Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-05-2024 05:06
Static task
static1
Behavioral task
behavioral1
Sample
1192000040f7c704fa7e070e94585a7f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1192000040f7c704fa7e070e94585a7f_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
1192000040f7c704fa7e070e94585a7f_JaffaCakes118.html
-
Size
70KB
-
MD5
1192000040f7c704fa7e070e94585a7f
-
SHA1
169327f33e24e2f24a5fa2663b34ea20a4d8a140
-
SHA256
603644d5ff8cf0b5d26e5df0b0d51b9205126564110e8ae356367b27e92817db
-
SHA512
f36ae24bead485f66e47e6610f573a77eb5766cbee795d5e1c0ecea2ea704a3230acc8b9f548b2082e259dd4a80ca535792ba816017c08670a4cfa8ce0c87f6b
-
SSDEEP
768:JiigcMWR3sI2PDDnd0g6lq3eL16F6G6xcoT2e1wCZkoTyMdtbBnfBgN8/lboiGh3:JcZ3K1YVyRTTNen0tbrga90hc+NnhVJ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000c01d76fad8e614033cb086d45d2f1f29256a1b9c9f2f9c1cf58fa6be19880406000000000e8000000002000020000000ecd21f21f03d8f6a90680058237d3f6ca332d8287bfbcf3717fa37f7fd74d1152000000024bb0fa7f84f324f210af62eba8ba9cce09e91db583b1393c638557b29b00b934000000017066b9925755f0832786b7d27b43aaff3f2687ab0a3fc5c11160f26ac67ef94d19db1c74637e0f6451783e650fdaf3873a8789bbcffd56fd4e642311b5427a1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420961071" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1090daede09dda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{19430CA1-09D4-11EF-BAF4-4AADDC6219DF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2872 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2872 iexplore.exe 2872 iexplore.exe 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2872 wrote to memory of 3012 2872 iexplore.exe 28 PID 2872 wrote to memory of 3012 2872 iexplore.exe 28 PID 2872 wrote to memory of 3012 2872 iexplore.exe 28 PID 2872 wrote to memory of 3012 2872 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1192000040f7c704fa7e070e94585a7f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2872 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d324f641b68d4249c0c2d8ded9bc75aa
SHA1119b83f6ae051f54016a213aa5d04c6e9473d179
SHA256aca46a1498f1fef082a8b537d83625aca584173c0fe0efc0d9f9815c148a561d
SHA5129aec875e07c564bdd427b438d5da8bcd6f40d171854195176b11e06114c7a5bebfd993fa81b49883ef99189e56c4c8bef669e46c7719ca0b3873b4b49467fc8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9a662e53760cc1e758a496abe51f6c3
SHA13e9d12aa3465ab64047fff9d6deffcd8446d8397
SHA2568a2fbf9fa652f5ec01bb912d32196b473d5676e4c326df7b857251dcc3a3121d
SHA512fe327024dc27fdc6e59d79f85ec9462336ca31b30c76f23759f9068ace2aa485326602cda2b880dd2677d4fdec976b43427e57e79caab43a4ecf09b53fa2a414
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2ab5141407777f48f0cd222b9fd5a81
SHA1461a746fc0d9ff80f3d79968d4716e2078a80b9b
SHA2564c20a0dc77329cba90aff1fb7f807f0bb31aadba7a880c95e434ef6a36a3878f
SHA512a64ff62128915e1d9220669a1993f03a456a811e94b1c3462cfba985ad92d307f6f0e9946046c69e8b2d9e9352434c914fbd8d2251a4e48788310a400af0ffcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c487663c169c68b504dd7f0f9b969aef
SHA14dab746f1bb3eb747db9baaceea5a324c7038181
SHA256a3650571d9a42538c7eb60b6b29001ede7e6205a63be83790a6de16f4d1ee274
SHA512174e3ab416588b507856b5488eb44e5e5aba22b2a90fad4bbe0d3337fbabe9723491ba2d8b7731db0b29195386fa45276110b5d2e43eb8c07572b788cd93d2ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a69f3cc87121b204cb1a0e2f72461c57
SHA13e90e0ac805ac474f088a815d2d71d3f821338c7
SHA256a349503c23920049300cfc26f0ed64fe85af4e70cfe72b92a10f3e0e00676b1a
SHA5121e28a409cc4d5a71d3fa16a4db320362921e651103aa912a1e82fee4db8cd94a774c7a3300d41b29faf5870ae7290c7bdaf7c7955a8ffae02a914a7777e945f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef1a9fdb7f1c6d8acbee44cbfdb6c95f
SHA1067dabb180c0af7802b68985c26bd02f5e3c205c
SHA256d02e2aa770cf629f41aa7a9baf46606b2e0b2c77314b0983a196ed15e63e0604
SHA512bbad508889733060375250f552002fe6c7a0033d58531e0b0d51c2bb8e65b7363b685c557a6456d6a594a0917e756085066808b3b75f133a618e7066c646377b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5155a4053f8c3ebd0bc918a1d4d1b30f2
SHA15d199bda73dc449a97a3f932f201c6fdb5ef7d4f
SHA256214763d4fc6509349900f91118c7fd1562b4f6c5271aa1b930ec5e4b3be312d1
SHA5121009caa0ca8aa64147aee5358f7897ff41e824324e9fbcbe285013d9f111c6256e60dbb9d66d5f44ac4da1bb6f652c4afabc73dda547149504cf720cec0743c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5799442b65752c531cd83a591288abfc6
SHA16c26813f7a3ca624d41efca6820b668da3d0111a
SHA2569735d4ebdb06249585d427774f9bd6c8dfcef101d7be6e390d9978117a6fefc8
SHA51278c4f9a7f6b399e63872e04bf34554b66141659ebc64404f38d6912d32dd793e500b448f679664c4526a83d818e4b7b9c6f14d7d68e5a09df632bb7db55093e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f88ea9e705d10ef29ec25b29efc5ea60
SHA18a72ebbbffb9f8f6ff1993e39830a9fd35c8a8ab
SHA25652644dede3886412f14c2ff6e5b3dd180d6c5b60ea7503baede96a230bdc35d4
SHA512cd7bef0930fe561a566e97d57166399f3d3a2fcc26561327b68d5c11dda9f823fbf552959995cb6c5ceb810e8b8b360e22cd60d2d436d42522eccf931dd2c867
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51fdc7a9c34397328e5e460e6091d0421
SHA11cbd0fd72ef749b570644c878c37f0baacff5bb7
SHA25604fc2fff3a0625f00384fd72bf8a01c55b73d665fc00904ef4f1649a42bf3b96
SHA51234783d9269b5c3111ef441d9af3e15a23a0397414405486ef11a9ee6a7f5de43c86e818fdf11f29a15db10741ecfcbfc21759118fc1f04a60e39c9cad173f7bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ab49fb00e98321d9656f0d353bf0cb9
SHA10661abb68a4b9ace76ff90791cc58f34025b5c7f
SHA2563aec2fdce89a66225ac66f7959b1502742457cdb0768f6f95352c4b90f68926e
SHA51282b80f693e700302a74f3fd607d5a1b3368a681e909ac09afd0999d58daaed1170fe1b5881f428fcd32419dc20fb4317b698e1f8e59887e804e5c473b37ea58c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fc78d15463b65293db7d68f1d0ed6fd
SHA178ad78b3d4e39c132055eee42393ed4e0f08fc43
SHA2560b1a2a2655e02efdb3716b10fc77f9f3f06965faa14ddce74f1c44ac24fc7d61
SHA512acefe39a2574dff633c5bb51f6a15962189d80c43b2291e76705cd511dffc3a1f7eab67616c81da2f8254a81430a82e7b40decf76836289e3ad3dc7cd88569d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54cf2be368aa01904ad3cc27f832ae180
SHA120fd1c74a24646dab7ceca0f7ede0fa0d76024d6
SHA2563325a93c8cda293adeaacb0e0a3d8cce33e0e8706e21c5cdc4dd95f481e34727
SHA5124109f9dead87cc91b70e10d99666da3abc02859f5c9f7efa43c32b7ebcc09ffac8429056c9f36c09a1ec1aaa38abdf359d138f96ad813183e1b2ff44ba505f28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58671a66ec0ed9a8422aeac170e76daa9
SHA18c3bd54173931dd77009f182abc7c5de8e5e40d2
SHA25613ef12f6dc7489f5f98995745b442c654336591f431515a9184dd9016380c594
SHA512e55dc7d9a04682451fed059b0c061ac611e3e62bb564a8c4b40a1530fd81525bc6a5f1917d569599b31ebf5e22e3295583a6791330eaa762fafa9ad8459e2e1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5475ac5a5982336348255bfc69db9b243
SHA181bd06cde183928a3786a40d404a5ab906c51313
SHA256e974666498a7a96a11aa32ad1ad8e782a07dfaea1780e950975f0d4ada1ba931
SHA512f31ac00086314e84e0ccff93e289ac25253f4601fc2db195ff5a5805ecd4bc712852270e3d91a42b4bf84adf4828999cf24f5564e1e2b9bdd5fc5018b3072597
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516993a6a23ff366e0cd0871711f7cddb
SHA12df3f19edcc4cc814fd6bf6fdc32a90b71739096
SHA256a7c6bac38a0381f3afac3ca908f8af3b0e79488635207b999defdb9b479cd0b2
SHA5121d5bf08534af68cad9f0f18bdcf84ff9e3e83ae94139261e17b6b88bafd69a13b634940bae79cd8c76cbeb07535c4fc04b2976039cf816bc18d5fc218e19fb6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6e8b1d560dc94f86f07153f5519935d
SHA16d0d04361efd4ee1f03ec7548867a739cbc27df4
SHA2566405693eea9fe4f67959dad5d42da4b1c91afc4cc12c6eb0ade2d00a380e792d
SHA512956f06dde6e883779fd6ecc15210803e5b25306888f1a0446c98989e818530efd24bea4f40dfe4970faf75ea26c7abf7cfd09a290297cb09a66d5a0e0caec532
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c379c584e0c5945b79b18320c7152f2
SHA14455f090b719c8c75a4969e90b8d3b2e47133770
SHA256c8ae31f156394ab56c7612fc2ea70e755aa20ee80cdaf8ea7b792d5ff7ab68e5
SHA512269c5f3613cd42da14e6230560ab1baba3036b0b4666ab689b82819e63de9a1c94643163fc4c9f67e512d596b7138df9b3a80055a488a7700750ef22b1d0a24c
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a