Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
05/05/2024, 15:12
Static task
static1
Behavioral task
behavioral1
Sample
1842d5159d8c6be7aa5fe59a06ad4f6c_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1842d5159d8c6be7aa5fe59a06ad4f6c_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
1842d5159d8c6be7aa5fe59a06ad4f6c_JaffaCakes118.html
-
Size
66KB
-
MD5
1842d5159d8c6be7aa5fe59a06ad4f6c
-
SHA1
de543acdc39c4bb4f118027f66bbd86b316b22df
-
SHA256
bdc7bf12920155538b5d7dcb3334f652a5b22cc6e763baf6755328717dd95cc9
-
SHA512
7211fc9103839f84941011a1a102246ff06c43343570e061395ff8cb65f6866ed5b0b0779354706728db6e08f97ba1665ca60c99c24afff319ee026e1c979624
-
SSDEEP
768:JiTnqgcM0St8tN99OIsbnQ7n5oTyOqhCZkoTnMdtbBnfBgN8/oycc8QFVG8sP/IV:Jqnd+FnOTIgec0tbrgaCcFNnzAC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc2330000000002000000000010660000000100002000000032705c190d2e26645ca574b4b68eeacb53a58b9adb8b938e06e3cb16bc31cd77000000000e800000000200002000000067a6b601034ec1b28b6013df17c848708576003684daca80c29cce24aa32960a2000000056bca38c43ce5868594a32624fa6697383498aeee94e85571895283458cff468400000008ef8db9e821511f9330cdcc611ec8d3906025e27238a841c2434a36a2ed8f1629925677f4e65cb6a9e0af1b0e25b5b8351471f9f5902d4c36aef266292e42597 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EBE13601-0AF1-11EF-A499-62A279F6AF31} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421083830" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 905a80c0fe9eda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2000 iexplore.exe 2000 iexplore.exe 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2000 wrote to memory of 2516 2000 iexplore.exe 28 PID 2000 wrote to memory of 2516 2000 iexplore.exe 28 PID 2000 wrote to memory of 2516 2000 iexplore.exe 28 PID 2000 wrote to memory of 2516 2000 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1842d5159d8c6be7aa5fe59a06ad4f6c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2000 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a9322c67b692c92bafb6e7165d76e18
SHA11d9a85de99f57f3edda9829f55e8a14c0f4040ef
SHA25637d4651aff6f33ae91c86e87db21d7a86255034d6d46d428e0d405c03f116c57
SHA5124afb0b29586122d1d2fb1f63af99f24a8fe3b05990ec76e8243b0c474c153089801b5285bffb5f0983052ddb7e7ca236d2c6575cc1775bcfc3bacdec34cbe8b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c2419ad8bbbc9ec02530113206bac76
SHA1342f29fd0a2942a7c02a284025d5b449b586337c
SHA2567cbb8b6fbe2e6e47e74befaf8bb6ffd0277b78f20033a39a91d3a54a2000c4d4
SHA512c402616d3e7d317b8288f203f081df01d364190cb33fe9383e1f9a62ca5214eb653ca093c0f4556f37799647b3d878578391c57250a696f76c2e707fb9a26560
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508af808b2b07c419ef1a2be215ef6724
SHA1e03650557a94f6c6c9eae157e8f3086a46621c88
SHA2565bf145a6c8b691ad621b301e2ca82bcdb697c6e4d8322be088d924bb8f9db055
SHA512172ebcda01350d85fc1e89d30195dcfd175f2374dbae9dc58e974a0389a5c584279528f865f4e57c6533143b3857d28b290f2d2c07d3a5f707fca27314a17622
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0c636ddb6cc5c4101f5ecfbd6effe27
SHA1c175a7493ee3e42c1b4d9660b7f4e2be00e29e90
SHA256d75a9a310b105afdd61f2fc242837eef554cf7ab7a128a2c6cb1e9a0923a62e3
SHA512f9d16c15b1e782518578402c30465a10408c6761dba0164b6fc1e289265776bc3f91c4344a34a68a33b7b22b71c07eec38a05bc1c785f94f71f2e76f97fb818e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55693db84a15accb7e1ef4dfab3575c6b
SHA144da9721f7b1d45e2e198a57f7d8641f3ca42ef9
SHA256bb961f83ebc9852c5ebed0942850f72c004b3e27de89d068d56614400ad5b55f
SHA5127aee3fceaacb021b7f0bb8757a7425a7ca2ea6a37d18dccaa1a0e5afa26d8707e073674bacd477791821508c93922fa90b18f8093a314f7684fe36d695f1455d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54eb2ff33e1309d607ce9656f85dcba72
SHA16085d42f54b3975f328592cd538ef7f6b1c8f33d
SHA256baf7c34495ccd4b1bd13bb53164d601fa1cb82a9efa2279a64d5916ec2618d07
SHA5123168be9a64d75a009f0da43cf30116c9b385c25a29861123435e83794b0c9716683fdb619ae70051c068a3322a49f3b731bd5bd46b6f88635a2da5092b7affe4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54bd6355681c2aeb83e99f79c06a3f9bf
SHA1e8df13f03c7aed8187180ba6e0a805f3db541b27
SHA25663adc66c314eab01146de934be8ad42fb306d7c2ea5d999142d5ef4673c054ca
SHA512699ae4d67fe9dccdf1783287efe8cb8af93b703f2884dbade40fc7beabd225080146540ae3e824b3eae51f068756e9a86c55248ffba412c18693281df5e6ce1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507f2ef2ab486783a10cfa9b278166919
SHA19e12728aa4d088a2d043c16b137d9e22d9cad0c0
SHA2564efc1cfa1e674bb330e8cc555a5bb477f2f30fb7718217171410967004fad17c
SHA5126bc8ee0a2c9e9da54bb8d4820d765a6e3d1593098d11bc7238f880c6252f1b0596855fe2ad2de67733558c0403e0eaf28e8ecea9279362c83422833d99de3816
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5363d18de1574e6bc361bccb3e2bfe5f5
SHA1a7354338a1c0144757f50c3e56c0951a131f7d72
SHA256fe2de4b4400bea97677a6725116560940df21879360aeb95e24d3030331f0bb5
SHA51298411fa9502248999f5355ba938a94ec99364beb88fde27ba0e97bd886723089061358829748a09f40b8d484f209495157183cd5ae20cd23d02f341fef88e793
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526d6a896bc65cd9913c5bd41db336c90
SHA1e2bc767c207e65d517f29c1abebb237faba7f01c
SHA2569f82e89af01b7aa240a7bb2f93e8f199fa889333f022fa4313919018d66a3b7e
SHA5121f64caa066ffe06b75136e738b7b5d5782036120d8a30ad996457756cf1f785ddbab475d4c49398770edd3f176e6741237c529005dae6214b5f0541a494f3d62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7faf087642a0cff4cd36b8848cc2fd2
SHA170afa406d1c0ea46b1a6ce207b9cad39975f8856
SHA2560a8a13b68435eea98fb1ddeb55946500a177096c27dc06b0b62d7795b44dc581
SHA51295663cc55c9d81cc5b41d921cb350690527ba6dc9bbc88dfdf4b31b8b37f3de971d19f0c2b2e6bd473e3d8952c4ade115d04cba23f66c55a8ca3f00827c8a826
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50231ed6dbb5928a52732883a82efec55
SHA15d694127523f622e634eb6aac42ed05028d30dd7
SHA2561631fccca86b15f9bf6ee7ab7f78134c3b3b53244499d7e707dc6393ccc4ccf1
SHA5121c341afae1c060629d6a5e2f2d9d2814dff6c45ddb41f9a850c175810a98015b1f8fbf045b1ee763b24db030f669aff2602a36c2ecf316dea2cefccb6ed2b9b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5680ac79040db2c5866a3c29491f34db4
SHA1179ddf316dd4a9cb69b55aa7e820c72eeda1b8ec
SHA256b65d50edb8552e735353bcea1bf3cd4be5110ec14488518d409649f1a3938a12
SHA512fdc92789ee8192007be2ab5128cbb173df4dd4dfceae3275745a8da034bc03fa238300b1b1f6a20c166fe00e56e9fb8419ecf668590d444bed217409dbe766dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534a219f1c468b7f690a7b0c4e0776bb4
SHA118028492d5728da4cb9fb9cc6e87046384c11ee1
SHA256857b59146faeda1cc2b80ce27b740c0ec29b6de6330f052d9fd40876007f85e7
SHA512061fc87919e757eb8c1da9154e877cc232f95dcee9417adf969fa97234276dd148a6dc5664b906b49d9df0ae2f3db2614ccdb93e24ba31d5ea504b2e596702c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aaa8245d112b0771261f94c2c10469d3
SHA18ad7a7f4a053e5899a10e0ba3332481f64e94650
SHA25668c497406d12a0d60ce4e10381ba786e9462f727e2ab73f304b2b74c0f43cd41
SHA512854ac0e542bffe58f1942810240abf54d36c9f52d5b0d9352a6d394f20c5fd184bc7e4b55194d6465b43a5074e405800192f5b911aaf381b4b709f9a041bb6b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d810b9818fcddeb47f74d070905d4dc5
SHA18c20dd38fda92320ca33bebf7b9a9ba51751e511
SHA256f7ea17ffaa78fba0972ff17014fd94122dc2238789b5c1d4c565e35b7f6a614b
SHA512232a1c7ea88a487a6f1738799dc149a521a62803f11346a4e9b18013ef89414ff6e96e03ff876c264f90e16b30b4eedfeb9aa14b09bbf936c6ae897a6ceb3344
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d39e3cddae555aa605e66cae55fb7a4e
SHA19d9f7e18a4342588ffd258b8c406eeaac142278c
SHA256150d78ba1dc651d0001f0867413a3ec0159cdaa23275666b746cad29c3be37b4
SHA512486ecbed708393449d7eee3f08655b31bc80838fd3e6128f7fb45f511cdb81af1706b0a48f3ec71d40851eb666203dd6223271580876928b62ec31a5c5956c76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb1ea6a5b38bfe853da4a507ddf53356
SHA1ccf663fb3d09f5a83e4b6b11a90f165dcb374ef7
SHA25613c05b87fa17cff1d6dbda9050080e39f82f7cb50fd3fdd4e56fcda280d1ba64
SHA512ddf3dff840305840d8ee4cb4613912705f0ae6daf46b1386e3566304d7f75e38a800c5d526607353bfeb2757aaf9c8f6f74ed0911045d4a7552d9fb82520bf82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5421ff1e67bd6b4952b8ca661d07dadcc
SHA1987e726dfb85e6d84cc18f53d966ac5754fe06ef
SHA256495ce83ea91d3245de49c57c2a40e17da3bf4299d132b3d90268621bf3b64740
SHA512f096122325b47b114da94e155663be2e6d3ad6d590dcfdc9685b72cae4e5a9acf83f1766837d12fcbe3b5f2d1fdd29d3452b62a30d6bbae172c29c8be2d279ee
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a