Analysis
-
max time kernel
137s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29-04-2024 14:24
Static task
static1
Behavioral task
behavioral1
Sample
07df02c0712156d78d0024a1536a4efb_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
07df02c0712156d78d0024a1536a4efb_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
07df02c0712156d78d0024a1536a4efb_JaffaCakes118.html
-
Size
67KB
-
MD5
07df02c0712156d78d0024a1536a4efb
-
SHA1
577003dceb67bd82aa206ad6b9c9411dfe6f95c1
-
SHA256
571fc75c5c430d0160679d84b301ceb574407f31bef951999291838e53f6554b
-
SHA512
a5a309f7b120d147eed537f71820a064b2bd9f179f343cee05950a3db6e95f35888eb5d9e8576943eb14f2a6d75d8079699d51f9ea8689c03d0012187cf463bd
-
SSDEEP
768:Ji/gcMiR3sI2PDDnX0g6+56EJh9CoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVh:JdZJLLTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2BB7D261-0634-11EF-B826-EA483E0BCDAF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a70000000000200000000001066000000010000200000009d8b6dedbbca587f9ec8deb878b7ad72d999448ec642305cd13594c1df89b5a9000000000e8000000002000020000000752ad784553738bdcec6b802e260565e8d0f0965917b863784bd2f0a96b0b01c20000000b9d609094cbe1d807b19fff9acd8761dc6d9f6c92826810dc457814dc35320fb40000000a013dad0032f5bc68f22c07ae8c6c5d4fce81f092de12857bc295933f3f193a9efac182c0e1eacf31523cae3a84f65425b0f224f5ba09039254f1ca5fd2065a2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60a95200419ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420562528" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2872 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2872 iexplore.exe 2872 iexplore.exe 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2800 2872 iexplore.exe 28 PID 2872 wrote to memory of 2800 2872 iexplore.exe 28 PID 2872 wrote to memory of 2800 2872 iexplore.exe 28 PID 2872 wrote to memory of 2800 2872 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\07df02c0712156d78d0024a1536a4efb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2872 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50065691fca92126b32d5e9c32e4b5da6
SHA190cac756b640909d8a391966fa8927483e71f72d
SHA256c57e8de27653405d833ba0c9d0a3833d26eeb1b7ea777f0af6a3c61c06075daa
SHA512955d610dc853e33901659b4b2a4041504b02e2793c043295b94c53cbe8c085e767c25839154b62c4c9fd08f1f3f259d6a8296aca966626cd45ef9e18d90262de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a19fe2a5f67ad857f0094fb2a060ddd
SHA1b8ae4a3e15fb4d116a87e87ed02e0755187c5bdf
SHA2563a070c02964876370967541bf796c07d40248016986637afb1d56b24102e53c7
SHA512c5b134555e450170d90a456ec122f677e1de36bc128bebc6307328cf141cb6d14fb4d80db46a06e7e64ae2ae1db416b64d04122600ca9647d1570bad98dc3580
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5711eef223c5de0886501851bbce1e349
SHA1986a03471620bc9e0291834af66933d84deff39c
SHA256857410077f8836f34ee7d5dafe5705a05da17178cf45f63102d01b29a03b12bc
SHA51204237dd777864f1370c87abaea647bf73beca27841faa9f8d51b8d7c1ce42748f11a0972930ddabbc9a1cbfe4885e18888abb9751a546599f362c1cc1055b938
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507eca150f132e3fd5ff16c0d13f52d4d
SHA1243cf547f53e2e1b29c2f3c974eab749a0782a7b
SHA25690e604fa5d5946ff67ebc14350e660a10548d1ca106957d109a7778a9c2d79f6
SHA51234f0d652d90ef9e2c013007e7533dd109382495fa3aa6a262c49ca2c05f19cd5530cdde653db2d546d194e6f3a39312ebd7e25944512c625e79e85c179a036c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f346a4dd0f0074a301e909e9c7aebf68
SHA1db9bcb27ad27463ad68e3699be1024983328a558
SHA25603ed8b2a0cd66aed0203edc514f85a960768c60dc51099ab49ffa43ca0332b28
SHA512984ef7b1bc8d1c75ac6de1665efef664fdd2814837450c938c77cc9700f7ffb325e6109f881184d2f5861fa093b0c5d3332d0d12d71b38e8a2e7ef3d2c0b93f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566dbd420607a7c4b6a44bdb8b1cc27d9
SHA1afcf3ba55b2be539b6e1bb653431270428ebeffe
SHA2562df343b04ad35b1dae122835bdfc86a76a5975baa582376466be218763b5e20e
SHA51229310be3183af5e7d2acf8b07c7290f40f0115595b392e52c6655af0e60b82170bbd6ddd07241bbef765d0c496fc7e5d0b69aa0f236eb9178a41127f6679cb1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2305ea07b4203d9702ba4f22ec74398
SHA168535d1de647b126a51031e0e37cbd31b91f7c86
SHA2564d5c07abaab921badf00ee29fc9fb5b5e09107dcd721c802a378b6b7bdd7de66
SHA512f288f02f67e7d27ddc433cc887909d27f17242a3ac4d67ffa8e846bd729c424ac90314af128569e0163c2457893e1390ad62e83959c33dae6d8b525fb50cb650
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54997df3782bc955d8b7518aecd038e1d
SHA18c501997efe7343ff50b6e86358f79af8871e0b2
SHA256ba83226a4d4d3efdb2059b6f1399bc4aaffe1943ba8dd1d401acc5f3159ec796
SHA5124b8c870fdbbb8f07bae64fd9eae48071b4d871d34b7a245cac3fccba9939dc7c3b51afe4931a6849762f8a3bf882adef13fec7e6f91103a900d5c5a161cf3cd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f2f8c559a946d60d359707e66ecf8ce
SHA10dfb3e2d266eeaa4bbb5bd8906668c3f276d0a92
SHA2565dfc17a63c5d33709868764f67a5adbcfedba7da8ed92306c19419abb2b97eba
SHA51267da781c595f08c794917cd581ab384e050a3682d8e21e3cf8f1bed6ecac1a6970edd9bb7c032fd96a72ca36b5d27cb71fafa815ec4695f577caccfac36049c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556fd558db309b81ebaee3df69c87324b
SHA12c0e4e394a0bbb953151321ba07b3585e2bd988d
SHA256ca15230d01d2058958ed603723263b04d991cceb98c15d9b96bdf2ec4cc597ea
SHA51256d93a2ecc426bb14d1a08f045ee875d2e4041f1874a7364d64549bba7b107027fe95b64e575f69f8ac78726703b6501dabd245cb869562d7f7b4fce54abf884
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55bb15ad13c0cbb5c9d2a02459149f4c8
SHA1a2c37c21eff2023820c50464ac6bb13f18eafb06
SHA256806d39435ebe7a711c88c3ce6ef7c08bc4e397df64b75bad0ec1c66fa54565b8
SHA5122b176d60d25fabf56b6289dd70a99aaee8829ac628616306ab22cdd6bdf28bc1bcc5db63af88b46984f9363a4078048a8c4953dcf8816f42c63a385a6125732f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5137e65289baa5bce3e091fe067ea8488
SHA1c2c1446443bb9924df1606c60e643e96a60f3307
SHA256547eb3f503998601ad6cca023e315a18954dbd759941b2a0ae5dcf18e9d8b248
SHA51260606d751cf6f9938fc261d8ff06983ab1bc501be9aa5308c8138c1296fca2eed25d5b669f25f8953ae4aaaaa2f0c0d60d23ac2d41321d3c51cb8a49a18f9271
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6fab2a77e4ee906ea8141a05a45353e
SHA1939148124ab9d92a5f7d5a4dc24dc42d2e921853
SHA25698db263d9e546221dee691215ccc57513094b36742763cca1556a68c1f9fc4c3
SHA512b7d89c937134a40c34d9e7b3b4a56880a3b15ea8bd37e7bab81b373726b73bc85bb867e0323763b056d248e7d611bf15e7a02ff0e4bc9df5146b4d9e45a05219
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ecfcd7d9612fbe6302e481e79c3cda7
SHA11b2a22f73f07f31f146152c94a1d84a6e345dfc5
SHA2569d6049e93760393a7a81e433b20cad73f15c5e2630fb73e73c59eba093920535
SHA512367960269475483fae8bf2bc31f17a3790f2acca5edace840d307b88ab0a638fb61d3e78b6bceb83575db73576b3412c3ec5513da2753757a63d5588cb5fb46f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aee3c25b2d8a224410901270876d1a60
SHA1e14a319820873da07dea26dc2fc068a8038a636c
SHA256c4e8682c17d392bb8f4d722716d32c786731fa99663afa44b147d44d597a6780
SHA5124530cd96deee77357e90059baf037e925157874dbae55395b37b7b16bc7a6426380dc300061b0019fe67a2fced3be30ee6a02e2e9c27a5a7d882a790ea1f155a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5386caab077dfa808dfad7fc210047538
SHA1fd195dc5001bd7938843b71f3c930f5097f23828
SHA2560a1bbc2b71625b9a1a78fa28772599451aca142ee983c3d1ffe28c8f5396b251
SHA512ffc09623deed6e7deb6f106d9b90df43638944a5001c548891c83bbc1fe575c8336b56456888f95f5b5ecb86223bc345c087c1d29c51371ffa5e0a9455e82462
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56800829e87568f5de0608dbc3f9bb33b
SHA13a21ed3a25f4327616785b188f4f1d309971528c
SHA2562994c5a74809d50a2fd805b1339022ed2e1db34ccaf88366ea4b49337fea1bd9
SHA5123736fd19c0bd779406ff99cfa10a0d601b6d36f37b66062601d5fa0c0ce67d0c76f82ada50db228c19a2cd396b1a420fd03ef501c5e624655d25a114559cdb82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555e7cd7b298cc955aa48c8ccdc5f185a
SHA16169d10e34becdf2d8d302710d484a65e45d6093
SHA2565271b90ffad0afa2a10e085c79403397fc81c226bcf5186ec79c60eabbecfc2e
SHA512b3b20eeae6f2e549ac1389c18225b1734d88469bfdc663ab7809a4d4c865ca12916e65571dd5ec753cef8c26955a3c907ffcb0ee7897c41464a778c83658306a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56efdf5c01ef3f699aaaf17f1c13a5470
SHA164bc93c44d3069d2f4bd2a4e9f32f8361f919241
SHA256ab4060add1bca038defa2741b3eb7558953f92b430cef139f16f266aaf4ea951
SHA512a90944715fbd409b8d78ff75fca393f82ecd5927114828d907976406bae039d87f74b616751c4af25b29c38346d212f8858f48e78b991b1d3b7ac336e58468c0
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a