Analysis
-
max time kernel
122s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/05/2024, 21:06
Static task
static1
Behavioral task
behavioral1
Sample
147baa63b55c0cce01db04603976b86a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
147baa63b55c0cce01db04603976b86a_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
147baa63b55c0cce01db04603976b86a_JaffaCakes118.html
-
Size
142KB
-
MD5
147baa63b55c0cce01db04603976b86a
-
SHA1
5485aaa0b34a8891de1f9f1e9ae34a5b45d35e31
-
SHA256
b0ef3e9d199bd5280ba0470bdcf23f05ec6868c758a2b1fe4e028902f52288d0
-
SHA512
7ae257297b44a0f9621f85f6ca283ac430748bb4bd45a61df94446bbf719a2cbca066d3e9649574debe50c1a4ecb39b55e77be124e772c514eb558b513300160
-
SSDEEP
1536:a4WIfX3MCTFNIRTILDX7Upg7MmpHopiOwAW:pzfX3MCTFNIRTIn7bpHopiOwAW
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b000000000200000000001066000000010000200000000560e24594154f9a6bbae4b2071f79a2c30a71b72e7634c7cc773e1b87115d7f000000000e8000000002000020000000ee7f8d212d4c8bd84104d6d47afae4e76982a9057598b67e199f4ec2ea1f4619200000007f321e915f3ed7aa31d1c13d8d7b8acbdb1d6346fcebced81b16776a14e41b04400000007ef2483394749675bbe56b12d1a1838364e45439371393f0ff5cf6ad1f76d6ee8afc1c007b5c68abbbdc9617d21b5efed82904a259129b5ca044a59706bfe469 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30183901679eda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b000000000200000000001066000000010000200000008de2fe39defe74b97c969a6b7da2f305580caefd056d8424b37a40911adcb96a000000000e80000000020000200000000baad6a1ff7410bf2c6475f89fc147d61238214af5c2836df52a26e88116e6299000000088907f30d78e2cc0b68e1448d77207f38ecc64f16c8de21c29ec74b897ad845b87cbc0ab295dbcf1852a272eb1bf65fd65f155f778ef202804af5cd74a3286a2f82ac1c20605fb4ef3f627866b0fa8931ac575134df3ebd4e133584cbe2a586d8f29b0f810b0abe48f61d37de4c838d79557facbd3411fd2cc4b5b671ee7fef7d81ceb361b94fc86c02bf392e23231ba4000000098e74abae9767849194ab346e126c34d7779b8ad07d23b15d31b5a91d0a2c60c1f884f151380938eabd0bf4972d72aca5c3a2aeb85771c83eb6fabacaf7a2723 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421018650" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2854CFE1-0A5A-11EF-97FB-6A55B5C6A64E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3008 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2648 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2648 iexplore.exe 2648 iexplore.exe 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2648 wrote to memory of 3008 2648 iexplore.exe 28 PID 2648 wrote to memory of 3008 2648 iexplore.exe 28 PID 2648 wrote to memory of 3008 2648 iexplore.exe 28 PID 2648 wrote to memory of 3008 2648 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\147baa63b55c0cce01db04603976b86a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2648 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a9de58cc60eeb254ce9737403b791fa
SHA13cfcfa73b41c2f06d5e556a56c1a6a240b8fc920
SHA2560a19022d587b07cc54d10305487e4649c4b61b4ba15c829c2d6b428e7f98467e
SHA5121f276c0109baa650e30c659844f6c7690469136264d6f5233402a9bb56da72eece9f306cfef30e5b1e45ca94d04fb05998e0b8cabb677cd2ff60763df2fa1da1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53209c48ee18d49055c3923ba4fe4e4c1
SHA1aa7cb9f7f0f903dd518a193cfb299dd4f2586366
SHA2564487096155147563d4b6a120fa17a547fb5f8b968ce16ac45b6e6bea18bf5abd
SHA512d754d0ce4b379a0743931caaac9971c6f651e04284156439062fbaf5823ac400d034ca918a4bac238e52f91c10d6723104da34f6990470f546c5773432980f53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535a8a516604bfb9c8d89df3af22039dc
SHA1ed10f7e8d28112b550e3ca04a477cc31c4088409
SHA256c5ac6cbe2cfc2bd5940b89451741fa5a71e079ca73fd0b7a5d3b386cf4ef34ed
SHA5125f6caa085df7175b227f0b70b3074db7096521fb4605ed8b0946fbd94d8fe2c3f85b92782d5774ab3e268c12b9986fe459ae5f59ab934f9a5ae8b2dccfef8b4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596104d7a135cbfd1a13245bc1bf4d793
SHA1a9fd5e732e05b5ada0b59d6daf06a575ba61b958
SHA256f0f03bda38784262cf79f34874081da0ab2e68edcb2a32f9577bac48484f2b68
SHA5129dddc0c66a4de065d07a71d5cac4b5bd9a66fd611414526347241f98d123822a8b3f5b8d34d9a4fcd1bb489e366549762b49e78605799b01b2f150e777b8d265
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55fe0354c9b0e079987484ef3b78e9000
SHA1cfa38b40b8f9a5168c670501dfcf9516deb02865
SHA25653371a0b28942d9c24096451af8f14a4a5879abbee7f1f6538c9ecc3db536aeb
SHA5120641b40081fc1192ef7ff1d250d08db1fca607e3c3d9cace1b729352e12f4c1ce4c6417f6a78144cd0cfa4e997823547b1c3ed0383500c7fee8e94a09e2d7a77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d66c473395c0019d1024035c831bc37f
SHA1c0e79d432d9668942b09ec5c71a0fe79ec752fe5
SHA256be64a2037c7ac43a862e085a828dd7a0bfcd0b99c0f756d3cd8e48674b5ebc5d
SHA5125bf04fc01b2188a28356c09c002366755dc6458b232e7fae89777d1b769cbe935e99ae7e8b27510a4b9ca07ac672ee3b943030e5f84fc7ab32548bd2088fe23a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504d05ab78f145ab07087a8f7c245aa15
SHA1f1e2a1207aec4b5bb6aaa079f687ee7afa2306ad
SHA25673df5eb2c943ec90b80c2e1d84c7ac81bcbbccc64c6d04b856a7855dc7f2be8c
SHA5128a35dfd19f4613dd6866fd46ac4735efae1dfbe50a30bb26f3c35871bd90472b29adfbef0751b02c4461005f070fd81f410d42f0371c62984df7fe72809a67ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580162110549d0107f20ba68603c63732
SHA11a2e2f606923249f4e8dc7c9c7496b1e88fe4be2
SHA256db8d067c08fe8b192abb73eeb54582f2aa29eef48d1d49d36b2827ae1d6d32a1
SHA512a33a60b8f3469f774c250d8eeb024243eed46fb4f589359b160b3c532a0b38db2590002a98f4600a09f8a8a22a313a666a5856ff86183804ac19037b3a5bf04d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57cfadbdf76cc11876e4810f6c6407c6c
SHA1651900ca375d0052a8781e719fc793acd2eb99bd
SHA256801a6e8aa4e7a627e30e1c20f3c867bbc25c14c443e294df145f242c89d2b189
SHA5120e59dee22ad0a7d1b4c45d646cac64638739e1362c8c98c4d85704d2f0b4717d3697fc0baf8bdbb37e6f301336558b40a2737a2c8b6beb861e35eb44e247e5a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546acc3d38b8c6b44890a820c18be6823
SHA12f9024219e007b9f8cf0951a32e2107f9828d7d5
SHA256c16c46d0bd982c0c949fd7cdd39ea7cc7ae218735f13c0f4e8cf89aa8ec78604
SHA51253f041f1492393df2fa37f58d328ed2a75dc09fc008f38cc03334bc90d2d4f824bab369e357e6f838b9a584c052152a72be3c5eb1d67915624ca038ba5fc876c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5842f908e811be5e4430e396b129fb85c
SHA106982e0f674bff3e3f14741d7fecac0801d0b307
SHA256ae6c3edf13a9a26026fb52833279cfdb7cd9327d6b7b3355e6290441db90be83
SHA51203967b1b1c4e8e455c802bc815c2afc688136b676d518f5861ee84920cf62979d06f15c59dbed2eaa418ce3c56513cce233154469f72e926df109228e9451cab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52bca1c4ce1d3719d577a1c015817c0ea
SHA1bf9c8a1b741b2d61176c7973b47b73b8366df1fc
SHA2562a30fb83fdfe6808ee5c36f2bc33b3d325d6c7e6d7d4908d564144808c26b993
SHA512b5dc3c3203fe135f5a24d60b7ceafed5e3fa1f341ca94d07ac412f43f9c768d78cd751064854addcf60ddf21eaa650bddd5f5f3bf8370dd45ef311fe526db1f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547ef46eb549a2c7cceb0f94f05875593
SHA13a798679de0b45794d5914c474fcfa0514de698a
SHA25690d1f52fbb3988d12472eb1cf92b815f324e49143fadabbb9782338c8c3d5429
SHA512f2e3001501a949b0f231da3e4df59889ac489fecb742f442e2ae0d1351b4d4e198695488e309bfa836f67d94496ff95085a6c71bb69818be47835a894a25d9a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ad49b17a4abe4c332683f93839ce2f3
SHA1ec065d3a2a7a0bedf9a71f569aed12088a19fdfc
SHA25620b69077f827a9aced363f8529808f236a95e3b01d005161ca692fc16990e936
SHA512e09bbb5bbbaeb4b242cf1ac3b5bdef49c66be3a33be5e7421f94d1055de5337e64a7d72384fc1fd41c1a8783524d1f6a8c2fc5d1a1f3ad23d128085e414ff23a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb74d86966b2ffe15c10fc4ec9ac0ca4
SHA1c308886398f5a3ca6182cd59a4202d437c8b546a
SHA256e428e1f92a094e6588b4bebcdca934bff3b387c8090a69915cdbde477e98851c
SHA512c5ba21a715963ecb3557dcda87ba41d1defac69ecab5ee94ba75c44026d9e2ed0af3d5951bd4b0ee8d2f1e66517fa73cfe081f8b79d00603836a164c01ef2f97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7a3b51403e998fcfe13aab8f31b7009
SHA1913c11dbf014ea66779660ad0aefeab688f3b8e1
SHA2563775e326de808b87df5cccd1ca62034e6629c2cb1330ac6020f60d42f966993d
SHA512b8c92757022c74e3d02d44fc2b086fe9a9ace2570e5bf615a7ba81f26564a8962cbbad0634c67fe939afe9935ec99c7308d73a1d48ef072b7784b9d3f0504167
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59fb43cac76fe99f098c76284a63c945c
SHA1fedff86e24e5972b1efce929f294eb361a869aa7
SHA256a3c7ca7de09b98f90c97aef24bb84675b31bf6179fc8664f0c25bd304175cda3
SHA512fbc899eb42473e4f6537e95d5ad57dc44c7cd457f1bbb38120a9336bb63e6476bd9e5e74396b6f4d26c1b0b4b3c9d7c59ad30f87d0c2569a98923bfae2c50991
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a