Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03/05/2024, 14:24
Static task
static1
Behavioral task
behavioral1
Sample
10bb6ed3b46db496c6f05653d2f38d27_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
10bb6ed3b46db496c6f05653d2f38d27_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
10bb6ed3b46db496c6f05653d2f38d27_JaffaCakes118.html
-
Size
4KB
-
MD5
10bb6ed3b46db496c6f05653d2f38d27
-
SHA1
f5cbbb9125c9e70f355c6b17afffa619945590af
-
SHA256
65636b8e999246572f83e022865e48b0d462e55eeef195f45c23d5677f6251c0
-
SHA512
461049d27d76c25ad23682e6c62249330c56ae1fd66b72f08db649cddf5f5d5496d6ad1a69e4ea08b9cd76335df5368c105c6338486a409f53dd4237f1d70430
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8o98vmE1q:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDY
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420908142" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0032a1b1659dda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000aa8c7cc9b04593ce398fdc980136a1b520a98c285c63a92d18c0fd5344afa21f000000000e8000000002000020000000663d214e1d51ac02cfb7eb8a08c719f9534ec92efd7a301b0d6bf3dcd6d2f878200000007898ede84804fe64f51556a9dc88ee4fc493c564c287a2aca4a8f21435809cf140000000a509811ad0b64c4fd6bb56d7bc1395b7a38812cbcc0567926216919268030eb5d93b7ea556426746e4d58f51a6c39c4d56eb2c12391ad3f7a34814fa2dcf875e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DD1AA651-0958-11EF-A304-E60682B688C9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1812 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1812 iexplore.exe 1812 iexplore.exe 1700 IEXPLORE.EXE 1700 IEXPLORE.EXE 1700 IEXPLORE.EXE 1700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1812 wrote to memory of 1700 1812 iexplore.exe 28 PID 1812 wrote to memory of 1700 1812 iexplore.exe 28 PID 1812 wrote to memory of 1700 1812 iexplore.exe 28 PID 1812 wrote to memory of 1700 1812 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\10bb6ed3b46db496c6f05653d2f38d27_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1812 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59556b96d0d35c16b459521f516b9a836
SHA1eabd36e3911a0d3fdeebd9313a25f9799072efae
SHA25613a24ad39c5a5d37f8be745a3d427dfa4107be5307fcf6b32ee819cba9e6060d
SHA5127f70e42c0c7e0b63c475bd729af51dd974bf29e182ec945bedd1a05fdb839a556325b4e536d5e27e4993953c911221513215b760b5fba12359f2ab745383edd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567ac9d5d5ed6ca916e40b351dfa733f3
SHA131ec6dfbec556b311b46e786010d218dc31582c5
SHA256da0099a5aa41ba605a7dc7d518ee3548d58ce3aec43f48f53ad8ece7535caca8
SHA5121e972b9bca396c7bb7716877b2ca73a71b0954f7481872ea6bc1a31b6d9bf56da93eef90b6002ff400a379f4a27c157733d59b0fc84dedd4f7d68b9d7bbe5eeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50140860208f9a959dbeef2a2bf3cca31
SHA1dde8efa35358289102014f37b1792d542c74a381
SHA256c9eb01fa476a5e4d21c1559fc5837f154a7cbd558b236bcb019427bf9c078634
SHA512b1251dcd21b034854fb7a5da9af71900a439cabe0e08ee2707536d786f2fa12b4ca32913d10150f2de445b02927cb987b935fad26965f9f463ff866265988edb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56cbba656b4dc21f7f1b24a9562e3654a
SHA193ef27148430aa74047a793000389d9c9a6e6444
SHA256bb47ee243d22b5257632716dc95765205af93d86b645adf85fbd4901910a91f8
SHA512571969994919af63e807d85fb34304e870a1ece525bbee3d79048bdc250ead901239949095f5bf50ac6b39d16e0f4c8d511d213f88204b9b09350a5851ab9712
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51609e32972aafdbe9a6abe2c4b353ace
SHA1c1e22831c1a92c8479d1750dfcf2bc54f3e2f8a1
SHA256eff59b3d5d4b37cb4411605e945f369695af02ef5a2e595928dfe6afdbe824b5
SHA5125943842acafe99362c90a4e0290f24fe92b0bfdb8034fd12bde85ef3983e8993d40116f74cb45531cfb886398527b298aec72ac3ac411996f2829142590e1bd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6828e51f2311f3280cef2cdc3125c29
SHA1f060bff8936db9d8f0be0f3fd2fd8875ea34c755
SHA256002ed019a27d63d85b477275b3d5020958e95c58c915a59dfb92fbb9949003bc
SHA5126dfac50fe51c46667a1ee4ae4511d2e949b060486023e8ff449e0f5bcc502d70775343f3f84344cb1439a883d9d0bb3bbab0a0cbc1e2b7382496b6250cd5caec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f916e1896b69267174151bc666348a11
SHA1aa4512e6d5876c04d4306a43bfa8bbe9c7413df8
SHA2569754413a2b1614de6951dcb3b2441697ef32366cef5eac3a16452a16e795c13f
SHA5124b4ae1f7676bdd58ca84c75dc919bdea32a3627701b9fc35b50fb3ef42d0844ab0d0efd18b38a40faddba8222a9b4989eacede31d058d5d4ad197cf607a74318
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df746d6efc63ea0153fdc620d74f8fd2
SHA1a9dca2b8fabe3e3ad460ecc6d36dba7c28cdf255
SHA2563c82ad86ab4fdbf671f252de772490b48381ca8d6b2047ee8dec8c67d40b9556
SHA512ece968fbd8e467bdacaa68db548251d0748a9e4df05ce4474acbac9c353fa2ad7ee14c61a2e20e67d579475fc9702461ff2a8ed9c4b348fb452799d64415f8b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c93b96eb840ff42fd760cf4448723b2
SHA181eb06a304312deab3a38584aeca0c385016dfb6
SHA256f5aeb49d3bad076c6c39fe16dae5205e3ed5eb4fefffafbeccf86e9ef418626d
SHA51239808a79d00b14c31f70c500d5526baf0acde192167533dea17ea1b1ec8ae268f8fce08d475a291150944eafa8e01cf6bfda4be8ee957c175da5aa87c5151053
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5929c0a649e2786367b1b45936e04888c
SHA1eefbe051b4b325aa680525afb5509f31185ce319
SHA2560db8ca84ac6225cafedb7c74cbe02d64472efe76aa6b0817adf69d0b05b66190
SHA5123c06fcddaa52b848911aedfb9518e2762ad762a6b2cf0752e21b66e9ebfd0f4c47bf73f0990b35f0635e93c452b963a7278409080bc27f900712eab937ec6b31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b750189f470614307df77600a5e664d
SHA1139e4d20a364a6f2e8cae87352ca73658447817c
SHA25663434998ec356c90f2a713fdd6fd60c1a285395e9f20dcf540fdf8e5258cc26e
SHA512dfc7ff0547cd0e0b1978255de1148ec5805d92adad122794ac6e978211cedea56cd1fcfd489666b9619a30c5922f213b5f8ee29b8e7f577307a082eb797f427f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594f85f03ef32ea12e1a2e8be6f30e58b
SHA12494137bfdd44f0b776e95f72204711be9d12ba0
SHA256f7f06c6869d74b6ee75c293d6a46fb205fceffa94d8142d160ce21c6350b2404
SHA512c2b9f416835856f3a851765251fae76245832a196d2684c3429bf38147e0ad246c09d5f2cba5fc52cd566920f515742bcb07497b28fb39b55ee6bc66701e6abb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50cab01385ede44ca522dcfd0367b12cb
SHA1c31322a883384a981eab34c23fe27003fe19b9f0
SHA25691e5a9ee3d5038a984e1ccc513565dc535c6fbc8620fa16ee0d89c079807d7e5
SHA512d8bb5327c8c3d7a0c9cfe8a0b618074efc3291d25246dc3af6e969db67ad7d1e914fe4e997e046cf88f0e9ace6db38f0e576decae1e47c662f5b8a1e3a8335cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c0b92e16f1869ada8d5531838c17a06
SHA1ec909d5e88517328f17d46a4d6d3fd59f76b6a39
SHA2567ad6a3346d53a0bab36d4d18a560f888756da8a915ad652fd30f98965b71cdde
SHA5122c999ee34ad7ee0fe7bcd42f8a7393cb8a7128181d8c4c111941e9dc43a0ff4546cddb6c3366fb19ab703bae790f731e6332c996da33c43819be249a8e758558
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f76672d0f5bd4fd04b6a2ad0be238620
SHA134fd4dc7572a800770967422e6a2bbcb719e191c
SHA2566d3be6653a2152aef83e6e2dae4a97c13023049ecf9fcf5e27020b7d46a703eb
SHA512aa4e2b30c425fc3d7efc95b92fe841afbcc37ed1aca0fe187b9b3e25fef94b72456a4a08df12dab8ca54badee8465a2071e318cf0a8b09b263156ef9ef00de0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba587c12fda3caff1ca0363de72373eb
SHA145b2f7f8f16db2087f9c0f85e27db81c82f73cbe
SHA2561e007cc72ca2bbae064482e105089ed454e003cd47769f797dcd9c8e17507475
SHA5124674c8b458ffc4445767059d2fd94f235fad775c5c53cea13036a5368d6733cf57e9f54399795fbe9023c4c61a4d8abcb3af926f758221fae8d36ed5109e2d6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569b4422f956af2b4a1658a2307704bdf
SHA143df496773ac9a40d90f70f794cb2c995f8c0765
SHA256f50786a76b03c9bb4f6739a35b8fdcb69145744d53391a904435c5a162fa182f
SHA512506fe62c2de5f7c9fb427311693d8c42d74c69160b384416482cdbff7433d745c9bdfa125c9658f9bd50face9d598718a9a8a21e93e457d13e640681a8f9d3ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544fbb2735e04f7f10e38d24c9a5f1844
SHA1998856bd89f69fc7faeb6e93bf8b7044f4706b8c
SHA256c2f3efaf6b7bb78284b87ca9f952d8ff2bafd28fe5269e21900ef0bf4960192b
SHA51298cb470258887731853d1c6b1f51892f59e62fb1900b1bc03934ecb7c1e8a3f6a64014355aac9a2df758d3e64e794cf377f3fb67a8d0390e6724f7f4d22c0d85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ccb8d2b334d31d884c68c4099cdda55a
SHA135391d6000ceff5e2822d1ffbd15672b79390d30
SHA25601e291e498ed69d43f290547e9df69e91e245a65dc5ac00e8c9a976b96edf2d2
SHA51250b601b6cfac62520c3d269486f3e239a0e2c79f3b5b6fc1a4e331f1fd1d9fd8cd2c48abe17f87722df5cec4fb291c3f92c51658470aeda1c841949b690c2e9a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a