Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
04/05/2024, 13:40
Static task
static1
Behavioral task
behavioral1
Sample
12fa0860140e21388c9fb8427bb65200_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
12fa0860140e21388c9fb8427bb65200_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
12fa0860140e21388c9fb8427bb65200_JaffaCakes118.html
-
Size
15KB
-
MD5
12fa0860140e21388c9fb8427bb65200
-
SHA1
fd384c4d4852adffde55790064574474851fb8f7
-
SHA256
8f9e9c26bd6f5477089339aae87fd9fde4826529ad0b61b124846b18593bc619
-
SHA512
ff0fa78c5fd8a8e70e09487412045172ec842376ab64cb78a84d2ba1df84d723c77e6545be09ee52858a9c19e8dbb91c6738de7b7cf69fc95b6ff905f2d5da6f
-
SSDEEP
384:Cyi2MxUJ/gK5omFAi7zy1wXM/2G/Hb0Xm:Cyi2MCJgeoOAi7zIKMf/Hb0W
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000008927e5685d5317d723f2294eaccd80c8a0b20b5a52a670b65f0c182c196e5588000000000e8000000002000020000000731b5dc05b24cc36c930962c625ddd9a0235a9a32b6302017b233c3b13bdc6672000000025adc5f4d673edb512e5d1cec9973c2020e95bc82ae6a488ccfbb82c518dd0a340000000d5e85b46b43a33c6cbc6a90a43232c6c999090ce433961d43b59ce23c08049a0171af799126712a42c5e12ea1a8a59c70c38909d21c07efb450a1a5abdc44226 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000001cac6f042cdb66838f65e00523e98db28280e59b0fdcf4a6f003620f4cf31b54000000000e80000000020000200000007bc8f720b7e9442d1d83e3053210f07f67a2d90c198d2ce5cb6ef379992577f790000000156de4cce793d59ffc29e897e6a4fcc275e6209d8f8b8d68c19e575b0ba5dcd7584e547c87a82f954e2e379aab48782410751d0eee4a344932a46d6e1ce547e6ca407de4fab7e6ea3ab2858fb2fc3d9a44bb60310094a489981d26c319cd17948656c3b8dfc56ed859fed4cecd6b1545087581d605c5a38f73497b019218ec2145b04d02445ee493e2f354346bc5afb2400000001d82c325c76fc55b797f49a72c4e062837fbd656f584fdc77a0604962c16e52ad2b84232f30d79101b93164b286f1305dc5ee31ed91ae15ad69588c96734f29b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7038bda6289eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D1392A51-0A1B-11EF-85B9-4A8427BA3DB8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420991879" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2368 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2368 iexplore.exe 2368 iexplore.exe 1408 IEXPLORE.EXE 1408 IEXPLORE.EXE 1408 IEXPLORE.EXE 1408 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2368 wrote to memory of 1408 2368 iexplore.exe 28 PID 2368 wrote to memory of 1408 2368 iexplore.exe 28 PID 2368 wrote to memory of 1408 2368 iexplore.exe 28 PID 2368 wrote to memory of 1408 2368 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\12fa0860140e21388c9fb8427bb65200_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2368 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556657f4ed395a83818989e9b7a1cfda7
SHA1f473844a4979c41eb89323d39b85bf6101c559e4
SHA256375990fa4e3fff915560f7bbbc401420dd758bac67c0a58a6a06a7e8d170416e
SHA5129427e774eb6eacf17420604328be14ae21e80f0676d42ec9b0b4e999d96b683f9efe49dd316f222dadd14d6368c9db3eb3e066e0c948855227f7a08d910dd534
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb507bdc68a834322ba4a418a96a7fd2
SHA1b478d7a556d96e9f2c118249bb868e3fe0becd17
SHA256173cfbf4fb30c8cd3f440b48a66515c5af4d4976f43f601b5447398f0e9d55bf
SHA51228dc96dea7afa8b5d79fc7232926281275bd0e569bcb0eaa9bb6804f90f236c336fa1ef24500fc1b3ffb71bc5b6a2fc5fd5c8c36a43fa86dc3eb2039050f6079
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5deb80e2c5d3dc62c795640b2f277c94d
SHA172313f91ba72729781c841d23211570498957c3f
SHA25615d68a6be57e93044556c9664ade454104c7e463a01f9bc35f4c8cb124d40bc0
SHA5126aa98ff7908540e37e1d815111388a62ad13c5a58bf0769fe8c125c332b40049e51df2deeaf976a99690cf9b79ab5d136661e7b1dd025181bd5afedd33ae3c22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c7027b9dab898b422a3fd24313adc39
SHA13234d2311910d3895c550a1823c35832258345d7
SHA25616a44745b5889fa3fa4201c2a0111fb9c8f59dce46fea95144fd93b659a3a712
SHA512d12e2e5331ddeb071ff255252ab833ecd93bc6c9fab8dff56d63e9e42b943114ce57c1e6e901272197f839ace578f7a1189a683de5a6ac6398dd47616883ea62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500cc13c723f2c275550ce7372edffc93
SHA10b3d89a50ebd29505e4e9b565842da454845c34f
SHA2560d7f99720e9535dd78f4c63420c7c3857f7e4d987134bdef24fe7816b07e7399
SHA5124c10a7877414f09b743a1bca3ef088249886b2cb975933dd779ddc4322b2b952e56c302cb55a47442fedf0322dd394a035c8d951efa74138d321196d633e65c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5024f475fce5c329581e19104ac02dfcc
SHA1beab3dcff29f8eec2787dcf37c2dff768a6af204
SHA2565bfd06d1b8fee5c1f5c588770d3fc9dbe1c1b94a38af2d203013f08fad7d100f
SHA5129710fce74971d93769cef8c0348d7de96e2ba654b5f6816f969fdad70aea5fb6cb9b666b95d030d71a4a133b22a97d0fb5a2348bc8f0a21a4e03953b0f0ec3a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53dc3e79492081d94952093a9e1e97129
SHA199b3c2be78ab1135207b33b2a16b29abe21a321d
SHA256adab56898b4ea6390ee8ee4525cb3f85c760b94d2c03e3a827bc13fbaece6b59
SHA512d0ba6702b610202f1fe557a715bea0a0f90d3a9a107d9c37c6c8d8625ada4b275932d1371ca4ee3d5695504988a34bfc65a93a6baaba27ad95ef0ac3dbb5b3cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4c2b60cbf6b91f7a449bce7907b58a4
SHA1aeb4bb7218ee1bc57740868871376217fff1235b
SHA256a138f1f87ac3164e14c2516699cce7d06992b2871a2b5ad442824a3e0ace2af3
SHA512c3fe1e66c8cca7961408f02e09b98890f36cfdba5785fc2e52109b568d3f7209208ba45c860fa1e3ff3f3d8df7bb9e885587646c2ee68d570f362ce85f33ccd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5997afe9e3708e46281061741cd40764f
SHA12cc437ecdebbc51acedfc66b3c29c96ccefe54f1
SHA2561f068f728679cac60ec4873eb479158de9c00225234274640f0052f5d9e1bca9
SHA512b825c0ba094209c7f2559920225cc52091a40e27c47e868f1f52bf35acc9ab275211e2e4d4477c84a651b91d6f8e8b9d3c90451d8317a078188eb69d7be897c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca10e91708ec493b9085301c704d3ee3
SHA12471688e312670d0e36eeb12b69cad10fde7c7ea
SHA25693c069db692f8b9ec8cbc594d06c86cc194507b3921de867a6a2475d58577dd0
SHA51260e44f4b01699c758f9087d75a5acb10cf0ab19236b7e2113563a1d34fcae7dc9a8914965d08529e54114782a2230ba8892bedeb774ac0ae2d9219275d60290b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7ff77437db799542a6adef55456b4ec
SHA1d29957b179a1dc133821f3b83c4a804521700d04
SHA256e217afc3c3ee97437b27014a889223b66ddd2157861f35d1728e6043225435f3
SHA512de000581655fd7dc69fd4ac247adf0af7e9256c72e222b61a73b38c7b61dee980cd7796dbfd0a335b125053e0e80115c55e41639208f29dea744286eb28aed4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a50f0a000875f4791b4677fd986522b
SHA1e1de4900e57f7d965d554a0d79178d1ca4e23656
SHA2569c023f899af1cf88d720f4214cbd0198b72433aca70848ccbe2e9f5292f62f0c
SHA512827ddd4049afc7bcd0151015391e8824340ba5fa9ae0640c35765d887dd64cc1be9925f967190f8da4c4c69a3541191a41a875888e558fbd13f2a0b3de0c3775
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2bd46bcfad2202d2d8b34f211afbcf1
SHA1934617645a1a6e00550b6ebe7dd74fd37f163966
SHA2563e65c1b1e847d80cd41c2a8a4b62869a53da94b3511c0fbcdfd7bc6ac3bd91d8
SHA512c9b2c39763bdd2433d778c1cadcb2eaa65d3bad4e10a6e30f0572b44fd0b6ea1774c89ec894342e221ae21eece101fd8b1361f33c5e58eab16c4c2dd66c4eeb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ac6d796dcd20e71028e493fc9263eaf
SHA1c2e17926a981b2d72b6449237c1f9da22445a363
SHA256cc4803f31198defc713271845a3d145e3c1a4e15f8d432b8614b558be023097b
SHA512e944f91c380f29f64a9540d646d455c56404fd61efa4ca32b1485fb707ea97807b88e80f0898a94dbe6ae034ba7bba98076a402f6f7395b8f53c7ef487f7b618
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a