Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
29-04-2024 07:18
Static task
static1
Behavioral task
behavioral1
Sample
071ab9c97631b87cecc10635a516b57f_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
071ab9c97631b87cecc10635a516b57f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
071ab9c97631b87cecc10635a516b57f_JaffaCakes118.html
-
Size
230KB
-
MD5
071ab9c97631b87cecc10635a516b57f
-
SHA1
a7c0582e15c5bad5567b5ea4c41c0b386c15224e
-
SHA256
b01d8dfff54f4977f42fab4dbf72204a9956876a882ff59728148bf5605faad9
-
SHA512
767885ef9436c2c41c7300e946263d4c99b89bac14adf62774368c95f9b997ea3da611fdb054ad6e3e0c8a9d5de79d8626634bf7c1f58387558e533a7e64b61c
-
SSDEEP
3072:/DRyfkMY+BES09JXAnyrZalI+YuyfkMY+BES09JXAnyrZalI+YQ:/DUsMYod+X3oI+YLsMYod+X3oI+YQ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B7A317D1-05F8-11EF-9BF8-4A0EF18FE26D} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000689bb785a41023cb79f1de8c2e6af5e3190fbf120ae7dbf9aa38159af67957d8000000000e8000000002000020000000381b3aed9d163317b8cc211702037ef8fb24e0bcf3bc0ff63c75cf1380a1b19820000000cae53eda6816ca5748508625cb9d04f2a2e86ae696cbdf5a3c0826d074c987aa40000000c2093ed9eddd42a34ac61d0e3ea55509cd464165fdbf2f42d5d8a1a327b1bf2cc1340aab5e325305c54b636b9c4b79a310cf66414841663172c1161e8cd7a4f5 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420536993" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50e1208c059ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1708 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1708 iexplore.exe 1708 iexplore.exe 1948 IEXPLORE.EXE 1948 IEXPLORE.EXE 1948 IEXPLORE.EXE 1948 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1708 wrote to memory of 1948 1708 iexplore.exe 28 PID 1708 wrote to memory of 1948 1708 iexplore.exe 28 PID 1708 wrote to memory of 1948 1708 iexplore.exe 28 PID 1708 wrote to memory of 1948 1708 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\071ab9c97631b87cecc10635a516b57f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1708 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53421e34da6342ad9d1607a3634889a71
SHA1bd3223b40d12aea879c8b981aa055d67721ef769
SHA256112323f22fc841e8cba78d8f5bf66b633dc976472df360fd9408b60d9edccf83
SHA512273137314fb4a224e2a6b3edbf4c3dca4672e9919763c7b63cf0be741242e9cf73c5160e01146ec5ba7546f7a5454b6cdc5988700ec5f51151f61699cad69d96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58958d06d94786bc22a5e2aaaf6bc9de9
SHA11aa8c4451386db2df57dec6349a27aa3cb26e994
SHA25693b1bbcf840ef9a9c5e40325243e0206f34fccaaa9846e241dd1987f9825efd9
SHA5125ff012662d92e39dac5121bad3f96ba9f92ebcf12349933f93f2d8543dc632b64a32b28191affefedf07d3e08214705d6faa61b5c0e1bc984a7fb65aebc9fa5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5afb26f6cd62d58591dd72d3a30530645
SHA166d86e797387f52b9a1141ba94d06a9ee2f36208
SHA256ebf2d5dc7e62aad2c45627f8239fd0c0924cc8348e2c64859bb355dbaafcaf29
SHA5124a7884d44ebac676bef03463b4b11f70815f377414f5e99c5a61ef9bb89796ce870974c8e0b1bb4b58cbb27d2ab301902588f5c80baae0e259259664382760db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567ae88ca2c7c7013788e3ca5bbff0468
SHA16183f4c2170e9018dbd2573682626382a9366eaf
SHA256459727d0d53262ffccae6d25ccfc98cbc96850f9d808fb9889efd9bd393b6a3a
SHA51271edf141ae5eeaae71329673153b0033f075ed0b0b7260ea7138305cca2a193c050cb39684c25d0850f8ce4e8c411f92418e4205e3eafd61295d4a4fbec6ebf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e17d9eb97327b4c40f833262ef3d58f0
SHA1ad063f71f10af7d7cff84ca8df005879d2cf818b
SHA2568860362a064f95e28a1055b862eedecf6eaa3c880163be51f1dd9aef5786eb71
SHA512f10d25b28a82b305f1cc75d1f23ca7809291771502fb0a833e41fb934f61335a4a0eafcc8dd7b2a2e5866bf590e3171f86ed26bea756b566de67033463c25130
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54459aada09ce213b741acdb53d4c6c55
SHA11d3f91c8cad8f1be0eb1d5b9714731568b8eed66
SHA25628c1341ec538a064b41627cda6f7c15547fc6a81cc44f5b14de57398980ca4e3
SHA5125db5dc4d904773cdb10944c5f7cdc8807813d59e2fef9caf0a029a562c359808d9708f234b49e3700147be4865c7be16fc96ae094a8237e71a90b86e140091c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1d1f381233369a2a920c9a28681d079
SHA138b33ef2bc210980d1132b62b1c9edef238c5527
SHA256fb5b204c2290cb7afdadf2ee66e3615c2a4327d2ba3fa017160d770a36af61f4
SHA512e949d32b77f29e8df4a915eac1d1436d6b92afc3ed8e2de97498af54d45bd3d6a32fa957c19e45d193739f95f499df8be35f07a28870e9aa74697e7ea82681d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1740dfdb230ddd58c1c707861516395
SHA11034fd83d7b5bd7b0968c585c3a9469cf393bd84
SHA256330ba04170e0240f50a1923a608d219d866de2f0491eae8d40f5e2036c866e5b
SHA512e4ac797c77e2613f76222600f81066b4206a5165506692a8821441347e2710dd0a4d4e4c471b5f91286097ed0dc1dd39c0efbb97a92892764c5b0c9a8708f687
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5820ad45fa480e195eec66b84b9cddc5b
SHA1adbf86c4ff37dda7060e57c6633d39b2dd1a7cef
SHA256514bd8344b5fc532df6c1789bb58bffea0d3b66b67b9d0dcc5b0ddf9e9fbf774
SHA5124f6de35f137e20b9dd2815840f2d431bfbb8453616cb46c7c64efc26a248b2b93167be7cf28d3381ff2b143a4a5920b8842b989aaeebd312aa72c9a121cfe022
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54abb9c84de7361ad98bbcac0648b8f47
SHA172a5c784d04b82f497b1bac244bf9da9a6ed6dce
SHA2567a83456fa4192a8ce873164f7f4302b8105a05ec7b7e4a416b027b1b19146a26
SHA512870d541a4e0f88d687b07fb70eaa754928990a95467d7fa18630ae7fc24ef4ccad327ad1dd7f1a2b4636f0ba3f34ea4a4d42b8e46bcea8bab72234578f6ccdff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec43939ca8c282317efc424259fdb43b
SHA1433e8bb98c8cddd1e054c45b387f5f5461c596df
SHA2561b26271d1979fab9b0b32aa6ef7793e2b4d1efe34e25895ec593f91a675c3bfd
SHA51273e53051bc822c58c77256915ce2cf677d62b09e37e9a012c1446a12acbb86156646b9d4b91217ac7e2662101ccde93f17315b1a45d32557e7702ec79b409b89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f34d3810fd5316833d51efe2b2543683
SHA10070efe66e53c06c6f0335c94ab6528851404244
SHA256e4e803692044820abd6057d2f5e8f2ac89b8085ce3566ccba7a2b60f44668f1f
SHA512d361088b9a8614ab6ddac110d08aee52c703bd18471d5920eeb4a402ed45ab4058f8dfe73edbff445fbb3d9d8f4ce5acb35e82045ead28f2eec91c88181dead8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ad4679e739d70c461e986b6b62a8229
SHA11991340649ca0875d8a121785b920f6b9db0fd6b
SHA256814edfcd12d75ed0b4e8447653d4eda003d678ae8f573a7d7d5e9ccefd2cce52
SHA512d225a33287ec6334242bf55f16079d97792cb285bc221fa321b8170f01ae35485a6f7167d93610d92b7a908154cd6695e413bef272636d425a1e9480f1b77254
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5149bf2d4cbca7fca2fff2233ce318609
SHA1ea59d7db5d263b937088ba1e3e7e2956a6aa4d63
SHA2568f98043f69de91d552f62763681fcf134780bb521ddc2b647b000c1b35408c5a
SHA51268a17468467a650936be4aa14f21f5951e28a0d047b43b32aa925d56d6639e78d92f62289beac314762504fb3e4e8f49e9b774530eaaeec9de986a6c1481acd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554f9ea57f46015193c8a9f3a90a58021
SHA164475d4237f6bd8f845c691e6eadb2f469249d53
SHA2566905b3b7d7564b526b42d6baef4ec6914e878c8401dbadd8eef4e38fb6b4b62e
SHA512c708130a54f881389f5115cd3e02bbb1d033d2b1387411abac3bb7ec8493eddccfece71eee1defcb1e5bc04b68690a501eb13e6dc1f10e29b7fbaabb45c7caf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ca3ed2db09077e1b5302941da3fc895
SHA1c15519dfb88d257488d52545e43efe550c54b1ca
SHA2569da4fceb4a4231b71f0f866998535ba39c578b1efbd82da42aebfb2c8dc46a4a
SHA512b5838e713cb0da34a84b8efe80eac1a524e45e1794d618e985434576c8e23deeab445ed91c88f752b8b7fe9b73d7c9ab4eb48bb985e1cae2e093babd4ed6426c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508eb6a744d4d9543588733d5326b5750
SHA17d943fff922b2dfb8087098f4ca35cdf09742f96
SHA256404c02ee9cb2afcd18cb86e16d2886b14f1a51742d6c998ebbefd8c7822fa0e4
SHA51222318ef8b5d90149b41e7b0643259b39e301cc620720db5deb3e13cc299bc856e1ecd2315e432044ff396bafff28e2225c83faa4c03b269d37768fa2129e436d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5109cb0faa8d06ef957db62f8ad8548d5
SHA10b3613d5afab5bfed7c922cebb7e5f4e9fe09628
SHA256327fe2908fb65ab18abbdff04079131820f9bd2ab5648061b8f1453508be8b8d
SHA5123e4c8d034843b53c252d5718db9e12dec8cfca9cf528b301a18e60e5a83048433b1ccaf99bba4b45c32ed8128eea7b0a83a641873bfa25914b493cd1985b7b72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f6bf177a2d40644b4dc43fc2e60f82b
SHA1c24535980f88875d505901e0b60094fb02d235a8
SHA25626e05c6f1504f12e1080ed6d31617509c504e8d42328384e6a03cd33a9517d72
SHA512d13018605061e644ff1d45141dab267202674dce21b74488d218061c5235e437d00576277f1a033002adace74331b42df1695c91c18212964b1e51af9b43a3ff
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a