Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/05/2024, 17:13
Static task
static1
Behavioral task
behavioral1
Sample
13b3d3343645bde32f39c4a5067e31a4_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
13b3d3343645bde32f39c4a5067e31a4_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
13b3d3343645bde32f39c4a5067e31a4_JaffaCakes118.html
-
Size
151KB
-
MD5
13b3d3343645bde32f39c4a5067e31a4
-
SHA1
36001fb55ac469bdf8862d093ce6d9f7b430ebc4
-
SHA256
09ddaaa294d02f842062c83142d9d2e4b1ff2d36186c3f674d563b169ba86cf2
-
SHA512
19358f86af95aa00f6473cf77b535303d571c6167de90ea4c74cfa0efd1aa080e17a52d1db160b9bddb86718150f8a01ecf37be247f2084f7c0f3d609b1bfa9c
-
SSDEEP
3072:FiHkXzhTn9yfkMY+BES09JXAnyrZalI+YQ:Fi2hTnIsMYod+X3oI+YQ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421004655" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{93E84871-0A39-11EF-815A-6A55B5C6A64E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0606f68469eda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000046498c2db6def1d93e027a6719b6336daf3e790dd634340b43a27878321fcfc000000000e8000000002000020000000e48dc5f4de95cf1168fa686dcf4824aa9085d2fbd8ab13858b3ceec450c3b44920000000cd300358ff216bf3be580e96149aa735d68c52b27c6b579284a65ef4aabb70df40000000373c3f15db8d1695e3919502d6f81c0db3e66e823bcd8d28088dba94be5782a29416ac478b4c6301a2e7417b5b3ebe6b4fe374cf195106be03c9461b6e44f535 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1132 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1132 iexplore.exe 1132 iexplore.exe 1952 IEXPLORE.EXE 1952 IEXPLORE.EXE 1952 IEXPLORE.EXE 1952 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1132 wrote to memory of 1952 1132 iexplore.exe 28 PID 1132 wrote to memory of 1952 1132 iexplore.exe 28 PID 1132 wrote to memory of 1952 1132 iexplore.exe 28 PID 1132 wrote to memory of 1952 1132 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\13b3d3343645bde32f39c4a5067e31a4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1132 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1952
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e8444cd44e6aaa3d2aa9bc3b80bbfae
SHA12ec4f69881319e53c8dd57878be62ce2e7221937
SHA2563f052a64447a2f631633dfd58b1533a167dd6118ba0af956a191274ad9cb6f41
SHA512f324db0818f1d75841cec6c6a28f620db41c72405b8430acaa58bbf3a9e5347c7669eed1982641bb80d0ddf882549bce962bb1c771c7e731795a285e20d0bcd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a921cd005893f8157eba246bcf27baa7
SHA160df07d51948cc8de317bf770434deca39d179b3
SHA256367dbd6bbd79ad5874e2ce94d6d7c52b10d5714b4bd54b10104ea884fa65da07
SHA51287fbff06e65ca093d7df35b44826a27433f085ec6153aedfdccde82a0907f6c144c26e49a5a79d11ad7d17d12afd03dab64b9fa92c133d75fc3dcb23b435e1a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7c14cad0fb1bc7b5e42fe8e5b4fdf96
SHA12da9c27af9bbb95fac1f3d4ab8e0924bcec6a5de
SHA25604b0513e6a776005c5d5d5168f9c92ac3b9c8a2d705957708639962e3bdd4c49
SHA5127cb4c92ed32e2c6d566bef1b8e124b3159da32569511cb68206a877c0cbcc1f0dea20d767e8bc000a9b90bf0f65a18286c952d55e665b1b3f7bab2f3e6048460
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50feaad6f5300ae9b43437be7c14dd385
SHA14877f8d858e80b036198b5088cbfe63fac3b7fdc
SHA256f79ae60720965f60a1bcce14f49ba13e0781cc9c85626d26cde5a87baf29f29b
SHA51271cf0057d1118b5f11269c700ff5a1f442d2e896cc2189a35755af13677b89cbe4711eaab0657f78098551ea4a6038a5b2fdbae1f782b9bebbdffa957fd74bb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b851f86e28c1fac19955caf19357fea1
SHA1526f01a9d4c65f09ec70893175cfb01b22c7a028
SHA256f60e610b11c99edb49f7876b5057f8853d2e86678c5e8447afcd6177d144bf4c
SHA512064b7dcb92a09ad11b251c29538d7da731ca68ed17a79bea2723f06823eb570608f9c1787d2c255808b0b72d1d7dd85374d781889c11080fadeff66b945904c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5112c5819a95a305478b025a1ca4b7b7e
SHA1e0db0aad5361acf603cae4d346d5af4bdfe0f8e0
SHA256f79cbc6dfd41ad6e22787e3fb2269395975aaef5d2f4070b16288d5fb4f19834
SHA5129af2ebe0d293e1ecbc3c95ed7cf85bafc6e9415344135d1fe3fd411e4b818758dea1a42842162a18cfd0cdae2605bc8b12eea16df312abfffa659cba98745adb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58389304a27779521e753e282dee8cf12
SHA148089cdc0ef6d9c71ae0b2f80d3a8ec32eda8624
SHA2562632d9c82af403582bf97d22bb6c3fb33406dad0d786f827486f4788f8f80970
SHA5123fb06264f3ce8fd742d6100a143b0ed10e7c134ae54965b689e956b6cf0f10550eb5c46cf82ba98a01e32cfb4461d1ae63654b6943e7aaa7d2f4a79806528a61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d384e5766a0ff2ea777e546e5d62895f
SHA158d9f3730ce8fa95775f70e5967522feb0c42acb
SHA256f0daa2936b8dd2686a47337cfad2272afe4f517f6a17f12cd5b2183238c61348
SHA512ac9b099e2831fe3526ba04dd20cc46bb50c83fbb0c026325e4c2a17f371c02dcf7ec5079445edf457632523fce19f8c66eb2acfa96e16adafc8bcefd1ed32538
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589f96586381ad3e3ace9d1468db92391
SHA14fcf53a94281870f885df8ff412243b9f25406a2
SHA2565900c1010f62f418ea999deaca034a752fef03eaa20a2dd0ba1ef493e1e31677
SHA51291aab6139cb57a93ec1c16e6a7c12c17a2ee3e8add1bde53690ef32453d32671ec27e1df837e051a7d1e39c29d0a1b88435a9e7735fda7e6d50162a9b4875655
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a427044b49b6d143cc558e7df3fb6250
SHA1de919215b499eaeedc7702be62f9d7bffbbbeaa6
SHA256e7166c39e91b14a9c222b70359a43929f7524119d524dcb073146c789c8ddfc6
SHA5120f64362fc17340957ac564f664047eb6da56f90a2fb23b854e231c108c1caba1b21628e8bb3ca5c37e7e223d73980c8e229a0d7cf975d8ae8e8288b73127fe54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9f75e5c5afce119fc7e292fad7cf71a
SHA1ddec33e2de13b4c0a6785f64561c0190b5b9a394
SHA256ffe6ad13565b899cc3a34f116c2e8a35837bdd7e5c1f92eee96c67de0d66ff32
SHA51260799be8b947a68f467a696bb04dd3c7b4767186e0e10a33d355737da723ea6abaed3c77f6a5ad596b9c00db4df6bfa1810b2394dec3570e7da168bb605e47e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554a5fe1cc710780c9e44e6294cf65739
SHA1b3c3063204c0f5d868977c76041ce2264035c009
SHA2560fc49974a0228df147620f039a047826010f955e052610ca93a2418cdea14a8c
SHA512bdc2e9093c7d66c8f2f83d64f558de86f076a772a0df6ab09658b3ca9b557825907291a8b45315911c3c5d5ae64c4c90c81545f8846cb1e98dedfa559122df25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5777e117d3c8e09cd768c215aadbe28d4
SHA1aaea555cc87701c8578e5698742a9cb871efcda8
SHA256ca33cac527db1efa97ea817f8581864fe2f76e17bae37e474662b80c6a904b6a
SHA512b5f80bacd9a89cc8854d123ca3e8d7fa767109e0f295fc50cfcb342f400bef269cb6a7063bad7b720f50c1cae083dc4ea20df8b8dbed68e7e2b83093ff68569a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0c8459a216cd09a7d85da14167b548e
SHA17d3e8ecf4afeb3d93948fa1f1cbb08ce62ba6af3
SHA256d72657dc953e308c9a7df1d85b051d5ddab8cd4609843412912674768069aa53
SHA51269d91a23e008b1a7ba2f908891b6aedee747f1e83ab7b3cd72d5cd6be2620fe8c045c3d60328b4b36f6e4c86bec567c959bc600da33c1d4c938d5de07a3fdc52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53bba60aaba0ed5dfd272e86098234601
SHA1b810a7b826bad013487f106ee585a13dad0c040b
SHA2569e2939058d69c30539953801abb43b43c505a26daabcdc486a484f462aea4581
SHA512e9082508edddf92a8a79f3d734dd6595e30c6d3335ed779c4eaa54872b9b7acb5d33068982decda0f464c65e4b14767822168c3338358c5312a2c1083bffc057
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0fc2881de8858b7672b6b2efe8b3c08
SHA11d4b0e276af90db5a0e97be32209e8a9a9d13c50
SHA2566189fe1658f4360c090e0155fff95d5aadb59114127e7f1bd32e0c09e94e5806
SHA5129b4b5bdd51e85f02a2f544f3a4eddabc471d2ecac6b001a6467bbeced5c0ddb899106438331bdf90e9e38f616049c988c337c7eec0aeb8c44373fe28f5e1a9ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55fd7b1befbcae8b3d392571a0aad003a
SHA195a80918963c6e9d93819d10f37b557a57923adb
SHA2562803c05afd34c98800d9a07e0f1b45391a4b728f85464bab497295e2714b3967
SHA512a1b5c411db015e5e428c8f428714b9ac42dc3df9e1c09d62d2e7d393c00d647525d74a4920ccea83896374639c9498932afb619ea4278aea402627b160336988
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51983abcc963db2b860adbf5415744992
SHA15ed50d71ba1ea4b46e95b8d0f278d32d9d661e02
SHA256328479905911c64f2aa8259e451b4261b4b05126c8a8e09226592513fe7ac0f6
SHA512be9ee45a798f92b95daa70036d5bf32e8a8ce8244e3cba50bdfa43d7c6080d82fe939147ce120efde75816d8919708a7085add3068a8c0d975bda7990474a101
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591bee70f310c59a98d17816ad09e4a7c
SHA1d46ef74748dbf1facf786d7b97ea3247ab9fcc9a
SHA256473a7d87f83674d3ed54311d6c3d82838c70984296587ee20046fea18a7fca56
SHA512f9b187070c3d32b394310356bdb8506ada5b1c647a748980d3f8bff65318e863b670439939dde700ef728426dd812e6a819ed097b2ce1244c4b82db179deaa43
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a