Analysis
-
max time kernel
148s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/05/2024, 17:43
Static task
static1
Behavioral task
behavioral1
Sample
13cc766b580726f035ea889d05876bb6_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
13cc766b580726f035ea889d05876bb6_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
13cc766b580726f035ea889d05876bb6_JaffaCakes118.html
-
Size
36KB
-
MD5
13cc766b580726f035ea889d05876bb6
-
SHA1
2081b7092fd2949551bd887f37ca165ff6350668
-
SHA256
b09900b929808a20f70a7e3a288631baf50ec0e7b3da0464c4be5b90bed9d777
-
SHA512
51e374b889cf1c6c2c37a0519c70bf0b34d79ce8ae451830720e3cf151bdb384859b6a4f44bb2238532ccfca56b7989a2ff95e42fcb06b78dcc89a3196070171
-
SSDEEP
768:yTLpQQ5RvKm1pbfzcYavK002kzdaNLOl7B+ndf6oaK4:yTLpQQ5RvKm1pbfzcYaC00WbndioaK4
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7090a7f14a9eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000d6e35913cd3d9ec3228710f2cdcd1fe70dfaffaffe220a9939c7549f8f6cb38d000000000e8000000002000020000000ca20115e15c1b0a566f98038c1324d301375dcb3547e0bf14bd8095382ebf63020000000cd7ac98466dde951a474aa7175ecfad78e6f25e05d8f8db76adfe09638bbda8640000000890c1ea8250110af614753a11d143d892ebae4ec887ef9da49a02d26bbeae72dfa0d5ebda3d8ec838fe0d5f61835dddafdd07cb22d1cf1c272eaf452ba3087e5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D6ACF261-0A3D-11EF-B826-EA483E0BCDAF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421006491" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2872 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2872 iexplore.exe 2872 iexplore.exe 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2964 2872 iexplore.exe 28 PID 2872 wrote to memory of 2964 2872 iexplore.exe 28 PID 2872 wrote to memory of 2964 2872 iexplore.exe 28 PID 2872 wrote to memory of 2964 2872 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\13cc766b580726f035ea889d05876bb6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2872 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD56c4ed6926faacb785601c7d2aa42a111
SHA16c9c58051c4aecbdbd536902f6d3135d5e80cb95
SHA25679c97ef3d144f60982a07d8295dad3a46dc72b423b45f188c714eb572940c255
SHA512632e25adbc1982f19474a319b4e62c1752f0c925d481f4682ba50451b97b6acfb292d26ce867f58f3b6167db1520270d98bc0947557c452be929d11c6337ffc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b97d086a3cc3d12302f3336f6a16833
SHA1c32c9b29e7a1e71ede1d5802900b2524fc051820
SHA2565197a530c0ab44b77f6f41c5f03580369727c342cca825dd21e5eb27c8882c51
SHA512e1788b0f3be8dfc0a7c8f1d4f3613e8458fe1c6fea06071ea22e7e3d4b6d5e8c3807db5d0f3f147e4d6e9943927303d3df0e8929eb30804b80e984a5cc0293e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab162666b2e3e04fa9af8c300cc28997
SHA174cf7fab24b397119938c058264e5c0d2f6c415d
SHA25693030d9728c19ad167a4bd2e6f2429bb69f42d6e641267a32782602b2dbef93c
SHA51222be29b76672eb6135ffa47e7c33d7d65d12b5c3849df0700aa66a0d0ab61658aea06874d817f03e13f28d161448d7d6a3b590599f222bfe66dcd80756688f65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57046766f1714b0b1b6116e6384d56346
SHA1e0a2a22cb32594fa1620375ee1031de75c70b9eb
SHA2569a7b6d2b9cc302aa7349868ee6151605a9f492610391eec3c8f924c7812f2e26
SHA5127d2c7e82023fdfb64065dda11381f84edd2e7bcc6c108fe31b048a0c3b03cb8e19feb080cb69b905659f94e1782ec40dc6fa546dabcc86225238a42c3faf8c2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5006c557d8725e9a2b85b0578cf7d85ae
SHA11562f3a8097b1d96806e1d10854e0f98e5f571f2
SHA2568f81d3d47b5180b214801e1142f70ae8d8cb24b13f2931eb5e18f0cbe7710632
SHA512045aa60e74167ae34c22f2918aa0c17be255cebc70ea75cbf616298d875e564d97d792ea28ce25f0d66c0b4c6c15eb4e54e26e37dffd75409f96a6a3293f8885
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584d1b3bd633a950d844a64e461a5395e
SHA1ecb301be1f75f3eba6b6290a76f0e16c69213037
SHA256ab3e7fd1d076e11350d9135996b0af674c5ea2db193726d6994b1f6f5764bd2d
SHA51211854f0c682d703e3e83c36731652333c3d6f93902b536565fcfce8c55c0a1b6c0190d17f6ecce4bb6d9a15b509c47693b1bab90924835275d498d868b703b42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52794695d18f114352b025fb2576170e4
SHA1dbcfdcabc56b144d21d9354e66ad5d42858dc88f
SHA256f7586937c263d143778d9a35bb0f0038a99a847aa5c9720a4bd1043abc1422e5
SHA51277669ac85baa7663a447b074fc05fb0d28a8604f2e46a8b827862f07fa29fbbddf51675e99ccc22b9e4a938e6e6297b1263ed33c377baf77513527bf1bced948
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ca2595b560465ea53dbab60fda5e317
SHA168b0638d68bfcfe7d56eb43cd616ab552f461681
SHA256cab4588401a8016ab5ab7810df76f2cc285afac0a6897d54b859c6d9e9db1a1b
SHA5127967a3eb1a53275cc787dcdce1522875048a3dbf509fdcfce08a541ccd3bd99e82d6aa371b4336f6523b847e8a06c37b80a21c251d2e14cf08a72212c77b30a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50de6e724749b853c11dacd6e2491ebac
SHA1c22305e9835e322298eee701ad98b635a1ac3777
SHA256aaa1c89fb070faec1d3b56638a83d2c3964ef1a76a35339febb0653a8a1cf356
SHA5121004257cd7e45c4477e5c913bbc0467bf5df13ced0f1aae9193caa6180cef5f243e4e7bb498469ae3a32f1153998877e64794624fc9e9faac1804a8516798229
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d10e44b2bb2363d888b1b5282b774706
SHA1d5fc0e1add034d0049a8bb4eccef7917717417fb
SHA2567519e21dbc27c706c1c33c8b054ec016f2941e42d955fc59a0feaecfd8cd14bd
SHA512763ebe6a03744d06d20bd984d0b8d87f32b5ae86d3e92f16cfb39c2eed75e6854821410d0e75523eb997bd7cce96af04d01ed436fffc62c1e75cb1cf6405c310
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d319536e0c04755bdffa6a37596a166
SHA159a18601dc24a329d6299db3dcc0a70d3ead6c6b
SHA2569bc68f2254820830e85cdb360e16f09fa8674bcafa6b7d1f695d2c70c181ca53
SHA512adaa5f0b2013754311beaa348e97f1f7c6b072ec3be1d523bc4802af7843a8ee412119250a081317450630619691c961f1475eb3499a345293acaa81f9a13c39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5575d6b8262d4ae8cd2d9aba2c162e44a
SHA1347a4d86dcb77ecc089f19cb7221c23231ff01ff
SHA256242abac8d2517cd4dd2e4e7bf97bed7bf7e15772e760a2d2c82c8978ac5dd377
SHA51207c92b9404737b8b8089183f1173ba45fb1d8f9333df538be8453019630bc70e8659462dea60d6bc49c4e9ea4ab1b888d206b7d3ef576b26070574915729d8e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518f6652a6cd82042d42b0b97dc4dda33
SHA1c66346f3df2a6737ad895c7cdbce8f598d1111d6
SHA2560ab59a7a451f60c7283cb454c9992e3913061fcace3203d5402270d60234ae4c
SHA5128dcf46f40bcca7a2d92fc175007ac3d1293a287f25186f026ece3cfea3d87d7c9ca2e665bd29ef0b7050209b5949dc45c64cac593f91eda5eccf14dca2810810
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f6581929f0e20206ea22bc48b3e5e13
SHA173dfbbf038e4e3f98cda0f6e56497dce520d1757
SHA2568f19eb8e2fad4c46b5fb9de5eee88a93150f161ccd75356aa2af0b8947be94de
SHA51266351907685b3814121b29454f86425e4ec1c78e07b227c42dbea03dea676b3677dc98e79a1924e6138cffbfbec94a50c8beace74c60ee0f4f42050b5b8d7df5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51600264bbb8d0842a0c2d34f9a744db3
SHA116f102913cbca3a4fc4fe4f0d91b79186991e1cf
SHA2565a7fcbb5e1646dd48336c50d4367e7c97e77177ffd86f92adc8978984c692a7f
SHA5125d869d844413dc2647060fb159690ba603817393a4e57faaece84f2b98cfc5fead29bb51839069669167c4cee36694be9b8e2ae89b95b4d662d05f2a71757869
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD56a66f068dca3696ce6abc4e995f256df
SHA1fc9578bf0a207a2f6ce55a7b1a0df7b9b114b951
SHA2568967a33c853727d5c96f65c6040adf7b8f3a0f01e0d8fcfe9ee68c52810a891e
SHA51235e4007e3d86eaec21ef971d772bb8f512f2a1c037ca94f3daa632ddb0b027794b46da739ab070d44726883344831c06cdde7308cd30006be5f530e5b47f1a5b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a