Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07-05-2024 03:49
Static task
static1
Behavioral task
behavioral1
Sample
1f58a34d18971675f551b39271ac12a7_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1f58a34d18971675f551b39271ac12a7_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
1f58a34d18971675f551b39271ac12a7_JaffaCakes118.html
-
Size
68KB
-
MD5
1f58a34d18971675f551b39271ac12a7
-
SHA1
4936ffbe3d48eb318691aed3e1643a1163079604
-
SHA256
88736ce1422ee31bde4dccd8d2e5034a921041624e16b1d651134f11d8cf5ad0
-
SHA512
45b6a5f9261eefec3dc1c668922c4244e716c32f002a3083cb57ada1d692ff17e662bba13662902014406b44dca74ffd875bd931c4cd1843aeefa27ef149411c
-
SSDEEP
768:Ji1gcMiR3sI2PDDnX0g6ctIk8HoTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVG8X:JDH18ITcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000004899216cbe407f6bbe97e79182a315b55027cfa516770c593574f37ff5394c55000000000e8000000002000020000000ee8d1dabd2ab893741536e5c65d1f0736025fc8b2fd8c5aa105e5c64ab5efab42000000057195939410a9235b98d568f92ada2925ef7198248d950e74b7d3aa55520057b40000000be7d35b73796f8778ae282d45554ab83da96a503f15540b8dc9ed68d429f4fdbf526081c05bebabe47a9331169b24b78567141e8232ad709eb91583d9570cbbc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DC2438A1-0C24-11EF-873B-52ADCDCA366E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421215660" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30b1b5b031a0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1684 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1684 iexplore.exe 1684 iexplore.exe 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1684 wrote to memory of 1984 1684 iexplore.exe 28 PID 1684 wrote to memory of 1984 1684 iexplore.exe 28 PID 1684 wrote to memory of 1984 1684 iexplore.exe 28 PID 1684 wrote to memory of 1984 1684 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1f58a34d18971675f551b39271ac12a7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1684 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc1fa21225bed6a4cbc6c9d0f4c949cc
SHA1398faf7767c62740cd9542321f572e453da7d73a
SHA25607997e2aa007b0ced7a3a8f59da4efe068f2087dc2bdb376bd0a63ed2be53858
SHA512aeb0c2e089c812f61f62d6e0c1acb2564940a70f1166c2c2aee348f1c6b14b022e43d606767b35975a65f427696b24f1531b0fc27c0c6bdc74781cf7dcffc785
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5513abe1f8f200a84fc2242eb05bc3011
SHA1f308bfe36e935538236293c2e38703c4b92045b9
SHA2569a87464da1d99ccbcc9891bc0940f76e67eb6af4293b7afcad9b72640a782086
SHA512048ca2f22f627c3e6f4d9194089ee671a1b108e8b435454993fcf84aa0820a331e7af211c50d3f7eccd8037e22debfbd1ba42864404de7e925d45195025cd0bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5370cd812d45555a45997683cdef01840
SHA1a053e0d7f815e6c7d1c7f18575ee19107b8d12b2
SHA25624d3b29a8f49fc3a14113c4dd8fbc001513c58883d7751987113e198fc0a1603
SHA512b75ce6beb370977f4f9bb6dc1c104f7aad0952dc98664255fb913348e54367532c4df73c1e8827d4b73c555913ca265eb4c6b80abf18e2d0c1da302e69581fb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eae141bf5d52f1fb595473f310cbe073
SHA14f259eae539a61688eda5d223d12aea83d52aab6
SHA256cc562f6d98b5575d9119e8cd567753ad83fb80dadd6a71ba83b05eaacafee148
SHA512fe7a217ade03d35e97e062986c8e13abe2291703822324e1de59798d52ede154475179f19ff6e9c3926aa953609457298b38d0c3e38af40ca4abf8c97801f736
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5492768dd22555466157da71f0219d312
SHA1cbfce7b121cbd331e349ad1a3eefd509bdab8f20
SHA2561f297de5e84882d6c7542edd7d70b0f887c6e62d1dbf8438744d49443a46b2ef
SHA512e754b9521cc9c47b964ed1c886601b82b28e55c1d1ab63fbdfe2567d94045925048978935cacc96c0651de958113c26af8a7f6aaa1ef8beec187fb212b8df602
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7f7256ed595d752583a016057ee2300
SHA195bda17a9aa2c69b2e05f1facd4f8481aa8f4e29
SHA256d574bdce4ee6c64c696ad5ee86124cd24eb88c32424f410dc9af3731c1a4f864
SHA51211a04fc885d64a04bd0db5bcb839e310eb3f13cf12e6db753a96697eba9a6c3de0acdcfe46c31c0cd081a9abcf0bdfc1cd909ceb9ae050668d6e2be27805532b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567b8c5879b98e41a20d23e56261dc5b7
SHA1e60da211052db8302c9c94b41d4765a446696cd6
SHA256e448277e94cd1223d580442b7e3407e14f4433df18459adf0b3026e11f1c1a04
SHA51213172bfbc6d1d6873ba0f1f8ce338a4b4be0799c4e99bf1935a6a78a28f2cee0d5f64f5f92a298441233717ddd29fbbd17b999cc84127039b4902b1836a9c1eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e87d5bf30e33b31a3cb39085ac807fb
SHA16342df4928f55fbb12e8e433e944aa1c420afa06
SHA25686cd854ce3048515ee0a849d90f2f48d231e2855a78d34738a67f0b4c4ebffb3
SHA512b993842438aa9efe0330d5c377fa3752d23f05d5d18f16eaa3df2d8f8e89e858c1cc5cf7cae963be27d7ab447d1e1a21422e8ae4392fa9a20154d5f663b6a33d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c6141ffa72f941fda14738262b7a1d9
SHA1f0d778e04fab0436146922c1ee96def20fe6c8cb
SHA2564029f9345f41991b186b7c88bc5393faa65681399ea5785dc734d019fba321d9
SHA512fed441dcad3ee77fdd786c7cfb299c59f3c93c94427540165761d86e0c98be9259f7372065e4423034800b4f6c51a089396a4bc289dc595011995cac052728ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb7d5e5f4f571d94808f0d247a044785
SHA1984ed56e3dd8d8bf61217c8fd189a4240f44d3a8
SHA256435292296135041de1a366f8a98387ab5ba072c065e3d05930d252461813e963
SHA512b199f86444f601ce0936ce5d071b1b5078a939c7612ea718a5d286569258035a5293f66be57385af1c24c0718c8cfa33f4236be14283a63e91f54c0c0ebed27a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e43f6400b26750744da55f0c9072741
SHA1da9fe721f5c01be7ba9219b8debbf665bd502f16
SHA25628d280e6c18bffbb4120cc1150076e6491f91b47bcfde5a3e08901d7190166db
SHA512f66d2ef778d55b1ccd87761dec9f6aec56103e407b02648ef16ef98a2c03764c9d9a50252783efa30c1b374ad0bef07e282a7cc197abbb2913673f597b8c8a7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b6ce4b0b0c5591f3c693e0f15d9abcb
SHA1cc3c3b765f21cb1fe847629449b429c7ca5a6618
SHA256367b477f3b7823620277f7fe22190a5c9bbac4b979ceec1433c70d424c1ee6e7
SHA51299c5baf493bd6375229d4b8b05a95c15e0974244b8b396eabfb5896257910687ef0bc508dda84eb17aa28e8ae623fa6a065ad86254c6eefea396d64190fb949a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de09d9fcaec5ed1243a1ba0a70e43eb1
SHA1a46f4d780960675f006235805491c13890d7c06a
SHA2564225919b148a15f53329ab1d7e6f001c38edb1742f02d82107aebb66610fad8a
SHA512092ed7e70acfaf66c021c556b1def1489fa90093ea93ddd294aa5917540c554dbb7b657e9539ad80c55286c9595c1c709f332f18066836bb43ff9be4fec3949b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500e3a1f556c41781a514ccc7d353fb1a
SHA14a621967a0c19150ed3466d7c99b673e227bdbae
SHA25614a21e22ed5ab90cbe47386689a791026649abd26982a68aebd2158e544a68d9
SHA51269d0d0fbbe38af8d715ea3d77af8741311756830acc7108eb11c059cfa93016a71fafe145386c6b36f2872571300d851f97a1c5aacab5ce9e07ad51e16f0bf2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584eee2a7e90113b04ee4c88d05f6c2e8
SHA1706a9f2ad74a9f234c98ee5b1d1eb3398821102b
SHA2564426de6ee55b83a7bf0e73ef334419cba69521eb0477c960c9346b1e6ecb8187
SHA512422cebd3c7f9e740c938c0cf2a852b22401cbb60cd98263a7195b4e644b8a318a4c921f6d17ded817b866c960288db3daea9788fe022c4d7af0b782ef620ae4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a20111fe84683b57c406f47e0a0ea45
SHA191104a1f2d26fe051e235da9940fd8d5f6a730ae
SHA256f7ab6ab402386cbe29924cfbe0869a549d82ed5a8c933807c327d79094957969
SHA512561165fce77c2eadc98c112659f2be2fa56d672aa55af44da6e24f96406dde13d370cb8e7e8ebaeb97939aea5effd967407f224914677b1bf14a7031e6b82c1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57927dfa9c48b23838bc74769942b8cbe
SHA1936029920d551e41c841eb3820697c146451e15f
SHA2564c1bb6edff84042ee334df0f292fe5503a7d5aac62d11d740057153b53d63714
SHA512917aada2f1a351e5e62977638074e2a8e436bfcb5f82ca075e44745c1c588bacf78417c9d4734184148f285d1a9cbf933617d286ca1541efdebf04fb610e08b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50dd3339c19ad1d4d4412f6244b921e0f
SHA150e00103f501f92faa3c46b048ed2985eb047a90
SHA256adac4b63c70e9ef6ad29cb2c44dc04a3ce15aebf2d4512ee09252fd064e00254
SHA512c53ff35268da227ef42a44f54ab97759946b475db89d40bdd5392c26d31f2c1998fedddc89d9e4d93ccf07fc2b67fceb331537a66ca9c736ea169a7220c3a7c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f06edeb4f88ddf0b4f0f99cc6b66ef17
SHA1231a6c7b7564a312d12ed16f6bad6e52361f0871
SHA256833339326d69d4e4db30d7cbd330d93df827939dea9f98f4c8a796932435866f
SHA51260c6699aafced0c9835cf6ea5eafc719a34e31fce366696801ab197c87cdb6bc1b19bee3e387ba88b3f0db24dce8be590028fb7af40e39f84804c29ef796a35c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a