Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
04-05-2024 08:14
Static task
static1
Behavioral task
behavioral1
Sample
11d75bd10f3b20eec77ce9d48e9eed5a_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
11d75bd10f3b20eec77ce9d48e9eed5a_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
11d75bd10f3b20eec77ce9d48e9eed5a_JaffaCakes118.html
-
Size
68KB
-
MD5
11d75bd10f3b20eec77ce9d48e9eed5a
-
SHA1
61113aa593dd6b9ce12b8437ae4cab8cc4ebe0ea
-
SHA256
8b9ebf1cb3686fb1707b9ab5a9e2da619e92100cf42706e346bf9b4929f43f80
-
SHA512
6ea475aa1d8d4ff83f99b991e12a8c50d39605db270de7664d02e7f973a77520cfe8efd4659cd77094244d26359e98da8b884597ca532519f4027b0c5c584af9
-
SSDEEP
768:JixgcMiR3sI2PDDnX0g6qz/6U6YHqHcXmYHGwoTyv1wCZkoTyMdtbBnfBgN8/lb8:JJz36YK8WYmNTcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{633B16D1-09EE-11EF-9001-CA5596DD87F4} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420972361" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c60000000002000000000010660000000100002000000028fdd0bff4406907d327eb11063a9cbdf69fa9e65d47a799ca44c5e02e519103000000000e80000000020000200000005e88a92b096a18765120c18552e72347eede2a1fb24d2d898b0f18de4517051720000000ba22417be4eeab6ca3a40818107be2866297ce38be7b2646223a35528278b20140000000b6bea3c9475ec76545e896cab40f1ab19c1db746e4e6617cd878b37d58ca269a0e8be0193d089b6f3c7b618b0e296c491c27c27fa193c037a6667df6d3359d94 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10e4c737fb9dda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2892 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2892 iexplore.exe 2892 iexplore.exe 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2892 wrote to memory of 2948 2892 iexplore.exe 28 PID 2892 wrote to memory of 2948 2892 iexplore.exe 28 PID 2892 wrote to memory of 2948 2892 iexplore.exe 28 PID 2892 wrote to memory of 2948 2892 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\11d75bd10f3b20eec77ce9d48e9eed5a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2892 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a04680b736b88a73d1489dbb6410001
SHA1953c4ebae862c51269f8e4bc214e2b7f959cd6b5
SHA25686c0d32ae71602daf5f67d1f88e36dfb79eefce667a0e2f2c99506e99b251b00
SHA512ce0368512ef7ea74dd42d0335a7305188ab51a74ed69f73b8935d4d3b46ed996f3c6d8a9af22dae8a772abd82c5eedee43d1e702017be337066e37708ed0ac85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e590eba402f63ec3d7ae764eedad7c6
SHA15a655bdc940e237df795754da8594af28fce875a
SHA256c7496f6e31b83896bf27b38d54a0f0ff4b5342d41a24ba07d723ac501fd4cfcd
SHA512fcf577ef4854b3da0eac5b357719aa868e7d2fbdad19198418f1b0057e539ae85b6cce82cca2295c8a35eb8b987b9f6572e8e1f20ed16548673823b0640cdfaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8e350844ad61cc91d390f3d2b8d96a8
SHA144007db9e48a0958aa676ac427cfac9315098056
SHA256da1697c465faa391d60703d7f23c53e6d125011eecb7eddf793612ce2cf352da
SHA512d0089c3d880a536040ff1f34508658598b88f9916f232286706ffc0e377c05ce773f1f3fcb8a7e9249aad494a850f649375b798a35fde6ba915dd0f53f5dd9ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558a13655f66ac8ef211b37fa75230382
SHA1220e1a8df7628bdfce9ed49ae8fd130d73a0d3d6
SHA256fce2f4e62b8f77261fc4975f9d1f8505497ec8ad35c404b5d2278661b3ceb2d7
SHA512c20228e71cb06e763871b8c58d66a7da60ac7f54830d3eb66adcd27ba90b1427f5743020b2fb751b811643330c440b95278dac66da0ac15ac3cc96e1d7f3cef7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5869e8bfe9bf07155ed302dcdf0e972aa
SHA19ed81c901a09dc0e95f0484efa165bac04f46a72
SHA2560571636fcf242a84240314e88de52d426c5f361cf6a7884617e6d6dfe2cee04c
SHA51255489528e907b43a75bc0bbf5f4f59b5e72e29d836e3b7fde1de41154afe4ea30f331b88098a1c634b9f1b21f66f16c2208c2a3bffdd0578d5f6ec1a1ba3bdcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570b6d3694c832b9209b4c31c00efd9c1
SHA1d51bbbc7ec182b1de12c90087205549723a6259c
SHA256ea9dea2ce6d92a9db9731ccca45794ea778aa8466ab28a6856ca53d32e856abf
SHA512ac01924aafcad22bbf5c763422507d4db013249b81c7c66d49d886716109df3176f2d44a8c7d592d360d001fd0baac33fb64e492f096595ea18d6ee7c657907e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5deb4638ca85bba56c2fde6d057b04d34
SHA1d07d31c0309475a1a153b2056c4241641cc36a1f
SHA2566e69a883110b35fac4c27e356fc2158fc2309405e557c9f88df65171631cfa6f
SHA512143f03ea4b772e2e81d69b670ca78c78d4f87c2b7cf766a0a702cfef0d0dff4f835d8eaa083a398a59e72bae3e503ea161fdf08b073fecaecf51153c3f6c20cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb3ac002dd98205b0a50ca47b4f539fa
SHA1f5b124c0039984528677475ec17c2b2fb3271b25
SHA25693019ef9c2251b1f1f23816cf6a7061b7117734f7a2650b36e484fe203d8dfe1
SHA5127ad94fcb3a2bd766dafb1667f8f28e2f305085b1989725425e8a36c446e6659890bc80f85b0890753d8f64b8ffbf898878a8b022fdbdf78d79046e65459a4e3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f516c227dce1b703d1d9c6d5715eb048
SHA14c3307a1eb31f0e3cbe0a7438875817b7db86fa8
SHA2561a3499809c2b4f63c0f8b6b8f004ddca2360d96d4caa33bf45afb77d9066bcd3
SHA5128737d161072589a97cd5c0edee2ba02c8532c7ea38019774595ac62d822a83aecc4f3dd5d4ad23f6204daf8d4d09bdd264b16215a827264c218e7a25dea6daf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b5e36fcc772f1e82017946a42b2d19c
SHA1f1e003966c78c0e307ce410ac53bc67f658757f5
SHA256111fb31e948346428e62bc841eb22140f68aec2a6cc1a5d321b32b1d45f9b2a2
SHA512d76afa5ab7e498e93ce294b69b17a03053c01fdd6fa6632383ea5f806656c1c0edeb3c056b31379259d388a47b83c5285e7d166ddbcac15189837f3ff5a20182
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5116024de4a720cbed93d534fdff5ac72
SHA1f553a10d4eb5fb1c82f2df3771bc22b097197fe2
SHA2567772aa6d46668d528fdc496f03ad996a6bb8d89c2112eeb8dbd64924f6ab69b4
SHA512364a1c9df852d5607dc718c819159a296e64e542a7bcce2e3da817bd7b3e2c377337a12645fb912652e2b8697eb5ebf9f777044dafd6c1726d32b443ffb892f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e25a4f9946f7a84c8a5af4b232bfd08
SHA1893e443a0ef08fe48b487e9cba90121301aba33f
SHA256bc5bb4fff3e3f382307f12299afd3aae2626da218ae5263909cbe2ed01353321
SHA5126750b565b87c43cef4e2c18e1a594498ff1ac055bb9374d5c75a4ea5a727e304adebea5a5963e98f6775f267a24b0f3b328fe3ad1a2b282ea7423e44ec71b308
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58225f88b541e5a7621cfb4edc6bd9ea1
SHA1f614d5e9494c1d0714a178bd87e0aaab97e54ab0
SHA25656ce62cf721ac16d2c8948ef4c552efb0bac9afdbac60ddae75b10d51fb1903c
SHA512afca089963754626015846f8881e649f8324d8c88781d45a080ae6a6543a7dcf52649e3ad3480121ec01c17c11800bfad4164b086056c8da2929a7d93d77ba61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56df9e6030ea1bd5f9003e48a5cdc0dcf
SHA13874bebc1a4f3585412d116247c6a5624fcec354
SHA2567e39bb38b8d56670fe153e4d2d4a977cc8b5b0c75b72efd57d38cc86c544c609
SHA512bad12024ea5dcb32ba1dcc595edb4d8c8c83029a00d04be1f781b7a5d440add74ac9aa1dc03084232e54c351778d7a3021938a9ba21b2590c333e5b2622496c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b95b3b6a218f136559b3050cf526062
SHA143be6a7f4ca065295f69c8864f08b4255e544b5e
SHA2566b8367f3f5460aef724c027dade1ff0daf4a8881f07059553709a9224733d70e
SHA512ade08fda31b7ae987744d3f8e755b6222f71d0e1dbaf256f511119251eb9dcdbd0a8b0f6e47116deb5dd0737cd7d1e0096677aa5adf2fcb710d20d48c26609df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad573ff5deba63bffd3bf60f9687459e
SHA1aca491e3740028b28fd1ceacb57ee38fd0965cc1
SHA25617a0160e22100681b63fcb1e7b60803a2f2f3d9840c74b02fe1853df13580ec5
SHA5120522070c66b6eb8758dca90806ccf664f46a508ea974cdda91fb4368045798115a3b59662a0dc7fd69291a9a207a954d76ca891b7333f456e70e492efc0a563b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50150030a8a892005de7d58137ca7fb28
SHA167d6f64d966ed1fb1d9a8014821817c45db2df13
SHA25619f8d8e7cf885d7a43931257b874f7a112bfe6ac3c8adc5ccf8e5911d760bb84
SHA512ea877f95d156ed8a247ab78d1c280b1512ed3d4ffa50631fa90b7d304941c547c964b73ed4ce56c7845ec6f0e0ce316e4d7bc82a7680d4f90d5fecee1846953e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550fc7353d969b5c8a22f6c97da82f286
SHA125bda457f859cb7168b6b82045ca2c34d1eb5910
SHA256f1e0177887861a5b28769a2c3ce6117f169f81acaea1bfbb126c4671a7c82cc4
SHA512aa0981e94b09cccaff91e1e3e30349f131adfbd83815251a376c9d8140bbdcfd9cbccf677b5b782ebcac5fcdc86c4e2056b3759fe362b61fe436243347be09e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0fd6e24e3fb61f17f6d98a45e01a04b
SHA1695f534c1af8b394f5fca71880bc281674034959
SHA2564002b0a0d7745a03af392d131af85bc5abd30e478286e6ad193094e1c762be85
SHA5125d6764882fd54551e245a5eb6ff98e0bc02cca0a30713dfc7d4a64f9176821de9d5029dc018e027575a71ed2daf870fdf90bf09193173b43e5fa2584eacb50ee
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a