Analysis
-
max time kernel
138s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07-05-2024 22:53
Static task
static1
Behavioral task
behavioral1
Sample
22146808e40c901545cebc79c490f9ad_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
22146808e40c901545cebc79c490f9ad_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
22146808e40c901545cebc79c490f9ad_JaffaCakes118.html
-
Size
127KB
-
MD5
22146808e40c901545cebc79c490f9ad
-
SHA1
16c262f249f0ef47389b73ed15ed378831b38a1d
-
SHA256
779d0bf0681fb3c69ea525ed23b664a85a6ad149289cf94b36a0ff38d412d9db
-
SHA512
db12c2b515c45336cb87345ad628c60459d198c77989cf9f7796a236413228cee8f48d304b45484d28a9ad8fd116f03dcc53f2bac09ef75b99c5fc63563fad8e
-
SSDEEP
3072:0dwob7AAQ/yfkMY+BES09JXAnyrZalI+YW:QsMYod+X3oI+YW
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421284280" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0b5b384d1a0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A0C783C1-0CC4-11EF-AFF6-E61A8C993A67} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000e140f2b52fbc29496b830d0f5987da6187aa54c1c1c647e709f8394505b4c6ef000000000e8000000002000020000000e15303526c1dd862d81e751d401840e828df1880b92e9edd3338819e354ecde520000000eacc0205db0a926feefd1b0d99da99352079eeefc399c3e110a8dc6ae3843fb1400000004d68c54acfa718b9e3fd6b14f8f9dea3a1018e796add77fa2988572f8866326da04a6c6b36b37c247d7edf6e0996cf251634c063f0731fa0d8a6a3379e2895ea iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2240 iexplore.exe 2240 iexplore.exe 1404 IEXPLORE.EXE 1404 IEXPLORE.EXE 1404 IEXPLORE.EXE 1404 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 1404 2240 iexplore.exe 28 PID 2240 wrote to memory of 1404 2240 iexplore.exe 28 PID 2240 wrote to memory of 1404 2240 iexplore.exe 28 PID 2240 wrote to memory of 1404 2240 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\22146808e40c901545cebc79c490f9ad_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eec45d64b3604bfe412d95ef841c360f
SHA16119335015f1e9a5eff2a769177c0eb992425990
SHA25672adbe7811e3722767312e1deb5f996412f6ba5e0f97a2c7d9d379ae17776f65
SHA512b90ffbdaa10a57a5dfbc29a34cf30fd84c64227cdc2066a0c6dd4af857da6e2db9e3b1de7ce878dc65ddebfcd8e3f0f66f428b55092d43cfaccfe73be8ec5128
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5834bca722d7cd0563218cbe578aa6136
SHA10aca7ee05556aa20004999eaffa6137ee6195523
SHA2569a268c46416213e55b8cbc70ab3c2920f1997d38f4917bf3ba23e1fe0b8ff5fe
SHA5121dbf9946f86e8f84275b16e902e3cb9e5e5699b422bc9a18c582384315aa0b630dc84d2e0d2ceef049624fa5a1d14b5c12c25d516d4754fbaaa52fffdfef42dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fbecd9c0fdb2d57cecca3e9a8707031b
SHA18fec88ed81cd7796f0737b57d58d545885d73b5c
SHA256f658e320ee8e52f80bb05b196a5da371cc67c0e71556f1db51591ff004a54b83
SHA512635006535371efeb37cfcf6f93390326a8e61c318dc57aad625f8cf77ecfb56738c0d0ad8516971172c6bbb9b9865713e6d70cce77d2409dbe3bf116c970806e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a55f6aa4c30f7fe7cd57a776fa193b3f
SHA16f81c0a1bb2121ec507d3502284def6fe7b25ffa
SHA2568ea21853a7208efc5a833d51b14f880078e60b468546065c185c724762ec702b
SHA5128ef4d938d88c1ab4cce4d83cf43e3a73541c53308bcfec2386aae1fe29f23ac7f520f46751ecb26adf44d6badac270a60140720067e999dbf2ca5d4f0203306d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bb6c793ed6cad31642fb0bcdc04a8d9
SHA1a85806f54cd611dce6c23fca3c7b96bef6f92b47
SHA256f5cd5fe490a112f1e865d01401e7e5c1d33f2c7d40506e35c38c1827abb8736b
SHA5127d5971719dd9205e94288726c23f8862cf71f666230f2a612bd34f576dea5277f471de796dae29d62458be11562b1dff35846d1382353d72b3ed81a027d3c2e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce7acdaaff6570463280db9f3a84dc8e
SHA11e0049d59dd46fd3308cd5d472e38bc9b00013df
SHA2561f4a33820cfde06170c352c688ada91ab6dc155155632a5c2f75a5979461e005
SHA512cefc798aa2e9e20bc5ad21fa457656ebe75b9b1eddbba6b363b2d587539a936d760f5aba7836b330ba316576e310ef04e6793a1671391e11c6da60bb26317bab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580ef4cccde1526afb8528a529e9f0fec
SHA12a21652800e967ef857a81571f927c12ecd0d2df
SHA25674161bf875c4fe22838b6208ad8491cfca4d37e6572860ad026de0938ef8cf52
SHA5120c06b79e41f75a4a8017513658b3b0d40bcb4acc996e667707c17dd2394baf19c0747c77bebbfb143199903cd1b918ed9b4285fe40ea52cb11ff0b6a079e55ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea7ed624a70b6278713d410436ae59de
SHA1beca890f6482ba5f0092775b2cb441d4dec92643
SHA256e4202b3ed791aab4650bdd85f354be499303fdd63a7e8d2847035775834cd140
SHA51239b38171d24deae43f37b62e9843314b44c42682d16e585449d4d4bde84de0e38b28c566385fac62d9210690b0750c62726d7b6d654b8e48a80b335215ea9758
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5673e0d47704c73124171936d47a015f9
SHA10051ebb1f247f8bd9bb2cabd5d636dface858ee9
SHA25694858e48c0540fc669e051f8f0c3041873aa1278512182cdf28f0b9fd754aeeb
SHA5125060c782cd3b95be077e0ba4117189dbd94005ab8ff364cd729987c287aef1dfe57dc4324e25b7cb031b883dd9c280d37ca3dbaeb2fd86a58bc22baf8c2aac1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5133823d0cea895ae4994cdc250d45849
SHA15df51c5cf76ac5e9fa61ccb690612d29f34fda7c
SHA256de2a13c16b174fea13ea8c6ae045ff4896562b35620e2acbfeb55f99c117a0b0
SHA51279c54956389751e387776ffb81e09e336eb7dfa4447f0025431f28375f510ed6fadff65a1b49dc68491c68bac19ed985b7dbe4716305250c186de28144f881b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f38fc8ebdcc3d3066ab66b73c455c92
SHA1da4939527187d22250fa19767650610dea0663ef
SHA25607482bdc93ca77594e2ce9e877ec6a072341f17499a55c9d17f2e8e426786387
SHA5125dba25b97691e0ff8ecf6afc65e0167682f2e5ff94c65a0588c39eda502ffcf8f745120db0366d2a7eef62561e3bf339cad2a6f4923cca315967a63cf1523f77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec1e139be84a6e1703c6bd20c3d22d7e
SHA1e4e38312e2bfa531354f5aa93fd5435ae3efeef6
SHA2567ac3189e58c90bf1d72ade99ba99915a7faebc42caf695d889f11b0c1ec3f5c6
SHA5126686be186928d5f55a768d9a515485ec45b0dc84de3d5beaf1304ac3f584ffc1fc2a449dd3fb3ca29add38c7bb23784bd2d2d20cbdae2d2e2f08f4fd5ec7739d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51998f6a2e83912f25b7787c47dc2f385
SHA10f85c3bfff457540a56de64a07532be74a3f94ad
SHA2561baba6592b6873c87d1b4ceade74475935ab4ec398cf69416f138c65f921ca41
SHA51244e20f449f6e2d095d0d16e5fbb727278fad193c272e02a66d09dfb986e13ba144b76d2f29428b256aa88239a809c3b78043df2bf4bb7f68f195ea93e87baf76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ca2d799b21c4797ee66265fd5bc2d86
SHA170be16cbec316f408c1447b1de0ad3dc71553ffe
SHA256c0e68956b80b291fd832cb0464831f701e9a8b59d94a0bc1eb81ec1c15adac95
SHA5120e5f36f813f0a31aa213124a0da664b50ac39723448aa9f6f1577bfb0dc503cc35c4d5574a9b1206ade0910c7280518765436abcf047a3bde22f2cf6f0a20891
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f69b1fa8b9ac65ec00af0280125ec7a
SHA14d9ac724033c6099dbab42e146190add79badf67
SHA256c8d368ad9e9bc5bfa1c45b4dfae2d2b8cc1b8837be08af540b09bffb82cc74bf
SHA5126bd5820988d52097e8f5e38a9a5dfdc26d595b0192c25bdaff2d9540d2a87f4f25097ae1099e7177219d7100199202c15919e1c425212542da0d25b8c7027239
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570335ee42e145323de651baba4b501a4
SHA158456bd173ba11758c90ed572d6e18b0f29d37c1
SHA256e7b45c55af7cf4860497789e62ce7103f2977f770286e299c797c35a4ca9ec48
SHA512c7b36a93d51e3b24d2fbb7f18ee1fab8a107f7d81e35944c0bbe5705fdbd6ef2b454f0ea988ed0145d2c741be40d4494f83f4be67fe7c150486c6814c0048375
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50bd0bef69feda959421854ad82f1f276
SHA16afa1951d3a393e654bd2daf1697afdb91a0328a
SHA256a916a82ba85604d7d57ed7e4bdd7b353615ea0649ae451f54568d352f4bf95c8
SHA5121ad884fb70c54346818eff1bf624a152965b293027858571f663d79ccf1d2b5568fcab9bcd3d232d7d69dfb0e98d5a72033ca948ff82cd778bb711d6e44a4480
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52691352aed15751b89b4a71ae1581bb3
SHA1cd98af986d6b2d051226979195c16a17263985ab
SHA256752d171f5a37c4381ac695d5af6c64373346aa514991b3c474ff7886beef737f
SHA512af1c3fcda70a362bd2818bc02e51baab447b72b08f77ff7c07c8c7f5da4b4d1ddacec4a903ebb80a6dc74eb7e6fbeba97a8eb28b60b4c938040fb8d6d660aaa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e9f7bd8939ce5cd51c2adf88cc4dbbe
SHA13e5b6ce7ffbcc054ae7d3ae43b4844da1db81bb6
SHA256d1c69dfccce7b1a4901bd483fc0962828fc9095913adee1960fa266ba614d03e
SHA51296ffe1ece13a81b646dc91bf581e711724fcf895107550be4182b9bab11d44e070f977ea08d0f7f39afeaeabd338dc258710f8f9797f25c2b7f75cc6dff16874
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a