Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07-05-2024 21:50
Static task
static1
Behavioral task
behavioral1
Sample
21dce065080e691a06dc91ebdb5d1489_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
21dce065080e691a06dc91ebdb5d1489_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
21dce065080e691a06dc91ebdb5d1489_JaffaCakes118.html
-
Size
4KB
-
MD5
21dce065080e691a06dc91ebdb5d1489
-
SHA1
128a999fd3a24c2dbcbcb36f64cbaf0d95984432
-
SHA256
de2cbff6aadc9a8b5d6af14bec12838cd4411b6c99c7e732cf5777b612b6baee
-
SHA512
251a623e371640f06913419dce659534ac7c289f8086085cb3d9be72583be94dd2a0a300d4c7456ef50b34cf4abf9ef71cb9c87ced9079700dc27c06e9e0e831
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oWyl3Qqd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDi
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D32C1551-0CBB-11EF-9542-4A4F109F65B0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421280498" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 309fb1a7c8a0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000df05a07758fab1e04c8205f91ed0c8126ad419e6a3603d52c3c186935147eed7000000000e800000000200002000000047ed2f858f320d4be81fa5eae78ca8aaaff71591c0a71b75675db141e6d03499200000003755882c87e55014f3fc1b40386fd410501ddc45485f2d258afcfb1646cd192040000000bc9f1534d2ea07db1d75461a0b197933edd6ed2ee6be9b8b8359aa37e8c532ba84f09a34bb75d990983fffd29e2f2898eada07343630cd7ce5cace1c0fda206a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2380 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2380 iexplore.exe 2380 iexplore.exe 2012 IEXPLORE.EXE 2012 IEXPLORE.EXE 2012 IEXPLORE.EXE 2012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2012 2380 iexplore.exe 28 PID 2380 wrote to memory of 2012 2380 iexplore.exe 28 PID 2380 wrote to memory of 2012 2380 iexplore.exe 28 PID 2380 wrote to memory of 2012 2380 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\21dce065080e691a06dc91ebdb5d1489_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2380 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7552447cf9617b2abfa400fa06b4664
SHA1f360005b6e0944560ccc1809d86ad9b7ac1a2a24
SHA2567972f06430bd66ecc07b78f00533402e0bd25c536a68651566ca5682b54ac343
SHA51275ae6c1dd1c5b19c9d2b0099ca32ac43d3f0197e6f25c991bb36d4d863f4101133b83e290f4e5fa2ada6898e753d2ac775e1a26b93ccc781e14a809d131f60c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d72c41324b20c7b3a2da62b0f947b47f
SHA14fc4d4b3e028b1dd670c79fcc251879610b1ac73
SHA256696bed1b09a31d97aa94e27b6069bf7c53e71b8915f0355007a30dd7fab4a9fd
SHA512a3c7279391fb6e5aa2c783cfec95497cd14fd1cdfc307a9b60aa47dde62c80e39aa61c22f4d768feef0ad4f73f94bb1ba6ae18f7e77e0fe3b356be2dac123619
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ec044f81b90dd705c798e80e5c1db8f
SHA135aaab74104b8823c620b1a66e218a04893a1a6d
SHA2569fb448d0b0fa98197e0ac014dfc0de5329167f811c2b76ef95bdc5720ab4de5e
SHA5126a0b2b7921b46aa9fb13c3eead9dacd621e16ef23f199da98880d1c2480add86a5628e64c1ba39b898dde89efeccc9c55dc97c5f92c59c98ccd613c3077f4787
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5222287ce343ba45986ece9d31bf4907f
SHA11fe0c1a27fc6e0f1b639d52621fe68061378c3b2
SHA256f9217073db729ad0fcd1bd2df07bfa961b3d510a004873945f63d87507aeff90
SHA51273b80fd98f89b602d450616bcaf3549b76c63d347a5b90ee4f413995330303a17802271324df58ade8cd499ae3e13ecd394c2044343625ea11176a498bb421a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5645a9ae5fcb144aed450ed3090b25e68
SHA1b8c7aaf6832d91647f296226f232068de1d73b3a
SHA256b5721900d76baf8dc02c6173290e3c7e98997a3f5062b27483a96cb4f7079a02
SHA512de314cbb470f8d56538ce10720979f7f9ea801ceac0d58196b26c9fdff1eaa919ad71f485fcacdf4e5195edde10f0ac96c454bf79af1ad6d1dd1da2985d98c90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53bcdada5c64b5f3208d074e111a4dc70
SHA14896f098e199fdb182b651ea5c39c4824cf5fb19
SHA2569b1cab3ec952c89a2d543353c73aa311b22671032d1b980f5fe5cf8cf643d983
SHA5125bc21b6a041d8b084386cfbd360e0ce6bce82457956f88ae9d86a3862127cda63867c196ffffd95d6d833c5ef719769f4c27d299616e6d3153623660b96a1157
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5260332cc857b4b4e705fe3a78e4bb3bc
SHA13df25ab97a1969a42a365a29cd1cb5c96de11f82
SHA25692e9ec937b992f5589edb4fb8dc53e8f998841a18deae44ca819d50b5c4f9574
SHA5129207284d40f6a721fb7bfeae516f8c40b78f965c5cf3356af4efb6bdb59beeec49c313845c57b276b7ba456a6465c1e47f2e87f41401d05f1ba57602cb8642af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525723e5f307fcb0a5c7274c9c6659819
SHA12f1e720892f7513d0979e8a84126183d8e22556e
SHA256df195ebf140d6b68e1765bd387d21875f130c2cbdebf8d47d467611be4feea8b
SHA512bac06fcc86b70db3eb708c99d9f7f3546ca82c004a2f342e1d4602f443e007831bec61fbe616561b9023bd18fb024a1903800a928057800beadda39c02c69502
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58273ea83e912c18ad0509bd90c814a2a
SHA1b6460e4be54afbc908409d84a8b8443be5987773
SHA256b0f40de090ac01fd496f725cc6bc49f9fd4fd7971959a92a46191741992b93f6
SHA51201a738b4c733376637958eacc238713d35b0c94ccd2daf68e74e022690f3d343987536ff82cc5e8d4e6080e416f7914191644e46c29a7d54fe4bb26b315ab866
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ee0e80a28c5980738973d130dfec8fb
SHA1bf3e8dbef14b67c4740eb7f1864acbbab54def0e
SHA256df75190ec73d98c9d227881843367d2abd81c551d9709923b04b4c1c977562c6
SHA51270b0eb5806c28fb7f11a4f6d478e3fa26413c2ffee88e32e34b217c47e486a6749c79153227f63e617593f6180d8d1040d8d71fb31515d3565052d434c42cb4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5acedab298d70187c9ca888f1d9235e71
SHA1593b77b8eac49dd5d03de5335fb3e52c5330b7f1
SHA256acebd0a50ce6977cd100d7ab077eb1256f037b229a2a5590699553560256692a
SHA5123d1755dbfcd22194daa04f0268ffda23080a30ec5df6f5cf7f85576db94575d56c84c29f22be828357a2567e99df921d9bca58cbca9f828c1fb3577791111de9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c06461f5c4e024b9f0e21476a14db57
SHA149df3dfaab8728016c8829bee9673343c9fa9fb9
SHA25646d87a8e3c650f81dbc14026c2ee90bc4d3892eaf9bcf7cbe0cd24bd81eb3dd3
SHA5126b921ed1439af3f92d5b25bfb73899f8cbbf874d93a3411e65a7687c4564744a8c8cb6a63f548401f77340a5c3f1fe676b0655c36dc6cd4d57b6e03f55ea2f66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540db33b34cd8e7981fbfb13491506978
SHA14dd825b8c76ff4b01b8100678589c57466717270
SHA25673cf8cf2385b48738c39a878129bbad5fefb1f4f532a51a67e29bf9008358997
SHA512a42946db1e3f71781c7aac77d78189091c31a9b066724f221c2eb8f4d34a0f85b6cdbae1fb5434136b68c003be6fd268a34bc073909c9e8ea94a4f18980c56a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a03ca5af5f278dd3b2c9e7d95bcbdf5
SHA16fe3a035dc1e8e03d299f649cbdf6ab336be998b
SHA2566927803c4e7cbc812aa4f7e15796f21419453384a0f932edb40b4fef2ba33574
SHA5126a3d47ed0ffa608d91b273bb0655950c734778d9667912079f7ba99d53243931aa61d7effa246cc9299eec8a3ac17cef86628f1ae6fa885455ff349a6245fcb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b39964846b6b254fe6cfa9e24ac5942e
SHA1fd90d9feb43d667e163bdea9c35b04acb0eb66ae
SHA256152e64cc972e00f65518cffe63214c1c988fa210114ab63f4f409c99dd06d300
SHA51244ee91f84f2cd2cd807771b4d9da57e5ae9c06d3571494d9a1aca4b4a538407aa166325e16f6db8c237549a35653f8d3cacc3bdee6946c7ab3c8d1f7f51566d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5265a5460b2ef4147928203a68e609bc4
SHA180b6d6fc7d2e9cc973f66714f7810e5617ccfb98
SHA25697f4751925183e8b98eef57dbae572667e4be299a546e6c26f6f32bf86da36ef
SHA5123f8af6e44d2c860f39ee88bb631f4c1c8e838707efb625132e8169d3d457e90d6a52a5319f1a925654be1e1d06cb63c8349b81331bb992fd2f5cd4f9062bfe9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5545d50968b058e407c5cd6b6435dc1f2
SHA11211268ddfa154ab76336d0030e913e42e9f6429
SHA256302c36df4eac63086cfc7b48865d97cb65c778e5ef27fca4a1b96cf2945f3398
SHA512d51a3242d71bce920222ef0b41a07e62cc2423e86ae30bf13cff12dd74e1838cfe318b80810e495e6623aef74b9fb2ac651a34d005a4d1bd14a4f888a1fbd8f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507bd97a01ede91385311b2d36827c80a
SHA143c7024d86547ed25b95e960e258983dba52b98b
SHA2566319a42acae301304774f43ea762952a718bbb8a48a18abb0d37873b24aff1a4
SHA51249abbdec9323573c4ca79531a1c5e6bbf54759f09d06570b2b84939affef240551ad4508a08c143d1c05cfbbeef4dc2efc3398398ed445f96a9d64d084393564
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d84b3ae1f725e7eccec1a3c8d5aeced8
SHA122b0a8199fd09b50b1f46bdcdf4e3fedef741831
SHA256c7720590647e8bb89a2814491a355ff60504d46a535f0f28d46bfdfa90fa16b9
SHA512b8a201cc67638593b50d31389e913c8f997749c75aae7c04a3be54e8fbb3a206e8c97e4b7a8b1125893540e4858b474c0729a1e8a5faca7a45c2d397503d1a18
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a