Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/05/2024, 06:06
Static task
static1
Behavioral task
behavioral1
Sample
16507c0d7ac4c796ba07d7284e1267ac_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
16507c0d7ac4c796ba07d7284e1267ac_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
16507c0d7ac4c796ba07d7284e1267ac_JaffaCakes118.html
-
Size
460KB
-
MD5
16507c0d7ac4c796ba07d7284e1267ac
-
SHA1
ecf6021f679a9cd1d4ac43576d861d6b2ef35f07
-
SHA256
02fa7277ed8318cb33d186985552dd15acfc8b4df079554e51769bd4a9790f7c
-
SHA512
c2cd1b3219c9b6f77e2b3c0138955f4986ce288de0cb7cd562b7c4ce9ce82584e5556292c795352ec18df27ef19acc2ba6473227dcdc207fe7cb9f5b57b527b3
-
SSDEEP
6144:SLsMYod+X3oI+Y6QosMYod+X3oI+Y8sMYod+X3oI+YLsMYod+X3oI+YQ:G5d+X3y5d+X3o5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A13E1A11-0AA5-11EF-BD10-4A4F109F65B0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421051063" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a06a117ab29eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a70000000000200000000001066000000010000200000004ae70affc7d31aadabdcaf8de15a23457deb084996e4072e1cb8fd055a6b33b1000000000e80000000020000200000001f32053895226e5a0a971652490e0971b58aa7f939487b4fd540d4d595ab94fb200000009649d764e808ad521036afaad907f4a0abae217bdb27835375d2dfad02cfdaae4000000098c10a0f90d19f1d63aba8eb54abf0b182b26a3ad16d21a0df1762f6f7e01dc3499a72dd4b7a0ea4d217daea5ffea454bef62e507bd18394416c57921affe640 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1948 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1948 iexplore.exe 1948 iexplore.exe 2664 IEXPLORE.EXE 2664 IEXPLORE.EXE 2664 IEXPLORE.EXE 2664 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1948 wrote to memory of 2664 1948 iexplore.exe 28 PID 1948 wrote to memory of 2664 1948 iexplore.exe 28 PID 1948 wrote to memory of 2664 1948 iexplore.exe 28 PID 1948 wrote to memory of 2664 1948 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\16507c0d7ac4c796ba07d7284e1267ac_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1948 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564f8c7220cf083ab868603df9841b5da
SHA1f5f0ac34497908ad7f8d8e24b43e3a6bc2721b12
SHA256e17dbf4b4c9088823c4d33510ecfe7d1c432c9b3d2fe558ef17cc968eaaa16e2
SHA5125c3cb8fc5b0a20a23f128860574f7e8016759386c954de6921dbb97a0e47fcc6014dc67191050dc0296f7bd268b0182784747ad54503b84ab55397a1aadc9199
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad994ab89327bfb397b08627ef9841c6
SHA18020bca210bef6fd71094fc0e2be82e0c3e25daa
SHA25697b613c13acd8fdd29d09897c5a2aeb46c9e20625c9a80f081d1272ed655cff4
SHA51234e7c9113f90678ac26c6344ccbb3c0b7f1e9d0ef4ac641607a3242ac891e026b69700032c1f92afc551c06fffe835d24c1856cc88886b42fc8e9ebb6e544556
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e8754ce259d0d9864822e31c18ca0e8
SHA101510476d28fa903cabc11187ed4614973d0b7d6
SHA25687fcb1ecea161a8597aab9471c659fb6a3906fae289460ce7468c776f0244613
SHA512160374622fdeaa9f61c28fc87fcf8adb32264babc9a68ce0b13f05b9f6b9a5f6cf5865736c5073b6f97d98ecfa23571c63a4d08f892dd4efd2cc44f61b57152d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567c5708f549503db271944856dc7df98
SHA1b20823c57513ca84f5789f9f79be8c179751f9f0
SHA2563128a316cab7291ac527697d49f9d628679c9dadfdfacdf592e854f9800b6d84
SHA512c8a5e7cc78d97348a61d803bd738509f02602cb9f1c582d1f83412a3333d29b75664c47583e0df272545c08e9cab1273c1c4fb8d201869d7f5de5fd2b7de47ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5209334b07434670c42beaa45168fee84
SHA174caf2d78c1f8689ef70933c0d0278e7162aebac
SHA2560663d9e6699906a7beb6f8d73511b174444987484aa0bde89151645b255b37e1
SHA512cc783ada884e10d875ececf7ba626e213db7140325065930d2b5647570c9c658e8d363d9c5a44cb4c4b9ffdfce4a50f8e030724418e01c984f74aa407e26ad80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5138ae4e583262d450bebe41935d78907
SHA16a398ca1a40fa50d12c5bfcd1022411074741b97
SHA256317b309ac5b4acca14a95c910038425275ddd6b57041b47c8616ced9fa2712b7
SHA51217af946d7536b1b799980a7431fc5819951aeef2f2be931ae32770570002a7c8c59549be4019b943428b834430ef0a31a4210ac53d85590b04d411721be710bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57527ceb0ad57da374ddebe1f266df4b9
SHA104b5a624225d92abcdcdcf9ce1ab43d23d5cf346
SHA2567c8dcb3ccd49438062cdc01a1d1cabfc48ebc27c24f1bfd431e064099a7d06b7
SHA51231225133ed9b451418e857f55e0f6e5dacb062b777e4eb271ff7e6029e76775df04e448b069ded65012c4ad3e22e992ca2965559ed506fde63c7a96bced36423
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e0d8f488ee9ebbc95ef0ac34d9b457d
SHA134decf62430a40caa2c6b0e0eef4e413aad9895b
SHA256c9d39ae1fa32569c181eac2317f787c2abb61f0abd5113de5df5233ecdd72605
SHA512df19a39998bc4c2310962a043faeca9495f53214bd9b6bf5014ed4a44962cc64cd269999a1fe18245c4561a3c6fe6089cb6e9fc5287b0bbe29a0c415d6cb4b4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54510aa3dbb67697aa05115764edef9f8
SHA18bc8241707b615a1e8bb20ee14ffa346a3ec7166
SHA256c46d4eab8df5cc9cf043e6389fe9a8d6ddc666ee06d7dbcdb48228c136189c2c
SHA512f81b700ca0248797c21e01b6dbe207b08f4a234153dceec0000006fefb774c85956c1e6d0c84fab3486db20c06981f0a5e82c2a41544be75f82e2ef9e374745a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59713c98b4b8810c0fbadd1f9fea59c74
SHA1cdde11ed1199f106e1746e0b0b5081c17b56a48e
SHA2564f5119b85a7172508d2f29df143b9a23926cfb7ca2aed403afd2cd31d1fb2d3e
SHA51272c0c2483331c1bf967ed6f7c3fdba9364e93bedcf2716ea191f6b06d102f7c6243691b171cae15b7106000568300d9e3ea8482b9d10642cb290fe59a2c7d3d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d51ce228c8b070d01d2bf4414dcb514
SHA14302366de6ccabda1f55412e535f9388716f1311
SHA256562a44429212e29b713f96be0a2d93ce578137992873aa880ddb7cf843304e0c
SHA512cc4a2310d19bb8f6ce71800ae02a092a41d6b58d59dd4479787b0558082edfc00ecd13d20849b8550d4384a1a5e44a925814133e03a152164acc970da288cc63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a85723d8eec87970773c0a7d2fd2c9c
SHA19b23fc5dc660133fe969f881f29cbe5095a12764
SHA256ed233a129a45c54cc87313a3b53ce92bfade6ec8cdc4039eb0e7d2df6353bd73
SHA51238057b788c7feac478f620f30a11299621eef47c94073c188bf203d8e69a96d052eabd8e357af07f4c371996bef6e3cc43a78cb25132af5eb51a91be2518c0b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb6458f1049e0130697f9e43f65cde10
SHA133c8ad2dbc6f00ee0be73f5d471c51f1c2e0d130
SHA2564e030c0c12f9bdccc8dd1d84f984319f43f98547058e19432bf636f76f0fc490
SHA512d6dddab28ca640165f473d50ccdb06d476481beeba3cee47894ef9d29bd25d7994be188d9d57a39df138e9f29eb0760fd462829c9a916344615cd0d9dbe9a768
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c1cc61427061e448907938dc82f4064
SHA106d1456dba177b26dd6f95a2ee3e4c7232a76057
SHA2562e7566d567faf6d7954620dfd571bbaf540d27e072f737cedf437a47d1bb5da3
SHA5122127ef920182e084726058724cee63a424bb96cde79151f17cc3c982f2f19e4470707f0526e282daf8403d69b9b8d64aa82e75768223313739f106eb74a8fd82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53af9855dd20aa4e613bed1effc0a0990
SHA1fd2dbfca3779d82d2d7be1681b864069cfbf8a97
SHA25621048d5bae3811f0b744ef67ffea1de8c1d763dc6c0f001027c4851995cdf0e6
SHA5129061f5679fc44f8bea72765a2892cde41e861a5ac2bc0533861a88d1e3b043e133cb271dcb368586639ee4b036140ca82c110cb41bd7762c6a83f6a1c7e34889
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d98c3fc0873e75e84a6e925b0434918d
SHA1ed441678eaf87cc89afca7b1bd02aa75dc7bead1
SHA2565de3129823246a164d2f4a74f6a425e142eb39e354f084336cb4284e9a4b8547
SHA51247fe5f187ce0916b87bddcc6bbf0647a44773ba5d0460074499658a172256202c05b7cc09f79210edac1a61ae025520d12295f5310f6710a56a3740dfabb1bdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55496fc9f4670c3aeed9021dafef4b8da
SHA166786f1c23a5ed1400470c7c423a0c2528197228
SHA256e507d16b960f5c91b44e92133e18c8528a51154a5eec8f143829d36d9149ec21
SHA51283c08e49b047534ac9bd0c05f306b5ef81ed1b4b7b2029b8037996183f1e08443b8df5e926813ca45a7fc51baa8fa3636d5a06a989b7fce0ac75e602b9718343
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0104dfb4374b03c21a72ca5be1ca706
SHA1d4f52073393b6d04fe219bd7381055cba9ee1379
SHA256cbecf90aea020a183602064e6fb464c114b296dd2a09a36d897c7c8d2927a3da
SHA512208b870b8e187eb465ce770b795970c787d1afe853595497ad446f5c8c6b74c81845fd0ae435e0dfd8bdded87c52b88db79f15aab3f8266902b19bc1b336aadd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59410599c9e9e93952e023eb289af90b7
SHA1d86bbf9ec00137a337cc4e5485a05b85636408e2
SHA2566d54b108d038a81ff3664db7d1434329086bfec09018df7613e387c127feaf65
SHA512c5dee39d54ab24d224fafa26b8b2bdd5ced27d25c2a429d19b15f23be84c91f5214d13b9fdd56bdf16c0c878c5ba57447c026588e05b2c9af66bb363bb44a972
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a