Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
05/05/2024, 04:35
Static task
static1
Behavioral task
behavioral1
Sample
1600c49eb56315084fddcdb95227977d_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
1600c49eb56315084fddcdb95227977d_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
1600c49eb56315084fddcdb95227977d_JaffaCakes118.html
-
Size
4KB
-
MD5
1600c49eb56315084fddcdb95227977d
-
SHA1
5bd98e9cfa451619e3a30311a7187fc6cffc1535
-
SHA256
f908ebbf7d007f0e6b03c0978b3b70a5f30b5bebdbcabea455a6f42339698863
-
SHA512
127b64fb09a60962b5ad2dfb90a0c8170f898152034e08c306ebfde35e91eb4da28e9d17c91766aea2a92a55b5e91f93605ded9b5999b7f860d48e35fc19ab77
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oIOZd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDa
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E6A77E51-0A98-11EF-8840-6600925E2846} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c6000000000200000000001066000000010000200000006edc47ef16d7a7baf77b2a38a59b217a33c40df706c25223f189a8dbd5a9183f000000000e80000000020000200000007f332150c30b4a509b82fdb76560911398b3f98127cda8da927e69c68a401150200000001b0055ab8ff0c5b4bb50e6d60c2117e98a526177615f5650e1aa3e1b37d36e3640000000b63dea44593dfc215ac9fd8f38e41d4b690e82ab0c735b8feabf1f959596e9cc8320046ccb876c5ceb16e30c1fa60e1e04210936619871e662d3fbb2c91e9f0d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421045596" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 901628bba59eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2192 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2192 iexplore.exe 2192 iexplore.exe 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2728 2192 iexplore.exe 28 PID 2192 wrote to memory of 2728 2192 iexplore.exe 28 PID 2192 wrote to memory of 2728 2192 iexplore.exe 28 PID 2192 wrote to memory of 2728 2192 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1600c49eb56315084fddcdb95227977d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2192 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5955ae54b140a73c95494bed3f504ee5b
SHA1aafaa198788c4a4e1c8080d48915381189190833
SHA2566109ef6453e5e154804d81a339c7f42348831a52c378effdff5060e5a6162edd
SHA5123b8c4bdaaf9364622a984dae6f4d1d3e56290a662056e189d6427fc9aac6f70933bc14fcf2fe1c2909b2a2bde9d18da5c5a0a12553b76843be53ee1084899763
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dbd644e89cfe0412a0e3b8be606fbb85
SHA158d575d57fc5dda7a7c368578cfd6eb680d3dc10
SHA256ce9e314cf7539e90c9ded7944961ec5c4d1d6712ecf35c20c6d0efb6480f44e0
SHA5125b8b5c4aa6c9a9617c891ee949a9af3a7c0005f5885e4e033d8ad384b9dd8f6ddac9596bfb803a4f787ced4874f798442cc77dd9df427de9cac55f50924ca7bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7b1c353a9f9836bb3b8b21f6e75a94a
SHA11a4c69946c6e70c0c766b043ee8208930da00b63
SHA256b9ace187c8417c88b8a416a94709e333d2b23dec2f89167fbb9956d51df4ff13
SHA512b813b13abd5431fd0dd19d2c10d3d0cf65a57fc130fa4d2ef0e99dcf3fa256f3ba7a4b7e86c2478a64e7cda7f121bc4cd42eea890453a55be6bcd91a505e1902
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54df7bdbb3612f0f34e46f31254cb3447
SHA1f14ffaf6f73317c2030395d33a3a3444ca3e0500
SHA2566dbf6a00fa61ffc3a73b37aa447f3d10e8b379498dddbe0b9e7da2c35bcf9e09
SHA5120dc58cf7dd94837f5cf8f97195f59d5bda7fc6ce8734ceba4bd60d2ae2a38c86071865208b1ed85e981fe0cdb821aba3ddb461f5c699e02a32b6b68e3c4f3189
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55448d95d5de7e6af2da15f97617d63f4
SHA15f4679ac9bd2103685fc1d57b3f24c9d7331d7e2
SHA2561bb2c3ed0c9bfe222fd356e4778bc5c4f377889c6917894b523091f1603765df
SHA512f5f08c9894779d4dd870543be8152b425a9d9b38709a699b4d3a5716caeb7295db97222a41db73e4e66c79b430b50875a48f90c0f0b1a26c4e0dfaee8916d739
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b435a2488116a82eb69fb989d2a1e7d
SHA155371ac4c2a2661c3ebc35f39715ee0561234445
SHA2560a685158fcc20b9ba96592015ff21f62ea44bdc14dfc04a972454b75801ddb03
SHA512475cc3c6e661c3b7d59f23fea81883fade381597d3074b3c1f520706f1c8994e72a60b097e1426204465542934d87be44910e4e97a46c4c16c9532f280890a9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c93e550deac2bd7bb8ea67e0ded27a2a
SHA1fdf4cd1401a32d49ac83b3c60868663879bbd9d7
SHA256ce2376a82c57768567ca9eb93e91bcf97c675b439344912e2199f123f752a1ca
SHA51269903289fef6b50a6969ab554b18ee8175e80dfd1f17ba8090f695cae1fa65685498251529fc86703b45a4778257c54de5c172bdeeac6b08cddd1dc0d8b8efd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ff03d41d3cc51e3339225f4a2b8a6ea
SHA176756fde7bd2d119deb7081c2e0924481d49518f
SHA256ce3c39669ae78765d0f40252cde77af76d6921609b199980295fcc82111811d2
SHA5129511bb7de14646ba173674fc73af6ab652661f16ee0484ce116f40195c73c3675c043929ea932374e52e78170d8179f7c6d2c0ed12023cfa924f1d7e8ba67738
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4e635c62102d9d97c5bd81f47ca0b7c
SHA1459d1fdf0c507c16e807c553d05272f68d1d374f
SHA25627a5389093269a4ebc5b29bf24286bdcd860abe11543c1e098cf368c32fa416a
SHA512647d63761ba7f9a994d675405864fdee4359c2cf4230e463ebc20b44818d2f8e7f0d215d740bba8faaf209835a2a0b3e76ed0861e6be68a323c3895d9bc8b784
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522cd7f1e1f64f8768cc6211c319fe0f5
SHA1d76e3c1ef77b8346127f73917eaa98facabf07ff
SHA2560485f2e3b25f77fcff38c5794fe552407f79b238fb3c5acc33d680645eb4a261
SHA512070a4c6816ef2d43586729341024755dea4f9c4fafbf7203d1aa6d44383bb7ce265d4ce8ebd5b92732f4e6ba6c44d5fd0660390adb7ac463594c59b655119d77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4943d250eea80241b6a76d8a968cb55
SHA159e65aa126493272028acaee7c881fb64fc28b64
SHA2567bb57f205ac66114914555f76ab85ef6b77b0369916956706801fa5f2a249476
SHA512f7cf660e9d1f72d30d6160df88353febe5d59c0929701b5a30d77360afb2500cc591b93ea9e6c76ba7c14cfd28f577235362e239dcb366c014268d1ae30376cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585b4216a88a0e4eaf09e65250a5fdc77
SHA1a43a8151bdf5394e215b5dd41fe7be137162c2ec
SHA256f80bd5214b419e49e52dd1981b715c149971d4b1977d183b785d6e2f1bfb3d63
SHA5120fb42661c8e2f5e8a88a17c7f8ed22307e0ada49165209429a382eb1500c2f9454d349d0d911c145eabe8d03f8e81640416b859ac907949a617476de5425df5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d19537e06657116f52af55d9ce23709f
SHA1a397ad019d471d27065396dc1772c8369f9ff020
SHA25659360235821515f5b42a951dae7ccffdafda8aa4eb83650d52c83f387a4b9e67
SHA5127c119adb4e90d3f93386e37d6d41cb3268a0905e977de2b6203c16b4e5f09ad19abd214ba5b741f270b670af0e66b6479eac18dd05591b4cc9cb79c3c2046eeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524bab98281988159bd83ef90735e72e7
SHA1bc1f5709c71e0b37116dc1f7ee86c1b500861137
SHA256a9566592744887236ff5535aabb844691df88c0fdcf1146759f2320c6123407c
SHA512ebca6c8bd2953ea487e9aa9b5a627ffe032edb1888b8ecb04c9744349bb0676c09e57ef3fc243de6efedab43d6afa3df153db6e1eb2f40ff2866fbcca2b5fb27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b0a00d367b353dec17119e98529b31d
SHA114359f6358f2b842fd0b8dae1e3e89b3e2f00b1a
SHA256d7b1f5fb73f536beea5c3f0e8076931a28757bb3e99d215bc85ad5126416ec2b
SHA5122b07ababcfe5c199734696273f5803ce5e8f80f397c0fb2add528b5dfe1bdd0170030d0c64103b238740c3c47f4ae35391cf31bb23499c5e869b7a0b2a653e97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a714d8f5a9d07b3f69098ba1b60eb50
SHA1d21ae3d3f46206b9d2d1394117b2fb7ef975c64b
SHA25645fffee47dfc27da1cfbd07c95871658d447dc92502c9882c4d52f6478abceca
SHA512ec6fef0e1d8b53d2d3af1a1646d68fcba49efa66d050e7ed4a2998649351c85c6bc8580d2a85a942363883a64f83266dfd06ca839fc87d9b0f8bb48611def71b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c9e0704bde6bb6af99a93cfaa3280c2
SHA1a9430b899a935521fbabc2560ebc34262cdc8918
SHA256526d9092cb5fdd166601fd7b834f05af9339b4e81390ed8915070cdd4e2e0879
SHA512d0cf96973e312f2b46ac4ec2dfa6b546919f9a279e4ec39ffa852dc295419e33f39620a5fd69252a6873e76daef2b21a34959a91a70863d13d498e7ee48cee0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1f3d81391a285724880920be6257b23
SHA14c72f914aef8d6fff06b045df4871e883061c06b
SHA25632158768bc13fbec0626f52073b2d5103741825222b28359d7842e562c7bb2d8
SHA512c5f4a1055f0323135b73a281b76b2ebaae586d7f729f6f41b271c2c41c6ced1539dec09890dedb170f67ec89067524466e39fb4e1a56354465016cce9df8dfa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d171ea5d73bb7d041fc48c1e5d3c7ad6
SHA1c31210ec7cf4d1c3b8240fba3b82710e7f161637
SHA256458d482c9c20a9ee7a023d7e5723ff9c19e3af12c5bc6a258cd1d33ef1ba7a5f
SHA51200f2d76f224a649b14f851578c182bf462297a3f3ab5d39748ca120310ee528eda295c5a075e5163d7b1bced6834a01ecde0aefefdb37395e38a39008d31cbaf
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a