Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-04-2024 13:12
Static task
static1
Behavioral task
behavioral1
Sample
035143b29894f6a92c25e44a79071ac7_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
035143b29894f6a92c25e44a79071ac7_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
035143b29894f6a92c25e44a79071ac7_JaffaCakes118.html
-
Size
124KB
-
MD5
035143b29894f6a92c25e44a79071ac7
-
SHA1
eafe68af00cfac7dffb4b51bfb00d02b403ab2c3
-
SHA256
6ad218d30b35b203a6d7efd5879841664a656adb6c9fa0856167b90f756bb56c
-
SHA512
f2887e14c0d3a8ffb6c7c1db93025605f11c68312168ac0c296988085d49eca3f9c63931eb8e691046f5bdabfee4d59ac902f36f6e5baed1561314bdb6b45972
-
SSDEEP
3072:23zyEgX0K48qkS89TTCmePBT/b4UZu+m6ybByIJ:Ug0m
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420385393" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 002ad5a5a498da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BEFED031-0497-11EF-A635-D2EFD46A7D0E} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a700000000002000000000010660000000100002000000017900dbb322bb37d13537288868b0d55f126958beb2d5c217d12b70545f3eb8a000000000e80000000020000200000003efff294d4f8319f8ae71718f4cfb977684a7f7e55f2af5b1fdb9fd8e306860120000000bb5bc721b61ba0fce35ae740460978454406acd93f1cb394c6609cc88d282fe440000000895ffa4b731e65895b67effdfcb2a21021a34c5d5e81324706aa2a2517d654b9e6ce441229c8ac76a09d2e1576c79b4c8d02ece08c7748bfc54304639a24a047 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2320 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2320 iexplore.exe 2320 iexplore.exe 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2320 wrote to memory of 2172 2320 iexplore.exe 28 PID 2320 wrote to memory of 2172 2320 iexplore.exe 28 PID 2320 wrote to memory of 2172 2320 iexplore.exe 28 PID 2320 wrote to memory of 2172 2320 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\035143b29894f6a92c25e44a79071ac7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2320 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2172
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57eaf0e385b716e6399a497db773767c5
SHA1e195d56fa71e211b9656f09ad06b6d8ba56f2fd2
SHA256ed73fdd67364e7720ff9908658faa98a0d16bd967d42015e718a7e870c00ce8f
SHA512ced711f5111c309eef9d280f95fee4898111e5f8aed76c443203213fc4b0f3a066157feab406608309f904c4af2e73f68eaaef8c0a3e09bc53060adeb3046a4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5713fba4ad67e72ecc03aec6588c80f13
SHA1e16a4e4b8c8d4144241679924a41b9616c906d20
SHA25604f3af0270b2a6626e011eee8bb7c2c0f26f683a8aadbef5a7193074a0760b00
SHA5125ff7bf2abffe7f693abf5531a37ad39708275c203092c989f4cc33a7276473f115f4a4188adf0315e5b03b55a7ce74896a3f48ad57fc7912db35c1e6848d43a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e670f267a4f846e87f7ed35ff208497c
SHA1ebe45c92540f666af010e050ece0ab25562385d5
SHA2563b0b2d37f29c56bac6caf4f5ab6143c344006b243fe7546c8a417b4b3d7799f8
SHA512875cf180625f3aa2b3df34e3e162013ba6e1b7445871032d6ddd703d46a64ad5bb51daeb60c6dc74f43d323e7b32787162c3df11127b546b42c05f01afc3981e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf86b91dfabbfe3a0482957186b73a5e
SHA12bfb63c3d5ac39cc0fa531b32e929554608ca4a3
SHA256c1b5632b70d61dd2ff5fcb9fa5bef7c31380419d16e797c7e912a6e1a3f36855
SHA5122111133009cb3d8318f2404bfac985c72fbe6320934d049304dbc1b3e93d6940afb63e879d1fd69757321373e3512def5d54efe1f3798c00f379e0adca8df2f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5310483b6551c111a34574d211ee33142
SHA1e0d2952343efd5e7c947623ce532b74a93765bd4
SHA2560ddfba25e041ee2e8859b7cff41d2b256ec4e7bddafc7e5f9c7b5e675d9cf4c1
SHA51207b61b6864eb5c3772ff2abce7c777d78b1a8e4749ae50e2fa9119526a24c577cec40a5cad6703c2c61710071f30697402c8fd760b1d791c5d70829631c96d63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524e98024b85e0007aab773c7fa3d51f7
SHA12e2e1622c17e59c04a97044f75cd24bea2def1aa
SHA25626d032dec2403c39e05580f5a87f41be3388e84643b8a92411b86ea95bf5a2bc
SHA512aee26b4886fa83c337bf9342ea29cc0ce81fa9a71dd74ae0f1e249572ee676901b2a260ab1a84bc5d020ea61db924f480617ee41f809dd0a27b80a21f04ce534
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a28de4ed5e98d44f293e263ed805c36f
SHA114e27a3b625874e632a0348df8bfbd4958fecb60
SHA256e3a0858c1fbb60418719c63b14fc39e292b2adf5a1839fd160af8d0480349579
SHA5122bc9c4233b408d17c6ab91e673585adeb8e10bec089d7d1053cf90ba8ea16b07c4e2b57819d03328340ccfdf87cd5c9874584e5bbee7496392fc3d2834b5e95c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ccb2d0ac80a2c3d64bf9d05e4cd78cd6
SHA1eb1124cf6abda8887696c9334fdd07bde6661534
SHA25660627d722561a6345eaed16617d23ea5a00d4194f53316255d0bd294215d4f4c
SHA51201e65f937f614ada563738d83d77bfd452472ee51fc77803fb17b668fa480e2743dfe501ba365a2c9a288539c65560c71934347b009a356123d1b244889b3d0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef0f57a480158f95e733d512144c893f
SHA1d6faedb4aacff0418c2a54c6d69d04bb4b515969
SHA256474f1f015c05a265405c4fa52588fb9cbb76b236a2c597a0946dce004cac52da
SHA5125bafaeb243a83b48272518caef48db08ba52db7baadf738f8c68139b26149971904cf3a0cdc4c67aa406f4c3b768e9715efab75b44528191343965dddb4b58b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525fe67e954634b5f035c1893dbfe7c98
SHA17da04efb4214b4347900c549313cc09895a7bba0
SHA25664a3cf3837a87c3e014fbd446e41290f93015fb84c54e3294570a67bc548dbd4
SHA512ce60532d248b67a29f0a9e6ed8650905dfe0dca6b33f2eeada1192acd2fcd108071b35e8fdb86e9d79462910cb5bf8abe916b5090c9d151652aa199a39c1cde8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5463a6e63751e739ec2c4b1732faa9a73
SHA150fed156beb7aeed6a60e2c118a1de4e738242a7
SHA256a8a92efe80cd08eed764c1c25a3cf69f5fb1eebaf8614c3894b1ac9f8a98b9ba
SHA512ab0178e19f2fd4437aaff85d120ca5fb4ffe184df4ba28375720fee46eee1dc6b1816c69e527f48235f5b60133f3c1f61b0a427462b4efa8a1ce4a6c045048ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5828f8a60980c9c3a4eaa62b3988748d2
SHA172c7030427e4782122b13b31d77d18b2b74ad29d
SHA25640192f1f0c45dcdac6ab5aaeb6062d95fac0ec7877ae8e8cfaadfb56f75e959c
SHA51255fd5233c78d964362fa27b1486e3bbe89744e206ddf88ba91c95eb23dc3def0bcda279049c9ea7f855cad1e0793bbaf73931f1cfa05dc60d0db5bd4cd0b4fe6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d5429dbe595d9a752d99c4fb0f6c9c4
SHA1a193c8c22b71d19ba7446c320eb75fe19c3ac3b1
SHA2561c314cd788c5a81f94118dc03db88914163ae875489764389a779d93a43b0224
SHA51224b9128f270dd0b8b1d32a37e646a07bb0e4c0111b6ba228dca160aaa4565bcc574185a3c372e4ecde9a9c46c01d0822ead968645289abf71dc3fadd00b984aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b92ea56fa1e7b72710d9118d13f582c2
SHA198515169eff1d5065867f7ebb2bf891c55594b9f
SHA256cb64f4533f00a1d1a2154a5fa1272d45f96edf2d2b8f7e0e0628bde1f55c4bd6
SHA5126da4f6ea4ecfa2858e8f4c77941a6f290f92d248433889c5c023a97f8751582a2c77656567ba93b8d958a701944de02b86b553c3e03a05fec471961d1aa45de1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f603030a4e331595aa02eb1481f4df32
SHA183b01741edd927218f3363a67cb07ac2e85e3924
SHA256c106ed1e40aafce9087a08363752f4b5b31b781a406ce827eaec6f554a043749
SHA5126b819e4c42e6b2a44cfa306fc576ec00026de83bd5c6a4c6e2fb878a6bbe7557f884fbe8b7218056adecfe2be53005f3506695635ade1d4e1b829e8051a45d97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591f9044e4274284a3c76428c69e99a8b
SHA11022f6f66c296445f9989230ef6b3cb8d0420210
SHA25610b05df7c7617ea22f47bf73c8a1eca7fbcd68242f21fd75a5d94fc452306e28
SHA512d004a1a72c3798b2e8ff3137cfe0854065ee217ab48a804d4d440db744a7a143be0a43c608652e428352c6ce6c9101b95e3833aedf0fc529335662907c82bc75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d9711362d06c13f0d0852bc1a764d42
SHA1151d578aa115f459a165bd598a9897215bd7b71d
SHA2568119f8663394a463a6600050da4098f91e4448355cbe042676c1643d0b4bf754
SHA512710862b83a114cccd6d5e66cb230f57b9e5b63a56347ffdc4cf2372a232fc2ceb4146af2925cb36cb89083594402c8a3986efa6cc40aa70291e3b0230ffcb497
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59cc6fb18a86e42c8b0884652059fa94b
SHA1036827f10b67b1d875865145e250ce5eacf25764
SHA25623862d1f40a0ad66c0e6d07644bda2f3088bb13c04f2873ec24903014e6d63eb
SHA51216814dc104580d8e23428062a94d661392a07c833eafb5b65cc1fcb2d2d7667d40fbb17034bb2bff0ebcee1a62ea4239fa48666665dbc8bc72d31f4e1e4134a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5361a1e2303b770829b5c017a91fff02d
SHA1b24dc19730ef113cf771affb575df8ac9d22db56
SHA256cc60c411bf8faa136768c5c447e16bd4b80fa9f8e5e4c6cc911f77ce01d26cd8
SHA512412145e3a587502fe26fa01b94aa097ff44cf19aa2f0dfd88ca138031ba24d9b69f270cb999c0a64186879ade241b16b0d095215557c7392f2f67c9a69ed39c6
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a