Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
07/05/2024, 21:58
Static task
static1
Behavioral task
behavioral1
Sample
21e4911c97bf0acdaaa9856ad2020aef_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
21e4911c97bf0acdaaa9856ad2020aef_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
21e4911c97bf0acdaaa9856ad2020aef_JaffaCakes118.html
-
Size
27KB
-
MD5
21e4911c97bf0acdaaa9856ad2020aef
-
SHA1
99a9c9e3d419cd2a6fadcad822c7422d0149bb07
-
SHA256
774cd42cc5380411855418cb21990f5a1777f0db25ec513956b1a6d0e79e75aa
-
SHA512
7981e08b697ad19cf473450b4c2eacc205105bc83a00ef094fe9cd2218cd4b88e6673f76cd125366ac8d5e66495f8d56b53cdad228fc76c4107a4f5d2673ed5f
-
SSDEEP
192:uwvsb5ne+nQjxn5Q/VnQiewNn2wZnQOkEnt33nQTbnJnQ9eC8m60xweQl7MBQqnN:zQ/IwpHkiw5SaFy
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421280952" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000a0cbb5eb4cf089d0732e425a4a126d45bca3485e2f4ce8d3147250346ad776c3000000000e8000000002000020000000f478985c2aabfdd93d20beee5b3409db9afa49c7be123110189fc9392998168420000000d146b6e04d69d7b4de60dcabc3ca431a291d429e0c6779df341436aced2b317c40000000b49701b3c8d41872bc835d9bcb1645b3b837d2bc85ec3328e5e06119e9cc56894cc1f6b9e22b0c10ca66f0b7511e13ebe94d45ecc090933aad19f87dc695d113 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E1CDC2B1-0CBC-11EF-BD6B-4E7248FDA7F2} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30e97ab6c9a0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2600 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2052 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2052 iexplore.exe 2052 iexplore.exe 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2052 wrote to memory of 2600 2052 iexplore.exe 28 PID 2052 wrote to memory of 2600 2052 iexplore.exe 28 PID 2052 wrote to memory of 2600 2052 iexplore.exe 28 PID 2052 wrote to memory of 2600 2052 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\21e4911c97bf0acdaaa9856ad2020aef_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2052 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2600
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3676bb3bc7be049893a47d27214ecc3
SHA12fb11356a911f9e1e9d8512caf500e82d56187c3
SHA256c1fc5b8b8959324366a4005e15a5fd36e2c66cb0ab1a9d15d54665a137af3e0d
SHA512b347c9340b1d4169f5bbf7b1362bf5df40c1349e38ced45a8a43e911100574cd2ee5a8edacbe8d0bfea16b1cda2c02470ddfd03d8f8e1ba9532c18f3de5b50b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55913d579b1fb2431dd59fe4be151ac2e
SHA1c88f58c2c5bfe2501360ca069165c8cf58593082
SHA2566a801d6a430996c27f603ecc0f0d25de716775fd09b99746cac5e97ed66f3164
SHA5122438813b7867fb3b53db24527eb7eb9849441ccbfcdf98c2dea77d0f4932df59815ab006f9da4f728692c9a07f6cb277d67dd3ab2e396f6bfdcf6afce8aa75a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5678bd29011b8bd15f54945969fec989b
SHA137f2a5865ba27810eade2ccc136e1ebe5b147e9b
SHA2560f601aab325760eeccc349debfbc2556f49872af01c883481ecaca7cf320ce97
SHA512a4936a99ed01230372f6c629bf9c4fdf05c58bb4bee43379e1fbafe1a2aeb0ec199c930573f356dd707b500cb0e24a457e577ea2397a26edf19289a3c32a8b9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5857b11f4fa41d77d284a4defb27a0fe5
SHA1f79e4638736bc63c33bf6520f72ab99e96a56721
SHA256b486037ebddaf838f88d99b1ea5add484b540e6cc11bf0b8be1ee9c849000e6d
SHA5126a532042bebf523dc68d1d0161ce297372c6a1c1ec33c8a8b2ed1cdc049ae0f91cc56468b7e4094034b64e030068fe9ff7aa4c86a0a21cceb700f10151d6da76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec35e325f99c967a9c6a643646893a12
SHA15fd2994d67fcf4f1366f40950dc78e5e87b41163
SHA2566eb0ec5cd68791e366cdd4e4fcc23942180be781bb084cf8d473e7c9c452a3ac
SHA512da45b26ac3eff67e020f3da168dde1177833aaecddea26e4d2845f1358e2641f965d1fa945f9619134b525257ed869912877b1ae7c2d540d0f388186eee6c5ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e15c69899d1b296df8d920b834a82aaa
SHA14c62325fb216af3b5a3d318b337f82fcb8fa4c53
SHA256653f23a8809a646132fce4a9a48e638996a04c9bce410dc3e5cea52aee5f5da7
SHA5123c9c95bd51442612be76a3defeb587a2cbc52200d1a4dcc28f1ddda14fa8690fbcd1ec4138038dc755fc2da68e72c6028e83df59c584879bb1483fc69ed971c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565756b3d4cae2c6917ea5ced20d15b97
SHA1235ba9b60cd29fb766af2e4a2751093755b0377a
SHA2561f46c6f6d385f17ef8290ec8342b975f65a8c64d51d208d2ab395a13674fb70f
SHA5127db713a44357f05774a0703895019228facfa1122df9523cc4f57ea5628d6e16dd72d6c5478cfc408a82cd330098d79ca7fa766580ad9a16b9f896dfb91d3fbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ccebe36ef515e32e2b75b4f533ea067
SHA1271d12f1186a3564b13fa2c671689ca6ae7d68ea
SHA2562bcde484aa6da6519b2f1fbd9e7f5bcd091ca34047504214bdf14095bb228f08
SHA512e3662d7fe3fb06ed2b5f0c289cdaef843c848c684bb74b8e985353dac977745c763c4d1916f02979796a2ee552045a85d11889c6336af8585c47e2eb861be242
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59dd84164848234b7a64cdff791d7fc04
SHA15f4246214828c50ca3d142e3cc2119eadf855403
SHA25672720d0e81caa3997f2037fdceb1d8569f45869393fd5df9ce011a952f9dab94
SHA5129015db25bcfb1deb5d9ddc16afd4b7ddbca44e67bce7a7029eff7e0251951e68fd5acc7f9a1565c432b01dc10f4aeab3448a4d4c84fcc1db7cbd49be6cbfcf66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518e909f47a99e4f20f05e37096c7c9ac
SHA1aa481e6014cab21e8a005e56d2cc1977eab17fc9
SHA25617312aa91187de46df84d791cf3449cde2914eef125cbd3c2f99b96eb17e751d
SHA512aa9f2f90859797463d1aa495c0cbd53d664a646d9db11129686f8e2b8eef64076e34ee2e55d0375ff8afca886d8a721ba649d85a81d394d61d45f9fabf3cfd35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dfe4d31610de7d333e65bb8ebb1737fe
SHA10572d798c556829d9f2d12c9c0c9601b14f32e4d
SHA256262651d36134e14e702abea5f12943509f9067b2aab083a4fcc0aaa3006e82f3
SHA512de54c21bf41f1a8bad84cb7abc269fcd5b981f624884e05738ce7f63b609774745245fa4a08b050d56f7e0e79f82230dbe657101fa4294ca27496369a8a02630
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c841466f9851a26eea441097fad514f
SHA102db23abda0ef40f1e7265a2c9c8921db161a02e
SHA25645af5f9a405f72b04b56ac16aba9247f37292ade5849e199b3883d469eeef9ba
SHA5125313baf4dd701979ce5ad157b2ab29eb1fa9fc377fe8f5b63203592a45d85b399346feaff5f5515e1c93ae346c5b4c5eefb9ee4b8da40faa7fcbe78dab3adee7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a150125710cd852ad88b0e1f30baa4f
SHA1aedb98673eac5e24120215da3284f7887c1a538f
SHA256de87daaa58cdbd332ef3ce6a62cad8805d3a288d1e0f2aec62c67c3b290bc3e5
SHA512135f753e92131cba3fb36b49e69003ba3ec9f36df241148df380eeedfe81e09d22b7266bd7112a0258aa262105e6f7e6e02d542cfc8ee416d49d71229e2a6c95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515011892d27eb718fc6ae2a1756c8e3b
SHA1e9fc5d0893f0d915930fb2c8955d24a2d1874679
SHA25623689260e16de7b30485efc1177ebb2a8d056e42a6143d8994a4fd9cd47edb5b
SHA51242710bf39363498ca6c1d7e2f2c0458151a104090849f9a320f6b6d2b3b16a054bc230485e4813e8b454010b998f3f59a2ecf41430379346f973c81d6aabf854
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a742b09a0db59c8761fd4077a0e756d0
SHA10234bbe4b0cf2e5200aaae4e47c2373817466294
SHA25679cbb5fe1109e21c4e4394f43d1aeaa95a6f86d16df0a1f422fd6cda1bd1b9d8
SHA512494309399281ad01bef07a5aa1d66de3bbeacc6af80ef9bcb2108ef0039bb7ca6b182b51c1b733e2f7868afc82ad19509145f96a70f7af1d173baac8031517dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5980a91706c60837df47158f5a59e1947
SHA1629a7a3d633329ae212b25ad327136ff31794e74
SHA256a923231f2ae7eb7467b0ab2609992b1be96943d8541046afda99839c1a5ec686
SHA512085b3fa9b64b689e05e83b7a0818469cf6d96de740a8e8869fb5ec464e87a8065ff9ba18d32b03315670c51527505aa2971dd000e7ba2485fa39469813d8dbbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54790461a27c93a60da32762f50c2a870
SHA1d4d7076111100f576d033887968e6bd820ffbaf2
SHA2567686e2594286d227c9a257aa6c1d12b6e7b9c2d6ab6e71b18c6c1859b03cdca5
SHA512ed81c786d2d73827808d77f3e526d6d7c55e850258eb2bbbcd31383e3b1b68b0129ae7791cd448788df9267495252cd9250ba96da5ab726edf4eb4780c96ec8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fabb8ffa017b9626f6a49b7b1da509ca
SHA192c3a9a33aeccfb6779325d0dfbb4ed1eacd157c
SHA256edd9e23df63c9aa66f757f31e24393792b802957eba6f2250b15a0ff02006b9c
SHA51296b2c7494b6b3625bd8f627d4ade882aa8768295d8506cc91ca0e698432459803a23b4a84fc8fb291bf33845d6239256c7204eca708fb1d28ccf4481b77ff54b
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a