Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/05/2024, 07:24
Static task
static1
Behavioral task
behavioral1
Sample
11ab1e6d18b178ac676919f12d604e3d_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
11ab1e6d18b178ac676919f12d604e3d_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
11ab1e6d18b178ac676919f12d604e3d_JaffaCakes118.html
-
Size
462KB
-
MD5
11ab1e6d18b178ac676919f12d604e3d
-
SHA1
95cb0e1b9c4b3eb42910dcbed86902f6b8514a7d
-
SHA256
de2103568d71498146eb02c6407fcad1f1f281fe7d546bef8e16b6012e474a2a
-
SHA512
0509db256ae058202541edbafe33de1c7fe9f70d21a1e1603819b717471a1534e10bf78a738132cee58e811ac5c8339bd35467827654c55ee1c535981d2ef350
-
SSDEEP
6144:SssMYod+X3oI+YfsMYod+X3oI+YOjsMYod+X3oI+YLsMYod+X3oI+YQ:X5d+X3d5d+X3k5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0ccb633f49dda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420969342" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5B2A39A1-09E7-11EF-8414-4A4F109F65B0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000183448a1ecb72cc7bbab0bc81b2dc2027391baee127024c3f3d6bbbfe26681fc000000000e8000000002000020000000d165d9b1974a5964bb113b862f373f46a8a52a63a5b12aec19be0ae70ac831c5200000005ffa77eb8dc7b1f90502e7cc11aecb08cfe3714c5c0797639e1e05865c56ddb2400000009cd8a059d4f8bb22da73ff37965f0074c07854c33aba193dff748f6e849d5450aacff693acd7bb03e377736cecceacdcc881d6e55687c598745bf13ca2e77435 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3000 iexplore.exe 3000 iexplore.exe 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2200 3000 iexplore.exe 28 PID 3000 wrote to memory of 2200 3000 iexplore.exe 28 PID 3000 wrote to memory of 2200 3000 iexplore.exe 28 PID 3000 wrote to memory of 2200 3000 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\11ab1e6d18b178ac676919f12d604e3d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3000 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2200
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52549601dd669c721b66606465dd08906
SHA16fff6aa143660c6076a0f6571387e5f4a70b861e
SHA256a42a262300a6b9402572641f41455f06f6e00d3661e4b54a5c25e57fc6c0573c
SHA512d093cfe00aa1c76106d7a70bcba35631de8dafe3329a961e79a5934b0d146e30b61f73af4ced98dacf4440ce8242c66d2181adfb32fbd47b7c5366b8c2631bfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d8f51f088a173a4ef59c75c778f19f7
SHA1d136ea0aa69ea98e6e492739204f1b335e1bd0d4
SHA256defbb494903264a041fe697f3393588b1272126b01179407093dcbc82fdfd142
SHA512a66176188c2241c936578ccfef88e17cdbca345c021903a718c42448124a92df9e96424ab3c1a5da99430a8534d63f4acc58207a26249a78bc008d6fab6683bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538bf1381f095d59af6ba99d907391fe5
SHA188a43b1b4542b8c564be4d6072a2692325731c7a
SHA256b16a381d9c96ed7265fca50c886f66d49208473e28a571ef08061f8d343cb884
SHA51235d1a65fac502d8a1c0a1f4e606c410b8344939d48c43d064178d782cc50be03754fd8955528cce81f61fa0733b2dde0fda1fc6c6fc21a6ad6245a6762ed6ed6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5978747075b01a90b8ca334f76dd819be
SHA1edda5ffdd78b474473145bb4cbc6aff244e37dea
SHA2563e0106b1ff8716e275ef0c122e6db66563dd28f9bce16cfbdf9e20d1346a5a17
SHA512bc7c536dcbffb03ba70dc16e1f15672fce5c79484e86ed0ff8d8f6aa6d2a70171041295ee3e7180a82509ffc9dce0cda2e3b191a520a8ed94bad52105b0d084b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504fc20ff7441fec31d226d69ac4baaf5
SHA14a92a2d04d08ba876e4e191ee3fc3f5c7cbc88d5
SHA256b046f62c34c3b13a63411b82b752286a6895be37f7a715e24b9982f3c1ab4a11
SHA5128908ccfb4f1c48f6d20d3e87d324b483562e9a8bcd84f7bb1919427ea0c81ba3d837aea9e36e4ca16548c7b232b9eff1050e6b3120562b68ca306bedf1ab375b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df1a3d9768b0dccb7931a6a26c03a00e
SHA1bced95740f8c434c822685cbacc9f3756cca29ce
SHA2561278be8ab8ed93eab5ca95bed7f8b757c0448dce6855471a4cb5454a40f6baad
SHA5120cf4664af154190a39683d0c1b846d8d5d4b54c81d087647957b3882d232f831365298bb12acaf1d59e281d3b85f88bc44fa4b3905a5440c8d911b96f1ae0388
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb933fe09b394daaa66ea7fd926212fb
SHA1d0bd866f7115afb4ce821910a5a72759a7c83ad8
SHA2568345463ff06a0a2d0104cbfb2fe82c9fe64aa3baa6e171798740cd3d837bc62e
SHA51231e982ccc645664c58cdfeb2225bdd1ad28fb973ab021f774668df4490cbcafa3f6d043233dba04462228caf2bbea88455a312d5f7edf23d6e40d487a818830d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8d0e88d6440e398d7a73891f5fb8ecc
SHA180e4266025f1af419642f35c21ae69083b2470d9
SHA2566b142f89ea5daab7d15b02413c7dfef67aedb37ec3a6166a12a8a7eb30851e52
SHA5123db9ef37a4cf49bc26ad841c2c6b0d9b06804f91ae4f276b50d6cdfe922782e9aee38e6bd450fc565d357ff7cf90212596ff7cafb0f92b3182383443f2e1bc0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58094dc3d51886d3f01a5d362ab24b17d
SHA139a66caeb148cbd3d1e1f5892373aeca6e0b3dc3
SHA2566af2b9c63a0daa67fb78520cb0158e585a448b43075c0f9780027f7b0de8e174
SHA512b6fc8cf9a9fee712b50bdbd768e7da4b5c777934e2dca680a26b1539257f9ee3c2e4ef6a7a00ee784c27b3465b78a9a8f11c324420f11a32d0ded2df7912abde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5244fb83682f5c265b24eed603f0963
SHA15f09535fa069de45bb241f65a76515bf06bf7064
SHA256f17bb34d3b3bd004607ea2162bcf8e74bd955e0e794f3f4f5d319a5fc37969bc
SHA512bc848d365ca67dabfc879064f9636ab8fe361d89ee494ab4e4607ee414b857cd0f760dce602fe9e9eaf6113b469128eab7e7d932d47d649882062c543adc2b4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce40b2c7571b463771a2f7b0a3e438f2
SHA1326ed1d578fcf2d5fa26b40d6adfa1c0ca69cdd7
SHA256883a079e4aeb0d1cc022850f57a4a04bddf7ddeed79aa8f8b9f6a1ca4d9ae204
SHA5121b1108e06b3fcbb26224975bf2df10b264c3b7825eb1cb24669bf268863c3a5fbe12391429723b9fdf54d10969a8bf76854b019b6858c34eb686167013177a34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5156d8ed363ee61bb0e4c97134cd974b0
SHA1ec5a4df87b3c703b50d0129842855a1aceb9b769
SHA2566b15c4eaca4ae33e1b9b705e60558ee78372cfdd4c0c796908e91685e985e08c
SHA512e87e6206f31effd915ed5dd8757c7a3f7fbb0c31d9c2eed45a8c3508e490ca6ce30fa30823ad14772549506254e6e65dbf8814eeb094b52edc250a1dba13ad43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56310ad415210e3ed5253854ada7cd034
SHA10f21b902e4b82ef4488ab5cfb8cc9d304002c070
SHA256cc229b7ed3c0c4da7a45c5453cce3352c7e7d6e6e93801ae7154fbd8d1c2cb9b
SHA5121dfab6c9b67cde831836262099db47c0046bf6b16845300b53c6ba8989992f4a2fb1f474361a1663d06953ddba7914b9cce123bfa904e58328d23516a890a1af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58385cb706582a094cd5002d8dabc3858
SHA1dbc7a02ff0b16f854b14015d3f25cbaf55463135
SHA2560b78b687573cac52c0ab462a8703c454b71b248aa112943573aa01e97ee86055
SHA512181d3adce7975abccbed3384fadff5d1ddaef38db99c756f4734bb6a04c690579680b71c29e46d743acc48ecb9614469458094ffef3aa259fbb5b6748ec2ec9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ac592f88affcd88e76d8332ff347a70
SHA16b04f7b3c7943035e54d09b932bb25b489644b94
SHA2566bc0cd240004ec996b372666cc98bbd0434ea03015c9aa863e753615b1e31fca
SHA5122ebf653c1ddfcb6a9a5a775346b74562c92c7c1c127d47bdab3fed7af60a17284eeeae96fcc211ce8307f90643da3e35c1f67420a3c3c68adf106fb236c81d49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e95fa86bbe15403f1adf169f3c6a9b7c
SHA1d8f13b954a1144650b21661d18691320238fd47a
SHA2569e529d36a49cbb80f545afe1b56d4e44f20bb0f365ad3036b0369c66d91ceabe
SHA51278a531faf835b52cde44af942a5c9a3536ab8bff01a239ef36b63a2a28d026a643a1083bf4991b54d7c809a59f006e7873b6f6d02b67bc9c154dfc854dcf8054
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55cbc934d5d3cae893b5bd6beb074f8a7
SHA1caf3ef098862a3460f3ca82893532b4a32dbd450
SHA2560b40a04bdebb33e763b044468103640416d4518526bd2f89200c8f7f9f39cf05
SHA51246e19c585cb161fa4c3544e16431af891179b01160c6ca53c3a98ad2bd1b979e15b4b3482f9053c2795406ec97baf110875ccf0f07b25dfd818acb33206d3f7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f53d5b77b0a97ec8e08dbdf4d95910b
SHA19acd49c806c8d2ef514618ca2b435c69636d831a
SHA256b2c150644c0435b035937dc3f4a14300bf426c02ee3f01f7238d2e8544e4f5b9
SHA512ab60b03ef4659bc22039a5d255c32c5673885daab28ee179702c7c7178da63bea50e56857daa851bbb2af9dec1350593f4e7c9bb32eb12f10cac44a98eaaa4a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588a68a0fdfd62bd802ee04e730bf909f
SHA163bd6b7ab1528345188d77f22855005d87a8e0e9
SHA2568198b11e616a5d488ef1592b9308e67e988acec8074dc7ae047629124a0406ac
SHA512eecfccabef9929b9d7e31996e309891af7b9895fd22f4202554ac531123f3c83c6c42388a080de35e5bb9a4766c6870e16499166cd0b063cd79ec46bdbb5a1c5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a