Analysis
-
max time kernel
138s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/05/2024, 12:46
Static task
static1
Behavioral task
behavioral1
Sample
12cc5c58fc301cd831dffd02fb9046b9_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
12cc5c58fc301cd831dffd02fb9046b9_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
12cc5c58fc301cd831dffd02fb9046b9_JaffaCakes118.html
-
Size
72KB
-
MD5
12cc5c58fc301cd831dffd02fb9046b9
-
SHA1
7d6fc81f78443b76618998ed7fb070e54047be3c
-
SHA256
e3ead53e66a296a1c3a1dbfa45cade9cca2440518612c18cb1b60f70cd60f5d6
-
SHA512
1da1419ef3cdd92c0c3b959beba6b8b4dac7d7df8de4ea3341b3da57442098248d0f1b2266e97003befc496ab684717eed0219a3a5cc3846aea03d78d0830b3a
-
SSDEEP
768:Ji7gcMiR3sI2PDDnX0g6sy6scyemaoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFf:J3ZmDTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4075e924219eda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420988651" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{503EFE41-0A14-11EF-9F86-7EEA931DE775} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000859f1182d835e4c04ae28d9eab086af4545de62ac6ffce5c10abcf63e6b859de000000000e800000000200002000000043ba19fe716313cf321b52bd00d429770d078576f93fb768146e7afcff41349820000000d868ab3370caff3bc9b53f4e5a60599c6250cac99634bf0f3a2ab4fbdd036abf40000000c49e29537de28735b8eef1a1833bd2b6047d7d517d5df6a8cff14cb9d3c636f46a350c727147cd991a7ff59cd7ef01ffb098709836abda06c9dc31105f927040 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2180 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2180 iexplore.exe 2180 iexplore.exe 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2180 wrote to memory of 3036 2180 iexplore.exe 28 PID 2180 wrote to memory of 3036 2180 iexplore.exe 28 PID 2180 wrote to memory of 3036 2180 iexplore.exe 28 PID 2180 wrote to memory of 3036 2180 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\12cc5c58fc301cd831dffd02fb9046b9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2180 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf292107b71fd39e71dfcc3f9b1c0cad
SHA16b84934f8516fc4a4ff7cd911c0c9395a56ba776
SHA2560f77acdfc7252a3815d700ba3c89e804d766ca6be290426d5ad12d69d9395b10
SHA512a910c0c0cd93180938018eb8d6f55cb5e9a0b56e2ec24150aa8ea7eefdfbce371046cb5f7e83fd4b602932794e43440016ecc1bab6b69a40cb7b073bbba7a672
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50de5f232dc7f88068c2bd7516e9819fb
SHA17e331ffaf21f36eff78072d739c53eef0d6e36c7
SHA256dfbb79026c005e82120e54476583b2e82ec192b5c4f143056765fc358d80e305
SHA5127c86c243539548ae66112b9e538e805ff3ae32c1d2d0811899501d434984c408db0fc65a1362b23606f4c87ca69aaad808013394dcc2ef5c1f632d8ca3be1fee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57dcd96668604f531bdf966ddbe6e4bb7
SHA1119072080f62089021e9c926b8d726190f1183c3
SHA25669aba0cd14c24c9175af2908da6582ce9cf79c8418c48eed49d641c3522eedef
SHA5125663c5051f874b8019ade4b34e88f22cf02cd979866547df402deb8604f727e88975e743c1e002b160ea7dac16886cb53bea59206b1acf2b54ec2d0e48ce276a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50540cea311930210bc3cd3b118df9866
SHA1eea7e849eca70dfdc7544983b30d0428f1b51a2f
SHA256424fe31932098aa199a74ccc51e6bc0360cb1365cbb314e6b350f25c5d0f6d5d
SHA5129258948de17bf2e7d8d7be2b47242e4f1a76ccb4a6ee89f851075ed68bf70276dae385e3a2c16a4bd2420ec060e67c68615f78675b9eaa5535aa32686dfc72d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5805c8b16acde30158334fcb05bcecc10
SHA1ea4ddb5afdbb3bb4a9687306fc6bca9abad1632d
SHA2568ace4acd2a56c439c0b767a3fecb5d8ea27528d470823ff7ca72461d5a159ea8
SHA5126888ece2c203a826e78fa5de0652b74a31ceae612a6a301b4b8c0947ca9bd4d7aa418463a1abe6298a71cf8977445035d3820b9e6d8a88a8137649c763ba1e08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f14f4f5122d9a6300b5ff65a63b9850
SHA10defb42d75e7d397da1c088c972a25c90c776984
SHA256ea426c808ef703bc0d339a216a6d1df895aa9ca8845033328b496e464c281667
SHA5128242770f14168cca4e98b23345933de20c02145c01f7dd589ac89148992bac091e929ab12003f209e1f8c7f9db9a337b05b8d79ff6936ba4df6d3e8c6d38c5e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bf60ef95d6026ce8861ea1b73b7c810
SHA1e83c6f26a9e6c51da1e5404c23c653cae83d32a6
SHA256ddd3f2763bc0c43c3ece1371749c73775ebc2337aa36b65cf5a03f1e18909ec7
SHA51294c26914ae622e0b8d9ce1260544e0c3c63aeb9eac793b79debf413f9a1bbd23693af61a0c2560074f84bedba8b78f758af7126e58b54bc61d742c9cc11e36e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544efcc8f94ccd9833fb41dc638d63bb1
SHA1986ca13c356d64a5df1a3b7798432f4d822a75b1
SHA2564ff8e69ef161e3e2b6fc473142013dcbd89748363ab82c55e3f3985e7868a0d4
SHA512e5074ed91910e51af8b88fa42861cc97a29fc6d903715fdd2777ab78795fac6c1302b68d9b89c8120919614f8dc096702b54c6b2afbeb4b3bf5f11a83e5c6b1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c158a7ead9521234e3dc700059ef10fa
SHA171f3d81ceed95327464e4aec4ef30ec64fb4a9bb
SHA2563b806120faa8cebb1b45112352a484af69416f647721450a50da1b4d85435c99
SHA51248edf25bf34927dd2ee76671ecc822794b2863695372b111a59c2d7372d6295aaee9163abdb3764e319bb76a2e4874c127006a22672e1d433b1678d8c7e09f8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a67a02d0324bf54ff2e543ef85b46353
SHA1aaa822369f78f7f36dee9e67293cc66612dd3935
SHA256edf9ec715b9cc258335bd9bd50fefc6eb87704e5f0c1f7fd7993a6ae507a367a
SHA5122b0eeced4f565bcb87a246c5d241b3b26f146c67b34f0b097dfbfb82e807ae13bca0068a555aad4de1819690061dbc17b9af302e8903ba125c40afe12bd3b4fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5313782ed87d6cc4a8a6993941d3ecb38
SHA1171082e633a91a348db843bed5b5d0c0178de471
SHA256a167b6fe581c7417e1669528ccc7bd07513f0281bda337555ae7f0e41a6dec33
SHA5127ad647b0cac52680e176344cc31fe1982a490f879afa47c38a679fbf416a4531958517f11d49227a9bc3197e751b6dec70f964e6e066d61dafabe56f8418e676
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f99d3589958d6ea86f4690b792eb7c9a
SHA127527d19ba47b797ea508931bc14c23569b7792a
SHA256907baf0611bcb0e6ae63d775cf7488381a8d383cd6d7b637559c5414b9282efa
SHA512959476a92240c8dde5eb1ea101d872fdff95d8ef3d2bb73118c5766cf81d49de6c37f1d21eb29297b80a7deb9229762b2fa3be97f0d8e64dc6c4bec3b7be34c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563731c584e843b4432c9ed429def4ee1
SHA14d11d3932c49ee51528f237135046e40535f6d23
SHA2566b207e93960cce1b6d4f2f6747f709b4ba84fb228d1f4660b8a6a088c6e58da3
SHA512207a5e5bb7dbdf54c7664f126727a86bb6736d2f8cea57bf502b3dd148ccf93a89ce00da99860c161503442f58a6e74995e6db8348004080ce20a9863abf465a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5635143b2c6e7bfea14d1007961e45293
SHA1c7ea6aec0da0fbb18057e9e70e60aa71e491ed95
SHA256db9628b690b56a9d09763fbad92e24df7917bbd9f2d05ab78c49ca5bf6044307
SHA512bfe6ee6017f9881f252aa608e992548c81ba0fce0650b99b3bcc08f5275d790b3309f453f7252a3c3efc2931df853e9ae6f7f255516b909032a22eb5d6a99f3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f00f4104c10a269af17743a598fbf09
SHA168f4025e0926beea9265b2347d5325ee71e421fa
SHA2562efb8284f58e29a7480f0e0090a460db781d7fa94988cdf763386912d8c4eccb
SHA51253e35b32582c1af536d0632afc90a5fa77d598ceb97568e1a32387b742bc912527621d57f4bacdd50735fd55a6944924b8790a982e93261e8e3dfead5e0b59a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a326622edddd20b29138ce017c67f143
SHA19b1f84deaa8c9a1c726b6734ba26c725679f15e4
SHA256f9068ec3e8c916ef0d03f4e4c1283e02c263417dbf80edf058877ef079b83f5f
SHA512d6281788cf74fd22954bad96f8b092e2d3a6f1e1a9b572d46f3948bbf78be80b089736c27f8577d803d87f8dd668f92948efbe7bdb3534ee1b32541d394c9840
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563898349b72118efc653763a8135acd3
SHA11a87d6a8138830c0f0cdae20679c781f959ca3a8
SHA256b65b795342f8abf0a826b24216343d42e050fbf8ad29390ddfb3851dfd5ae5b2
SHA51288e029d3b472c52c0c8cfb0b1a5fdcbd0b82f85c9f32ab8a5d8416d24ce1e70021e41c94334177f73ccfa467636c8dab8f304e41d0b45532c92a8d960600ebfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fadf0ebf8d5e3fc12cf2eb0b363ad5cc
SHA1aaf7a6541522d01998038ede774eb00d8bd064b1
SHA256a62eb24ba6538fd36aec6ef7150c95dbacc294038eefbf2fc24de3d780707541
SHA512d0b594ec8851bfbc40d4fbea34420ec3a830df19f80dcc434dab1cd01a781e1d7a8ac619eb6031d0ac8a622f3dd070380c452080da83810d9b52eaffdcdbd6df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513123fd437304ff1b199850ac450bbaa
SHA1fb6e3ce08026a3813d823ee15108416246420c8c
SHA25666c94dfa4b91bac3d77d4aa0a4cb8ace10d44d9eac94dbac8461c3647a1090b7
SHA512d457af88cf890b61e73fe07779dcfea54fc02e2ea7c8e7746c45072cd2fedcdbaef56e8a3d87c4a1fa62034630ed88ccc82583e3b88d312e746a8a50bf1d9d17
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a