Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
04/05/2024, 16:51
Static task
static1
Behavioral task
behavioral1
Sample
13a10c99f1911b92fa46540b204f33e0_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
13a10c99f1911b92fa46540b204f33e0_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
13a10c99f1911b92fa46540b204f33e0_JaffaCakes118.html
-
Size
61KB
-
MD5
13a10c99f1911b92fa46540b204f33e0
-
SHA1
8928f78ce8f0b5502078f582ba6426c4e5daa017
-
SHA256
47cc7537123b53a5c01f097627aa2ac8612c43cf249837dc88ddbe0b07b94f87
-
SHA512
18093a548024250df23f7502c81aedb721247835bf8e3deedd70c43583ee2a2825424d423227324f052e759b42a15155e1e4ab4c2fbe0d5d582804958cfcecd5
-
SSDEEP
1536:iYfckvLv8wWOx+eO+eV+ek+ee+eV+eN+e2eA9A0eZePe9UHElDRDAazRPAQTlcSh:iY0kvLv8wrIz6E7z8AY8DRDAa9PNTlcO
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{909D0501-0A36-11EF-9DE9-520ACD40185F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000ece08dc280173965d04fafc09b8bca30621eeac1f94371b00c54cb77106ea8ea000000000e80000000020000200000004f5af70b9d4f988518f8d73a19b01ef36be5846fe884a13337ce9037adb1b5b220000000e0bacaf86c7d2fb1fde44f1b0a341672125ace2331870c7cbc2dc4bd824dbc8b40000000e946001e852280e75ff1786437e07aa1dda0306181d5fbe3e9f32aa2044eaa7f25e30bb278848df85d40873364dd7a11377acd0c15247507087af742bfcda49e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421003361" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90f1cd6a439eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2944 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2944 iexplore.exe 2944 iexplore.exe 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2944 wrote to memory of 2052 2944 iexplore.exe 28 PID 2944 wrote to memory of 2052 2944 iexplore.exe 28 PID 2944 wrote to memory of 2052 2944 iexplore.exe 28 PID 2944 wrote to memory of 2052 2944 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\13a10c99f1911b92fa46540b204f33e0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2944 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5610030f1a68e010ca86122f7ee9a1a9e
SHA1c714277f2bf1dac2c42d3807f437ac76b296ba0c
SHA256c2a38318153b5bde1e26c6718d78fa5b38838d27c6f923c56bad43cb4970a7fa
SHA512b4a107f07fc98bf3721852b6a6d7a05e736744762c1fd94e96cec3fe69796eafd566b69066107f171c5ad184e589b8c34cf0d03e7bb674e8278222cc362e671f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51dae2fe91153a717434278509a26d56c
SHA1b5790bf009ffb6dbd62dfc7b57e596f81d5d0a21
SHA2569fcdae0ee8c05399dc2fb5a5b195f8f84ce48cba9cc50a15d37a2ddd58c36018
SHA512aec1547142eb8fec70c8658bc7ec0c551e8c268c919f3db662b39cd0ca4be8b4e6d2894113a7e6f3113f62d834d343f68ee61ee4f08f1eb3ab7b378e7b5fb5c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58fd80253feb0e8972f39db8d811dfabf
SHA177c38f109608569bfe5adaaf318db6ae23bc544f
SHA25630adceb4e9d52fb0c3454fc7e29b56672888340b7a25357c202cd6a07d65be00
SHA512b6d8e7ca9a659b836b88015877b7d84ff9b762dc6487381058371480f02b0c97e0478c094a031ed03ed74ce94e0c756818577bb41fb8ef349f92c9b1b0821112
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fcacc2ceb0495afac801168f067a1f3f
SHA1bea1eeeb19b36b41906dcd5ab20e74e69cbffe3f
SHA256c9d2fa40dc3dee07ba4cee860707f0afbbde343a40b070f98a9f111b7c38443a
SHA512d9c7c700ffe8cf1eb944a5d0e689ab989c16dc62dc6cacd7ed28498e36246a23b0ac384a08ff32ddddec7b6627164989db045c3c53251519f0196f2d1d114607
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e6170fc3c3a49a333b37616b064b109
SHA1f6a17addaf39e1140cb7ed0c14a885e2afb834e2
SHA2567782bde6beb203c54fe54f0bf637202cb3ac270e0d4342ebfc509ccbe7d1c357
SHA512df939470d9bc90d4438242fd8b9fcc1b03951384b1a28ebdf1ce4a70d1873263ec3a7b6d78875fbba13b190e625dc29138c31041f8745f25434bbeba7825c03f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5595c7f5ccbdfa9fcf82b2975b9a8813a
SHA138eeb0fbf3a05b8ec0c90caf8898bb7bd31c7be7
SHA2562492ef4268df8cdf6e7d8d573517246e6d2d1f47f7474fc707771506d3056b2d
SHA512b071a629d2996de7058b6144489ae65340850bce7c5818c0700eb27fe5af516f1efba4ede33f464264120d4051f8b2e357b9a842e70ce681f4bb894d8ed7ed53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0e01509c9566d6747ac7590805aef87
SHA17af4297b2e8a43d7e0e9a6302fe65c714421910e
SHA256270af1d0fc016952f775ccb6a69c02f9a94fb7e2b937685f0db2ea78d1c59a71
SHA512c71db83f2928c360e000d330f8e825535554f642dee6f3a45bbca0c9311361bdfd7da2f2b239ff9e8b49b03e3def345c1a4886982c7368b4103feec8b3adae92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f29a48482d327a076185dc33eb4f208d
SHA1a97e5a850070c779f79830ffd152cf8484fd220c
SHA2562450e71fc6ab2b01a55f4372d2f6487cac83b583318bc44c523a6db44a85572c
SHA5125d02f895c10c0a797e42767a29e451ae194d035df5c4518dce4ff8d507a18eff7044b92331e0e2da6773a5d102b2808a9c79df9563ab77e0677b21ca4433fdcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ebd463d50b169e345ea5e0eb18e9e89
SHA1ea2690ccf2024f5298102aabc3364560f47bc032
SHA256ef19970dea9a2160741602d02d072925660038b7d5c81c13d8f138a5b49fc095
SHA512c0d7e146b73ad44948c66f460acac19e8ad565d02c8b7779303b9ba9b472c3944ea2be41396cc2f2d4f8262739213127759f99a0aabb9c6439ae4e36c00f087e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e25643a9f6937d2fb14573fa5ef01da7
SHA1f204dbcb174b1557313afd875dc13ed94925e399
SHA2561bd7935e167f3fbdd62a17bd2697a493bd38ff1d7596516e1891ad1b21d82f9b
SHA5120e2462d75215e8fb5ec0619cb40431ff78894a2b47232d140ca0f97be3866b3e67c5be4474b8b30a07f63d48e55eab5c752b214ada1fe9482934540d321faed5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588e20142f8f52a1f63dd7fa3249941be
SHA1ba2788a7294438c29294fabbb45196c248ddee74
SHA256a920c037494eb66fcc1a6001f852979f69301eb54539a99c5da812092c6d2838
SHA5129bc9253271d7131a4a000adf1bba6c810451b6c5694b5a757a82b23865ebea28d02b534bd1e98efe8f8ccb05d9ea98b1d62622533dd45c59af5f5d8cffff9397
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565f95acb639f51a57ad947b953a96b27
SHA1171190685c741aa9d9b1758bffb7922c8b97fca6
SHA256e6a474f7c6e83de68f608a97bd93ea3c5cc6ecd19773b80701757dfd4a1e83b3
SHA5129eca7d1dd3230592d173066aed4294822a5df648337c21f15185edbeec3b884a18c98e8776d075a60ba7087dbbd3414bf5daaa84d8b8a2ab228283bf0adc323c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a7b9ca7c788e206dcbc5a125bc22f6f
SHA133de14ead24bf934f57fd718e88d20e64aec7bf4
SHA256c7d56b702ccd192a737a661bd09a0e608f35f98570b0ee658c8e1b7f944566c0
SHA5126ed0c8a233270600f3ad47a6771861fef9f39adbbce392ab3de92c70da2695d904e5d328888bd68023bfe7a267c0682228d58b4efb3aa801e8a5b7e225980912
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579c2fe17299a866cca4b9776a8c367cf
SHA1f54c0aa7b1e96fad3b3f2d6c8d82c13cef6f1ad8
SHA256b4b781cf9712848830088d3dd3162f2f7890a12b99b3222244bc4a393d36e37c
SHA512af388bcd05e93bfa041dc9a4eedce9b855378d4e814ae744b530edb031dc2883031233df3e640f354f4b0d289de7d77110e4bae2f507429dca72ceca655a7e75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54bb6ba2d158cbd27c50bd16ab954e6e7
SHA15ef216118ee27bf2d2c887af1d0142293587be41
SHA25684e0f811f3540a3d1e1057091895af075256c700ac3d4ec91ad7aa9bc7251322
SHA512fba9f20cbbe5e5d22c09aa36088717b728fb9df4fbefac827caf97e12ad31db30f5edee98f356d817ee54a44a8f7c5bf7449006844f1d3b086678d44975a9eb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58fd25bf6c44a45ee85be0e8d05249c85
SHA1b699b27b63439e0261bd820bd8a416620581455b
SHA256543bbb64f6297e5b51c6e424e05e7cf3fe9b628c02903054257d18fc9aa7ec2f
SHA512aae43f7b252af90a906db91eed3b5142ffbd067d2cbcaf576f2d36f4bbb911627e9b9c2db8e73b11cbbf0b9fc671c9b83e771b1aa69aab7dcd0efa2706e56f9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e87fd59b53cf4c56a08b8975d7241fed
SHA1a963d643a00dbc6412545785f554369dcc630162
SHA256154834b164630e75e375523fe25cb728032234128d21b1c7bcb0c9772a250b63
SHA51290a124a80044fb8fe3fab64d00d04b6971c8002ffae7e779393f3b260b8af0b4bf255b93834054ced97213fbb1c280a9102699acfd324dcd3f2d59987ea7c50e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55527e883c5ab8f8918ca4a9daa650888
SHA1b752fa07b65c62149b56b622ce6e93a082e72b50
SHA25616255c7f72ebae2b6213a57078f7d41e91ea22e39c4221fbd8155b45588b1e46
SHA5126e98c5a2c2bd9cdb7c943498b9a9a4e72639d54988eac27a1fe9ae2ae67538537480ec5d4043a11edb878c1f47a1b00de564612f561d2eb9457786ac62725d17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563af49e53641542b160b21c8914da732
SHA14b5dbc867842f252d932810eb976877dad64affa
SHA2562f54a84139bb531ec548ce1b02562534b807f13e9c17351b59f396fc0a83f83e
SHA512fe781299f4abe1bf581ba5d7c99c59b804c91373e7fec54ba6ad4978e894af9b14ed9236111ba697de55a2efa04cfb3712271dee6706223464c59fefb8ce243a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a