Analysis
-
max time kernel
121s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/05/2024, 01:59
Static task
static1
Behavioral task
behavioral1
Sample
15783c55a6b7df6174561b51e41c314b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
15783c55a6b7df6174561b51e41c314b_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
15783c55a6b7df6174561b51e41c314b_JaffaCakes118.html
-
Size
4KB
-
MD5
15783c55a6b7df6174561b51e41c314b
-
SHA1
698b8df6acf1f4c8149c4c3f5ec92b1f688beee0
-
SHA256
54912877b590ddac84239cb90bfe4ec9b3b6512b3a3230026726baff71ee9fe2
-
SHA512
4ac172648139b33373862236ed4844bc11599a3b88c833046327bfac4eebb2ea94725e7bcf86b5e2d2083ace2f63c4adf3056c332de389da2f5ba27b37c86345
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oyMtUAd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDm
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421036247" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{217D8B21-0A83-11EF-97FB-6A55B5C6A64E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 704c4bf78f9eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b0000000002000000000010660000000100002000000069820daa67659afd42eda7a2c428dcc848400f00dc30f4cda71b8c0dfade6b28000000000e8000000002000020000000afdf27c465dc6c847af092fea4116842d6bc537838d5cf5b702546974779f1dd20000000cea873ba5ac7aff6715cf93b2e7e4b2e6db21d083f3d65f802325bf7baa9d5ad400000005bed5f0fccd82be106dc602ec11df452fd7c3ff6da284b582ebabce9d0be432fd0e6c5eb3522bb88c8a89c33a1c86d0882cb8a869dea14a4e7b4892a54b28b50 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2956 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2956 iexplore.exe 2956 iexplore.exe 2992 IEXPLORE.EXE 2992 IEXPLORE.EXE 2992 IEXPLORE.EXE 2992 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2956 wrote to memory of 2992 2956 iexplore.exe 28 PID 2956 wrote to memory of 2992 2956 iexplore.exe 28 PID 2956 wrote to memory of 2992 2956 iexplore.exe 28 PID 2956 wrote to memory of 2992 2956 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\15783c55a6b7df6174561b51e41c314b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2956 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5847051f7020bd0e07b0b9ff2d530c25d
SHA1d8356c7fae8fb46e4ac2f308e1cb1a76e9a94478
SHA256782eaa705a72b7ae75f13be0004f904c6a17b27eb809bd5be1839626f55dbb47
SHA5126ee1496d71b2ad7783b68bc68f0abd08e54f1ff4593f1d59f68f6d29217d14d17a9d2f0dd1ff6ba7f9a3f540f68f9f4ce49bb5e296748394453f5fad41534449
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50066c6bf7a2b782813a17f6eab8a02fc
SHA1e1975d8057d1eebc8a2b3505262dd7ea154fccf2
SHA256fd08b2264ab22bc93e623ac57ebab2f4893ebcda2e3e83bc4ab3ea322849b6bb
SHA512f65702c928ecb626669010ced17a436aba2e4789de79ad6c0859c9e357f6916cbc374b5a7d52f2446b27333ac710aebf350af5325a99482d9b1674b3f285691e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5868d1ab7bb30475c7ee8e515659d6f87
SHA16811409ac532d591e6fb2cedba009baac81c2603
SHA256b74085e8216eec9da1fa135248f2b42a1cca6bd9c8b5084dd145b6ae3a732563
SHA512c46e946046dd5243b5dc876eab8a34483952b7b6ba342ca5164907767bd6d20f4c7d1b5cf3a84819254cd5669d4aaec2c1fcd7d3cf9cd50ea1844e249c3fa56a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7d4114a71ad51854932d7f22cbf89bd
SHA1f8d4bbf3bd6c1c06c9037de628c9e6225ae3e7bc
SHA256e8070211c79c88207612d8023780c3321670d7cd2255d310d9ad9ae759607fca
SHA512a79cb363206bc2e225302137d9cfd62bbcb3d78f15c604979dafd7d6e6751fad90efac6a6332e76e2e06290727e47497fa067d1e572384e8a8341292ef3200ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af227bb158350cbb0da9b8c7ef397a75
SHA100e53097dbc7ec861568f9878c6181ba15b5dd0f
SHA256bd0018003b521088d26d2ab93533cbd5ded870c7c21bed7d36baa2245c3e6a67
SHA5128b95d73f7dde4cd0799ac17ee3414d5f6cc82c2564aed35f04fc52942decff040454ed36981c3602cc1368ec4c6d637a7452fb72242e05e7410bcd04bcff52eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54596486fca522b66d8ffb594836038b7
SHA143324d3f859758a8b4d1d5021ccb88daaf65a51e
SHA256a2d867e145dbec7df98d870dcf25862f43f690eead68f4500b048b89db07f2f0
SHA512e40aacfed8415db0e8bd8ebcf698151e3837a42cb60e23458d7e92608bd1e1b3fe3634c0fdd1d654705b50b0b21cc95a399eb297e669692ee5e122e6963f470d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555d9922ec269af3ca05166fe8ecc66b4
SHA17c03b72c73ccc4d1ed57a8c1cb05f7b997c52e78
SHA2569e7dd58b45157bc6dfde31e50901dd385adbe15b99bd8ea47d989ed53b5f2ebe
SHA512e6d2fd096de41a37b49e923ee88f7c370f06677e7807c0a6fe973e58a372ab900fb31926a4313a534857474f71e221039e3789ceffba3b49585b19bada3cdc0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a82c7da7a655d9a2f2b00ddbae769f26
SHA123cf5ab57ede2872a60ee76fb18389ae113958c0
SHA256e2b92f261aef3daf4fa9a1dc40d6be8587712ca6b1ed912bf92d57eb29edcf79
SHA51242e96c8f78d28f3b6453a7272ff4d0c554cf772bdc27c5ef3e1b5e2f60712009db4f7cabbbe4dc0da98d9ae3aa2454be6d10d582fdd234560a82c678d82cabb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585728eca643405a6ce6fcad6cbe2ba3f
SHA1add294995c4a0368794961129452cd402bc52dd7
SHA256b3129b4a65436da38a37dca6bf74445b734a851396a159b7fc895a8d367c7b37
SHA51215b16006ede6c6f5a6c45d225f1659152e9965c14892cd49594118e44a40c12e21ef28ab1b2a029e81ca870598dbd2306cf5d4f8a7c09efda2fcbf346828c07a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d1a9f17e961f7d391bf28b38a2bd5ec
SHA1299f1030649c954330b28dcfdff928dec973b2a9
SHA256bffe04ca60b70df43b9b3c618f0a4943566972959bef9d01cd84f39ee99fee49
SHA5125dad5695a4292fcbb717c7df16939908beed62aa0bbdb11e10c24e05aed4fb6805ace07f4596d2eacec9df931a6b7053ffae5ee1ec343c8acc14ae08784399fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c25b83e3066197b416802adce49f9e8a
SHA1226fd1df8b752a868e3db5ebb3434866b2fd12a6
SHA256e17843d34b187cd7aed39af079dd67ec2c5d287de1b353db2cf9a875eb03b9da
SHA512a590e0a628fc4b83abc243f87e4c2591d183933ed9a4158ae4150a83f876890f069a8f3b822031b83dc413ad3c3d25de6acdace1ce75f72fbabc0e5fb6f65ad3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e946199b19595591a5c9320d8be22438
SHA1944cde3b2e55ac746b1661485d9c1c581bb2443f
SHA25612d225213e8d3d8c82ac35c25a6bf26069d7fbaebd4ac78dab99294c809c194f
SHA5120c3afa7f69001742f2056580f6c35ad014eb7888f4c4db185d8579754280bdd3d5e809f86d0d3ecc7d471f7c4b43bf67cd4fc37a40f719cdeaa5f178d7d033b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5c780a9ef5d78cdb8d42dd7d9103286
SHA1e4f6a8358b68641a42ebe4eb8961e00591cb47f3
SHA256ce17df439e4397f8e1d54c97954a08017b300291233bf5302fa473e78aa9a55b
SHA512f5faf65b6919815d07da861dfd0252b5b1850f88f3b87d432801fd8e84e2e3ff05b2f9ffae5e9041d6cfb0b4d63fc39be84a5567bb5227789035133faf9531a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d31d6971ddea7def025dc04c2ae33665
SHA12d68237708b3cb93748b0de207c3fa75f46602ca
SHA256b8a61cbddbc3f7754e2838450f970d6724df3f711b5b010e60c96c1c5179b9c5
SHA51266ec53c8d6b8df6091b054dce4de69be58c1b9032217b0dbce697f45738b31e3320a689d2d3f9510da01ae90f9d9fa3e9b9355f7b23f143168723a307b38bc25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581aecf0bbf4ff37fd656729589244a4b
SHA1563b62a32d21d5d87dbbde46a66eba7fb6ffd2e4
SHA256f9f723246377f3c069e221d7ce651c0aeb84ba0aa2e4fb7b972765a9b1247312
SHA5125351e59ddd7c67e5e78077bfc62383d8760e5d4a00c5b35380772b53af62fe5783949ef20e37da8a4fd3bb423b4b9acf815e5b522f5af32aa071802d355f3990
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5496b9ed1bd94ab7ff088c1ed851a428d
SHA1ae9b0b45864ba74f310b74a1c053037d48867785
SHA25691e08adee18a3e6a2b10a269ba9633a7fa741d6dc9e7f1d9e046af4c60e73c7f
SHA512bb51056a6dbbbfdd89dbb4ffc621471b91cd97b624b85c1af7d546b1e6d236988412f98666e40598f9ca8e56a7904f2146eac03743b39b0329fe05cecf1dbc82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9fc3cbd3706aea3d3d7feac7c91a732
SHA11b896c03b165d67c98bace357c05385e1d0a040e
SHA256177086b46a239abff02218d7d9af8ad89e11e0a08ca32483fd3b9cb8055cd29a
SHA512ade808791eb8eb3e8641fcbf17a8ac3f2132f51688c059006ed88c28c78141c72e4e07ef999e65f66f189e11636c892eb5a292b756b5e703ceedffdbc48389f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5020fca6c6346b5650e9508219317bb61
SHA1b40312b93295bbefa724cf301d54891ea18239a2
SHA256733b0c61b3d1ba427dce5aeb6cb57cfc411e06f4f68ab19bf5f8066f5d4ee100
SHA512c21629417e5d3c0bdeb2d3aaf13822f4ffb2a6dd313a3996a9250e0b1bb4b06cd0a9ce445005b4bb107cd617cd5c02387d3b8ef646a0bcb4433c5c6938bf73a6
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a