Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
05-05-2024 02:24
Static task
static1
Behavioral task
behavioral1
Sample
158e09b474c20cdbef6a19c11e4086ef_JaffaCakes118.html
Resource
win7-20240220-en
General
-
Target
158e09b474c20cdbef6a19c11e4086ef_JaffaCakes118.html
-
Size
27KB
-
MD5
158e09b474c20cdbef6a19c11e4086ef
-
SHA1
ca0ddd9abe86803c50ed23ab5d8c2600fb65330c
-
SHA256
bbb467c9f88cd87e66c119bf1ba7cef3443dc7ebff92c8dd1542bac80919c32b
-
SHA512
e30e45184e80e2905e34cc27a879bcf8daa3986d3abd5fbd509184dca9e632c740e8f00fd470efc8837ef8156e2d5533f3cd6d1744bdf9189377916f4a223f72
-
SSDEEP
384:aK2FAlpG9iCGS+3cNQgB8KtItsf1cDtZXZp1npB8Mi:aKH/CT2clB8Ktz01gT
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{26FD7761-0A8B-11EF-85B9-4A8427BA3DB8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421039692" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000009594d2a9f485cc12a086752c0afe8e96d53ab6630f0ac200f8f1933eac3bb80f000000000e80000000020000200000005578ea5e8a0b5eeae960a9e3b6406218f1ebdc6920a44f768c1c0bb4b5916e47200000004dea844c1fbf7cccd3e5ff7317fa3c47fb7aa5a71577ee9750ecbef23ef26ca540000000733147e114f33a25d3fabcf13d86d86d7fa806c19d419deaf14a07a0e6d4f0d33adc43d756e727587d4fea80471536fb28ef872f1ce49b9868152ae30aa31074 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0bddffd979eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2360 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2360 iexplore.exe 2360 iexplore.exe 1408 IEXPLORE.EXE 1408 IEXPLORE.EXE 1408 IEXPLORE.EXE 1408 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2360 wrote to memory of 1408 2360 iexplore.exe IEXPLORE.EXE PID 2360 wrote to memory of 1408 2360 iexplore.exe IEXPLORE.EXE PID 2360 wrote to memory of 1408 2360 iexplore.exe IEXPLORE.EXE PID 2360 wrote to memory of 1408 2360 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\158e09b474c20cdbef6a19c11e4086ef_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2360 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51ffb05e02650c3baab3b3c8090f4f9c9
SHA1e5a0f92d40003b8f7701346b6cc7a3703477876d
SHA256df22623662d4bdcadf8f3082c8544b43b25d6141eca7267ee804049297c7519b
SHA5121d14f0d230dce313e00a07888891c35f6cc0f5842174c46d1f63fcc84a18967f9b0538edab8f7b389632e3ed370f6273ffeb2049ec606f19291ef871433a0515
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD581a1103d3a8b9e4e9164745b24329e63
SHA1f03b040ad157afe7b3de0ae6f7f0c142c82ca74e
SHA2567fe323f147a6fae4814cae53bd674f36f389c61f534a420dbe9dc982ea25509c
SHA512322d31d0c2ff62720c5df440ddfca28fc4c665e322f1741004ea332a499d88b8566bd7603c90606301f260e6aab477cba92ce50f24d5809594f670871f53c50d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD547a664e29eaeafb4165cb84713be2a8b
SHA1a836f1da0876fc822e30ad8f50c3a7f3f0708c35
SHA2564cb4a4d128f11f4c19151de82efb913712e0b17c992b9a9c72cd6a4bbabd28ca
SHA51259a323f3e29c72000595489480087cc843134387516ae16fd50469a4e93de93252558db098859b0e4929180e5dab40a53bfc85713416f68be233c6a683c2d27e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD505d3ab192acd7f8f9af535f9d84063e9
SHA10d19d5736e5e803a8ec2cabbc334e6da42f21988
SHA256cfd5364bc6c475529cef9349f9fb96429ebf44c1634d469483501bb35db4ba6e
SHA51289e94d2ed9a037ae0d04c3e3b66b245cbd5169f49c3079aae38364e8da9c079002fed993028354904a2be639da7ce4a4912b357bf9f19befc05b29aec3f66531
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51b28240fc6557c4d69518285694a0fa1
SHA1e85c2f6926a2f4d173e410afcab1d1315ea9fd63
SHA256f47c737daca8b78f3bee2f484e932098336b2d6d39dc4952de90249e13406865
SHA512d15d8ad14e15f0a2c6537323fe9fb9a8c47fa2cddfe84f9f580ca61d07748d1a3a8cde96b8bcfc3161a983375ee619eeb000a9d40ee031ed2139c9fbcb1e96d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD503f8ad7e2bbff29134ba3e7a71a8e225
SHA19d81b35428899ffbde643a9916a78c34874a5daa
SHA2567662d5b03f7e2e4dc8bd358dc4212f1a7f72c806edd6fc5a6ced2d67a1e1fed5
SHA5121f030de403505160a684c893a01de124fd7079e7a0e83ab44a8c7dc9ed801c9b1d41c461a95794cb2fa4fb25a2801aa41eef9cb49e334cd56d076e42a772db23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d6dc7a02c4b8e068cf22cbfa57e8cc08
SHA1c03f54515d29a671a6242a0fe44c9f3d645269aa
SHA2560cf3ed8c22391db077ea0789ee94bfb67c49aaa7218a2bcb2fe8ff123d5d44a3
SHA512470eb0a1346b2c2f7ed028a8d1eff4df50fb589f9c36f85a29947f0710d3aaa5300588426b3413f7ce41474c9429959a00725852e25865c6c41bfad8c7e39be3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d84cdd3eff0134e4218992e4545637b4
SHA100545e60f55a26fdd14a96724ed8aa07afbb9412
SHA25612fecc52ac109eab77000c8538dd584782ea6a0f4c233a23c2eea4c08695af22
SHA512ce5235c9142f922f88c7e8f914235e3b8b1b4f33c4b869777a4cb130b7c4a0f643fb6ded4ae7c191ffaa5267f21de6d79507556686855322e29bc057b974130d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD587759c76f84e921d873093c641712481
SHA1ffa46039cb71bb8abfb518d55778aa2dbb9d7d93
SHA256189071abc06ca6704f1244c461793ada002a7fb6abe977c29bc69c2356bc84c6
SHA51279cfed0efc766f265626c9d2a18806d5e21be6ce3b4c90389e2d1ed1f4ac7d06a9f55faa983fa5aad222561acefbeff714fa3b2e19748b193f58e5001f146aa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD573c8cb79bc8f9564f587eb2d9832f98a
SHA10b5f7aa4ff0efbcd67213ec2710129c0c137e2db
SHA256325f2d5dc75e908f76a7265f19f4063ef0d96571551303034f0b6f16c978c30e
SHA512784ca100a1a5256ffeb2fdbba093aac31fac0b92e42c035c11d883edfd4b4f72a36a30452f0a4378a6019b18640bfb1531d7b07bd1a16f9360b974c013202194
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD54ece764d30e255d55a98f4c286c96caf
SHA1888c4a7d6b423adfed70f9943e1a1c821caa5245
SHA2565721c798d78e6c237feb26a4cfcadcae8900615475caa7457fe7e8f4a9f0ea00
SHA51298bd4eb196a9e9619578da4de1f803de7a976adaf0b622b401dfa5682f6c44bfe2023a4ce6a6624756b895156df0d9a7d4e7b39901e80cb450522e4a2ec19bf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5820cc20ccb2de59d7498bc35b9d676cc
SHA1afc8816799e0f871c2dfa7ed6e7946d7535989c0
SHA25683c009911d55dd95b9e5f112220c8e18bfd294ccdf826b3a8f599b277e6278d0
SHA5127870b2fed9b252a8c70912d2c04a7dd2d7b49c4300cabc34fba164a4fb072f933acce37eede2562a4ced2ea96ae7ea437887839c8fda48c9c8d5709fcf7df554
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD58e4e8d683c79b59acdbe815beee26876
SHA18536d685d0e9760ba01de3607f7c6c15167b9844
SHA2568834c4f96dd7f2aa60cbbfc6d2b248fa3d29d3ae58b31eba9bbc05c6c7b2ebec
SHA512249ca414969d5f39248bd3934efabce37247883b80a38b70c928d53e9ab9a83ff7af01eb99f1c52882ab4755da7fcb9df469277e0f6c175eb8432172eb6b4e38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5e03c2c7902ead393fbb715ceb7602d16
SHA15a78aa065787ae883c02d61bb9c7d5169070ba10
SHA256ea9597ea4d263d2a9fe76948229064c3f29bd83142cac749f79308bfd7bd8972
SHA5125d0a3732be34c7a9361ff6af4e8170c6a5eed728d73e4cdd1a43b417e6aeb59f2ad269d406eb5644c7bc665c65d82a48ab7045a30a5be844970cd88b8b331ae1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD564f87a99e766f47c9b38f6eafe001dcb
SHA14160e554970e860e70da1a5407a1dcfd40a56141
SHA2562ad1c65f9c65ab643dcab5c91c8e504e29c0a288961ec2c28ae376d7e3ac047e
SHA512acccb197e21c60adacba9547ba766d208870ae823ab4155c84061721eda1da472d63425e5f8e456325a96ad0ea6961bd3ec1ec5d2b8d9535cf33b03f94b48a4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD59466caa3a96ce7b527f82e60eb467b39
SHA1c07971eda40c4dedb2b1d3776a6084904ab4134f
SHA256c659304a7d3aa42c1f309e8596c639f4e08684184e1a8f37dc4fb7d7c44aa88b
SHA512b8fd85e10a07fa111d3428dea6eb448df7df682ebba7201c34b1fc37c67b24ea21b8b47f60cab58b74d9a7c420f82c5d56a63013815650d4df053ddd3719eb68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5b2a7df393bf9b4a7f26e8d1744de96f6
SHA177cce3d39116313876e9da5180e6ec2f1806f2c8
SHA25692f0c83b921a979075caee32498e2c806ab8e2dcc742a0a6c4260d2fb5dc1322
SHA5124791f638d737217b26a020f619ce822ed4eb3beaa1fb29b052f2ef989ace99f2c6b69030b5f8a920d03dad808bb3f1e1c104f836ef24c4f445475cf03e6cfbb0
-
C:\Users\Admin\AppData\Local\Temp\Cab3508.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\Tar35E9.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a