Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05-05-2024 14:06
Static task
static1
Behavioral task
behavioral1
Sample
1807cf650973a0411614dc9bb96831c2_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1807cf650973a0411614dc9bb96831c2_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
1807cf650973a0411614dc9bb96831c2_JaffaCakes118.html
-
Size
460KB
-
MD5
1807cf650973a0411614dc9bb96831c2
-
SHA1
bf0c38ce17c172e24cbbccc0998281f18cececce
-
SHA256
0a73baf48157563fe0785a9fcaf0f096c18e5d576d32baa06b8fe2689a018589
-
SHA512
9ce08a67b27ec3144549664cb977acad530b3f62355d351490262db75f263f256686e925235bbb22ba850c571a58811ba8d361175b7ba2790a97483543d1b9b0
-
SSDEEP
6144:SgsMYod+X3oI+YmsMYod+X3oI+YXHsMYod+X3oI+YLsMYod+X3oI+YQ:p5d+X3i5d+X3J5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e0000000002000000000010660000000100002000000070af7663d800f05bfdeb8d7ae30e445188d8174b3cf24a833da018ba5ec640d5000000000e8000000002000020000000a576424e11a00cf08fba9ce974daedb79a5f085a9017e14e03ae0a9efc2157cc2000000004478285c4e85262c5310a0386f9a4e0cfcf52388ef657abb084be8e6021fdc940000000cfff0d9c3a388461e6cd4917a3b475f20a1be5a036f25a5c469ebb18ae9401feedd3b735fd8e7091bf54e8f9d4f674f1dac2c41e5ad8acbb677917ddab86d5fc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9D8F37D1-0AE8-11EF-B1D1-D2EFD46A7D0E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421079834" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 001e2376f59eda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1628 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1628 iexplore.exe 1628 iexplore.exe 2620 IEXPLORE.EXE 2620 IEXPLORE.EXE 2620 IEXPLORE.EXE 2620 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1628 wrote to memory of 2620 1628 iexplore.exe 28 PID 1628 wrote to memory of 2620 1628 iexplore.exe 28 PID 1628 wrote to memory of 2620 1628 iexplore.exe 28 PID 1628 wrote to memory of 2620 1628 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1807cf650973a0411614dc9bb96831c2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1628 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2620
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525c11249adbfb76358a769cb3a378dd8
SHA17df6f3ba6d0acd4c5871c4c27132b186968c83eb
SHA256479f3891d92e3194b078e96fb292f7c93803c93e0205f2eb435b1ec49ea5756b
SHA512a624adb695f3a6f1aa3ede90648c169319814f40665f644e5d77c19a3cc41f78d87179a7fd1d40794e36a4f8356fafe88d281d50694501a98663e6b63a4a0715
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6bd4de5a45d2da4c495c80e13abfb33
SHA14e0415d24879b14f4c7e563001e81c559832f324
SHA2562fdaacc410681274198acf3356f4684859dbfed063bf8caa5f158be5224c665d
SHA512cc4b90cbee6a81373e251b40179321c43af62897eb1c179b8329b2a8152d606e7ba0122eacbe075c1bf21326850d47483931805ef77de343ab17663c5da476ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc026babd4cefa7153f5982fa8abc5a3
SHA1c4675a667527e162771ebd91b4ba5dffb5734a30
SHA2561880990ff541d2bd6babeab632f4bf003aa3a7fc7cb43f34ecfa12092504572e
SHA512bd95a79865134df465fb2bd92ec510f27b3de8cfe74492c25d02bfc3b5ccbdbab780a3ff57e88cf4d404556f5317fc483bcb4fe892a1f013d1e66e25f4076cd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb56a7b0051b0a3567c18a62ecd83200
SHA18da316bd4945ed1ef8aa94bf23acd992bd07939d
SHA2569d9f7da76a81f985fc66b5b956aac823a891348689eb3ea6c2851edf3f363a4f
SHA512cad9f9da72d06b44b6842d1cad7083d1f530795ebcafe8e0e76ec4b46cf30493741d09765a1a63a4976f4b70e98add017090faefa0ae1ac70d71ab1106795c0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5120a3768eef165c3b7cb43e310bad282
SHA1ccaf360aaba23b8617f650d95fbd215bc5e012f5
SHA2561edadd8d8c6d5af23138f604674df7b92488ea15deb930145912540578de080e
SHA512f5cadab606b183a9cb6f8b056cbfe5eb765f12245a53a653df87d758331777254a2fde28006ab8c47b4ce2966b2f072cf40ff56d0a20a90e46d5d26d3ff92ed1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4e61d4f0f1af51fce0fc477c8592cce
SHA158a7f5fa78ca9e24c5a5bcd5efe2ea6596c14d8e
SHA25615c4508530b6579c81a5a5d51b7844ddb5096b29f6054c7bdc2998da8f4eaffe
SHA512a6a5c1dbbf12656ca6dab09a08aaed6741e75b8b18bb718e0621e6e4c4b5c0df725fd6f8e540555d2b5cad3ddb7ca3777f947ac054deb7a0c107a858a16b5047
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6d7ea21809e81f2d838a916e50bce69
SHA1fafc1e34cab52fe7527dbe465087c5c5342fda86
SHA256a2f07be4b64f3e2c79456b224ee519881e1b4dc605fd74405c4556c79096c008
SHA5120fa8d853ebaac391e11ca02ed21f93b1b3978e5d542657b951f89743e70d90249559b8acf431694abd752e50bff1f2d679d4a78fa275b15c4ab09a937fbde0b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a234924a01622ab7aa93e908ba2bf29a
SHA1499d27f233804921aacfd5de6e7ac784db048b7b
SHA256b4c4921322561c6ec3150bc8eae38e37829d9cc4950fa14c4023bc162d350902
SHA512ef59dc6f29f30f5b91bafea6b88c8a7af5c8ef8238c3c3bde6bc1235c74328f7491773b5f0d929baead9ecfe405143c14f1aea4020023a5941d7974ce6aaf007
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff916f648bad124cd76042bb90c1d6be
SHA100454228475324a3b45c40c1fc019832a010c57d
SHA2565a0617a41d82c8699ce710baa715826fc7a881883badc7c57be18f00303f3a65
SHA512e4635e12842dc4df9c11825cd2965b3dc0bfdbd7fd98c9851b0b94bc793fd41879fcaeacbba2677d9de547d701f2169c1c9c5bbe51dca60632796b675f59c902
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e6e79433319b050c8f20c6d2a35b21e
SHA1178a3837674164dcc0b13fb7b80a669ab0242447
SHA25696e263208b21b50f2f6d1a77e3ee661dd2b4a1aa1cc16d15ace9c8aa99d755a4
SHA51207d474021a8e379212323174a555708dea5723e50e19e671fcbb5dbef624ef4f2f43ac1ab465378b233f99ea07c7f502df0356a0297b440ae054fe051db22969
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c50201d0c72a581aaf5bd24947f3355
SHA17e5864544a615195b5186c9a7cef0f5d6c90e56d
SHA256471c0ff8a12d70d6f09e321cdde2312f44abd126a11c5d298204fcc3f1722f2d
SHA5129541e6d04a9793442d7e734c325579f515e86c14ee0a82d1ab71198e73ed1bcd9d3f65d8447c1466e6602828ab6853109b518ed2c0f92302c83c6678617b387b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598fc16ecfbd3278ed33b9c84fa315cf9
SHA18f994f25427b654be74890c05e9f96fd46cd5f26
SHA2568eda61663e6a970ec6d629c5a9f021465b4eb35b75050b641245813b308be17b
SHA5124d18b30ec566acddeec5662a03b99067e48f1d75125984566da5d1030c01be21a053682df60b30dcd5bc807e3e0124f396c8e09667de208f2a32ed3f7c91c16f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56842edabd04993901c14395ede2487ba
SHA105792658db21d6a67965bbbc55ff1d7075d93801
SHA256e1f76b3496fc7dfc543231e85c4889d614bb0d9a89f95c33fbd86a2b23b3811b
SHA512e48ab9a64f674bce3a90c7c15ed6348e077e8cc50371ec179045eff40edb34716c4001be5d1dbd93cfe11b4a0c00ded28a2111cc76de0f8657f7ca5b7866a7a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b30f71042f3c0340ddeb001b6163898
SHA12643516353ec445fc67abb7bc8caa91938fb53f3
SHA2565a978bf9d7529e8c99cfe0ec46edb871d8351f156c8bb3b32873a13bdb302535
SHA5120a360ab1bde1b903da87a7b815e9c492a6edcb8d8de8a1cb0361133294e116a8d24730a0eba2db8706de359e9616f7a62ac9cdd4931d80e7a40d97b2a2062129
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b72565c5e75434032f76413e762c12c0
SHA105316e6e82bb90324b5e6aa85dca644928c5c4f9
SHA2564ce57ecc52e533bc5e5bdedc1c28d94d3c2f26c4a33b396e518407a75438c8fd
SHA512882aeb9a861795c7998955bf92c4bf0b251f42a9789130be546f13b2fd5f56fd85c3545b0437fc3b3e0106ecfb8286dab5f210541fddfd18cd0e06fbbeaffc34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543307bec0975603384d4becfb593a39e
SHA16b92647d1d42fbb56074de23054a66a194836e9a
SHA2562326b7c60110f0575fa67d0b7db1f2b4ae3da50f60aee686053db7a3c68c3c26
SHA512e6ae8a6003477e5e49dbcd9a2b4b26616b2e51430722094f6a3bde38f2894910c29d1f8407d0397b37fc18d670a6dcebe744f2be1a3531e0abee27b1f06e54ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fed0944a167a28abd6cb7062fd9da29e
SHA1c7c929bfbf6fbb3416d22c4479088a98650eb23d
SHA2568804debae60ff6549ee3d97f23fd7c6348ba1d347a78fa3896a709f8a847f7ba
SHA512096b900bbf25b9cec33dbfb07fd3d9296c038a15796ba3466de68f5ec1d9dde73f5c37c9525346d7a8bd39c9ffe789d15c88fe6ab352a9d6b1a7e35a29876ff6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595047803ab14f6b46ed65ca22e560c2b
SHA13bea1483b10d74f3bc918f673fb881bd64bbaa7b
SHA256717ea58bc98443994fbea4e0f70f3ca14d2914c4d458993d08cad20862dff07a
SHA512d044186b80e4a8b1867813e3a0e0e50e9576d22cbf56fd875e5a1d79a9cecbecc14bac23064bb7e5ab8d7b6b407fb99bd6090cc77c616dd915c680df99a65a1f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a