Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
29-04-2024 12:20
Static task
static1
Behavioral task
behavioral1
Sample
07a62b0b934b441ae609c49bc24f2022_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
07a62b0b934b441ae609c49bc24f2022_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
07a62b0b934b441ae609c49bc24f2022_JaffaCakes118.html
-
Size
25KB
-
MD5
07a62b0b934b441ae609c49bc24f2022
-
SHA1
d9a5defe9ba4f7a8681e41921021c829a36b01d5
-
SHA256
de7965a4788d0d344b0520fe2be53de0ba9557c4944b31595652f3c64b1cae9a
-
SHA512
85b2027600049171ee0a34c4d827b70f24ab22e66dbb7f02c96707990324296d06bc04e403957d85afb8e0ae56c3d9fed89748e0ea613b568f00505baa4a4b10
-
SSDEEP
384:ziSKnZHb746VBD8cqQ3RTmISJAVqmL++qcfIk99heCzVc99W:zi/bJgcd3NmbRmmOIk9Skq9W
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30a800ae2f9ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420555090" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000002ff85edf365769523c1e188721bc760cfe72aa9f454b3ab260890796df7bd862000000000e8000000002000020000000450ec9b75d3650600255c1e7d781c5d16875185d55bd071e1c8174025475c0b020000000f2e992d2d646a2b305b3e515e91f7f4d18b266e1eb7181d6c257051c75f34855400000007cd112badfb30aff52823163b1bb40e9217e20dd284902372ba4e38c66c827f81b9c51bd3ca55d9355c2df0ad78ecdd8d7595be2e2f1ee711029901ceb74c4da iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D9216591-0622-11EF-BB79-CEAF39A3A1A9} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2164 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2164 iexplore.exe 2164 iexplore.exe 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2092 2164 iexplore.exe 28 PID 2164 wrote to memory of 2092 2164 iexplore.exe 28 PID 2164 wrote to memory of 2092 2164 iexplore.exe 28 PID 2164 wrote to memory of 2092 2164 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\07a62b0b934b441ae609c49bc24f2022_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2164 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54778014f81941d85c78b33ec93691521
SHA1d73f01b86424c70b0c1b8aa94d6f6de309ad77b5
SHA2566e932b82d09091492fa21dbcdae4b0596b4edda26c78cea0dcdb13bffe6a5f37
SHA512338441844b04b20c840bfe78cb77a41c34b1692afc78d14499c52d9591cc5e376096ee7a1e59ad8cf860a6a5289287fde79788a9c4d752bd609ba743d24cfa9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5214a1b40384e9fc8f785dda29bf0bb5a
SHA1bdaf7623372de0f3578b6bc6331679ca235e93ae
SHA25657c874b5ff94bc0b91730f7a74c3bca64e8bc6bca8c020d5354d47c2635423f4
SHA5128d84d54f3842b697b074cb6e574ba1cab0e9ba7538fe7d2ffd229cd096322d1cec81a3dd7439c41a2195d55207f56db7dc78ba8dd25b549bc0508012085cf1cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b550a5e12c339d01a0e65dee01e54eed
SHA19e330f79f70e98e298563ad05fa80bad08e3efcc
SHA256d5a77a3a4c135a1e7d9b9236d736f180c652620ec42d5ec291a049281ed6637e
SHA512d2b36caa0f3629dd4a76e33698d047dc25fa27a197621d764e3b2e170b2b67df0cd949bab574e7146acb760ce0e263ae66e359aefcfeb1bb1ac30dc55fd05bdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518409a1920ef26e6138d7e5bc25932fd
SHA1aeeca84fdc97905f25c620b650b14d1489ca4958
SHA256960b91163222e0312df45bd83a58665caeccb600ab783eb591c3c5a045d4d65b
SHA512baf211e10c59c20e4b5528583700954ad5c5a45abf94fba4510deeb418453c60b04c286d4c90f291a0c6a2f7a805bfb3554646e9fc4d34928bfdc78c1cf1952b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7579080d81d3690f728c81b875c274f
SHA144df30cdb7defa41a951b586d11038e8ecd205f6
SHA256ab776324cb929a17b16b273b9d14f20cbc1486624ae913e071c4b008ad5ceafd
SHA51214448e131fccf422dfd549bad8b42f4746ecf4cfa9766affdf46fd7c456db498b5335c1dc68bce8d1904568e4b3b971fed6c8d4d25490797e3cdb0739e95b9f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524c948f7deef8a3850b0a838f2b902a2
SHA1aff3b5053a9302cd9ce65fe773905448f81efc06
SHA256874a1a00b4811148d111ed9e98a74bf91e9e1806781e31677e10c72a74c9c3a7
SHA5121a8b826b9f8fcdc90c71c2d877dd6ea303bd91f1b94d28db1a96a0dddbef869f1e12b1a872007fb985372397b48cae5bf25ba1db3649ea51469c16923e629cc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553721860c801c1ba4fc5bc4b0b0a39af
SHA163a54d23113756bae6446dcb0a4082e60a78bc0c
SHA25622e3155c229b29917d9c5690f02c5fb86eeff1a4af2b1bf3ff9c162312b85662
SHA512675e95742a1eb77a8992c8e45be6f67b96c74db442e49e1e3a75c728286ec60c03c7aa6bd6cb78adb784dcb4995c19738024a926e2f01170d98d4f07b6357bab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b19f94e89732749388d0de642f9ee185
SHA12dfb6f71752fe70a6671b3432fe05177e6a7202d
SHA256326b7dccb1b2472eecd1696be9b4bd60df691f89aab902b7748175dcfcb950c5
SHA5121a05a1df5ec2b8d90825e711d4c5d435041ca774f7e5dbf4e07821e0dfc5df03d231d5c0d4f8cf977e214cff6f6e1c82233b2568c1127b62bfa61195d7c890d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ca49252e2193b15ee65908bdf4517dc
SHA1d7de339bfc716600613e67e963cf12ded415d4fe
SHA256eb160b73695ea3f1c26eb1d3fa9715093674fe199923e0a70e43f53e6e0b8ad9
SHA5127a40e8d726fa0a0c409fe920d6bd52ac80b2bac82c16a1d983f4fee8bb815e55d336955511a09f6a75496fd2f50546612afadaf92423bb0a9b71d7e7599ae4e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1a6fc51f590982116b6fbcd4f19514a
SHA100c795b8fe4e66d6094d89b756d076712ed2afc6
SHA25698e06d95123c8864b0b3e2c85f6ae09abea81605f1ebe8278391533e1a58b3a1
SHA512c09c8e16177e7399da2bc514d330c26a12f23dca1404ced0c25139800badba175da16c0659fc33e0c4ded8a6d04d4403aec010f0d432abd255dd6ff837e94a3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b938aef44cdb1481b13ea6232b1999f
SHA1aa4a1a760b3216299ad2dfe7912b70bbdeecc089
SHA256a257b13e8e3feb2c126d6aaca3695dbc77c39e6f85b276bd5f67d0e7db4382f1
SHA512273fdc6dcdfbefe7271a409f782e6b3e4fde9271a4b46b08d3ae0673bf80bb0a4ff947642d59c768c975c0c7d42d81fd5f98c874221f5c92b5f94c54294c08c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ecf3634d1fc07526b4e6c7014a9b35ba
SHA1de2dcd4ac17b2f27b56617562b1db266296c151d
SHA2566d91aac5ceba033da489cbd569b6d80dccbeeda09ca4f7a330bda10aace95cb2
SHA512c39fd1ae2b6e907a0e49ea834c1ba7f3d81ec8d9cea0fb1603ec26f72ae732aa20d1cc00dd6424122ffe4fc7fb1bcc10d7786600a2ecd65fd4ebbb1dbf132674
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e3e979808e85a2951e5792639068a5b
SHA10c1cc6faf41098884746b514cc52e1d58d2ee08b
SHA2563d45f9348cafd0a304a7b17aaa325c76d9e4e3f89e996ec352ea64c0edb95abc
SHA51272afeb2cfcd596c2d8a9c17777e4b3b505ca951fe7d3a74a397a20a2a893b4c7caea8830eab28fd2e692f90b9b5bbcb99073ae6e80c4e2508f1780ba07104d91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58be09d4529179a80f3cd3b0d2f8ac49b
SHA1c1322fb4ce09ada3780ba5d940412528746bbad7
SHA256c7ef2762e68e0f875d2089d548818dea2ee53a2ccf7c88869c9855cd9b99242d
SHA512fd2147d7e93f310181f9a5e0ee829b400f88ee28a2142dae7c1e8e9639508281ccf7cef3be3c566b75c8b89db05eeb30f192412b512b7a3a835d4f9463429cde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524d9d4201fa44994e64942a914ff6257
SHA12bf50d4864abf7fb143ee5684d8f15448f19ace2
SHA256794d8be1f7a2544a5ee0e873e793ee28fe89d2fe4b0e9cb562b39ea0c6f10291
SHA5122ef2592516afba270c42290336c177db2718744a7cdac4540f85688be963a9e2da699f010c7bb990c1498a70819cc0a0e6c7f6b8ecc29988b40182998e2debd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58da71749adfce34a251a1116822b9520
SHA120f70d94ec2a81f66b84fcf3497fe4644c66488c
SHA2567813a7df6a56fc484b0a2b931826e4653a524efc1f47c6b833c4a801aade9068
SHA512258f74a5b23f22fc798ebf3d131effc692c05813f171e310a2af177e78990eb75fdbac675a59ed570b8629d0e1707b50ead19ba9da311f63cf86168366e3dc6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d90d4665ffc1558a7185db06889e874e
SHA1f6d6307ce82f84b34bd63cfb2a94946ac171f945
SHA25654dcccc6d8515a8d22ed53021f76f064e1cf6526d5bfe5dd4e55b25067016cb3
SHA5127b1df6d14f966f0ce2ee10eafb76d1d3332e22bdb73447c12f3cedaa3fc5fdd2a2a9ac3682628216ccd9eff07d28a68cb411e1cc604945b9decd57beb1d69f6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5159aac314b9050dafd972c4df8b60335
SHA10a2618f300d8fdac500f3bda70d73581647b3760
SHA25661f5af13371d147b1421bd159d6cbf5cb42096b98b1280c2864ab1af8b82c07a
SHA512521f58dc076fe9a62e9ce694e9d1a00779a63e29edde60d0e7cb09167834559889d4e01b3788531470b47472eab6c787c9f6b661b1fc71646d9ed775eb2fb174
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ef8c11961cea928c16cd2df180dbd88
SHA16f8ce63952cce213df8a3ef299bfee72f64bd16f
SHA2565b05f4ed6153c25637d048f0572655305d7c7da10a0d5fdfac51b1c647e46b53
SHA51293e2290016db1636fabc61846c7c9d8b35b10871a450073d68a857c59a443476a3f0084ab8ad6547fad3302104132220e661b9c89d22fd60089a217bbaccec1c
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a