Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
07/05/2024, 03:34
Static task
static1
Behavioral task
behavioral1
Sample
1f517a7b43b43c06641a7e652494f6ea_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1f517a7b43b43c06641a7e652494f6ea_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
1f517a7b43b43c06641a7e652494f6ea_JaffaCakes118.html
-
Size
462KB
-
MD5
1f517a7b43b43c06641a7e652494f6ea
-
SHA1
b7ab8f9dfbe02255df5380f81501bd0132bbe53f
-
SHA256
e57ee1b0b5aece1a390505f78d0333cdc57c274563116018953a693d49562305
-
SHA512
19c223b7b387414bdacbfb772dbb8a8b0786587733a48dda628c05d54d01d3e2b6d0246d48e5ae7bba22b6d7186b25d392ee530191e89519e8978cfaed9566c6
-
SSDEEP
6144:S4sMYod+X3oI+YxsMYod+X3oI+YesMYod+X3oI+YLsMYod+X3oI+YQ:z5d+X3j5d+X3G5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000d1cb7182f22305c19c4df08f4cc980da2aac0f88b66fa67de9e191af8df32361000000000e8000000002000020000000d4bf43fabf84f18044eddbce4709724e4a0f0b9566e42d44578a4f4d549e65682000000040f0b1ebb64c5c1891d9a4a65935c9fc77d16575289b6bd1d4d78492aea05a1b4000000021af94027badce137b42ef9ff24c230746610b2f41da86aa35b1d7f72aeb223850bbc0b4c286b241169debb8ffb234373bb9712354ec7419f2fb3f464e9b1830 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C0AC4741-0C22-11EF-852B-6265250A2D3F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f03c33992fa0da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421214755" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1744 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1744 iexplore.exe 1744 iexplore.exe 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1744 wrote to memory of 2900 1744 iexplore.exe 28 PID 1744 wrote to memory of 2900 1744 iexplore.exe 28 PID 1744 wrote to memory of 2900 1744 iexplore.exe 28 PID 1744 wrote to memory of 2900 1744 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1f517a7b43b43c06641a7e652494f6ea_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1744 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517518bb14ce52a9c5e2b576c1d32c882
SHA1ee77464017d557f3ec4aa797f42d8918065cbf65
SHA256659f634499d0107d333e5449e456abb6c322ee0c6c8e9cd7fcc5cb54389a3f36
SHA5124d251c8141e4ee7c0bc475dffd5a6fa85dd7bb46da7f0926af6df0ffe2369a28361e3ad7bc9c8bd70a31165b5f0bb6fc792c99045c0299e4449c5aca12130539
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d740ee8a981e3197e2be2af034eee4fd
SHA1ce7049ff04c1ca44cd4c79925050141ca74c1e12
SHA25685ad6135866ee89cfca850b6de3ad0118a74f0c7e4a3d2fb4e1bdc27e0b77531
SHA512988a8bc2e5faffa83b68ece4e8b92de5c6b8267b1f3c9c95452ea92e5d0e6c79f46b1665fcb07e4e96470fe5773b87819827962adfa858a45f56718e4728c8e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589723d01d5100df1a45db0adc72a53da
SHA1256fea72125e84656dcf919ae37b6590f451bf6f
SHA256928a936a456bb4c33f8161a12299e06fb8ec70a74e1917cd1b10ea82bb434809
SHA51273e8e0a04e8e6f81bc80e7faef455624321e21a2374430cbaea44fc390d3c16ec3550d145ab86e02e55fb7c82fe2a9476c1c90dde6efd14997ed6c47e651a0a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576747ff32b8ee2d44eb8a2ec4bdec5c2
SHA191bfb443e3da29ecb44c32757356f41031b59689
SHA2564b69515ede722177c23cca274ae4b6e3d264d644f7341864805e68b925442604
SHA51267b8d3ef466ceefd2a5c9ea63920f273fb8bfc1c83a480beefe9f92a18315fec024d2717c969420bab1f80b5652facfe68ad97e87f373d2728d1d2ff33336368
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562b677ba15601df41c399e8b756fb715
SHA17c1db601c7ef844caa5bae2f41f1608583e92da2
SHA256e829d4abe26425d6feb50246bb015725cf6f455fcf2b58b59f2332ce6bee01ac
SHA5128cd6fe9a32e04b410d3ab2e59b32559de9a0c9cea92cd26cb51f071b70d876cb097456e13c65eed776a5698be9cea8290b041bd1714f49dce7cde43dd784dc4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3c146ea2ee26cbf8fb8cdab70d137b0
SHA10c56bf1cb0c9b4f610f619d8f70b81f01b52635e
SHA2564c9372766de61adc9cc94e0d5149da5dfa6192b79611e49406dbc15dc90b3890
SHA512e406ca9cc2ee448264b871585f473a0ffe67a1163265849cd70e7940c0392cc1850f7d0105ff9f814efaa7b575af1fabaa4778d733dc3456803ac8c84b55139d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a7bf37454972e3ff03d854cc700e676
SHA10a610cbd777afa2f0732c221b4d5dff40aa6a611
SHA256c6919c38b98fe0ca5e8ec0eccfb6fd3e52564601755b79c26bbd84e21abb4b2a
SHA512ff890a2f08f9ef16e395d6d8ccf487e91e030a01af4d3796e6346053625354d8dcf6f96e6b1c9b057ccd5aa2f22714a5779c37523d90db6de3e09bc66a0adff5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e2ba98a313e77936f0e117ad963e486
SHA14bd967df524e7964851599f03c1bc52098cf4702
SHA256d9591619f52772ac62b21f99271cebd5216ed18eee21d87318fb40d33c4e526e
SHA512389717b9cb307b251ff2acbeb18f697c714e8babb3bcf1181a944c0ed0476aff69a803f56346c23c61d6274c326556005248b16ce57c90cef0600048945d0082
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bcb328d08e4a6c1031ce3bd5a52b1243
SHA1fccae1311e99cdcbb15e3e21af5409a9a3dfc8c2
SHA2562a9c5fc8e5f0e84f382c61074c2d5b94233db2a736e6a2af9e30e835e311c63e
SHA512af9d100a2c203d9d99fc1c19ecf2ee5f5122baa354d5bc20f8b7d5801a60eaba576c5c9fe4a598f7ad8af60c500e9b3a09f8e602f39eba152c93584b68cd28d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5046d9262da5f1101fa2e87a615c899fd
SHA1ee9e5613196a9f93c405f7f08cba99478652cb0e
SHA2566c30bc5d7b9a95e290fbf91f9e7412341b1856a3753a55e64c4a1d0fd59ffbfc
SHA5127160421ea39f0729fb8fc42e809d94c51d9336857d73c4445c24ded4e3802294269a804c7715c50209a2eeac51573d65d0b29d1a67766281834fe217a852ec55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584bd795912ab1d5e97d15f0dd2cb160c
SHA1a6412cccc096bc756fd4e25d6f1ca9691a44124f
SHA256d52e8219591c11e4554df6db43e3b6b01bfd0c1a3f047a8d5a8c4fec89502450
SHA512f0d971d03dca8935f661c1c3bc49551e161e2add3867633dd2b6de2c63b9b872209694cb121306fa0b5f35356e338e96115be7f4c0fee007928f48eb8f13fdbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c6ce42cc35b8a434e6cff4fd712710e
SHA16c0dba06cc783998525829984d141b130a702bf3
SHA256819afe25099d41864e91341ad011ee938d8025ca1256fc1dee920d4e95124dc1
SHA5128f5ee427e49947fee9705266f304466be25803684bc88ff031c7dd26883a47c61a872a032bbad5f3c811d582050d3cddda317b67dcc32b77ee295d1e809bdf8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5827f4de560c935a0758fc575787365a9
SHA1b8643d0cd0b876d15a8a2a7bd74323f4cc1d5a54
SHA256304bd2a071e8f1531342f845bb60b1427e47944a397b4461235fb621cba99117
SHA5120fcc5b0eff65176e957b48cd9fc982f705707b94bf11327e08e08693b03a665ed75d491c46bb71f3b4469d6f752518e7e888190bd3b433f0c8c0aafe5e2a158a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a8f1153ef22770074088ee916f65e32
SHA1f142578c801daf713e5ce19365f9fa7845b24b0d
SHA256eb5947c2aa8c47fbbb0eba8bae52947c00dba911a702ee3c473c98db00b938c4
SHA512c4aa323af03ffe459078a4144cbda7689dd375818bc75af06b64d65d6ec550c16a8fcec63828966a60f01e0da6875e2a398febdc691918eee09fbd8ab2bd520e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ae89169fde645231510650bdc88327e
SHA1aeda142e0425da986c39f87cd2a1d9a46546919f
SHA256e8bc03413fd7caed10fd4a96580d48e671e20100199ad313840c212bd8f2bf15
SHA512b09ed9a118aee5ce5133aa80aef8e901776810ffe06912d8ecdd1a20fa4e38b471ec651a4a406053998b31badd67db0ce707a437f09d7f7f26c38d4b1a55b2ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524fa27329dd0b8aa32b870e5aaeaaf3c
SHA147faef50b988c7dde920b4d911f76fddfc720eaf
SHA256f3a73ddc2b1571f2ef70f8a53f51066d1d03d63407d418e8efcc2b4b5f7beff5
SHA512fc798e8c0280034ac1756c33d2e2f970d4d90930e1125415c5ff6bafbcc45d6423edee9e668341e1f2a6b2ad454588bf20add2ddef424fae0f333659ea4bcd27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a20a6262b244ae384487751ad5a7c08
SHA1b854f9d8a33b2a8daa4a91c0a965ff5b33397468
SHA25635d3c083af8561d1aea1224a4de7955fb8935a76a0fac23e8c115163daa62dfe
SHA512fe70e41eb6e627dabd7776329e49e32687443149ffd78d6a8abc3250b5c8b581e83c4b34183912a894b87f5785990e19ceded8a60b53a62a74eeb63e06539ac6
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a