1b0420602c8cdcd1596c5b6974204bc618b76b6277bf7be8b8d9b250c62766f95fbf1d13d4786ff6cde7d4f5169abe7d178a956ceb9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565be09f069c711f5a6c819fafc93a049
SHA12dc46341624b9fa4b5486d912b28dc2b6df7e858
SHA2564aed5b6ce8262643ff18352880795f90364802f62eea15c6286941dddbc8310d
SHA512ea3553c9dca9bf9161cd07cff5dd160700a317285b109a05aa62282a5ca33ebc5b2b3873540d5de6cb2f9416e5c6c006a1a1f6655639875f399d4f3bd6b31905
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5813265381580a7600ced9b3e66152ecc
SHA1baa0bb00d6fe50ae55ec36d408e8eacccca7cf53
SHA25640e22f37d78fa6af3c2fa0cc59d3f9e330e24f0d259c69a0c7c37e239b5e4872
SHA512d07b5f54bad9927cfb259d83804cb01e0f92a94ce6d6b82a8df77140a53753f774bfc97cd8e5106365badb5aaf4e0a006dd4038b22024bc1561c482af8d876bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1a908f5371f74c6587c16ea1d551d6f
SHA16e245a873295cd6d71fbbc8905c1289cc1778586
SHA25635fa494e343e33b5de2100c65feb6ce543dad7d524333802c45be34f81ad1245
SHA512c09d825f5af6295b96bada69370e3226e958da3329023bd74e83e17cc489d8600b5848552dbbe71d521a8140d0aeeaa54b67bf6bfc2fd16397b9b37cda68152c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf06aca646ef61b8d6527f492a847ff0
SHA1b9ffa3a80cd51ab5715e52a6d044535db050a4eb
SHA2561096a84b57a16212cabcb92c78b2b834783826f9074873d36d0a50fcaf9268ea
SHA5121fd1093b3f6bcdf5d7a3324085736f42c638dc5a020b391b2cb26b49cc2ee64c9e7c1737797f1301dd8a4333e653a929bf5f7971823c43b1ec63eadb1cfd0ee1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a4a192dc132cb2346f9253ca7f3b54d
SHA1c06b4713bc3f268e8c2f9b1a5a55c8d6aa7da6cc
SHA256a3b01d6bf34e9f4d3c549f22525a6799b85745143a13ae0174c6ec862486ec69
SHA51296a68553f350a2cf6dd493e4cc9cd1bd192bc7468eb721c1aae757282303b7ffd8a311cb506e74e48780e44fedf8f66a3f6784dae0fafdf484850add07fe5e33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b7c0eedfc6fb418c2b89c857e451622
SHA193aa721a86114b87723e4642b5f24ea819896c82
SHA256701d6bac484c9f622721610c526900cacd143325d4cd55d460594565a1ae182f
SHA5124e8fb848f7c630aa0d12f56ebacd56a791cb92a2b178a3b78e1b7f08e08c56ae497c82008a55db6ca8c4892248208588d4d57bb14a2123574e0e85ab1b095d18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d137acacb2b91807b9a21c9810048464
SHA11cab256f91af6e3b71aac44b58137b76452f9217
SHA256ea59ec737163cf44e58ee268c59e39d608cab63aa1fef476b52027afe3ea31c2
SHA5126b4a1ac0822e3b49db4f49083b7b6ebeaf85031bcb545880cfefa86a5c2a1562b1410f7a78123d195e264b8a9b6971e29c5c00770045f0050e9e0e9aa309373a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ea9b3105eb1456b8ce018bdb72d41d5
SHA1e8b61a89cc50c265bd8c5d292c2d2af98d22fe25
SHA256ca034afafbc1e1546fb04331765225aa78d5d945785813f7d3b73b762638276f
SHA512b43d45fdc53d96eff21863d9a75091419d9498bd28d8b6abaadc1ba6bf5910064e06dd97cf04b83da95a82c2e06da51035c5926cad09f96c355f8c45ce76d235
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a375e40be9f1776598ab254668d655c
SHA1df8e7d45325d9fe801b82f05f7ece5fe6a154e2f
SHA256a5a11e29b84bbdad3d6d5b4df811e6816c8d55840271ca686ed00f552700f0bd
SHA512e4e073cd2d7a64131b1138beed49d1f4efc3200b6ad6442315c72b4b0da33b2ca012670f0b621ac47e4b2e84a81fd692701afde8eaef21a2c792235e22efec84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c696ec1064fe82d9166d44f46ed5dd3
SHA15fc0b0e537c4e385e7a137bfd3163a92f7b4c6ca
SHA256116f5c7824ce41da52768c73b4b3dc1ced573035b87841ef48c58fabc172db6e
SHA512e6595b071da2a1f4ad4cf8506bcbaa4a2de61780f1d7c2bdf311b2c6817d9f44cb1fe0366b45ca330e85c310d7f077f4586af784d96982b01bd8cc3a2743ba84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb38179766604fd512697e4735088513
SHA13e0ff1f6a5acbcea02a9945f35c0d242d4d2f16c
SHA256c82628c877c2eaf26ffa134c9041d21012df788459055ee07ff1538a98c057ff
SHA51294f26b88e4ab841182990fc3882f2fd8c9c6fcea1fc1b7219ab200dda8625c243765d857115bd6536a4aee59610f0e9dd32689b55b47fd4adce4c97451d0729c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54422a04440584cf3a74d2a8dabf75ce0
SHA17a0cb9462e68d6bb4c78da1d0f07fbbb17c66c5d
SHA2564395881f4afdc8f2b074e0903d467a2f485719b9c5df100a1d2d0d20f23696a8
SHA512f78b1c4e3e8629e1d6a1cc8a68e4fa4bbc27bc4bd161b32b19cb4a33d1e571311a032bc11668e8822c6e0f3cc65cab62a7bf3c15dcec8946b0a822f85e7990a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585b47ca367239c5856b0226b03fdbda0
SHA13524cd3693ae1122f2b858b3561d8efaee12dcdf
SHA2567679be5cebe3720553586d946f6e6191ab6154c085c037c51fd83c0937ca628c
SHA51234fd41eae136021bf1ab0c4fca52945a3f036d642f5f6cda16cbe2c8ed8d0664857129c9a95527dbefc5028ec4ceaa9bad8056e882f1e0363ec264c741945c78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b03cebcd15132b9adb11b016c32399af
SHA10989f2201bc063304fea834378976cb721f73c0b
SHA25605fee33c318d798b730f5d69cce65b9eb52bdaab7f8b6e0bf60b2f8b514d6aef
SHA51217cf506ab59e13fc4e906d40e0a6e1d7fc8aa7a3aebf5eed97374de0c426d9eadbb81f07661a3105a7f7cb9fe451f7542bd1f4bb1b48b0d573a122d7e2e225be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa6246fed4e2262de795a0d34d037eda
SHA1f1f66b8cfe0425e1c37cea59a52fd3b50ff1ee31
SHA256ee5e9da2ccdabeb90190feba57765f12268c98389e8ec993ae2fdbad58766a1c
SHA51252254901b864ed92c410c6a6fa1df6af40f4db0ad5dfe9c4842c8f008457cf4306efcbac94d58fce24a4f1b356af306a9b1a1079f79ef9ad7b2bacf843565ac4
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a