Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/05/2024, 07:35
Static task
static1
Behavioral task
behavioral1
Sample
16a2d8632cefe467bf5409667b999978_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
16a2d8632cefe467bf5409667b999978_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
16a2d8632cefe467bf5409667b999978_JaffaCakes118.html
-
Size
193KB
-
MD5
16a2d8632cefe467bf5409667b999978
-
SHA1
3f5d7574849c6514c7bb941df5a02e3575c56e27
-
SHA256
4774fcfc839cb312b1630a226832c9cedf3e2f5df55fbd43773c71c130993048
-
SHA512
1bb62bb765d56bfe24644cd5363326f82e9a6e75b3c706ad10fefec367f8584ba6b4989827ee496d0ae71b8578c60e2281fbfd8f6fb3773bb170f5a97261e97c
-
SSDEEP
3072:mD4yfkMY+BES09JXAnyrZalI+Y9rreJ4PKPlEm:mD1sMYod+X3oI+YReJOm
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0a851d3be9eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000918b79217b1c413d748f5140ffa7eb319b156676edde90e4e85c540e1bd790fc000000000e8000000002000020000000e5b266ea53e7268abe6e101116cb1e56d5d8f770ed15cea1f8351cf9981a40fb200000000647f68d86ceb31e83848a3ba4e9d34fad6a7a60dc92c7654742bc26f84d10ed40000000169b211c579cecea08fd510ec45a545707d5c6b05fdb824517874ba64563443f8152eeecef9a1fdca2733a99bca0cfa9c3cb85607497ca02476e42a40b1039d8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FED85BC1-0AB1-11EF-B238-4AE872E97954} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421056374" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1848 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1848 iexplore.exe 1848 iexplore.exe 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1848 wrote to memory of 2080 1848 iexplore.exe 28 PID 1848 wrote to memory of 2080 1848 iexplore.exe 28 PID 1848 wrote to memory of 2080 1848 iexplore.exe 28 PID 1848 wrote to memory of 2080 1848 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\16a2d8632cefe467bf5409667b999978_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1848 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54260141d4cfb6a493572d90ae986a6e0
SHA1e432d0b624f76ab4f8faef153bf2fde2c4a1fe1d
SHA256e4f08258a2129815c4f64fe256e83cda914257ab6773ada27d59f67a7e0b651e
SHA5126867c6eaa53a33b5ce3933ae032ffabd5b97552accde45a06d38d4e2f03306ffea21560617804a0ccc62649c5e9153a2101c1e81caec1fcdd37817fed81600b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2cd948a1c1225f6f82d44ca15a872c1
SHA168d6a9a9859384433ea97e99c9bda651e884b366
SHA256743e414c0b4d5181b7334b96ecd1122a736b767b4df8e902aa6499abc938527a
SHA51269348f6ad257c50e46a96ea8e5d0e6b74ad7174d5a9fb85f397a161464e5093f80dd65f8e11c9e9ef0153d5ecda43f936dad733fbc27d20741f02c79b31a9891
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd2364bc60e5ef2b908f2fdbf2188a28
SHA12211838fbf0304f81d3145c4e205c4e1a56db44a
SHA256c70198d6125e50a3ca347b040d219b99e4f30b83631b8180bb159e243f08d3a1
SHA512ee9e6e09e7dad6f2783fa80a0945e865695d75e1f9c5cf0ebc54b6f1efe8d51a3482bd7ca3344ba54ff90adc97f59430c2053688029e983a6077a807f49e7e61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de747e10062bfc349575791aaba6089a
SHA14af9573ab0978e6a1fea5d37010b3d96198f201d
SHA25675faa9f8d9eabe0000371bbf9cfaf43888f7b4cd27e6f160470259cb5f6a864d
SHA512ec0904e99f15591712a56821b8eae18d57929711c7584aec495c7722a30888096d754d8bbefb98caeca6c1da8d19eb18758180d8060fabf60f0615d4a8dd962a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534a4d8f33ea7432d4fb479adc4648724
SHA10cbf08d53de0586cb0944da36246b9b9d89e7c15
SHA256fc7dfacad114963f90ba072ec69948f49a365e65dcddcf626256477b2e3707c9
SHA51259daebf99734712143e2440d7e1b9f5f5a24ad8eb35125bb732cbfb3497c75214f565735be8be37578bf373fe6374f4a6b3afc2cc0deba0b5b1aa52b57ce6589
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590c864baa34d8e5e80c1d0da5d8f4de0
SHA195f13dca3c313b6d73303d141c5a822564d2a319
SHA2560b23ac107c3909f5ed26d4212f9f8d67febd68244935909ea54cc77c39aa8528
SHA51212498427ea17010d0db1a9fc772d3977a511c116039a0bdf31ebe82fd1538db641e7e74ecc7a735c7ec01cbceb739a8a1f8d847d7d0e532b15d84472d62e65e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc4838006e1abf384bb3a74ef105aa32
SHA15da976d74fac9f451ea9f8f32b5c51c8126d03e5
SHA256c5bf9f0478dc1370793380d96d7ad51ce9fafbda9121315b4890df7b118cf07c
SHA5126bc135daaff3244522b4748559ad1eaf312342edf54daab5ba14c6710e7a5fee9bde8ff552dea108f2a3ac31a9a77145127a8dee4f2302cd9046d975a9620964
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500d14a44f6fa5bb88190844e2e975fb6
SHA105d5623e3f52f1ed0206d35d81c93b2f7aaa3ab4
SHA256ae90440eb9f47c251083c85453e3f8efe207b30bdf0e9af51677cd49a47e39c7
SHA512f95d072f9bbd591afcfd8468e5582d6ddab455ba923adfaa01cc755cc02daa56054a221f306d71cbfffc61c8a310176aeacd04dce6f0f557d6e6c545124ab797
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598081c3097dbb3b52592cd4312883131
SHA1d06a63a3f5c17e21197d8ef48eebacb928213d28
SHA256c2cd22c91f925056ee1aee4a70ecff84f9b795dada6d68d2bbddc4070dbbb80c
SHA51250c2e4ae5214d6563f275a4860c62f7bd9c73fa612de353acaf6ca95c327c4ddb1c98cd8845b3bb594a41a956ccb3d2c66f72ebbef7c5653ad31f660f6483cd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d14655aa7751ab9e91fcc9c26907040
SHA12ff4446abb3499ddbb8576619984732a14082da8
SHA25605ee1db0e1dfcfb65fa8594cb3c2d45df1c7bbc2cc931f63283cc33681496e1e
SHA51255714b6297ae2d5a213b4a8cebe5d7a7ed77b23ae19f8dbfbaa7f04063bcb0a133feb5a7ac7dec58dc59effbe3b477e4d445e07c31403a95f714c4140dddb226
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526aeaf364b1d981c8f6daf7d35555c18
SHA1b81b89c7982e00c798d9f630f1c49237156168e2
SHA256c2fcc4598f782c23378a4f24d587f1ca8fc9b1208f4fb14d73ea2423cc5b2256
SHA51299225063c30909f950bd029d3d2384a7ad48f55e3303c0d6688f3f907711de23ff8a6ee0ceb8f6fecc6a72149d5e61722b76e5c0374cc92f34ae7cf7e8fc78ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc90001f0468f75de73f8b2e78ea86a4
SHA105de019dacc3bb40f5e1a2f72f96f7b2bffcb248
SHA25658084ca10121ef5ee1441fa5ac1d3ef387937fc2dc56ec86b6c3ae9edcfbd276
SHA5121fa3784d6663e4d187fa5e1da21c82ba78f907aa71d2c9fe5c7611e0c9a0649aa9a3b3b3118ff80eae55bd57adc7ab556bf541997213a132f4065178ef5c5036
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a307b5f49b2544da045dde2b588cc7b
SHA1dde03fc3d96c35cb866f2ff3bcbba4017e572413
SHA256054763621e9789d9f5fe1756087e5358993c83bfb97834be557da9aa67ce0bd9
SHA512859ab69112f43ae2c12a29a550768265fe42eccdf4f75d5cde9fff9cf8ef87bb983b20c10237f4a5c78bfcaf9320c86ac5761b3d5d69ed1585103717b549218b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5317bc5ec7c22303e2bac406d81f1c15b
SHA177266e80ee585c8c18fb5d1a1224a5ea292c7231
SHA256132150331d391ce823a013ba1d07200c4f498f5f77827a83856c85930e9338b2
SHA512d55b66f7ba071d926c06c8662c9bc1c588b8063359af70697c4ddd9a1be300edbf20f4eea3c9a7fdb4a8b95b120e3dedf69b36e1cb8af5d73e450c58cf81ec6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ef3bdb7bd4424424287ea3222d004b1
SHA10ed4a4d9347cb2771f0d12480aa8c5641c2ba9ca
SHA256859e79381bddcf403c63aa5c9ef45d7ec96ddd803b79708319b240bb1396d4b7
SHA512299067221947e0d370132baeb44410079c8c62bbf0e7389a41fc7c6178fe5d354f853da6916e2316431cf1956c61f845035829db7de3bddd7f274ec78428e89c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526a2106233de598c52ab21b579a67efd
SHA1b9519c7c3a877ee782be5fd1d078ccf888df89c5
SHA256f58495986ced77c9289d5061fb724894aa54874a810179adb79cc2338b4dd500
SHA5129f1581d704cb15949809c9c709bb280b0c82f29958e763d9e01aa209eeb95f10bb52d2c564879e122c018d0d1923c2b6cfe4f15a5a7cb702625ececd779c3dfa
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a