Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
04-05-2024 08:32
Static task
static1
Behavioral task
behavioral1
Sample
11e81624c8275957cbba316111bb7b7b_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
11e81624c8275957cbba316111bb7b7b_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
11e81624c8275957cbba316111bb7b7b_JaffaCakes118.html
-
Size
26KB
-
MD5
11e81624c8275957cbba316111bb7b7b
-
SHA1
2790f4daf58c4db7ee0992cd0b570d4480aa1f70
-
SHA256
a8579d1e882111f1be740e9e799c1594a7852286ab6d6dfa05c62fa37e6ea72d
-
SHA512
a1269e74ff078c444448a2234780f74ceb3046cf61d619da6476fbf740358e82da9bbc4bece500f5b02cb4ae53a2bb89f881440192df268e35a62935f33096d1
-
SSDEEP
384:EfukXdGiwLuBS5hEJe8fcZdzwda9cxFHLDZ3ZhXbP9xubiu:Ef7XJYhEJeZdzcDJ/bP9zu
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D9367AD1-09F0-11EF-8B56-EE69C2CE6029} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420973418" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0eb7db0fd9dda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc2330000000002000000000010660000000100002000000020f8ffe135557cfc782dff5ec77acd4ba4642d3a55524db96db7d1ee50826921000000000e8000000002000020000000150613be3da3847da17272c06d291e3b9c5f2a01af37dbb03324f57d8fb5a7ca20000000529d8342a6f822f2400fe0a7dff8d0cdc11ca4b454cc04cdaa30c17ff1c0658740000000fdfeab01a12e26859bc3d5470d006295c151076821b91c71baa691c124350616b177ee47ad368f0e28c899bc23e090630573a7662f39f70e517d2e4e5810c6b8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1620 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1620 iexplore.exe 1620 iexplore.exe 2488 IEXPLORE.EXE 2488 IEXPLORE.EXE 2488 IEXPLORE.EXE 2488 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1620 wrote to memory of 2488 1620 iexplore.exe 28 PID 1620 wrote to memory of 2488 1620 iexplore.exe 28 PID 1620 wrote to memory of 2488 1620 iexplore.exe 28 PID 1620 wrote to memory of 2488 1620 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\11e81624c8275957cbba316111bb7b7b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1620 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2488
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f530687f6a5dad8bc4f2f6dfb04b1ba
SHA1f6a3fd159328637aa051d0fc963877640ec42305
SHA2563a89da8efe5fde022daded95ab9a095e43e897205d006468d5d8d1bb0365481d
SHA5124ce57a527e2dfbaa7d3faf9ff9e088ac09a23b4284dba9c2a6f9ddbedbeb8a034622e95c6c09385f74636857120f5f0ec4138c58fba19e6266ee40eb1b6d7d2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c327271b03aac967f79431ded66e73aa
SHA13120cb3e3782e286ade008cb4dd1c3c1e10ffaa9
SHA256b470fc0fb3e5013e90149895b2013cd4ca7e3e19e85addd441dafb5dc82d5c89
SHA5122a64b4a42633db10a13e2b34ccbde71ee1ca4e03f36caffe285cdadf5ae6670548d00e9dcba31fbd8badf2de6b12109e80fc80ba4243c00e399554e80c2948f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59eb1c7a0901ea953e208d8f2147c7a5f
SHA106b84ab7ea94862a3a9aeb9fb75a53e530c38e59
SHA256675015bc4bc809800a28a6ec1cb70489117fbe3ed7c0138a967232fba78c03e3
SHA51274b7272c704a0c5ac2bd104bfa7b84985299ef3e1856a70e495399cf4b69681c649d4f939105b52e55a021c8523fb72045d65497f7ca8d4900c11032c7086094
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9029aacd770790b94c6cae616543b6e
SHA119299a918d2cff9e4eb5d7a3cfcc1fe90fd422f8
SHA25645934a385fcac5b0bf4eeaaeae40d988f54dcca5b90b3599eee3b26372a72014
SHA512e7054be6987bc3059e804a6e241381e6001d5ffc7161f69a690bc28d03560277e2ee96e82382e3e63069af43df7be6f71b44f05548926949f19603c730e3175c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59cfa348a66321055fcbbf76d2b324582
SHA1f6120adff602e2102bd6a183578c7c20a27db575
SHA25604345b8d6e1fe78720ba962909f2de4f8074a957d2595cab591dcef7d163b253
SHA5127173f846af7f1a20131e1a619b960a723911c4e9ea8fba6ee97c88889e3118a388ebd8a3d1d8b3227cda88e73bd051d591ecb8baf3b9ea710e71a732e6a09558
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a658474395ef88170db552c285d45631
SHA15fc1a281f9ed09f5d12c3a9baffd94d14eb61b73
SHA25625bc89311c0dbc467578ee81f76793b8e5d4008356801a42f2571ae085c47a1e
SHA512054e18d358746a2e5aebbd33f1f487e582825b3ac1b0ea62c48339616e1543eca66e04d7180fa4a2b030746725198febd7394796de687deb94692e5551caa333
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0c3f5db7884b922142203c9d503fc91
SHA1f8317d676bf04cc399f7e6411ed8ad9df24980f9
SHA2567e61a98962a42cf65a66c192f1dfda869209463d12ba77eb29ac14c8b41d61a5
SHA512efcc92249063f962957db230b326a8f940bc9b88184db7290017002e9dd6e7b185ca54de8c3e1de80b18f5884ab9c777f816fc046ff12228e6e28047ef1ba4cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a435bd2c7486d9fb353a8070e2b8fb77
SHA17bd773349bd2b64188e682bee1444409c4c917c0
SHA25682244058099e08ee3bdd23982216cdd33c19388afaf1dbe221941738557132b9
SHA5126994adfbc4a8babf209d41a29b1c0305a0e6726076b46c5c6d6b22f0852453964992f05a2691c768ce98590f169426063829271f4c6034613003df202380a71c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7462234351921753f452493a8b66049
SHA11525b10f8518ded4db996c571d682fc427504ab4
SHA256747f0ecaaaeadf36294af9fec7fc4081762c1dc029156363eb0d1d4070023bf0
SHA5121409e9709926c761b3a0b5dfd9d531c7f0d382c1de0c0083ec9a026ec0db0648bbf04dc88f74112de7d49def7b290d8c78c97904795027f5f18a50dff47f8f04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1b184a186e66971a7273eab745d1fe6
SHA1231bd81cbb212de49276ec62264d66f35fabbe94
SHA256090abe8c0cfcbd02fb3703cb6bf8fd270fd1148a4468bf99d931dd5ef32d0b37
SHA512b7bc440fa65974f112378862ede96f2e5a32d3eb3456d5d50d36e592834414c3f2155d6ec9d5a80983f31e676df19f3a8fd111461a1ffd545e8753b4ad159bb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5635a3673e589a102dfe58e7e8ab0bf5a
SHA1fa67c13db3a2701e4f3137b4d02ed7413ee9fd47
SHA25682c7bd8ca0776afc2c1d51a2a2d83ac9b5c83b2da686f6da7523bafdaddc5a84
SHA512e1a528d7af183f309311ad0ec95b745b5f35bbeed82411bd1e1a13bcd35905b8ee9712b59a7246f15f04fb82675ec2caf5c76efd3f3ff328a4888794bef4c5e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eefd448e6b526b34a1ee7ed3f1cf8558
SHA1e20692d77d6a674d8e7b17be693c5cf13ac80c79
SHA256ce03b2050d1b2ff4147b75da643d6e1acadf7b814fcb78fd9a30f4f29131dcb0
SHA512f6260fbbf8c92f0a36c5e8ccae7c55c85b80859bc30e2a4f079882cd593f4f0d26a89de55e79ed11b9fa7fb6f7edde22c3b63bcc76cc42df0854a6397af32eaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516c3b92183282e9b43aa0e7a9c15c82a
SHA1ea48ae9b52b0b4c020ee36a6111625836296b686
SHA256f7e4a0207f7f4ae26cee9d0116465c074156cd0f6a3e6658dd5a6fc9c9e120c9
SHA512d83e6ab2858936928ec8423c86b22ab046a972cb51c001afa8eed8054e336ccd66c107e39053830d0ec488ffc2cf5bb1e5156b62a39b9d032cc823e7b90c30a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b14f5a8d9e4c93a6ef4416ff17086013
SHA1f1fad2eb9722b2c0608619d822f17f9014f8cdf0
SHA256b7dec3325c0f0c7a7fa357b326658a87864e36670e91f439a610b8f902d3cfa5
SHA5127fb50bf8695fb2e280cbaf0a945243c3ad09296ce5b4d422026e3f5726a31953af8f9236a0c7055f099dcc83265923ddc55d7bd024436a6ffffd2b5b2fe11e47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df8ddc30705595d5cf035e5f26724d99
SHA17fe443e7a105e80d2226a5f73adc04f751203870
SHA2566bac157e10225f4a3365781ee65631032af917adb991dbb254a3d26c505ca297
SHA512d504a2dfc46d2a2ee4b550916e348484e337c6cd8bd56f24d155b86eada83d5ea80bb7e46dd3e4a797400cd050def92e8ed45df34024a09f777778db69c8a53a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595be849bace95ea066710f3f752d647c
SHA14184afa6f2ac37c60581d062479c02f5e0924324
SHA256ff272c0110bb26d76d05319f8dc721c822b3c2430addd377a6f2818338ab1df6
SHA512cf5ad69652be63fbc3b81b9acf37123253bd77f6cc40302b9c4014883192c34be8b920bb9858efd61d2467057a93d2e2876e6d2582a3e62dd1ba65563d4a1dab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521ce61eede94e4efbf266e2d436a3c1c
SHA1a47a2de5d9a879e386ab7b1e83831916d8d174bb
SHA256bc0a8c90aac903ee6972c6a71cc45c5e02d9772df4155a71b603cbbea275f02c
SHA51234c959453b7ea02d131b4a7a2a94738e104baf9f664bc76c5a18911d1bef82d08ba51b6bd9268051739675b5b942bcd7aa7a2a92b1cd6a07feef98505799379b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5036632d604f81eecff9754e361722c36
SHA1f8436d7e9294266a95847e5d6dd21558e5ffc1aa
SHA25673120400ac47bf4dae8cafe8bdd09f1dafda44471732f9ddaa85b190cd7dab69
SHA51256ee91fb93ae32a6cf9ca84599c4eaadca01813868f76ba73ec38d71c64f83f14cbe0269cafc7254d37fbe445ebe20f7a3f8f60da38231ed8f53329b0abd2265
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e2365f8ebc3e90077971fbf24b02a31
SHA19f3a34f18f3a06a6dbc762a1fd17555b858e5597
SHA256ee5874b8f7a6faa170cad19ec5dadf55273ccf755809b01c0adeb36c66274f21
SHA512884837748c22fa1564c5bb21eaeccbd9b72fdef31ced8f1dc0c5ac829b2b305b43df396ac486728739b79debf24e3b8cf4ac88fb9cbfa6f9799231291bf309a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50fe4ebdfd3548eed2d9584bb458b4520
SHA142c26e7951a022be8dd0b445bc11ff9644af8e3f
SHA256305969e2f0acb5624feefc839b10139c432b175e899b36c18696e3a8bfa38936
SHA51283f1fea958d62d7a3b3142216e177eb2c29797008a608f85cc936a2c9cd97c60ad54e7a41340ee085a52f7d1b29a06dbfcf0e74e7d7b0818dd437dfc0029d261
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a