Analysis
-
max time kernel
141s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05-05-2024 01:36
Static task
static1
Behavioral task
behavioral1
Sample
1564c87a1edc6fee78802e14e55493ca_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1564c87a1edc6fee78802e14e55493ca_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
1564c87a1edc6fee78802e14e55493ca_JaffaCakes118.html
-
Size
41KB
-
MD5
1564c87a1edc6fee78802e14e55493ca
-
SHA1
99577f6c60089145b52a7d4dae513428cdff20fa
-
SHA256
fd841c3efed808c52037a8f05b3bdb2191ba8cede4579ddcfd66897ffff8900e
-
SHA512
c398019f1a67052ba3069282a51acfbbe35ede560466bb9ee11718f06e7763e74234a62a1b750a833d45a231f8c9ea4c8eea0715e7048c5c75eb628edd07187c
-
SSDEEP
384:SY4S9KanyLgD/m3Cu9Uy2Tfu7cJfmz1pBMz0szfOhiweOLg6qf0TXuLmquPP8rOp:SY4S1rjly2i7WupCNwmiPP8vu
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000bb84829836531ffbc923ec9240d426002cb915253b6c5c796b2174522fe93989000000000e8000000002000020000000bf4774290c099000194a24c5fc05e0281d6551be2c29bb474d6c4eed42f11c5a20000000e6ab361c30b4a9385119a998cc28b466a712c13e709452f9eae98b43de8b094540000000d5c341856eb7b5b31b932ab90107a7d27aa328d96355c9420806c700cb10309a9b45fe10d37e8d5fcd2a53cc540eaf243488a3138a284ce32b41da26f7354d80 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7037ccc08c9eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E9E89951-0A7F-11EF-9591-6A83D32C515E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421034865" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2324 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2324 iexplore.exe 2324 iexplore.exe 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2324 wrote to memory of 3020 2324 iexplore.exe 28 PID 2324 wrote to memory of 3020 2324 iexplore.exe 28 PID 2324 wrote to memory of 3020 2324 iexplore.exe 28 PID 2324 wrote to memory of 3020 2324 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1564c87a1edc6fee78802e14e55493ca_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2324 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c12cb41aa74f263ad6accce9c1aafb04
SHA1f42d5b70b4846a2ddf007722a3ff7f67d36bb208
SHA256f6a48074f663d1ca614befa4ed53adc7f914268ddf00cb4ef6376803f5b318cb
SHA5123f156e9ac30622a11b39d395f84cf1f742195cea56ba70380934d0d2bbd8394540ecb3a23ae8f01a14af18d90cd3e2167e0e86a8f7509941540568c9359fe6d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5beee07e63dc0282c30d6afb6e7d52139
SHA19d7beb82ed286a499de4897315ac3aa15a5f07d7
SHA256f0904576f6305f8f39bd9790fd3dd7f49be77bdaadb08f1a09b60817eb8e483c
SHA512ac1407d3fe70688d60307ed1f6058defeb7512f5e2b9e15f2f66c5abd5b0ede6b3140cece689464a4ea6bb9ef75e0184516bd35da9e46a969009a81b2269acd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b318dcbbb30a5af35ec58ec44f61ddc
SHA11bcf82b12589a211bafdaab426e8f000451e07dd
SHA2568e3baa65d63a07082c3ed17d99b787e8ce3085c1d72bf6b9d83ade835cf727e7
SHA512afa100fd019132e03182f0c65359c1daa496a64570ecfce7e553c08ca949fa0adfce3a3e6f8f0c7c09650519accf5e4cf852474c95aa1ecd38b1cc062dae890e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5232daf5e7322132bd8bf2e8747e0d7da
SHA12144ce56e2f2f00006270c6955f31d52d5ad7732
SHA2566fc99c430c5eb830f01fd6f4992c8e3762cbaeed8bb22c0e330cebf52e5e6082
SHA5126c3b5f5d13d61c81a37dcfb563c139a0150c2371410f06f138014f0633590cf5497de7a1afe6d10d0b02dcdd7cec510b092f918a2f73605ef34422c4b89ad11f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5acd4b63de93e56ef3fc6dfd10892c908
SHA1a64ad7d32e41348d9bfa95593c833776724f1a56
SHA256c0030378ab8243338dcc013a8b25612d1d67bf475a1234a145a5905970dd82c1
SHA512b412a7cf7e8584f0e6c298b3bb02f5c45d5d62eccf5074832e4a8de5f6cbc79abdc7c475d5a94eb7dc9164b58adc6b4b16d55047a15a81c6b7baf6a8d8789641
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d74a85d2301837006d6412339a4a0a01
SHA14dc523a7daa53d9701031ac4d1a68d6a8017f64f
SHA256823b19e04dcdf78905c198aed1b6b90ec85ed1f7c401abcaf7610d65e3f63231
SHA512d6668716560400e13925251f0f1c2d4da489ad7abb3ab895c4cc3c9aa52162d90da27248165ede4289e0b226c88aee4d4cb6e7c4b2422acf12c03db8133d1355
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57152adba2c4ce5d67d6a5c8a60fa7e0e
SHA151555b18d96ccff420b2e2af5fbc4bb040e8b554
SHA256b160c1d16e22177424c56d8476a3d6c0711d0e328f2b199abc2b246b62c2d994
SHA512eea289fa4c404bbf9e42bbf7061587990094d3a844da985134a3cd80dcdee0b7f7a5fa969ad2c2fc0457c0b61f2fe92efb565a4706daa9ef3d19aade0e202037
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0fab83080f68ef7963ca084af70eb25
SHA15db0ac30109e5cad7c5976bceae09e98303e0f9c
SHA2564a7200b41f83365877949889a8d05c8eb0e4ac0074e639b6f5fc2ddc35da541f
SHA5120443fe9733f888c056a6a9789b7cdab7a188e698f5efdded81f9fcb62a3592dd4e5d495e40ded1db7a625af48e2a049718009f57cf476baeb40fef117fc4d4a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a531cdd1ad6e4c94df8b51fc98bde48
SHA1095f6bf426431a26107f8ec17571aef3e3bdd28b
SHA256ec3e4396452592187dbdcb5d4aa75b41084ffef05fd9453b7badadaeb563c235
SHA512aa7e5b3343c4c0f7a88787dd1dfb41af6f91aaa03b8e1a7e054ff616bcb3567ffcff8795e57b0bf01ca2942988618b39ebcede8b9d7b5135a902fd75469e5d29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9db02f849ab6cbc7f1a16046ffffe68
SHA1a5b37524d24b847a0cff75a5b8ddad8f215f0321
SHA2560654b946332b0117962bc7e2e3c06d40cd703d0346306fa63f20967adc1ff4be
SHA5125912cb3ab7dd97be93178a32c469fadd6c60d9174f3d55fe8889b91707ab0bed12a264c0b98b67d6de2a5e23e353e90489c59bc54dbe47f31863b931a1664bc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572a618c0eff0905778c57387f7c1906c
SHA1d23fea2cf53f2eb8d153170cf0c6cd42a204244c
SHA25687a3baabdffb9d283b298402aefc307cd21494f1059d1a7d9bafa691a473c476
SHA5127ff98e8675798b1cb6bca1c8fa6b2af61ba86989f6fd5bdd83fe1d1f7a11471fec622b6c8e416a8d5711f8b0f4b831cf26210a0ef77681ca9a2cee4c041efe37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f87aaac413b4185ed5f814d7c605578
SHA19bae2d5c482e6f5e830668a1440c4e7bf9cf80cf
SHA25663b39541cd33935acdeb0fcd1a2f2a26901be16fe3a42c3c2895ebe694686fd0
SHA51221510895831fee5d08a1d8d975911a6f986162688c2c194ee66dd27c50d167f5e8d75b08efa6ca596399ac40ff70d244a19cc269294d101aba1ede1b698329ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56366a9e3b1d53d363da5bf1eb61ef43b
SHA179123243e50b10660d36ce0fb12620bcc470db3e
SHA25619c7a01778c47ffbced3b50d0ba266c8c33ba67598352f26f4e48ff0c08f29ce
SHA512b84437291c50be89a7299d9417a2ce9fe4ef90f6211fdf66207f0847a8cd2ec37c3355beb90bcda506d94fe98590c83ae3d480d139ef44c3a16037c07f88ac80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf3590c5580269a0388c8098129f18f4
SHA1b0112817e45721c3e3a5804beb46b94966fca023
SHA25616c2f3102be1aac4fbebb578870c6ab7c5c070916a924168d4f447f3b9872dd3
SHA5122d293c9a94394d8940b2935d14594c316064fa692fbf38805e2a44d5522488445650164d8155f136e91803704587cc69470ba189838d1fd144a09da18d25d588
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537b38e41cb496d1a98737ae3c05e707f
SHA1f55cd7b89ad9d671b76100351d632b7bceffef8e
SHA256f716c88132980f4e7e4caa0d6d4fce9e3df8f0e79680bd2104cf25519ec126bd
SHA5124fff5428d20da7d63c5cad14ae07eba7e63b3a59f0bf8710b3070e85fd2a657b2a0bc5f07bd90dfd7fb26d0026d1b3ee9554d2511b95ceb80f0a6cd1b3325535
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503ad97a4686e935f04e62a86e2ac918b
SHA15f2695efdcda95b0c4a36c0b039b02fdb7f7235a
SHA256c4857cd43d71a6ebbd406ea1a5d9ddccc5f2c177115f54ebef2909e96757591f
SHA51281ef44e5c085a5174d0957a6d408d8673ab75570d666537fdf780c52ef8ce01364bfe90292b813d5cf9b26a56662229e25ac7ea072cc216c7cba59aca7ef0268
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b302f306e621dda4b3e53f11b42aefb1
SHA12ba0a99998202cab95a5112496174729e7ed0035
SHA2563aeb7578ac67c5d37b2d17d83454262027999bb4b75b3ac59409853b8713c4d7
SHA51249abdb4677dd11993c2f20cc126ea465d210642f5462871c012869676d7d0c09617e8e5d6f225e5ee615e141d7bb1246924e5b6f35b6003be26c272b3ce52124
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5447ceec56471a6b5f2bfbfa7933ed576
SHA12e4259d6aa9ee3883aa988c7ee0680ea29b81c37
SHA25656c2263bb9f49f70dbd4ecd25df06957e061222c86e15db76b06ff8a1802b450
SHA51269aaa93e0eea2bd0c4641c7f60461c2f46753a8195be6b82276ec657766259d7bd44096290163809ba503c53395693f99206710c1ea43a72cacad05751ee2e46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523eea232bd8b64d8a170aa2fa6451d54
SHA12b41c8a7d7ec7eef9c6120066596db5c976842e5
SHA2567decf7c813765e0ef8a4684c3b4a6715575ab382c189a42ba445b67de5d11c30
SHA512be5430de1276a936795dabf10da8012bde5b77fe2e01181e0b8345de6481f4060b39d35e62ccb4e00066762b45e75f223747f6d2b494fa98944f759b0da3cef3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a