Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
27/04/2024, 20:30
Static task
static1
Behavioral task
behavioral1
Sample
03904095b4ae2ba6dec735d8a1815f5b_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
03904095b4ae2ba6dec735d8a1815f5b_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
03904095b4ae2ba6dec735d8a1815f5b_JaffaCakes118.html
-
Size
4KB
-
MD5
03904095b4ae2ba6dec735d8a1815f5b
-
SHA1
d41f29c3ad42cf7f40d4b3852af96437dece89bd
-
SHA256
cdc1d59f74b96d25d3e9f243910283622c04f80119b506b9d4825d2615bad305
-
SHA512
3a2a2f5826e7d672b389a27bbef6f1e110ce918a5558f892248cbef058393369e278ae16f72ea8c691f524456eabbbe738cb958ce8e82f908ce4b1a3ee794c7a
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8ooZm4d:Pk7yY1aEFHVKtF37sNjtXATIQFM93pD1
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c6000000000200000000001066000000010000200000008dd1c2a80ee746af48d52e457330de7f8d7d481ec8d1d4e08bf0723905f2eee8000000000e8000000002000020000000a4b9445a0e010fa596be98f2df13aeb84a4ee0ba3ff2b6b80c0440f62774620420000000ab99129bf0e0f274cf69d8e85038fb9f8817e933e04b85ee08ed7db8cca24c1340000000174b1607317feb2ab11ae37a7ca99e6fb199c4d7180b9e0c31e69999b596bd168773f5354d12f3c07c010e18ca52c8c163aacaf51acff0b5d2af8c2bd0df3ae3 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420411725" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0D84B9D1-04D5-11EF-A4DC-6EC9990C2B7A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0ec11e2e198da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2204 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2204 iexplore.exe 2204 iexplore.exe 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 3044 2204 iexplore.exe 28 PID 2204 wrote to memory of 3044 2204 iexplore.exe 28 PID 2204 wrote to memory of 3044 2204 iexplore.exe 28 PID 2204 wrote to memory of 3044 2204 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\03904095b4ae2ba6dec735d8a1815f5b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2204 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d114bfba0c532fe9c888d0f54e725b26
SHA1e810821a72fa30c6d5d1e4e9b457a03e84466932
SHA2562f22bac980321fd804714387edb2a094416b3f7cc5be4fee79ab59bf82c00ec4
SHA5126ec8af7c4308e42ae75422a7860b2b448d6e79e69357fc8c3cf98e4e5800244a88db57386404b5e4d28ebe84b92b75a928e01299e2ec48ef0cbda640931cf8d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a7860943238f1fd6ef175a698a732e9
SHA1f6aa05ade780575450a63e7dc4f1c55bb62aa56a
SHA256422a45c5fbb7bd22e78e5b588fc98d7fdef3d9a574fa79b60686da3f202a9b49
SHA512c3bedde13c72688d8972c779ba8fba7567e23545ef44c4428226368529e237cd01f2d94ccb65f70bc67bd387aa0678176919a6ea740c66d5ab3b8ef74940d300
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f11dec07be4bf8a4e0f05d2cc005db47
SHA1e5e819813740060b22582a3c1580297fe9e6119e
SHA256df36d07b1e63fca2b83d3088c40b003d07d1291f81097a23a2da4abbdb401a63
SHA512586f3c28fb0616deac7fd2f8639f2cb60edb1718765adf6c45f9dca28163c714e9a7439990d825c2ea8ad4c68f41019c1dbe938f7dedc6cd6fd2f20c5219c54b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572879e608e1002e285fd31a42086e0fd
SHA1086702de245d0a71d08783644c69c2ea4e3bdc84
SHA2563163fffe9dee3302f52661417a79f776aca368aa8e2a264d4dd1af552d507844
SHA5124325874e98d62206adbb30e4d63ee51a92888c391f33f0f4fa7cb4318a1a76e2b2277b0c313ffdab1c642bf8a3574104be36f21028235d8fb670005870ced630
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d44aa237923d7f68ccc47805121c4b6
SHA184bf5172f050d37380ee620e6dcc3081be15bdfd
SHA25649562bac322e742c924e91b167e93d052122c363738c4e41027c86f675116373
SHA5125a4aac4b8ed90a3497383b249afe03cdf1404e3dee57ae4c2fe6012e2c8e73b786b0e59a1b2e215ab8dde037510f0e6b3e84a68647e94aa7fedeb3c93efcbab5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5792f29ec9906b59904372c0a640fb350
SHA1516cbf05cebe3d800f5d0adfe1f95e40ab89efbd
SHA256ef48edf8d5f2e3dd627684293bdc325828b810c6fa28c627e81a591309996b22
SHA51225f5606d39a7dec8f8655023a88b79927726abe6e9c5f323ff5bf73e17abf562db9cd4d7a02f88e34718e98e0dcf87214520e40bd35a7cfb7bc82fd9665dfa67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530d6f52c94f1b4e27d12583f32357f52
SHA1c208785f8bbe0b0deb3e6d44f99ac3fcc8309c7b
SHA25684c1b48e40bf4684554f4c8407627d26dddfb35a985b252f005a443a26b09fc4
SHA512d5df57ced92362bd62db0cc05383b5fee66aef59c3a5d0993e39107122f72c00a01675957d8ef45229cb574ff5ea36a7cd97ebf59953c66fa29cd64c34fb5ac1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5afb5fe5cf1baa0ca26772b65f76858d3
SHA19ab2755c0da91d9c6736e77dda56efbb2f9c732d
SHA25660465500662c914587e3152e9307b1c33215b06613834b9e592008304b518413
SHA51217002dc9ea88a51c39f58985a4625dc68f1bcecf236d81fd5a1b8081afbaeb1fedbc2f394307d9712c822c965e0e63294ef026cfcebf9507311ba8fe6f37c63a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1d805fcbb1e0062db5294edb34f2d27
SHA14071f3f39eb33536873e39e32621dc064e6cdae3
SHA256b36294110d2c8fe8903cab45c1db4b4734f0b576a558ce9d55b5d70cdfbb35de
SHA512b71818c28fe1c5c6624d8627dd139d63c768db6d554b0b3fed9b463547d2f7387d2cf2b4eb81e41dbd2bb297c3587c3770fabe6679a8caf46cdf29a2dc550129
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d84972e1d0a4504b560c873f8511786
SHA1f6ad5d80b4230b9a82baa6ebbc14aaf0c61ab301
SHA2560d2ac3c73daa981a75af36d54f4d205474ddd330fdcf3b8beb6e12517121d3a0
SHA51212b8d9f796be6b4f41faa48c04394d0b6a6aadd2ef85ecd03631182eac528fea36ec86526d87609c05841261ee943bcb632db40682c78dc145072aafcecdfcd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aade34d7399ea4473e71641521387bca
SHA177e8ebf00bb557f9e3e3460689a6651ea0d6d60e
SHA256637dbe8576f8b9f25d192fba3dc6e2c5d310f54d4c89a48df64c135054d555e1
SHA5128c53bfc3e8ab98bf4474dfa58beb6a9cf3fc2879934905bac32dc3ed70ad7c9a312b73ada9f4ba2e08bdf3b06550a62bdc55c789cf3d43c4eca607681cc08a6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5212550163c434776c3bfb1e0a70dfeb3
SHA130cc0798c05a3c6b14238c8e581ac87cec940a4d
SHA256cfa03c6c9ea8ee13967d9baf6fe83d2f11de0e1c44bd63e66e307298de0ab8e1
SHA512315ea2abcf14d88371c76022211869c95d3ed9a0e3de92f4bdd8f76bbaf2cea19dccca7cab8c290223b7467582bbd44e9ea2fcbf3c3bdf93f0f320a9ef48d091
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528cbe37f6f90dd59a18c9e4521bcb2a5
SHA1f09c88d24fa44c98b28d07faf9d7518979c8467b
SHA2560f431dd4af3dba24af78edf034727206195d9a1fd8b09ce4f1efdb8331d6e2e1
SHA5127ffe34b111432bf64fbbf4e5caa2bbee0a4fd1c321caba1987ababfdaad420fd5ae3efa6f8c9bae6c7f1ea6e8454805c1607c07c0202e2354d1622b83f777bc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4b3759fece7d9bbeab704454f19cb91
SHA121008927cfdfc00560f8611e261099ff9e52335b
SHA2569556671335c5cbf60175d568db65037b7035cdada17150a2db8a39c6bed70467
SHA512f493cbf7b4a43e766cfd07b084a47fea66299e4208f28b9371680558a2214bdf148e8191e54d6b07e8e6c5b103019bec49a26de45711257a4e7d2c512ed4d301
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f20c7d4e00183dd326017b373afd8005
SHA178517083eb12e6be5494645dc8df3b42496f4db2
SHA256e17bea34f24a270f60c7a2c85bbaf64791f6f13d43d624cf332eaacc07013c56
SHA512828f37b4cd6cd55e21e7b2a6e05eadeb98889d5f681c050a1c271e54f79f43725eb1c5e894b2bf7befa0820fcc1a92225653b344d3c586bc679d276eae3a69f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523b9f77b927a63a8d22214001b6116c7
SHA102de99ea4a943bac092c551b8fb3c593878336fb
SHA256d07e703c41a26838e5aaa08f71a12f0acbf343263a138b520b44f2cbc293569e
SHA512f6c1e3c04535fd2325c7749a4bd82427da07785a81846ad5937ea2c5b48400a3e05be7d8eabaa68ee67b102af435d2f3e6be0960d8f59746caaa2aed6423de6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d554f6a4432ec451e99fd40d15a94763
SHA1c244ce37080c85e594ad14b98a3d1496c70cdd3f
SHA256ee630dc0510ac5f6c52beef9e288f4ee12d53cb0775b947b9069f0fe599188e0
SHA512f96cd2b1d6c64ecab518fed16dead82a21e8d2e5e29506eaec953bed3c7875e8529dd020001fc687feff88d430dec58ef93985ba76728b3fb470df0c01617bef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57cb53bb8b254612525a1c34d24cf0edf
SHA1aceebdef1187aea31e6e73b5f90b9f7d852762f8
SHA2566a897f4021acb195d2aa53ab7fc3dd95d3da55d3b4f4b6f6fd805592a227ba72
SHA512d55d7962b189cb068d97a367c0f4c5186e25287af01f31e4de4407474387f553d9a6d2f7d27bba1893e37c5a155d3aae353cadd6e6dff06ac5341e4a34fe56f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6762012ddcbe02730dc1fe880078b93
SHA172d3e1e47d1f88488907453e2584e73f54f7daf2
SHA256300903bcb02d67ca2884523ff504de4576eea655e9bd80eb4a0cda178dc74865
SHA51226b4482296dcb1457c5873a4daa7028c6877f86a67b039db953d3a120d6c56bda5c9fd475ea6a4a018260d0fd32f6daec2ffb10f401a25cf006e8ba83e26f438
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a