Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03-05-2024 12:48
Static task
static1
Behavioral task
behavioral1
Sample
108e34e37eea75e8aa23a1edf3207820_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
108e34e37eea75e8aa23a1edf3207820_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
108e34e37eea75e8aa23a1edf3207820_JaffaCakes118.html
-
Size
14KB
-
MD5
108e34e37eea75e8aa23a1edf3207820
-
SHA1
ba402def8259e044685db5068f959d2326dcc9a0
-
SHA256
55d6b6367f5ba48e16222a272e43eb016d00907858d39985eed184b24f3dd3aa
-
SHA512
35f032c90fed93a028cefa5a67793dcf9b62f2ae4dd11742c48c5d01aa9182387f974d60f7f6402bd48689ccf2c01504b3c4cf06894721054e6c7be18a3ae234
-
SSDEEP
384:CyiZt8x5a/twyWmFAi7zy1wI1M/2o5OKsv2zMIsqum:CyiZt876eOAi7zIB1MPzH
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e0000000002000000000010660000000100002000000083e371c233eb9f8a6fdcef8f99fddf81b9da78d10e78fbd74df2130e77787fb1000000000e80000000020000200000002546ac94715b02697d43f8aa12d3a4319c8f6f58eef8d88eb2bed01e2261545f90000000157560f472f656e60bd290bdd6090a6304f9bdc6b52a7fe8345f4a7325434e11525376ad74676ff401122c1e4b9836470c3daace54cb4143f280ab76aeae5d911f355fea2785fedd3e168d5f039d66027a71d405a9fdbb184c22520905eb13ec696bbf885f3dc7dab9a6764b0374e2049896bdba855bcf49ac8d8969178af880ff3cabf8063139ead70b8f1e4e97471b40000000fa1bece1c9792ca93f36092512dac0d1805d8bcf7b0aad449b9932c8bb9692231567acf8784f771a177519396e90287f63744382fa664affeceb8a3ee23ba157 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420902353" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{629C43A1-094B-11EF-87AA-FA8378BF1C4A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e0000000002000000000010660000000100002000000004ca602b4b07a7e661f2cab9ca27120692c6ecf6bb677c6f0985b39da8d0e27b000000000e8000000002000020000000137dac8f4c15a86f6233b72e1daf990d14edead112f3c9ca405ebcaad2930f3b200000005db7a0ffb3b0069fbab1d695b09245c3d624da5f31c1b0a2703eacf75e4ef2c740000000c97787d9482853d1cdd975e28173b9ccb8f04452881624b574481a6cb1c36e44f8f268a503b2f810dd524560405ab5a6477b6a27df88b9de7d8387e4b8641edf iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8007bf37589dda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1688 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1688 iexplore.exe 1688 iexplore.exe 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2732 1688 iexplore.exe 28 PID 1688 wrote to memory of 2732 1688 iexplore.exe 28 PID 1688 wrote to memory of 2732 1688 iexplore.exe 28 PID 1688 wrote to memory of 2732 1688 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\108e34e37eea75e8aa23a1edf3207820_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1688 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5feecc79771e5a3386a9958caa10978d8
SHA1e530814a1787e95f2effe8198273fdd11fea3ce6
SHA256d936c15c2c5db8084f615c39dcd450a12c39b644df885e6695ad131f15289514
SHA5121a489165ccd2b99b86b17b35560e6353b8bd4e33a4042869c97098733ab9be869202b207b5f3464250ea8622ea5ab7ae29236c39369c767b818759c2c4f20229
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc4af4b7a6082a5359cbe5a15deceaff
SHA19b2cef347f54841611ecabd82bddca97122baf17
SHA2567863cd7e0bc0c9a3cf38cb0559e0ad7b66bb1f965d18951ffd4d57d08c9cb09b
SHA5129d7c236fd086061529eaecf68fd4d7a4b98017f30ec62a43d9555bd8dff54b5790bea77170bd46b9daa14df74a32f2af6a625fedf5abace3409014387bebd493
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b46e6a8e43842640b0050b0a8b3f5c06
SHA1b494877de34c51ebdd87f43323e82937c797d961
SHA256356a4398cf296fb91c231d25c6645ca0feb1ca52f837311f2255bda07814562f
SHA512fab2a8fc025291a2f3d270f12fd05dd8c35e116cddd3a908fa6aca793cf5cac0fadee0c510000da9a6f5eaf541b9dbd230e59627d758e68af5512a96bed58bf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8612413c3ef6a947e5c67c699d3d4b3
SHA126f8536fb165077a225b7f49252495d9e0aaef10
SHA256b8a957aa934203a5149fa47a73de57e47aec5de87eff067c990dcad216aef57d
SHA512e9592ba7934de6468d4706a921312a73850a4075d108a7f5111ee66f6470f389fc2ba337992ce1fc10cc7b60575ed8347ed9c8cf62c2d8f0864a6373eb15f877
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5acfd4fe8ec39e5535758c9da9171d619
SHA1c4af5ee6066a4d47afd06716251f7f9f908c9773
SHA25617e4c5a32575cc29fdc496d7d77c4e2323b268df5d0bf962c658d70b22b64f0f
SHA512af8b122e21949eb53923a5b6046efbed7e99a66811b58307992306f413864da278f0f2d9784cb1527a135ff3444c31283965e63308ff53cad9d042ecff506d3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f402413f25391ee6512fb976840f2094
SHA12fac94b0f2a7eb6610fa1dd2e0e32868bf7daa99
SHA2560868d543bf8da5bdf9343f199fc7eccee42532877a2c32df00590ac484063a01
SHA51203de6523d561f0e1639b2cd3b73c00bab79f3c03ecfc57250be4f2b1849ca87f3b01a790a459ef4110a2583787f21880f2212ccca23d2128a40e1895b5c6c02b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c7e035181202e4e177babe4568a275d
SHA11b85b52639d735afa6e4afdc0e5cc28aa38d5e97
SHA256edf08a5673eb34e12fa3a461c0418ee1639a353d46c183fb3ce5ad3f4a1e3a39
SHA5127d5c394f0da34130da3c3bfb7f7a60dab6950ca6eff269c6a5ef361dcec905b5a42e28862eed80c1ad9fe98cf8ff5faafc8460198502d3f5ba59cb1d981ce589
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1d59fcd9fcba8bd8ea39d634e8d2202
SHA1d4ffe34d4d72971b2b3e48c521390019178a807e
SHA25688c8516e56c0ab0ab14bad580d6e96fa06a2bdc17fc0ad360f6cd9ea5b3cda5b
SHA512607401495c7c3af500b12b54e0f08c1a6c01fe1eb25195e8927078b459906649e715fe36d4e60fd90c0d55274637bd373b46d1ecf3d29e45389ba1718ffe11e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571694d220dad78148c45395a61064cf5
SHA10a3a3f9561b401f55cf53f0dc9ad1f5b46e31b59
SHA2569d1dae71984b9d726f08cfa5c0741f6b3afcc9207550a25107faee712f75ff72
SHA512f7372a4ad890caea21608aa618ec359a7c3c0c57a849414decd2e3918d258537bd9d5aab9f5cd2cd0c19711a32ae977aff648462e74399e93fe1e89e60fb823a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2f85327400607161accb3d4036b748e
SHA18a9ceb74348ed6a8052f7fab332fa7404141c870
SHA256367d6d38939386f6ee1aaf8ce8f4307540a034372975a895ec889b8bcd0c921b
SHA5129dadc2888e02b7a95d56d409463633709759101b4a16ae6526733b9183fb3df4940b238cbd9f251b55cdd1b979ff8c76bd55af003b0e0df0971f1d1f2cb3e618
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0f6dc6db18e25ce027b463ffe762d34
SHA13adf405ce78d1a2f3a737fdee43d683beb4dcdcf
SHA25666a74f6ea7f7cac5696e9315d5d039c3771e9255832bb62d2265e379386d5758
SHA512524e70fcb2fc6509aa0bca0a8999771c7f6f3ea6a1c8cb885aa4c5055d71f6b4cdb071a4f8fd0d5c4d6c3ca76c4bfaf9a48b572df50accf48e9a9b8c07696603
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b35e2d11a30b0dd3a5cb857d0bd295b
SHA1307486af39ed75e4c16976fb116e6f21b93be294
SHA2560ecfb90835f5356f4a455b7e511f134d00d938e940e90a6f06b2aaa7c2174cb1
SHA512e22ea49e5b0d27898a3f645b0aab7168268a5870268ee6d9259f68de8ed70b072f6791618a7c90f6f05037debe76237525029d553e23fb03327b660fc28ffb71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56503987d1d5912860c2ae8a962bd1ee3
SHA19387e04b0fc514fc8ceeeb040ed342c6d166dae2
SHA25602cc114dc2bf5c82f301a752880ae2d6f1326dd43321be84c1cebe23eadd1148
SHA512098717d6397976f4af8aa9f2e568eba82f6c8db6680bd868c5b53c68fd6380815f8ea0eba36f8ed24b77794f4e9078e145f29ed64b599f9273d13b60644fddad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c95ef20f4cc7dff2daee76aba6e097e6
SHA156081164a5b1734c167880cb0131fba52a29ec93
SHA25686892ac81c11f29b18deec6812a1eb9e2e1b64e999591c70c70fff6c13994000
SHA5127d6fb253d15ca17c66bdebb6e9a8353adbaf2cf35191719720f1f5b0399c3609b4f92a3f82c366e21ff3fb698f32fb1ad74636455f9a2d7c14936038581e531a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561e148f98830ffc0c36bfb9b42501804
SHA158f71f9c6aac46fda8fbf987e504a298b27bd092
SHA256cded143fddc9396fdfa0818b0306eb00815c5bf9fbda3d94fab4da5dd0a757ac
SHA512499f06dca257549e422265a063d08953f61dac5a4485deb79c34a3c78067e3425a676a0eb44a77ed4bd3ecb5849231190daa2a284705729c8331b40722fbd90b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b62d5ef89a5ccd1596a25d230fcf30bd
SHA16275f8c35d01806fb5a54b66b8089d93e78dddd0
SHA256ccfbd87518d683913745384b100811d76c1a8839e3450cc3a48afbf004d927c5
SHA51220c43b22e0738317fc06ba6d4b59e16c7cb93b3c82f489895d839ccfcc5ec22d46793cc13437521c2ac17a3d18823453fe40f80cd32fe4e9964e6df97c8226f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d76e49df5170cb7f84d07bc35e4b3d95
SHA17e8b38776a58199fabaadc9b8dd40a6c550176d8
SHA256ee13b1b75b93a40eb07c906c44d9e0fe220168f08ccc251347e05a16d12d51e9
SHA512a57ad4bc951b996c049672e88bf78a6b003be567bd5103af7f603ebed87fa5d7e044d805eee1a58db1263a23ac6412a4b61e44ee3d376a4297d791d4e51cc56d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OORQXHVT\5MELAKMY.htm
Filesize408B
MD547f55c8af136cd2efecca296358cb401
SHA1a15ed4a54acdafadb7f533c16663c02374f14544
SHA256eb2a187d4044cf89780468e58b89a1e50c95f2069565925b9d9c26fc5402abaf
SHA51261f28d6cf3760720a1b3cf20b13488f10209ee48db3d826f1b85a7e9e3e9318f9a5a77b0fc61ec24e0cf97c64ae8c8b540cf6751c172c55b0a1dbd7b9669962b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a