Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/05/2024, 13:56
Static task
static1
Behavioral task
behavioral1
Sample
17fe9cd8a6314a157819491f57182a21_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
17fe9cd8a6314a157819491f57182a21_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
17fe9cd8a6314a157819491f57182a21_JaffaCakes118.html
-
Size
461KB
-
MD5
17fe9cd8a6314a157819491f57182a21
-
SHA1
d7a15f72c335fca4786b03aa19787be44e97837b
-
SHA256
e835da429cb5dcc2691ff059996bdd62e553531c1c81ef195e8edb5097631cad
-
SHA512
4f0c4abcca2c6ccf66ff9f86b53b8d7f155dc89674f777979f9c670dc01372c31a8102bfacea57959b7b83a54ce956d5cef6bc26a65ca8086c409cd81ac5b55f
-
SSDEEP
6144:SQsMYod+X3oI+YJxsMYod+X3oI+YTsMYod+X3oI+YLsMYod+X3oI+YQ:x5d+X395d+X3d5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e04f7126f49eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421079271" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4DEC7D11-0AE7-11EF-A40F-5A791E92BC44} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000c41eea064901377a1369b90d63cc75514db65e035ddb4b965b1e71ebd477647f000000000e8000000002000020000000ba2d474f9c0ce29c5e4d44fef9269f90b043326c5c1a88957351ae0803b71e7e200000001d42888e6a114870f819e10f0b5ee853ba1c446b94910dba933be322a75341f140000000307bdb3c36465e64c9ed9769cd99b7050d7160311c24fbfccf9b192b40f688165dc9b2b3ea4a849464e49c72cbe013f85783f18da3e094ceb0e7843827d2d39f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2992 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2992 iexplore.exe 2992 iexplore.exe 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2992 wrote to memory of 2476 2992 iexplore.exe 28 PID 2992 wrote to memory of 2476 2992 iexplore.exe 28 PID 2992 wrote to memory of 2476 2992 iexplore.exe 28 PID 2992 wrote to memory of 2476 2992 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\17fe9cd8a6314a157819491f57182a21_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2992 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54bb107125667171ce83461cabab62508
SHA1fee619d40243e593df0c9d7662b7589d30bf2670
SHA2561372a29fc5e807a79534cc1d53e671a0224f734d101a5e08917d078edf52d85a
SHA512e1e20d7f4876a8220b60f081c513fca30c5ab53d4c47a656f1ab9524fb700f44cf40e8099e5fe2a5c7de518e89a8c7820b6235075083d3665ab1b78a45f1aec4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528bf625f7267d6e9c42f62110e8c077a
SHA1e3a7d0c3735f55971538ad3c662ee3f82edc9c25
SHA25618643b33fb1040daca71f7edf9470e7953878aed9889654f9ebd71e3fc818cee
SHA51251e4a0a6a868b94bf9a042fc09f23aca48e6069b3e9e121722fbe08aa25d93047d76739d80acc89e162ed1d2619d703e32144f4e90ab245f5bd8462a5d6bbb03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6f15e7ec873b63e3accada6e05abd6a
SHA13de7a6968a0eeda987c351ab4ad63247730ddff3
SHA25609dbc69234397f861a6479202f5186cc239190163f289bd0500c5cbaeb4ac1bc
SHA512752fff4ab0ea8420dc5b9268e541a275d5154b8b8a4dd12ca8d1c8c053029c22d337c1ae2f3189532e9c3894d9cd406d542810bacafb844b1b9287416e35902a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cff8799238fadb0fc3dcf95bfdc0156b
SHA173d66ad50fd352509c44abd9b772b58114f4b5ad
SHA2564c91a87b8c8b40ea4751a5bb1db080fb035f333c98a4902c5c65df475102f7f7
SHA512006e027d32e1be1947def9a93d9fc1411c55e543a0b4a04a9fecbe58a00cbd84e4526ab1486c8e234cf6a76421b9ebbfaa32c1006b496c0e778788522b3b0576
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b67b93d927207acc778fdbb18fa4eb55
SHA116749fdac6eb1e4c9d2fcb62c12f9dc83d32c207
SHA256ecef235689109676f7ac6a683fdb4d35a8368cf8dcd4ebf6356b5b54441a2b13
SHA51275c1194a067f696f7e9790452d74c5f34a2064b89b8bfee179c6dbde98d18d8d809de31f119e23336b0eea0d36988671aeb65116a0a05be0ccdf93aa18e12bd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a0d247ac96ccfe4dcf3cce717b3b30a
SHA11ddca0d17da8c356044ac29f8d6fff4e7a866472
SHA256081bff42142bd37ee9b828058f335aa5d5d30fd45a8f8086d9b11612910a4632
SHA5127687d6c004d7b7f500e813adc35708e395db72c984ed4cfdeff4ca91db82d2a2a44ab864d2077245ba10a6e9fc2972bbd644f1ebca9f6b294ee7abcf283b8546
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553cdcfe890b1b78c50d04c37bc6c2615
SHA1f42ea4997c360feacf62b43efec7447b8b753c2b
SHA256b7442e0ec11064bcce58c7a6d7b10db6a7b63fcca71470a0daab1e7ee1ef2c99
SHA512b79847fde2b19cecf83a2b5cf6a603053ce5f90a65d806a59a984060a083a14570c20aeaea4fac418aa0681ec669365b3987e2b7187ddd5e1cd1c153fa91daa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530583c7cebdcaa82ef0b0d3d0fce2327
SHA160f2ceb272ab6867736ce4f1164505d1dd0aa233
SHA256ad238826436c85a4c7dad54df2fef92dbe38e54d1240fff6ef0b2e30d0c893d7
SHA5129398cc42643e48bcc173a3b3d7c1faf7846b9bc6c4c12a2d4e0e623269a9e28b87cd33d97f4c9433a9034d7b3e461f116d661ffd6ce8b6cf8b77e667035caad3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c250123aba7ea6df02bc0386d231992
SHA15cc841cf3cdb348b8b88102dd309a3778db08ed8
SHA2566a6fa7eff4be721fd201cde3a51228f2556d0d3afe141f71bef55a9a1af9e5d2
SHA512ed2ccbaf5928f757c4d0dbcb418dd2a9116e3b87280149b3d692d19af89a353b90ece554104e2657ce0b6c023d3b7dc5e479e5ed7a1aaaaf4446f9bf6768a6ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502c6cb61c52165ac49bb6f5ea0eb8def
SHA197c41744a5153d252ae83a70ec8b83ff8a6d46d0
SHA256dc053e66db60caabd31242a2534f9cd90b42c27cdeb989d158148cb7cf1b39e2
SHA512dc1ee6832255af6ed145f720ac5ebd71a932d56bdb8afa4968a859d1263a9fc7fbef6f613ebf03e436a241ea065d86e1c9bddc07283b061d4e3724583ce97e3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d524f9e186b62af7bdb5fdb145b599a7
SHA1331e5b775a8fb676e5143b4676075001f9421ac2
SHA2562bec8a7c6a21a062e0ff3d5632b1140484e6a5cdb62008894bbddee0e271f61f
SHA512b489b1552b88b201f72fc45bd6009938e2b54b0a455034ec8b8cb92555b0e480736a5805b96137373bbdf599133873ced5efd722dc73d8f9fc77add7ceeff953
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507bbce887017df51e125beaef3778db5
SHA1eab354c9c6b8d8cb56ad8f8eb7083a56b57b7127
SHA2568ee93178608903fc44ae8028c42c56ddd4fad40ac80d3d94d0c9366296a2e9e1
SHA512c3bf1657ad0211c2f5516787f6542641248e1c655908431d5a9a69bab4c5ba7a765bc2e7b422ae7060b90cca77767233a40aa0ddb307baaf6584422141feec86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5723e7a3c5e232445a28889a4e18df87f
SHA1516ccccacb7f6a7e5d9166cd5a3039ff8b3226c9
SHA2563edbe162df45ef2997e588b393e933437c5298826ecfb1920414647e1bfef395
SHA5125a5958082c8c08c617dedf0de11000bbfafdbb24ce10ed06f1e0c1dca7ff712018892faf75b7d4326a7b64bb86dddb0e837d3ba86eadd819b6a507faa93fd52e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0b83b4e2ad1e84e009c1336d8f46e1f
SHA1c615f1733c29e3045ed3e2c6882cfb99127e3ceb
SHA256ba833084894430b6eaab44075e6bcd8dca75209e21570e6fce1a5f94e564d701
SHA5123f2cb2fc322d430cb4a42f90b666d75b0a428d4fb6cd0ad76665d405620247cd93232fdc575e0a2aeaf05e4ec22921d570f76e69a01b8ed3ddee3b0c3ee97615
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540a7f3c0ea9f118dd8fc8f636b935bcb
SHA19e37a9cae545cb6eb49ae32eadb669d3dbc9a422
SHA256167c521905d9d1a013d09401f7d52fcb92f6b06a79c750190c1d6135bdbffe2d
SHA512abd392305a2e74f4762d10ec33c896df842ce47b16529079a1aadb22c0fe8f3c317898d0bcdd429f792efa5f28c1bb455023163673f472495adb7ae89775f76a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b42404332e499430888f060bafb95e0
SHA1fe252bf4a816794ce72a94999b8e753e8756b0b9
SHA25625915c1765ae2485685adf042db62e4f203db6f47e7e51ef68da0d4252b5a537
SHA512b50d932c968bdca7216ee2f546cffee1fb52d8ddaeab7c59f037fe441ac466b0b262291e19597cc026bfc828dbbdf292f31db68dc081c6336e4fc65edfe75cff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d78a0787507ed00f93ec0f75931f37c
SHA1326e77183dad194ba05921cc4dff3c0d2371717c
SHA2569d65cdb154ebef87d3ea364afb131ff64bb05822773f27140bae46efe2f87899
SHA5129e8ea8bbc54aa5a7f1495640df33776be8b39883ba2d35bdff96399ae01ea65eaef685e3e60b56c323ce05f80b5cf451b89f8ee2f30545d0e62698535d9b6b80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b2f3f9b235726b8ffb023d44814c24b
SHA109b01758b9aacbfc4c0206b2a86b775504ae48bf
SHA2566e02c3b9a6b50b662336561030fcb455195b180cc1e2eb6b7a781efa5fed155e
SHA512e5d756782abb8c0b5f01679c6dcfd8dd97cc3cb3de9f838e5f054cb4a88b78957a8a37b5ce30e5d1c4fca522061fdcd60377d2a50891842290e163bd3c08f905
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a