Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
05-05-2024 02:26
Static task
static1
Behavioral task
behavioral1
Sample
158fbd345fabf9aa8eb6e2426a39abea_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
158fbd345fabf9aa8eb6e2426a39abea_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
158fbd345fabf9aa8eb6e2426a39abea_JaffaCakes118.html
-
Size
70KB
-
MD5
158fbd345fabf9aa8eb6e2426a39abea
-
SHA1
a4b504203a8e54e7ae1b69fbecd10f8670187c30
-
SHA256
c06447ee4d8301de82b09cc48b9502be4887a1df3749a3a24d853acea0a4184c
-
SHA512
d529e4a6e9355a14d4735a35b82cae88a6dc70905cfb5f97868e316296ea56a469bd6d25d0f5c01c717be73c7426730de90a37c2df1d6159c0bf88910786fd1c
-
SSDEEP
768:JiigcMWR3sI2PDDnd0g66pvWoT2e1wCZkoTyMdtbBnfBgN8/lboiGhcRfQFVG8sM:JorTTNen0tbrga90hc+NnhVJ
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6F2B7E61-0A8B-11EF-BF93-66356D7B1278} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000005b953a674538ec797d3d3a5f0c2bd05637f7f9ab82bf23d639aa1a1f7b9c947b000000000e8000000002000020000000c134a449ce2be3feeab1b3c8ab1022a3252966ff9b856ab1d98e8265a9a2e430200000003df2a5120a6a6a53cafb822d71da491ac3a357bb46c6720ef700019012deb7dd40000000d1e9987d73d94b58187ee8f9213771dba5bc3fb53b180cf6d7e246796148db98f54a9821ba2e715d009fd8f77c1dab2a5c5ede8c26b413cec339e06f08f3dbba iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 606cd743989eda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421039813" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1636 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1636 iexplore.exe 1636 iexplore.exe 2036 IEXPLORE.EXE 2036 IEXPLORE.EXE 2036 IEXPLORE.EXE 2036 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1636 wrote to memory of 2036 1636 iexplore.exe 28 PID 1636 wrote to memory of 2036 1636 iexplore.exe 28 PID 1636 wrote to memory of 2036 1636 iexplore.exe 28 PID 1636 wrote to memory of 2036 1636 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\158fbd345fabf9aa8eb6e2426a39abea_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1636 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1b9b1d2b87adb0dcd47baed8e42eb25
SHA16e5370406c052fa206ce8c4669bfbb576ef543e7
SHA2567bae413b4520ad59bea746400446ad3aa1d5ce37e06b82ccc3ecb4657da5fd52
SHA512894bb6881c766a35c880d7df59f9a67385ebbea75e8903ecd077c85b9fb40f45a240a15d49227d5fb0867ff9ae9e80a124df7baf497a4151309e024d313dec16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50348ffa940ea0dd01cd621c8d3079fde
SHA1bb7a5d9e8cecdbcbcc6a140834814003f2b2c96d
SHA25664089b466482339f2744a0b1d03e2a512b6d329aad44654a59b38dfde584685d
SHA512ab8c72072e4cf4545317c346b5cb1f32906a8151ac13af361825c7a66bad77744299872ef199e65cee9d4243ce1b086bf3b82df33cefa685545326f6cd67eec3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a70e1c3b8f9ecad73fc506affd1f76da
SHA14faeed1ef1435316baf38e3cf2995f85b36fa823
SHA256ed173cdca558db9e4f64d6afb4e97eaea7d690dd2792ff48ace7f112efa76c7c
SHA512a547f015e44e66f62eb0d829bd326c5fc4d8c72e728a1ccfc685e3fb64f316ee5c90e7d13c6794d8eed52e7e9511af5ae3f6a80f263e881c843760c62fa4b92b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d334ab4b3c05f194faf358e8ea27fce
SHA1ad770942a6b9597b618ba91528771ba6f596496e
SHA25624ab43372ae80ec9665e324669e7fca94b096fc24bc5af53aca3d58f9d51ca91
SHA512f0909c45f06ecebc8aa7c8f92911e83249653f6ea59a0cb194b3a88ef28073276c95ca47f8262a5dade5da2fd86ec297818ddd075674fe44a22a585fb764773f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53eabee6dcac432e4f93dadc626199092
SHA1c0a089158fc5754eaae0981ea1a5c6db184479eb
SHA2562fc051c90db043bfcf65f117f5b00e7631cbdb108be1826d8f1a0556283e9f8a
SHA5123500f15a154b83888a4b88d61ced4cbd7f5ad290f721a7aebc747c79340beae9358cc8870973cc6146f59d28523aae0462e79d2818d7a0c7423f6e9cb99b04c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5edd44e143707bd6481ebfcb3a8e3a32b
SHA135c243eae4636bb822cfb3a8abe61200f1e230e4
SHA2568fe2f0254605fbf5727680b7e62b7cc6c790ca04c02c8a76a4789a3e4234e794
SHA5125cee31b54c4ce0098771cca1323c48372a95c4653584708ae866c085078f4595a65564057efd1559b28754fe3af66fc4b53d44d872f4f67f2108513d4907d7a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d31ef0eb987d2e0f658ea88bd3409dd5
SHA1adf966ee14e90d9a55bdac97bc5343a9bb7bace5
SHA2565e4b73b3928bbb8c06c29dfb423d4235de31aadd38ec50d4b5741d869ebabd29
SHA512ac4268705974132ce12eb2ea474b1a0e980a10b3ceef4c9ae753722acf9f176e440469e6b5424a57382e608e8a8a7cf12a9460ef731bb637c073dbad8fd5ea7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592911ae23f8f0e73dc8a53cdcd6c4156
SHA1273ce1cca637b1e737fde86c0003fc096b0c84c3
SHA25648fd64194511fe786ad43d08c34c449a9c3df406b0783f7f8e5762599a55f116
SHA5125bf459b54a1c073e6afa1cc0ea65b1badb2847cc1ec49e50aab13506b99587bb66ee5a2b2ff89c253c56262ff68bbe8d4824bb961a0bf9111bf236b813c97062
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db449d9c05ce2941567972619ab9bada
SHA12ba9fce68a927e737aa6bcf5e229cbd45fdb4c94
SHA25611980130687237b6a4ab9883e55ad11c4078f08c143b1c3a4d5c71411e05684a
SHA51276ee1732e160ef674fd09ab19f8979b92a97aaf2aeec3a9e379b921a6465da65c84ad5ce0593f8e8f0411f6dde04808308930903e38c0dde32dd8f9d3174ebc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cffd71f7a8c7c384b1211cfbcaed1311
SHA17710d9b579118b80cc1c81381f465904108ce058
SHA2569bfd0f15577a9a9cc04668765b1c544d3ca80835b4639f87707d7d067aa38529
SHA512d0227ba9cfdef431cb4b7bf32ada4a88efa2249ebe8ca591c37cbbed3cbb50fe1f463ce831ce5203a3c47a8e42038cbfd6133e956d836f2302a91d8db44ecb12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc15f61b79efe0f0e1f02a28e7669b1c
SHA10bf632380f8a33a3832236e4546d555c0cd86e80
SHA2561865208d6d3dd29ea9ea9bd14adeae56becf49a52b8b47ab35082be2dc89ba74
SHA512578e89c40e3caa108bd0ee84093a6b0c2cdaa1ab01e5615624a7e6e34799a7c00acf1b240eb76bf8aa372c764faecb25ffb9a960fa34de11bd193f8a89404f11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5230a29c91d3dbaa773e0726dfc2c1fb7
SHA102607b7d544b517ce12f09f787e77819dd733483
SHA2569a0cfd78ef21a4f15d6a0178eec500ee073ed20ffa4ee0a5afb66f14c46f6a14
SHA512d3779458475245a28618b5d923711fb9ec8126f708d207a65fb57e2b76a069ea2875ec2d0bd8b1eb8f443da16b7cd49c1dd678e63f838d70b8d503428442f3c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c5759431446874c47806ad0d7985334
SHA11a502678482a28682f7a2fdbd1b439bd48b8359b
SHA256eefc5ec44d5e127a64337035212f8bbe49d600aa0f3ab5c9059f4036e8c5f619
SHA51232956f204d2cabf2df694302d52c50384ec84c22c2b7050573d54aab4fd19cf23ae2d019e88a9157d2b88a93da7fda4d129f9ab4425d08359d54f38a093678c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58039a6a7da34ea81c192817b14ebdec0
SHA137bc8faec7ff5ee6576edc62d2450f596a49ca2b
SHA256044e6e81df8454d8d920fee8883c47e73a91f47fdb3320fe7d6d79886d26f753
SHA5126c46311aa5219fa56bbf13fb7ab56415d43372b8ce4f73e4b0238beb2b0eee38a095c452640e6732e15f464d0298265de855a9bba5a3bd4ed1538fd83feb0ccc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50067f975117be21d3ab98d98232114be
SHA1e6531483f39b4f57b75f741367bbc1de8e52eb69
SHA256bb245695e511b23e26074576c6abd1f64b313339ead00f11ef7cb29683df8069
SHA5128c3ec3b144b0114f9dbde431423bdf155e243c8d6cc9f9191bc6980994b58f6edf8efc4091e987c0d6150af965ca026ee7f2187d0334323dcfa19d5935c77492
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc86192b8f8d917ade720e8bcc3aa777
SHA129d6090d73108167c8dd4efd77ac61ba5f49ba8f
SHA2560b097529103f14913c223d462ee7ba6500a58eb08ffc5906eb1efeea26dbc7d8
SHA51213d326c5ebbfcb87f790f8907ff06d1251c8937a60b36bc8adba571d3c320e241c33edde06bcee28f438b448d685d2c45f798433c67dd12a17a0df4b2db415f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b04fe61efc1636408c5005f6f5a4275b
SHA184bac7d3797e0ae9af9653b29addda504cc70827
SHA2565a0060582245c743daa7c4fa955f8ef353de55589807367150f653dc2f860df8
SHA51252a04408818dd4b59f37577fed43d5c519d2d217e22854d5dd8bf105282d237bb95739ec49c1dcfb4ead2d0a704dd205c91894139feb7f90cd0c9bcb2b2680b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51efbbde80cdd439bdf091167e4abcdf0
SHA17bc302502f97a307c6fba0052bfed8e530bb4446
SHA25619961355e531c0c57a2384dd30e0f81eddcd6d71951425562641f241fe9a3b7d
SHA51290e64a408703d5837bdb391621d017728a12f230613bc83b29d62d97418fc7a75988767beedd4705a214e2d11b874820887de54d82f195d56921b62202f71660
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c88ec854a186833b116a598e04788e2
SHA1d569d7b0ca5ef4426d7206c35ff252981527e9d5
SHA25696a5b126d269a9b151688f3fbd1f1310d3db5cc5092580975e153fc7d6fd30dd
SHA5120fd7562e8b4b33e6455fb123939b5c5c5fe1fa5c36874fe7bd27af20e77a512c4dcb647611fd360a78e2d3f32731ea8c7c0d41bf9852a4963b0db47559d26b03
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a