Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
04/05/2024, 17:52
Static task
static1
Behavioral task
behavioral1
Sample
13d3994e6649a9affd220ef11ab3a79d_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
13d3994e6649a9affd220ef11ab3a79d_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
13d3994e6649a9affd220ef11ab3a79d_JaffaCakes118.html
-
Size
27KB
-
MD5
13d3994e6649a9affd220ef11ab3a79d
-
SHA1
8e15c316a5f810205e086be72a275bf891425a33
-
SHA256
da31a569259af539c5cc2b6e790758f81a40b7a4a42a4b114b96bfbe064bd1ae
-
SHA512
04b1caf620b4d63e40944c21fb2a0df3880da4f35d713e04e44a94e4ce04d08c5a1c880c7864813cfbef1e62d9f04e6e26acd66b6d7b93b3ec3bf78a5075cf73
-
SSDEEP
192:NSEoIjeVb5nrnQjLntQ/tnQiednfnQOkrntrAnQTbn2nQYMCNFAEj+pdE9wuMrQQ:YEoBMQ/FaDFPjCR
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0E6C9831-0A3F-11EF-AF55-CE46FB5C4681} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20fdb0e84b9eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421007009" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c6000000000200000000001066000000010000200000005bd1dba3fb2f3ca47272fc9862a0848ff79a1aac4fa1da8a3b5aa2035ea6a664000000000e80000000020000200000001c9074c06e991976422f9650291177b41f4a6e4e06af99d4c4356e546237ecc220000000929307d95dad72c8b33a6fb0b7ce8428ed8687566cef184a0be1efd3fcde799b4000000055ddf983b0557664d41fc191e967d7e97304b9a651a109e78774eebe64269f00c4a0aed4026eb83d1563e4cd875232513318267ca2875788513c7d12e25b86b2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2984 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2984 iexplore.exe 2984 iexplore.exe 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2984 wrote to memory of 2660 2984 iexplore.exe 28 PID 2984 wrote to memory of 2660 2984 iexplore.exe 28 PID 2984 wrote to memory of 2660 2984 iexplore.exe 28 PID 2984 wrote to memory of 2660 2984 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\13d3994e6649a9affd220ef11ab3a79d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2984 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5031835372af11041b28f53cd5d378ed7
SHA14bce1145f0e8abada5fc3325445acd32eb005da7
SHA256fe2f1340f126394631cef8de52dd4eb9d1bf184a4fbfab8d82c3c2a6e235d8f8
SHA512ea297afabfd2354b9ff5dc2dffe8b9df945470160a35048e5c21b4daa93522e668d3cdd081ee4878eb18eb1611d2ef3e6997e2321ef3737ed5102f932aee61f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53febcf5b0f868f3d06c264ba597e1d66
SHA189da9eb8ae0b9231a3a20744d966011e8bab8f97
SHA2566e2ca07256591d8b77b3931607d902b803606a933ff818d1ec8e1808fe9f7f90
SHA51203e5f1c3b6145d8338b406213cbcfba0b45c97f69ae1bf77a3d4f3a89570ea86540c1247bf6a7aa34a30aba1798460090089a2b0cdfbdfa93e74e3fbc19c22d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562add0779b92ffa76c5cf9bd0a313592
SHA166f361d2f554641decea742bdb7099622a114caf
SHA25643c671ff37f247eb2e5d62608ca00aaf65e875a483f12b30a28126c86deb3dd5
SHA512b73b5c2701a3d5072a2e0c1da9324ff38699abbaf4c38baf8313694f5e24a4e20620a446820dea98f81430ef1f9ac321e82f6f105d1d787fb1d850ea9d271901
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a6ae805c96b465ba5f7d729bd148ef1
SHA1fa0c580bfb03be5ffb1994d88e7ac0f386458c6b
SHA256768ba8fb4e74bef2e04cc9d3ea5947a93d9e7a05d587f0a6a7337391ab688cfa
SHA512d969596d40bad565fe6e2a74312d69a575a4e691d62bf9ed4a056121c54d38b43e6313ef2330a6a577b6643a55e88a9f1cda2c30a4cb120c7563e064dc8ab193
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58495cb130f0c5e67005f70a2a24d7eee
SHA1cd6c8d98f001ffb8c3562bef5f4de2c2ef06b31d
SHA256a7c1ded57390017e0e594a805d1337c5fe40135b5162c52f8fcba0bf65d1ed30
SHA5122869b446886e7b8628458a5e0252ed3f20dddaa908aa7149791a9106e6783d6a6a88e24813cc3166acc8dc04c276ed83d4ccd8feabb37dbbdd3877c5bef0c627
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea8f2ad24365cc77e5df6c1af028f3a9
SHA14fba92415419002bd16f4a60c2915bbf263ec21e
SHA256ff5ca0a6955f8d843a3fd1d32ebf37bb4b8fe4476d6d5a080c0a355486d462f4
SHA512d40f27ec4615e664d1e9c24e0bee755c512f56056b8d0d57c22993f58d97a8e63957c26e877af5d4fca9e9e968fdadf3c3227fd12dde2e8cc8394243dc944107
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53bb932947fd9313d7837b2acfa607981
SHA13a749104aac8b22782496431858eba2773b81e3c
SHA25632b7c0c5cf40f71e9aaf0cadfbf966c2877e7b00a5971bc6008742166bfc4288
SHA5128b95544d6292a12127d41c927576ab0b6143a2d98b347e31c971409888aac9abc731d4a1e79369362cb23b705ff2a05697381d0829070c89501d24a74a32fb49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532cd81b9607f9bea3ad02ef4a16adf2b
SHA1439201db51e8139f6fbd813bc69cebe591f265bf
SHA256146636f5079ce71f116b49bdbd22a2ce656d081add04e30432b0644f28e743be
SHA5127b20527e4a79888ad91a68a11ac24e3b1d1a5efac4f40c453324f94e90835d68892aa222d03b7370b06a36519c2124866881003e3e3bba2304282736ad9d34f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa8666a0ef7917ae82e5c915c8f88f78
SHA1ae4dd9ecfccf8bac14b8a1860211ca0af6d5838c
SHA256aefb824abda6b95b1a9de0b1b33767e1d1cc19a65fa5152b088f095504080ac3
SHA51285121e6aa8702d49939a193fe31aadbdbcefe8346939a52f7dea63007d0fa761b27eaa487a14686c36d281e70fb6683f2d605f02aec6027b0f580e790ec18a13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cbc1737d43d1b30bd483d158ede947d8
SHA1a26e80c3444213907d59f6475180aec0759dadc7
SHA256e8f11b0a82e08f4ef540fffa6448322ce3b97c77a86bfffed14988de7c7a2481
SHA512d3de46a7525734d59e172c863206311a9f9e9040b128f8fa1d4d76cff3f6c2d2023aea0f8d7dc9a9abbed75de77c3c5ddad2d8b535706da37e23035ab65995b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5adaf5270779f5449fc13a7a0061bab75
SHA1a1057d5ae1f7a6d9d282a751aeef6ab119752f38
SHA256513a53405eb40a6b1225e0eabf94cac7958ff9c862019e29c624737089d958fd
SHA512a5ac227200d9852becea9908ef3f84da783adaadca9c9188e52bafa3b437f32316c4b794314ac7f6fd3cb01405077474f4d6572be2abbde084f1eb28d4b2cea3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56cb848198e634d8fe4e88d168140da67
SHA18c0b48d60ab711778517c9f55cdeb5b2db2a6e26
SHA256620218a156711a75da84cbd09b042471ce470e9cf264b9ff7a3f77d2fb74e169
SHA512a0ab7a5288887ae19421004a737864d1eac3886973c66140c4b579d40be506456553d346e1a9e996f1dde3d5d615107401c407e9c280557e19f2334741c0ae4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5393b4e6e2e957a4485115cf795ba5b74
SHA10c3afaf6e19f2e108204848fdfaa9c10a5dbca78
SHA2563282d252ae74566e36aa8f667b52ef874d4010b9840587c05e94c0192899ecc7
SHA512201748e68e2c9b23a25083b01008b77cb4dd7a3f55379f9f1eb57e9a6ee6c89b48ad5141c8ad603945805d4625bfc03e005a5fc8acce028d78abf7947c3616ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5038a5362ca4456f83780ca8b5f695b8d
SHA1ebf6a8ff79655d792f06fa1356cfef3ac0b8f521
SHA2568ef6e57f1f5c1c798ac968957194a2b37b3dce2abc127f19cd1b44db6cc0d80d
SHA5127252ee9bc7ba0ac7c77a9c81c376bf09a18e3076adc47eb76a6aa8375db39fd708ff8fc4273cbd29a3229e392b40fa644b4c1958de1faeb236be94301410930e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c450b50c571a984c819462df4c861dec
SHA13b28322c68a397557506bb3ab3c07c1f1e6d9716
SHA256108525c89900274f672ac853c3bb1e13332fe58b8ddb100c6ab85061c8fbcee6
SHA5124bb8c3a59e122a6664523160a5266bbde8f46a0b803f15ec68a929d8523f6c067ff5be66c8f6541852ea42938ce5ed24ba9e047587c958e2ab98abd1eff902a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5734ef0799db1b9a33071a1f3cb697dc3
SHA1d65f60628793057a0a9555009decef38c699d73b
SHA256a6fe1f7508ef99103f6ba6d147571af142abed0142af35da01cfc055cb835ed2
SHA512ed1eb90a2c9f6c7bf228a36a6e6fba8068e10013e41bba4bc1767c7c29e765c76221957df369aec11d6aef645f8ce3f1ee89419a8f474b3a81eb782645af097d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584e88ea5f1e460f2a890c5871ee01d49
SHA19a1531a02aa634cdaca0342570cff23869d00f13
SHA2564bf0c850f1f9f7dad1b48523c7418719396ce94f2f200fb9c719ff17493b1706
SHA512ba7183f78055f9f00bdb7f4a247a063cabde43a80f658885cac4f6639a230340961a1dda62c102f5175f754e542165ba77f879d364fa09b9b477f63cf1cfc699
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd415fc46cb491ffb5ff55c99aa05c7e
SHA12e168d26fc2c51cf794b5be148feba21c170eb5d
SHA256d181f39230cc1e99f1f9a875176e24c60840ecf787069d554796bfeea23bc0d7
SHA512b20d64029e7be8457ff60069ec41210d539e597a6b176e75e022dec3d163ec2fab4e82e669816cf5c698749994038c44d68ef45b5bf52c2c4b7ed336ddcc6233
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a