Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
04/05/2024, 19:20
Static task
static1
Behavioral task
behavioral1
Sample
1420a02e07dd5c618fbd5de47ec200fb_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
1420a02e07dd5c618fbd5de47ec200fb_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
1420a02e07dd5c618fbd5de47ec200fb_JaffaCakes118.html
-
Size
25KB
-
MD5
1420a02e07dd5c618fbd5de47ec200fb
-
SHA1
94642ae76bc7710c24633e1ce709c10e3ecc11b8
-
SHA256
828699e5ab6d0a800590282f189a9eb454aa407f57436a6d468481a7cb6444e6
-
SHA512
7fd5762897b33dfba5549a1bbc0afcaa8b99a1a3c36290b3915e5967103ad1496367441b6db8ca14ec7c96807fe8ceff3e0f6818dd2598fb7ba780057e5a129b
-
SSDEEP
192:NaIo4brBb5nOnQjLntQ/RnQieFnInQOkrntf8nQTbnKnQRYqCbAUpdE9wuXMLnFK:gIowZQ/0cnb0
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0a17025589eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{50B273C1-0A4B-11EF-B7A6-525094B41941} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421012274" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c6000000000200000000001066000000010000200000007f29a4b5277666809dab087f8ce27985972b6f02217518f6b4079676dd1ae188000000000e80000000020000200000004b37e1bac23bb3e54c1bfa8cae2ae5e704d03f58e8326d06e90a894d1397c30f2000000006431025d58b0d80a47c622ab27846f6a0542b6e4b859acaae04206fb40666bc400000007527592ff08534a7ad0fad24cb174302cefbb645fed9203f049e7549ae48a62fe6ad0177d4c7bac406307398c450b6ac8642611fc5e7cb41cda4ae46d5b2b035 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1512 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1512 iexplore.exe 1512 iexplore.exe 1820 IEXPLORE.EXE 1820 IEXPLORE.EXE 1820 IEXPLORE.EXE 1820 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1512 wrote to memory of 1820 1512 iexplore.exe 28 PID 1512 wrote to memory of 1820 1512 iexplore.exe 28 PID 1512 wrote to memory of 1820 1512 iexplore.exe 28 PID 1512 wrote to memory of 1820 1512 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1420a02e07dd5c618fbd5de47ec200fb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1512 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585fc4007d54213bc7caa2df87ff959ff
SHA16eec1fde300de28e30e9084c609c9e36a5b8759e
SHA256cdc45994d79aad19d7c8c275c68700a8f474f892863f7805f8e493a40d1048ff
SHA512597cb3f73f0e5d4bfc063aac83585e2ed7af686cecd2f92691fd576a47c5d531237b12e0e339ddf1465ea1060395f16f49f1040c63ed17b20c983040419fdf57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e93032c0417d63870d29824c439f8936
SHA1c60325bb1fa83bd238ddc0a9c75745312416190f
SHA2563fae32f0d17747ff0b3d094b21085daa336f374e47ff8511feeaac3d6f8c5bb1
SHA512164ddf854db8454216a49e5db198edd4b2140fcc9e0fbec18328a0d6dbced9f90737294979ba917cc813c2a7b76b650471ffcd72e63c94f67493203f4b46830f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c65d2b8f31dc0ac37f869f1234da68cc
SHA1d9659643dc9461995f145acb27425a2f2185f428
SHA2568d8895851a6e9c0ff79d61e853f4b7127fc861cf6303c81a87532049ee80b188
SHA512160e9c26b857f38330fe15ea8ee69f510295f55550e73577195db20f87307a59fe89a45334e851a5d8b8b4a5ad8738d13e92c1581c263ee6aeba3b60c3a5eb2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54bea57ff6070abfc3391e44525aaa851
SHA128f869bd2245a1524dcdcdbb4e598f18501ebeca
SHA25628d9c093bc7005cc4055068199496c79c9c7a1c36f7b018f0640600f7a9c9aa0
SHA5122b5bd7f3e44e488b77dc508e60e0ff809bcc246c79967935a2a4a67a4eac05b6383371bf04acc1c3ad99b966c1ce1cef2fb3791b4c2fada9cd04646eadb19472
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584130ce95a37395d9d67c887bf894707
SHA1d02ad89ab5611e98bc9ceb9e0a357c923e73d977
SHA2564bb4ec85e600ea8516962597b192ad048a19f840ae7c4abd2ee8f502300e9db0
SHA51226fbdf32138266ca044558b4df1aecb274006f373a7a8e76aae7dd8e1805b2774513af1016d315a824d37f525e8ce3f6b3ed2fe1aa679cebf3fa78e0df576d35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae3371effa5cdc27dc69fc8ecc5f45ba
SHA1c80faae5574e713c5804daeb9127fbdd4d45de09
SHA256273003fed4586cc184992284a707a7a40f4944a1f65648bb32519f706028b724
SHA5125e0bd29df09e5ee3002696877dc55b25e22e2e337cf86e7b1e0d74dc0afb73abec7d69bcadfd841cdad13ee0ad340e75ae7f15533b089d285fee954a2416870c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df9d8cbdc17a69b12dcc08065fe80e8d
SHA1ba443761e4d6daf5f4a06bdeedc22b98956b16e5
SHA2560b82f8fbeb2787454701dbc7de030c66e46fd9c52cefc9745ef2e89ee30a1cbc
SHA51241e8c03559800bb3e24ec72840910e420bd1be0e15667929cba6fbf17a192e65bed22e93847f7f4badb1dd69f092049ca0a79278394294fc508b4cdcb6ad39d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531b9ef9bdb25bd58c9b77354ef3eed70
SHA1d7b84c0ee29274788fcbf841117b2f0aa1289062
SHA256fbd60caab8a44ca1f20a83eac0e4029ffc73a1870f79e046c02051f06f33e2cc
SHA5128222dfec0e5ddf0f67934c9ba7bfdb7769ad6bc302889927b696f0e863aa38d9c2d2a6166a0b49350b9c5722e4df0c1ef86f00690975b71aaf9774cfec88bf4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57880e78a952c86da8deb5f3dd1d44d03
SHA12de81d9e5ef4ead37709c916190e265ef1b0bb65
SHA256d5218768dacab4a9aa932d337e81bde7f5a6d55b1ad138d86fa538b9d5e36906
SHA5120858b275726cd0b8ca93b0411a47d46e91ab72dc1cfce802b23f47695d062fa7e304c8a4e48c8ec321b79c1a01b56c534f534cba8998fffef83180631821d21e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3a715e540fe5c6a463f07ffaa357a95
SHA1c76d891166f535b903e6b33496fcb4ec6ae2fd80
SHA25693729a6e114164e1484d8fee8f8222178c3dfe3f1203d0b11ade23ec04655fa0
SHA512f14362d21bd77b989253b6e7d0b9e38e1c1e2aa469d0b20dde8acf98dea46f555ce57671a32c5be40942208ed2811d803d34832e93a973a3b3f9da7323e1ce4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e9cc82fef0126f7f3e85a4913dab8ba
SHA1baf9168d8c6dc2c89373af11b356ee40799fb6f1
SHA256cd307734dcf78a855136c27c6c9f8d2ea7f6f3ada521c5925980759a3dba18ee
SHA512b581cbe1b6a2172d6446dc7a8948a7fe1dcbe061d8a45cb3600d5bdb6ee4b29cd1bef57f2001a574026867d884cd42db553ac311e5758623cd878cb343d0c7e6
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a