Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
05/05/2024, 02:59
Static task
static1
Behavioral task
behavioral1
Sample
15ad234c5591b90b24d4507e81a66816_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
15ad234c5591b90b24d4507e81a66816_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
15ad234c5591b90b24d4507e81a66816_JaffaCakes118.html
-
Size
839KB
-
MD5
15ad234c5591b90b24d4507e81a66816
-
SHA1
5589f1cc0fba4f8a5d740f732ebc9dab3eeda920
-
SHA256
d1e36e3c0b3e0a3f77349cc2b32cef9cecf3dc4ff6f98db50effd5e2105ef3ea
-
SHA512
4e0abf926ff0553816d678137929224bf139fa3b661b3c50e1c2b00f43289b3f934888561e1275cae1e2e928be97e34f311e48dfbe8adef1aa20a36f6a3ce947
-
SSDEEP
12288:Cj5d+X3ZrscWy9dHGx5d+X3ZrscWy9dHU5d+X3ZrscWy9dHv:C7+1jyt+1ja+1jb
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F61CA3D1-0A8C-11EF-92B8-52226696DE45} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 702d94c8999eda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421040468" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000c9c94b9d6dce286c1c2e09491ff25c88b5a67705c584bdd30357cc1fab7d3a97000000000e8000000002000020000000314cd7b0c6649764d401c69c836b7190bdf5e5c466770de934c9cc3314530bc920000000e1ca32f31b8b42a992b380967a67bf60345626f315792559d58d10e7d0947e2a40000000c225bbf21f9b4f0484964c85e62ab33e00672549b5828f5d29405bb98a8cd073b61c22fca9a3821ca9c41663b47f835c8a1e131f8080da45cd123f9db1b425ab iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2208 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2208 iexplore.exe 2208 iexplore.exe 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2712 2208 iexplore.exe 28 PID 2208 wrote to memory of 2712 2208 iexplore.exe 28 PID 2208 wrote to memory of 2712 2208 iexplore.exe 28 PID 2208 wrote to memory of 2712 2208 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\15ad234c5591b90b24d4507e81a66816_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2208 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0bc857e60505641b589230b13f90670
SHA13b1ffa3f66cb264210bd3221532b952501d4a495
SHA256345e83adc66e39c6669acdad2396006ef6ad4e7d37c38ed8feb736b1b8043f2d
SHA5125cbd92ebc26005cd0b5018614102da665d629999f0591572f459954c8281c6975bfc265ca0e1ebc27767a4097de0d6c3e4efad88cd5359bc6c0e100027517884
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a18105d5df607e407dda9a2f83664c9b
SHA13a34b05f7e3133d0544a66335a69f082e01eef3b
SHA256f5d5d6d217b0f02b1f8303fe6b58924fa43fd310aa38147abc5f416d48f37309
SHA51264897b7ff3b6d2ca8b3de46edabf502a40716bb0c022946108e7d357afcfca176f1894bbcaeac8b15d77f86273f3feb4bac1e40eac045921062347c908b8ccbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557a44294a4f105d18ccc016d5b50f1be
SHA1a10446679f48f48baa22437e8ba745a93b0e180a
SHA2569e07804839d974c2b092eddcfa0da84b34e62d20940d0798a161230e02576936
SHA512e219bf6e73c7a9d4e7769a2c6a25d55a0f2e72884813862f9f51ca4aa42e10d6a335405432f9f8652a6d6147fd2673951da98ec82ef51ef709a48419a42e2360
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f6cb4d27d138d77a12fbda51aa568f1
SHA139167595aa33bdacc3aa50f9f3ba975855186660
SHA256dfc3176b656fc78d2ef5f98d09af51dabc65bfa80bf3d6202ed4a9e34b2ea8d8
SHA51225374a7014c1d623af4488552ab4d83dc7a1492793e4bd85d59f3fdff27e0af4352527f0f23c5b74d5d8f01efc1ca9e031c07d4c8ac133c46a658780343ffc80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e0636f160aab1598d317cbd30a14150
SHA10195229db9462578c4f958bb93199a8f529ceb1e
SHA256a931a2de2e3d78ba21bfd55aa911cc2cf3c0ee59db36865a1ea6a8f5d288cd7d
SHA5129c7c5764b24c38112558a803225aa8163ec5a9467a3fa9235e9b6a6476787a4d3b93ed310fcb5e6b3e84df429b330816f8e5baedd0b578b9d2c6ce2cbb485bf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51eb88e376fd80c8160a7b6c4d0be9a5f
SHA1f0c146688652ee09111f46979f9ac913c3629056
SHA256e836a517ddd5cda36e5825e46e947725897e7d4487747ab3e50cb4710ab8646c
SHA512ed122262d88edfaf062c42ab68b6e27992a6a7190b6f089a95731593be627c9f3f6df4121c7792450fbaa00da678ce6bdf9b976933a189546b158e29ca4580e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9d3e5e22b064a317f8e24701f5a2e39
SHA14adf5a68b009b508179434f7fec109f3706aaa05
SHA2560c1b1d4f41ef873a54f2cf7c43d20170664af58ba2bd610f0495675564d67e56
SHA5128c851c76b9f8ff2c924b22c1a9a1a4aff66f81fa149235a09f274df6c20a3570a44eb075f137711447bd0c5c11479da769dc4306b128ddb6976d9420488fc322
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577b71932181ac0dee48ac315c803f020
SHA123e3962a1c5167bc5e4a50698c9bd3097e4fa4f4
SHA256b915fa7b2ed0dd4a763f51681e5b663a1d20d36323c44893121f8ef875e95112
SHA512cde575dd6f3d41cb9992049515181e1eb6da3c43db8c5369ff4cd895a28273e3602d02d76ea5514f5338546c101b4696912c84c8b45467e539f5b49adcddb522
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f898f8f5ff48bda4aea6681c932d8680
SHA1714c06c08a036191a21ecc1150b029f4cf3065c7
SHA256bb29f4435fd2aac12bda65cd1be53d9f0a0210a30a83d86ae24b223392d0deff
SHA512072ab8766969823b89d42f105118ce0fb53492d37cfbebe25d71264b52e3cf2e3ded12c854ba76614f1ece516139ee66f58667381a3a9a3d7f841c9683f3ad86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53734d59bac019d5fbfc5db2e9f5194be
SHA1da1c103e1aef4025f746970ef6dbe40c5d718c85
SHA256cede66d1bfd738142a32effec3f1f530f64676f8c79a21a201b19ed6076127d2
SHA5120644855e446a8c317fbbabe4725d41c935e4973907074e337b958925c518903aee960524665baa5b840ea568337db021793aaa2365348d6ac62dae6c1d9b53ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8c57d53835d0da7c967e13ec9f7edb4
SHA1b2dc9e00e99c775efa72ffbeb32e4111a07ad30f
SHA25643da341f132fd70661b70635db78984032f75dfa46a0be23877008cfb4db1c6c
SHA5128f56dbb095ae035240fea53c180cf44b08dde3a785caede4b93b04e32ff19ce0a979a1a73c1584ef74ba2904880041a0d4eb4dc754097b3fb1c659cee719737e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c787a478d1d8cc52805de8dc6663ecf
SHA1ce363669e181a08001a76518f33c21275a94b8c4
SHA256d90f8b20bd4652dfe7d07fad1aa06396438f070c1fa3b3b5df7ec6dff235db4c
SHA512dc966c78f0af3bc2774835c2436701f2fa4a74a97615bd8e1b45440528b960a5c30f069ea6742935eafff8a8892f6714529422e72343ee6996015bc61c8cf4ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58639560b122403b20481af128bc0c0c2
SHA14f7c3991db6f9ead97d76494743d961bfc6a0f87
SHA2566ef83f18b9adca8fb1d832fac7aa3751f5907ab0f5f32e3f03dec3009ea8d0e9
SHA512b1e15cdb4bd3558b9641d739b6f8987e27af8008c181e161f6c5800e9aca1ff4da5826a7dee07cdf727ffd1e8c732c0dd6c0aef22c9a7b174ae4e00de2bac733
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5cd0006789eebee036d161a24afe7a3
SHA1accd0a95d5d500541486cae1dad75243b81702fc
SHA25655d6ad113527d55a2d097e82c7c8563b44778f90c581a71ea0b68c3dc8b683c7
SHA512cfe991506d2ac21d863bafe3dd9dd549cad822c4fb1434cc654168b4d7f9200d8eb6e94f1064579822fb50ba227719b0b1461e30bd7d952e9a19031414cf4678
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554031924cb56234953f95305932586bf
SHA1c906efaad3790d652c43ae0e1325647db6717b47
SHA25685e98b05f695619a4fe0a4d90d48ae021969d7e1a8ea4d9d2bf141b96dff1ce0
SHA512157758699208880fa70c8c23c875dd99765b1e740340bff505e46c48930b1438bd119315121f9e567837f89c7c00919ed3ced438144e2b2201c851890a87674b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507ae70af1489a05f72052a9cf1640622
SHA1c02bcc193a1d8a2fc0d0b1511c3d93d6cb60ecf2
SHA2564122436cedd580c4f8379fabf1eb4eff77a9c5621fd56e9033e198ddd590d80c
SHA5128fd915d4e2ed64a842aab3c1059099b4eee9b6b5587867c967e9a69c602aed20dbc4768a283eef39c93a40d306a09148b28ba18972476987c50a6df6e839d619
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5851a589d8659af404a57c10967b0d5c2
SHA144c3f2ef171eb179c12a319a2280e7de1538c63e
SHA256679eb1c12c1818bbf18666d7df559d4eb8fe10f83459a1da6017d68d08c8e04a
SHA51288fe901e500551f05567b78e26a6486fbc18654e2a03f326346319c93a6d1fb711195ca74324936f720fa6e4b3060dd17dc4e725d5eaad7cccccf44cc12f30e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561067565946636bbe3c7add1cacb6d0a
SHA1000263513807ed45a121042f7abd495fdd1298a4
SHA25657846f222c254b033ccadfd6e5d9ca105dd58ba0d4bb1c3c506bb3d83351cc78
SHA512021d0aa4108cff93cd73a28d6fd64f2a0c8379bfdd734bea0fe014b4cd8730dfac6344d6af5dd2ee2c52db544a496d354c6380405683b07266d60b02e6a7eeb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590110df6f09cda3963164e0ad2a08de0
SHA15293af933fbdb8c8309c684dee924fcc2b5855ed
SHA25629df3a88365854745b21b216c185ad02cc09c3c54a3e39248af94e83c65fd3c3
SHA5128626eabeb9f4608dc13f3f5c3bc352637940c277b1343debc1df8842bbf3e673eca9f44899a222fb5ba36febd856533e78dc3a895f5c7e38c544b760c3f7b5ee
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a