Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03-05-2024 14:22
Static task
static1
Behavioral task
behavioral1
Sample
10bab7b3f40735553f46bfd45853cde3_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
10bab7b3f40735553f46bfd45853cde3_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
10bab7b3f40735553f46bfd45853cde3_JaffaCakes118.html
-
Size
4KB
-
MD5
10bab7b3f40735553f46bfd45853cde3
-
SHA1
92b596a92b9bfab1d7f20d2b030371c98313ecae
-
SHA256
a313629ecb4d70a200116207c74aa78ee6e131879118730cd836eddbfda90009
-
SHA512
e76fc47aea0a8e0b4e534291a89146e0b040c5c1df1f22dc8a2d24b94eaef8e1f9911e02b4b5c4fccb96eba655c427a42733d1447c2b6a52f0e246c4bac78339
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8osTJ91d:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDB
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A0E76CE1-0958-11EF-8AAC-6EAD7206CC74} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420908041" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a03d6975659dda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a70000000000200000000001066000000010000200000002648d1cab739c5e9ca472e876c493b18f823d1b3dd69336c939c0a99036fe50f000000000e800000000200002000000074277547095f76b0edb0c7f94f9f7acab5f279cc45940af3b728ef10611dbdc120000000564dd66210192def3ed1e5de911910c8732014e533b5e2b818cc47179f2d8d45400000005771e09cb42526f9e6ae22a0b580ae3e640df92c0d423add22e62dfdd9c333a852b3569d83e9f3c6c5825ac97d8872cec82d604b1efb12751b608ac9da88bd74 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2848 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2848 iexplore.exe 2848 iexplore.exe 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2532 2848 iexplore.exe 28 PID 2848 wrote to memory of 2532 2848 iexplore.exe 28 PID 2848 wrote to memory of 2532 2848 iexplore.exe 28 PID 2848 wrote to memory of 2532 2848 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\10bab7b3f40735553f46bfd45853cde3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2848 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59733acada87bd6a659885deb2a2d3edc
SHA18a5268e8e4f73695cc53f5c23cda32adfc43c3dd
SHA2565b063732fa8bb64d5b92aa8eedfadf6273d0128fdc6f048c8ce317451414649c
SHA512a4d54d992f736b27f849e49a970d9e3f847ca225a8c94e1a9b173366b0dde7da71c9ea4e61f1dabd81919bae083760bb21f6dfe5bc37f2c24d84c3b003fdb8e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51cbdb2a4e1e325df37b858c9e42ae358
SHA18123aa3a58d52be775bb80b11888a211bd2de367
SHA256cb09d6f88c4c296126314097081fc704dc1fa75b4c659206c6051c247aaed675
SHA51261b35cc3a19c10897b46ab50b1b284d61076080dac9fe20bd9139c7a4de301d9728c6a93ca487dc29fce76628da1a6032970db3f39ebd20ba2ef6006dd0ae527
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57bd636afd0069abb3f17d8bca5cfe885
SHA1abb54d9be1411d89b3ddd0dbf3c91d16a9564c63
SHA256d3d57788ce64a7d103869bc269729d74bf8e76c2772e4d7a116f68c73c44585a
SHA512c0a9f32e3dfc97cfd4840be81df75bc6482a1b874c485e06356ddc8b0c8cdf6f0e84be3f74ec04c989ebb0b49f7f46e8f265e9b46b9f39b9fc2f651883ad2d33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1b0542aa1dfeb3dd7daca454ac95c7e
SHA1a8eb367b30c4bc113aac2ffcc440fb5a780fece4
SHA256e508e5eb3739f41213fcf3765c47d1d8c7296503e6a9b5669435d6b65e06fcfd
SHA512eff2e57baeeb8a411bec0f83340909d9edfef5428420fbf68185ea599d84e285633bf983dce8375e3d27cda6ee9dcaf27da1008cab2681b1f78cccb866fec9c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54925a0ca5e7c2d9446616384fa99ad0e
SHA1609764b1e7b97b56594ced2874c4f7469955da0e
SHA2563ec75a94d0b94677937ae8923bc9307e4e83595f14cc2e035fb2b1021de7e44e
SHA5128dba5c23df47f01ec8cf83629d2f4ba32f45ac2a2fe6e348c13f642e1b8e169b93094ab1bb05b9a1f731029f4c784eb533f4db73f3fb4ea00f309ae1b58865f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5883316e3a6a1f2b7ee3d5812362e4e66
SHA12591e3960f27dd15f108e60a75667cc6325bec89
SHA2567242d8df4177450fe2d228f4292651394eaf603e805d3024e4d96a3875516ac6
SHA5129a298785e68b8b9e625055138c24def0bb9993b392c06b1439c77136a7cbf7f803c90ba811ab81b58ee4e79fbc346115b0243dfb9be469a17945556f16ae6aec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb8b180ea20359ef308135fdb284543f
SHA11a9bfa7ce4a1d3f93304465beaac6cdd58b74771
SHA256298bcb83c3e4d94feee773d5a40e881db3eab2842b0808457efaf2e6555eaf5c
SHA512334ca90db49680683e84ae55b274f11e3a3d0df8be257bb1dc9303b635d88eda2ec21a5d9483856cd7ed04e19d3f5903ce59ba6f345defd6044016b3b81b1b8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed65da7e21f5ad39f111c6a186de739c
SHA1ab7ed38cdaffb815239b6e68a04161e3db5a6edf
SHA256bb1cd09d86014a1fe31478fab47ba4c7828e308e350184527fbb8d99fa673aa8
SHA5122584247647d7d1b083f00625ecfa8656081f2a8ebe1eb5354447192d5bbdfd1529e8b454a203463fbebb6202448d7cca9baea74a741f742f2efe3fb4e14c4b12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1a2d90ded8b31753830501547cb6ab9
SHA13aafae74c8f60c404b4ea2230888d3dd8b247574
SHA256c843efbef1659ff32d8c06ed58d472d752579cd3bde214ed9df91010806df38c
SHA512ba53212b928c0d1fa009b6d5c3eaff028f6e3b2cc124ae5faf09181810e1c0232b57a9f5960f0d0adb834746bb528ee66593b671168e70704807c2d892bf3b4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e6a531dec6c1185a9346d773054de39
SHA175352fa4f0a529083e2dcaa9bbd43e99b96a52a9
SHA2566d70f15697c9c209f5654207345ec8fb91a09065ff76e7fdb8203a7db1da776a
SHA5124fba661193ad284434a5aeb58abbbe6c2a3be3fd06449267162accb6ac2e1d16df52a786320ab0c5bf0b825403fce22196dd3430304e8117b98550291c586913
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53fba13cb67ab82c0d1576833aa893948
SHA147c7005c0c1bff5e4b5fba4be398462ff7bcdd6c
SHA256f988d25b718b5e38abd3190ef3af8efdb59d7630b2ca38584f4d87427ec20ca2
SHA512968b2ced5f6f6fc5fbbf99967914148186e1f256ae0355ef50c35fb81a6a6a169f10f03624bb7a77c1eef86a5ef80044dab745f0a73de73bd7e7c13201ce283a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eafa25abcbb32855142a9b4731b931e0
SHA1b499aba49a6c4164c980710a438e2a2251394e92
SHA256912d7cb03f727a6b5a9205b7a47a98541dfec20cdb470b97db74d3ad1f50ca68
SHA512c97f1fad3fb72dc97dae039191d955e36a919efcf6097cbc0a331aa9fb7781cd8ed20a2a1e94c16b50e2ad59b208a189d7413ff537777ba031412393797cafd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f50d3d6cf2d14229d54f38ef02605820
SHA1293b9675091632141b3a45130b83cd26519d5b9c
SHA256157e65f400da2e02f4683c0f1dc56713eebb103e4c3d94c003e1877e35f1bfb8
SHA512e0a6bc209d91d59fe89d0f5505da47820553997e75eb0236b8e4654fa7becace1a134602047981014250e2ada67709f9d44084e0cedccea5b20b0633ffb1cad2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e65b7c2765c1ebd468450213ca42d94
SHA1388487fa6a4807e63eea9373de517be3d4063d54
SHA256f444fd3b35debd70d7031981815d34a79fe9f02277ac97f93d88efddffa2fe97
SHA5123f5f01e7eac06e75cb1eee9243991c28231b4af75eb036abde09597fd3ce34e752a85a47a476ab14292f7d88188a6d4c47880b0d54bbcf5f8ff863a984aec159
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c64f88462542517e84a28d6d1a7b8dff
SHA1b2efad5ae376a78a2d616554dc2de952c8578c8d
SHA256619b08a3d2faa555eed5d762e090d417774725cf85559a487b43e332c04ee316
SHA51272744757d23b2269a21752a708a04fb7e055bb77f7e9e72c21e322a6f6e3d9ba4ac2c2999c2b75a54d50b32f5a8e63dba8cfc9b2f0c91a38ca2786aafed86acc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58968b30ed95ffe9a55f7b424b1b925e4
SHA122194908b69d8761190cb7ac2261d7a683c314a5
SHA2569ea3a692f2a4ba6048abb5f13b9d6b2903dea3420af443aa098c07287eb3ef78
SHA5125fcdcec5f2d1afb42881fe0810cc86bffdf2418e3e112a45c462389ddda61c00282309b031f90539dfd738f6264e268004ac1c95381a4a4ddc2a48f21803e6ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50358125c9318260603d0dc282b8a8f8b
SHA1d986e53631baddc4a616ebff65108460a6f19f13
SHA25691b4b5e70c61a5f368a1e743917b70239f8a6619c346d8b4f204b5a1d5dc6877
SHA512cb36fe8c97e9f2b9d5602a3f6c9a5eeee94dede35a21357712203ab0441eb361098d27c86e23a601dfe64ea61f16fd5cd55cde7b03496017d88b6f77d9d0b1b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5650a7e816a78b73adf9f820914740c62
SHA1933194a2c482209e02957c207c0d6a3900d167c2
SHA256aa652b486135fc0a086580238035786b9ef517e342134afa56b1e3159acdb3fc
SHA512a5e2bcc4541a4b1097e9d14943e191b3bc800e188e20cb1df0ac11beafa6565a07d512b143043fa8cd9beb4dbf6eaa25f9c4513660a4902f2c45d0cff1941e79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532ace0c4931c20f89156778366982b81
SHA143bc239bf832b5aca83e8180d8d87b05cc8ce2e0
SHA25698acd3f6ed423288d6ba63851effca90e243e54fa592df7b9b79663c97ba70ac
SHA51274c5e81d70e96db5a7765bc6db5e5892a343a7d2e1438b863f2980adad7e592f00d63b684e2264adea5c02b76bc1545c2e29ca25342f084d42d9e5305fde70e7
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a