Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
04/05/2024, 05:03
Static task
static1
Behavioral task
behavioral1
Sample
11903b017c4ea5a05d9f40a72ea68378_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
11903b017c4ea5a05d9f40a72ea68378_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
11903b017c4ea5a05d9f40a72ea68378_JaffaCakes118.html
-
Size
30KB
-
MD5
11903b017c4ea5a05d9f40a72ea68378
-
SHA1
151f96c907a695b956e8cfa61e5bd5814609bc89
-
SHA256
091c5c5197be87f3ef13b9415e01dd71bf8742675b4ae1f600c5ee92535b878f
-
SHA512
6100887a6af8be5f659d865cd7154a5684d702c8c69d1ea74bb9eafb0d79af8deed316be656c68b56b33d238f34c430f1c152dc5cf40d384c601860020dd7c88
-
SSDEEP
192:RcroZJcb5njv5kXInAr8ELnQjLntQ/2TnQie+n0nnQOkrntErFnQTbnInQ2aUoeQ:WrovQQ/2orsteAQxW
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A59A3941-09D3-11EF-AD30-660F20EB2E2E} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40f14e7ae09dda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc2330000000002000000000010660000000100002000000001cab6ae417b8a92ea4351fd6cc75560a3274591049623e73b387e42557af2c5000000000e80000000020000200000000f0d4adf9d777d1ec4a1f24fe0470c2243ac0709a10bfaea3f4a7b6c1d602ccf200000004eba519606f611b9cd71b5fb1063ac66f559464d8a0b9673cffb299483cbcf6f4000000042b699bc3e13b2aba910a79dc65be1ccb0823767427de38039f92fd25c552ae6896a212531a67e8f8e21b55a8afa9a7d6cebfb5ecf9d40179729698bf97eee4c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420960876" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2072 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2072 iexplore.exe 2072 iexplore.exe 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 3020 2072 iexplore.exe 28 PID 2072 wrote to memory of 3020 2072 iexplore.exe 28 PID 2072 wrote to memory of 3020 2072 iexplore.exe 28 PID 2072 wrote to memory of 3020 2072 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\11903b017c4ea5a05d9f40a72ea68378_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efe5fc6feb7e9ab5a439d0067a6a9d6f
SHA179e6c67003e548b6d9bc19301d417a2c3abf6871
SHA25647bcf705d6eb4e222945e69ecf21d687cf7603b98e0fb72f1850ff1fb902294f
SHA512a546efc1ce09ae9bd489f0853c79303b4f581f346e40478b51649aaeb7efd6b562c6197f304426d578333fccbd93425796c71aaf5904be91fdc39ca086137a5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ab1e0fb118cd9b4586b6fd94c55712b
SHA17f83486cdfde98eef64b3c0dde59c8f0bc0612ce
SHA2569643459c622d9f593ae2da281e099c8031226793c9aa84fb07f44ef3690a2ec4
SHA51262ffd67b029cceced873c6e02bfbdedb6cdc4087515b8386c1c07608d22a11724387890b5041dabec2bd0f59e25f34b8f031b5aa00f9a2e14ac100c2ffc26914
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54eb51db18150eb342ab743c2bd00e9eb
SHA173ea1b20e578dfc73e2868d78e5d56a13ff305f8
SHA25637ab5875f3a0545762eb456af219c80d00b458d044dd980d22cf7764442265cc
SHA512a563e36cd3156fc73637dcb4eace56499ea6d4c6b9a5df678ec1b08e5664d1f53b55229036637d10f626d8dacbdf1f83774b13ce82221e24cfb7deaaa395bcc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba3fae515775f81372909e33f8ef4028
SHA11885476f83b607355a9620d138dc1b5e2149acaf
SHA2564040cb44626792fc520cb4b51f839de2a331bf61b88655b0e6c8a1c2582e6537
SHA5124471e609fe11e6dc7246580ca156d07d6fb932ff87501fb94c4be71ad08bfacf20eae0086249f94d55ae27c7d006b815ea9cca01b2f4037d6c4090e6e8b51346
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510d5af3b5f98b401141c20699f5c6f6c
SHA1f6fc5a50b44ed11010abfb5bb849cc508af2c92e
SHA256d968703a3481dc1630502973a41df3e3280a077558dc6194954be48b72337b87
SHA51277a959a74bce668c208a3a76af01a8ccc238c66fc713a9804fe51a7c74da36ed6d991106a27b2f94d867213033b858ed1d6a98db97e0ea7f6301fd21aa8dc9b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523b2447c73193a42e9e665fa1dc826dc
SHA1943c70df8658f5f972e2143e46772671428d05e4
SHA2566af49bb725051903650edc72c8cd19d7b0fe63527d397cbd7d0cb569d336eefb
SHA512db807d28040001af070cd9e2342b52975ad044546d078d337e6ecfa3f893b787d74493dd2c771a99ae81447b3d6fbe1cfffee746f7c762dc227e70d7aede5304
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6eba3aaf2b2d8da6ea72c8b72b8914d
SHA1c73850818a5e8920d4e633bdda4d23963b626610
SHA2567fe19bde064cc972f735aaab16af00f1d4d8119f6c5852c136c20186b6f40880
SHA51221570dfbc717db558e2d578faa36613ec05c0d5fdedf4f77072e15f2b32d4f0d8f0f5d97e7fc248896e812ddc474fd47c3fb1812ed3f36ed9e407cec24d212cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc1b7294c96be8d9294a5ddd560434bb
SHA1a7caf9156b4d591672153ac4327e9e6760e2637a
SHA256532c5f1778897fa9e2d4e9596ab1bc5c8ea33a78a7db6f92d08542268b6c558e
SHA5123c3bfec45e46f635001b4307e44088e1fd2ebe9e5be7f89f0e16ddc6d1aa8e016198d8dcb0ab1a8bba4c5492e27fe57e0ddd0eb93b5daa7759dae7b52c69fbed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537f50452d3acb6d9ddb29cbdfe09ab09
SHA15736d480cfa465f266f05f06d6769448971c3fd2
SHA256948058faf86498dd5f8732966daa69148699768ea3fcfb284b77771b0e67448d
SHA5128b39ff100cf959b6f7f0e8dd9d477ca8e5be0bf579755e834a7bf776df5795015ffe11a5fd82ac5708b5abf27fb76d56fca13a3835cec61ae95c98c00e1e8fe7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bde12f024435ab32f88217795f74362f
SHA10a906bd9401fedd44e9e443cc5b7b35985b35885
SHA25693ca7e4a903fa27d36e204f100f64e2ba1930bc37935f1e8187d1b3c84a63ea8
SHA512d0c7bc6432ab0b418d04313f55ce0059be4a2e53a5c58b98ead1113ece35289caa79b20ce0325496f50bf87bd9bf35750afe9cab24398e0c12b45e4af7af01cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5189204bb57306a1925b5f5df331d7cb1
SHA10be621d07d4927b3525e6f7a3b2fcae2b34b05c2
SHA256655871d24fd2954ea6f7fe6f8d85a61fa179ffb0a04864bf4bb07881ee14c2e9
SHA512d2e36794f55b04fc7b03874b115f64f4ad038041360a450f57e0907022714c45117e2cb6874338acc944a009f501aadf5b45a116ec45855732bcb338dd5a6e02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570dc19c712ba57fc94ade4526514d434
SHA181c87fb58b2ff89c045e7853d228933e2fdd6f83
SHA256bbf77595e3762e60ab84793d221b58242de18d583c8bb5193415acb28912c5be
SHA5122c44b78ebc0601b7470e2ba8f6680cc3a50f8e92e27e6b1cdd8e0793a5e28151386e0fb83cd515a1edb9ffc271f239691559ae589f30e0f3d72921e547859951
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514c554705e86db9c92b056225a4cd688
SHA1747b1d9b4befd652a6e953f9f9ab6aa9eaa8e2df
SHA256c6cf49ace2c92e4bd0b55b0597e7aada0a35acaabe0993fffa164210c85b5945
SHA512de7c8f7cbab6c6b9f41b8ea8d3378d7dc427d13872bab586b15012b609b8132c90766cace431669d17a1c4b5b3ec3de75067e71d4037f5257253ca549091591b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547c38ff285547fa6d79c74dd92e83748
SHA1d913ce463f08f088ce329733df821d0ca342b11d
SHA256f27f9424db2e25287b17fc0d34dc05b6ad1cb130d0b057d33fe7eba7cdeaca12
SHA5120737d05785d72ea0677205f78dc1ae0c96cc059cb7e36d6c3777f0d756263afc45c1ebcf30c000c97e78e976064df33875c26411382ab96b3e69e854ce112991
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa6102918ace18af85944866991b307b
SHA1ffcc57c59acb550c83742a378d73808dc17b1e19
SHA2563435be85bf5b1948f71d46deb727a4d06b1b72052ff437b345987ffb936cd7a1
SHA512c45dfc1fa4f20bde4d4ea1781f9efe71faf71a4d546d02a804c46c4c1ea65d47c94182cc9563d613dedeca6f14db21ad8a506851df1c5c6c7eba0201dd2042bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ecf08ae81e6604ecca8e1980bb9a532
SHA1fcb740b94cac239c280b9f12fe2b40009edeb6a7
SHA25684396e78dbeea19a7e04f5a99484a15f3d16a88757dac13617cad63c16544991
SHA5128c242dfb581c997b9cc8e9f50764b2585ce4bb1ac9b25d3f8aa45e35f9e5bc02e5d6991b9e6447054604c99e5e5e7fec94881098502a8e66092660af57704c5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d637057b8c745010fb1d164e3af968e7
SHA1a39edc6a111b93e6a444336e9e0aaaa3905346be
SHA256ff32546cd029affa5b3fc6a7212b05633e4f4d022a706fa612ddd55d79b80ab4
SHA5126afbf5c1dd359a7001c23944e94cb867c2608bb090fae7a909ad038015ba2f04ee061086d95fcf8470c58fe87fc63db28d5687b46119cc6464f08c96c6051e23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9f2d5682c58ddedd99e371266b6102d
SHA1ecdb9c7e0054429a5eb24512c4d534d666fa4a95
SHA2568e5d060d2d0c0f15a24240ad61b438c958a9c7eaa8b6269cf66c68d05d85ea15
SHA512b11ac0f55745ff8c7d7845ada6a66f73a927b670ab2ede58ef00cababef5caa92345cdf88680fbfab52e1e8143ddc07e4a13cb15b507ee1197b3e7f4fcb0bbf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522341054ce6478561f273bacb72ed527
SHA1365a095ecc38a1ae0a0afec62d05fcd94c2cf69e
SHA256d647e3f39c294520e049a8202f861a35e56caea60d31e8a0caa028875282930a
SHA512362570c6fd141993fcb6eaefe945a2cd4bd85ec56cfe2686de869c81fbfd50334a2e8f52db0502542a74a4613b15c6b4ce3b28e27e003d1e886b6a345e6ba0c8
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a