Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
29/04/2024, 08:46
Static task
static1
Behavioral task
behavioral1
Sample
0743278c2c8e9b2a135c6eb2c2a84498_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
0743278c2c8e9b2a135c6eb2c2a84498_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0743278c2c8e9b2a135c6eb2c2a84498_JaffaCakes118.html
-
Size
35KB
-
MD5
0743278c2c8e9b2a135c6eb2c2a84498
-
SHA1
4412bc8b8949e226de63447c06b26c274ef421a0
-
SHA256
0871d1b2adc490a045c02ed7dcbecaeeb7b4ed8ca04a6502f7e44ad6d35744fe
-
SHA512
e9e32dba0a8c2268e47b72ac1fa73988a1c26fea889f74e37b922860303af55baa756163699cdbb10fdea011e5f0e2e8d5f60778378665ed0a746c562deefc45
-
SSDEEP
192:uW3cjb5nHMlbnQjxn5Q/TnQieCNnWJInQOkEntpxnQTbnJnQKXCxxA3skY3xP9Y9:IQ/0Z6xLr7CzRti/mQqr
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420542239" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000b597b61e8f6d9d4384d39334a47025d5c592cc71d44b580842c2a1908b565ad3000000000e8000000002000020000000d624ffda5acbe91447ec5ac8e9db2c2613d6defe2ad688122152b2cdff66db512000000034191bf65e5c264f9d213766dc1a9aba83d8ba8e01d1ebd9f65b71c0af273e7140000000633bd68616b8faa6626fee0dbb22a4262219ae5d3bebfddd50125335f1a082d6b676da508c865ea93b89f518155d4e4e8d83e2f491570edcc40802fa303afec7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d01740c3119ada01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EE81AB71-0604-11EF-B411-768C8F534424} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3000 iexplore.exe 3000 iexplore.exe 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2640 3000 iexplore.exe 28 PID 3000 wrote to memory of 2640 3000 iexplore.exe 28 PID 3000 wrote to memory of 2640 3000 iexplore.exe 28 PID 3000 wrote to memory of 2640 3000 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0743278c2c8e9b2a135c6eb2c2a84498_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3000 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50fb4bd33c470b5e9dc53114db8a41861
SHA1a3ec34ddbfb7c713b758f58c88d6f83121000d2b
SHA256a82016bc8e2292fd410647bf9d6d0e56b425a2635094fffbb25c51954b27720e
SHA51231828f1716adffb8377fa5e8c0e8a09f5dced06bee2292bc6cae3a24b3e1ef7a812f62233da1329b5ecef8149b0c88ff5e254775f6dbb68b1940d353dd90409f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a66b6ebb8ea55e0965aae1e927e812c0
SHA136f679f41a18707fda3e15b50dfa6abfe2f60917
SHA256f958490aed79d6bf2ff1576cff0b5996b6b06390b939e35014c97ea257e7d14e
SHA512f0f2820db69b63e63b63f53aaf4d31f460a8636278f0ef35855fda1876daa3dfeb8cc31ff428c4a63d69b75cd30d4a77113e9bc6e758d444257765834cc0f136
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3470cf11847097728b5b37099098683
SHA166731f6825ab53d96f0ff7fdfefffdef179c458f
SHA25669c9374b2e8697aafe4100fddd3f4242241a5edf09e31e6d28ef00720e118b91
SHA512045f15bd023b9e9ec0df7ae28cd8f669e12b1c0e230e78ad86149169f6a7caf86eaf3707d76c68be0f0cbb67f99fffb8212672e224f0adf2362865bfcdaca061
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ccc80c3732bbd3640ca203a98373ec6
SHA11a266bff55f6b18f63100915a95becafc96c7c40
SHA2563f245f26c8a6ee930c240bbc7fa2e573a9974ac14465fcb0eaece57f864f3b34
SHA512cf2f57434866d7a3e5842b657c08a691331a26b3b4707add21138201ed9fc46466de9a2b0f7825ebab7f0c4e62f201e0efa9518ccc39595577ecb59242da3e91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52dbf0fe414a38caca30d764f578be6e9
SHA158d8260565ceddbc7aca905bcc91b5a174589451
SHA256c25b24d145f9d23ad0803bd005942b70c96d4eab831f84106a6222855fc916c7
SHA512b820795c723ed245afb7d6be534a463d874a51239e5e8bed93266aafe32300bffdaedef624a12b4254ef7d7578699c1b5c2a7949cabf67b167523d3be0b922fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de5e07ed1550bad4dd1efbc629be676c
SHA15ca641caa9094c3fae6177550e3354a58c44dea5
SHA256c486efdcbe08bc925c47b422889b90a6d8ed1b1f991b89e3d27d460d1cfb2f6c
SHA512af6df2526c91a50c5487d9ec9c7ad80de4fa70047d80314f6a22fd5d758b7c53cec2823147b52e67323791134e6632ecb46c44a0d26d5432a6a012d316664a67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b57344b695bb4aee81ea0d167a35b558
SHA10dd7df067deaf85dd7bf767742465b3f027c9907
SHA256752ffb06af89d7aaeb47d4376b616afe27a9964b0b6b300e287be43bb3fe690d
SHA51275202543b3bb230cbcaeba3519ec0f6d1d05d5cb5a6de4e073143db94f2c76cc78b9dbc778da0b74d34ed7416a2eaffd81008c08411e1289c7562688b8269858
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5659ee2f6c488afb91601a135f12b4dce
SHA10764fcb90b5658e36f0cb4d76afeb30e00c013a4
SHA256a422fd0db35e07a52976e8eb16b3c9ac1485929646a23b9fac7bc74a50d3a762
SHA5129ab16c9def3a11170040442a8c397d2b4d2350d347124984b7a7fbde737388b695b6f1ba1f28a33e15fbf73efdd109f372bb4cdd9ab696adfbd2f9f80ff1fba2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a3e1b019fee1bc185d028d5e6400b3e
SHA1f073ea4893b1c2df914e1625e65bd6e1786a386a
SHA256f9d928cf3b29d38aeafbc6c9b2d0500c1008ca4a5b8395f5f04707a22a2a4fe0
SHA51275c3d1a195afab942e0559439496952052478153fe5b9e8b01db2ef7ff64c598ac34370c383fee6f18f81ec4a1a0ef74eeef5b6ae0318f8a0f714c08712c7e63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54725bed2d3a7a26de139a1c1a71b5c46
SHA124d10199f6f1d4103ae60245a96c73801e27f85f
SHA256ee4ce7b27da79ff82c54a96d800e537bdf82f1acff6bb8db0bd4972149cce804
SHA512d2bf8a180bda43fec39fe52a4b9b4032c95840c5b6f5263adb248c524ddca0120cda1eddb4c91ff7f30a677c4077b3a8c2bccd2ce49ca26a0c9375b1ce36c72d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f400eaae941b14eeaac12b7558aad500
SHA1f08740693210c29b0b70453de9b8095165c133a7
SHA256bd5d8d9937e80ef873bb4ea016f5a8d8f78fd72cf047bbdd81a0acc3fa53dda7
SHA512f0e873e673bd56196b8ed86947f08e07f37eaf8ecf69bdcb7be5d334b6be46dcc904f3642551999da74e2ff64772ce2f3b81f81b0dfe4f12f4f4f30f61e17612
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de9fc4a48505610082dcd451b6e7046d
SHA1a7224993e2301c850ae40259666ed9c8e96d0db8
SHA256a45aaa9cb9c09e383600e8ca996e26fe2b7e3ec3cfcdb1ac383ddd3180437ed1
SHA5123cf3b3e6e2f305cc838839d7eebc2e1f9b96178b92cd165b0cf39eddea88779ca7b3d4ebaf470f2a471799bf009b15816c0b3234cbe77b5ba52d7683c2ad3449
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c04c84da0377c98adcf4427c75d105f8
SHA1c51d731924ba2427b608b790ee28fad35431e5c3
SHA256452ef5620e6808580586a2d6808f0d5c3c3e93014f833a2a0a31ea80e12833eb
SHA512bd54c2e7b470bb25ae73f214b952155fdf31e5ab860d831411fe574aad4211852fac8a3b0953f19c334584ddf1cf4ba9599071f4afb034e58ef146a8527b58ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5613c2a491484188400154db940331c54
SHA1f5730f5fbd9123dbfa4cda5b73513a4a27cd7913
SHA256e1de3e7e9e8b6342ef7a32149d5570f555281a4c6bcd62a550f861a173857078
SHA5120734c25ec75046ffabb9b963217564e06879d90055f413dab25088845f064f13a707b30107d3b59b1e41f6224067f7590152602523ee05d7967c232c16d5b75a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522a08d8486fb2e92833a7eaedc01437a
SHA1d46abac902b38453b0824baf38d6103b10af5675
SHA2560056d0708f4945173b7cf08af6acc2c7db3948dd1c1064e1c220d7b7ae1f103b
SHA5127455c3d4cde7981ee669f15c14002e7470bb33ee92a5ab1beef02ab69a7ac5e0b6e97d1d23c0227ea66d9af586d864a23cb1a16be8b5c3320eaf176fdfc82c53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f73d9827f7dc29c9cac0a84e7869d86
SHA1e64ee57502de504e2d7ce175fde29c57d124fbc1
SHA256844fcf1723396bbd8a20f50ceaa6b3419d16dd1afad921588ea62b41e563d546
SHA512bc46b623728cd37764b4605be308097fbd951e8f16568df0ea3afd1a436b4686472edce978ffdbfaeffa49b5cca485c1633d14c5021dff93c0c5d6fe75b412b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59dec905e161aa34e71e815b34aeec261
SHA103e4e5d989c182085d0b792e2e951d6d59728dbd
SHA2568dd76d6363c2f6e66efdef506e4ed62bffa7e80aadbea25be6e148b928a049aa
SHA51276759fc8b8da664e2c530452301cd8e98c0ae4efcf8a605c27ccea1e0efd606e57094032427c5ada1bfc58ded61dd4b74c21313d13607befc834972e8272a312
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a