Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05-05-2024 06:52
Static task
static1
Behavioral task
behavioral1
Sample
167c5e2cd77493b91c7a7ae9b746c86f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
167c5e2cd77493b91c7a7ae9b746c86f_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
167c5e2cd77493b91c7a7ae9b746c86f_JaffaCakes118.html
-
Size
9KB
-
MD5
167c5e2cd77493b91c7a7ae9b746c86f
-
SHA1
f7af722dcadfb197ff580204f6535c978d792593
-
SHA256
6ed4414168ce4d69f2ba31b9274402847371b5be3634c2192d745857f30cea83
-
SHA512
d6197f8f8163b2524034373be6dfb5475408d7d432828edd2c0160639779ed10eb63357910408e9fa2e78d9f1d9b1c652f22b7295f03dbe7cb1a95be92b6c8fe
-
SSDEEP
192:QsBgZfGIw4yGxfF4bWEfwsr5TUjHiYttYaYHz:uIVbWvXt+T
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40e7b9efb89eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421053845" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000003b9a0d866d98659826efc076e7bcbf98f8da78b345d86e3ba4a2d7aabc0aeeca000000000e8000000002000020000000689b06449bb90e7c090a320d63386beb900eb9dccbf789bc1ee680b8986418452000000089cafe976f2f823963960855b11bec3803c2ee0930246048403181c1b03d750c400000009e495f30f6b44a717615cd3a2ce21ba087695972e15ae2c29ad68afb5825dea4218d109011e312c82c4a8150865fed9e768dbe4e516fd168b89b6063f630edeb iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1AE15391-0AAC-11EF-93CC-729E5AF85804} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1196 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1196 iexplore.exe 1196 iexplore.exe 1804 IEXPLORE.EXE 1804 IEXPLORE.EXE 1804 IEXPLORE.EXE 1804 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1196 wrote to memory of 1804 1196 iexplore.exe 28 PID 1196 wrote to memory of 1804 1196 iexplore.exe 28 PID 1196 wrote to memory of 1804 1196 iexplore.exe 28 PID 1196 wrote to memory of 1804 1196 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\167c5e2cd77493b91c7a7ae9b746c86f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1196 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580d8711db272193646c05ff10ff93c91
SHA18333e72285ba320183e60212f8eb73642c665134
SHA256dd89040ea75b6a38d53b1baea41d126b3e38d29b80408d3f70af9f07ed841ca6
SHA5125af9d9870b933d58d2700fd5ba5206ffaaac67f594e6db350bb1df9110fdeeb0535302aaa5feaf0fe7a956e893de87bb74b0269b7b59ebff60a481aef57d32fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54805f080e715964ac9cad443baaf7aca
SHA1229cab778e323a375527ba083c7b3155234f0d1a
SHA2568cadc4fbba8c36329adc9279a84b2cba46232ec269f37f082f07e9e631de4a3e
SHA51228107d85c06ff4f71f236c2c1aa4b1210402859f0bfac287242c86e5bfe806f5f2066c7b2e5ea6f49d5877f8258945b3d7a8e5f696fb6505d9aa77de5dff3667
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f01f960a3f7718a72c1da8762ca1f8a
SHA12b196a30f3f2310c7fa2023e0ab06575dd35408e
SHA2567f6e640ff6eede8397c6911d8ff86e376b6cfff339f51577efbe80ee6d2941dc
SHA512bd262962724d852f0611ae4f71000a50f1e86198b14d4c35b04daaec7962e38545bc8d53cb415abf168115fa16bc6cd564ef2c87a5268883e5e975ca37a33bcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595a333bea02c5265c102e9b107c89476
SHA10fe749f704eb547f36848c9b69a20bd5518cedca
SHA256e1b94fea3919754a73a626776858f48a5d8f16514f63783479ab2020e7c7866a
SHA51235f4bd46b716b4390305a22809ca17b9cc8ca811e23fbee3de10d9be66de55e2fde8bc79a8d89cda5c62a0178c5b7b5dfe3b434284eeebbec3c5873a92ea18cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d380329c28afc4d9c0fc72ac39bc6511
SHA1c9ef8001538b95227c8bd66b47abf45e434e9965
SHA256db51d2f1a1176b4d7d5fe7a8a37e3fe0a3105a9f238079bab31047f5126f940b
SHA512ac4b3bb8d7a1ef8e9176ea981baeb15df4a556d3b16f24340c47c988d42e8aae7c741cad6d6a5cb0c7667910ac5491dd45075726f8ce8e0a26d9e3eed5161534
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540aa7d93cc915619e3e301ae1ac6f3ba
SHA124cf2726a13fb303ffd4b7a7b2a57310b90bcfd2
SHA2569b1854598b8b919a69c3d612a6d5d144d9b7c1f14a7a53b04e589195eb46c1ed
SHA5127fcdd5b7564eac1b7342a0d4f4c26010a896123f291c8950fde00aec415e2fc1a8f0de37d56e1b4e566fc0b5ef8cda41d789da63a0aeb8a1a397b523b40ee076
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5857cf171d47959d602f5b66b6f8c25bc
SHA147526c60a09af4e741bc47f648cb5a69a0ee91a7
SHA2568c35dc9d8d1f61680667e5b9174b63daf7ba79810c50b205e21c95ff1bff5b27
SHA5121d7dad00fb9eea3b2366f0372c3fd45feca6f4c3741d969c26325e6956e946bd5931a5de4dbcf2bd89e169bdb063fe8b7708cd17971647214fcfcd95d989e845
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547eca3c18ad4b9bea0546d5752cad27f
SHA134ff972eea5f270f8ddfe72b634ba1a48e9b3441
SHA256895aba19bf44bead25db14b5ed1e11916374a1cce3bed57559c7196d8d781c19
SHA5120c5e1644633b48c55d903369661e05c5aa3b534f90e48d0dc9e00000895ce758a67eafe3adee3ad3311a3e775c69b4d43c11c494284ef3ff1a8ee26548d687ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a94d5a53197baf79f0d359c30bdfb10e
SHA1add2a2f63713deb884849d728d1af3567f6997c1
SHA2565d414c9032b8b33aec9e1a494894cec3b7923ee59418bdb60e4319a8171d4087
SHA512ee6f3f00872bfd6c0de42e0534509935ce17d61ba8afba7e3fc0c8a70579d49b691e25f35d762af1e14fabc26c7a4b4589b9130c724e71ae3e7daf5cccf153be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a79c9a73b132f5538221d2bafc43aa36
SHA11a135a3ff891fc50ac60313943182a7806000954
SHA25615773509b816dbd09d547b0fb8a3a57957e408e9ec13d7fd34fb2b76eee8b494
SHA512a69720e6d36618cecfca8369289b40eb2f8b2e4c2713b7d69efeee3f50898f3929b91a8ebd51b6f7de73571e616cb7e4bc5842b9fc67dc6d3c3e22765de43355
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58de95134c6bff157bb8bbe5392b992ca
SHA118c4e591c6b1f07309620bbfc1c338cbc8618083
SHA2564e40b9427a092c9678aefb14310215e0dbd37d4a818421c1222f458857105109
SHA512c88b4bcb018853448b0e3171429718a39ea2429f183c51ea8b8a2993fe88ac4a9b51436b177b1a0cc8c0468d34642ab82bf3e234f7b63750e399165467528c38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bef2382826536bce7cd9ce946d9248e7
SHA1bcb51b0faea7326b265881b825792965ce4689b8
SHA2565e23949e84f305a422d9fe6565ac410b4cc0f95f02608809aeca9637b9ca7d43
SHA512501eea0268348fd62734d694d17ace0e00348cb8999a262ca0efffe7fe89d5022f5cc87305fa0106e2d1fb06c4e640c9b4989217d0f41f01b68d1891e1475b11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569e961fe32fe25f2299a7119cade93db
SHA1de96ea228fbceebc100ea2bc02aa7f08d734898e
SHA2566d2047b5a95507f7b8a30eb0253da181c0377fe34666b16663b1b9d576782acf
SHA512719346596b8b4402fe6acf0c23022c2f572b30b29bad6ad031992caf6e585ccbd8a5bd3a7450a6551c772cf001472ddcf8701c0cb04e2fa43f66491d2ceab0ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53724d62e36d688da6c1b179b952748d5
SHA186ac2ffbd2e9f17cddf86d718e66a56e18cc6077
SHA256adf0dfdc803bef518afdacf31fa6d129272842b5cb5b4af088b2b6ff831c2505
SHA51240e5884969e8456e6116be02bc2a4fcdbad8cc8f2a82fc21d473474662ff3cf7188818cc633e516f398836f69fc7817f7e6e37a8d2330a3cf40c2e3af960b0e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e45c7b016f1920646d33fe9f64fb442
SHA1444bcad404aa1bc4f7aa719f195333b249a6bb6d
SHA256d5fb78997d1e892040cafec2dbcbe23367c9ef8b3fb5f6ee4141df1a2f90482e
SHA51205d10dea769c41bb9e3e970ca4fd889a22756079ee32a1aefae17c7ef507e7d2ed929be4b6c18104019ba3c3bb16f1a5e929be2dca47a9915474c3a240eff71d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5afffce5c0e941b2425ceebbb45793ccd
SHA174ca5ef09d9094c5826962a600d1546b58d55430
SHA25662a39f6cdf62704e2b85313abb140d0e41d9962de49017c659226acd57333adf
SHA512fb3a459c83932d2f1d8a4e52e434a574237e5fd45fdbcd6b355c143c5cf2f7b5c9a8879a435b505ded0393f6b0d6fa07745c57b481b84a069b441cbc777dd8b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5274e7d992dcf70710d631b6b0763bc3c
SHA10868f04f9b8f457ddd856d4d7af8a23f3e271425
SHA25629789e127bb6d0e7d99421fe83b1ef9d927097936f48281eedc7aa42ffbd11d9
SHA512e91cce1ad77d4cef100a5e07e2eb21d753a64b8252cddf1ab07f06b7f5156266eabff8013b6c11c4fce35cd53ef96a45b9cf20763b79d73d4303e126900bd0e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555f28f4bc4c82df33cc97baf43788d81
SHA1553eace5af7a7c94a131b248aeec75236a4fc877
SHA256aea4e0fb821ef7ed73c72d502884f563696e230333efe7ccc5ffd76b8b58c3e5
SHA512bd75497f3399e8e36ecf5630a6aa1151380c46e8017a938cb40a8bc71b863335caab3b25abc0fe2515eb2947d0b1d0d31c1c354f473ca014fa7856ac1388370c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57454fb87fbd1b65e303a29613d510530
SHA16bb94bf568320de9b1a895f8aee417796f651392
SHA25644d99940668e0a29a40e57efc55ea9a2754b965a8d4d4babcf99fa370de8c786
SHA512edd974af451f009162b6bca607ac92dcd42f674647fbe5c9273718211f14e916076687ac496173442c7053fa61bc331a9619c5d87171352ded438d0e04d867c0
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a