Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/05/2024, 06:48
Static task
static1
Behavioral task
behavioral1
Sample
1fc95747a12299927e6a9d9902d51c7e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1fc95747a12299927e6a9d9902d51c7e_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
1fc95747a12299927e6a9d9902d51c7e_JaffaCakes118.html
-
Size
461KB
-
MD5
1fc95747a12299927e6a9d9902d51c7e
-
SHA1
978e947c90c42e77242b9e8079174754daf63404
-
SHA256
48c7ba24dd78c106804250ef8aac10a4e4f920b880774c8d7c716b9438369155
-
SHA512
fd19573ee3b56f2f6aea51f5fb0bbda33c5fe77a11e4a0bd73f0db02c2cae9ed227ec411313fcf7fb74faba74fd0e0297749e2b763aa53ebfc2ba26150f6f93f
-
SSDEEP
6144:SxsMYod+X3oI+YLQKsMYod+X3oI+Y7sMYod+X3oI+YLsMYod+X3oI+YQ:65d+X3F5d+X3t5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a70000000000200000000001066000000010000200000009dec6d9505897dc03458951dc4e26bdf9f456a299173cbbb8978e43952d0cc9f000000000e8000000002000020000000c41f6df4336184bfeab3575f1fe194412c0df39706553db7890444e3f754e7cc20000000f3870cdbf07f7a9acfcbc969c43af730105e3b891045170e5df40f7316423e2040000000649031ac44363fac73d32b386c22a8ea22cac42c45d601f9bfb477a4d6bd115615723420e1eb2043f2009d6416f1b086541cc5e1f921f28907bceeb0e8408774 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DF7277B1-0C3D-11EF-A7F1-FA5112F1BCBF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421226403" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 302107b84aa0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2372 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2372 iexplore.exe 2372 iexplore.exe 1092 IEXPLORE.EXE 1092 IEXPLORE.EXE 1092 IEXPLORE.EXE 1092 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2372 wrote to memory of 1092 2372 iexplore.exe 28 PID 2372 wrote to memory of 1092 2372 iexplore.exe 28 PID 2372 wrote to memory of 1092 2372 iexplore.exe 28 PID 2372 wrote to memory of 1092 2372 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1fc95747a12299927e6a9d9902d51c7e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597c346243feeea13554154b3dd342156
SHA1ee825a0d12c08d05209efef82d639250731d53fe
SHA2563ea16cf0313fd840d895a50c1505e8ea424bf08b66f45a54365e41f2c1483724
SHA5121bbe66b5f606cd12ff8b552f5dcde905c8b136ae5c07021b4c53fa5d8519a80ed57558e2062c977650008d36a9aa355df9c7e846f454c3bdc8570fab3b9ca6b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af1e75300f39ffd50a5ba5493c80e0de
SHA1f94e84d1c3fcf6ecf5e2919d6da4e42deb038fa2
SHA2567658d374824838b3d5d83cc0fb89b265e6d1007236da86b1c125d79cb973437a
SHA51225c250fc8e078a3eb6448a22f0c141d660b790737f3bd82c4ff677ff50b7ef655f3794bd5d86ddf080d7ddaffb0ff4726a122aaf64e7712d2d0db8645f9d56be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6ca308e8790e2e7461e1a7ba82a935d
SHA1f922c980d391c7732817acf6d5be3c6b24143984
SHA2566db726b57c48bb5730429a77326ba67e3a53c96883250c46779395f992a3af1d
SHA51293a43ca09cd36823045ddfc82cb05d4c23fe7b0dc426454e31d987ade52202f279527b5e40f0eab2e4dc0d6d55a814cebe30f0741d42c406b5bf5c38b42ee295
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c13d7bd24daccdd71fdb21b54e28bae7
SHA1e5687f378d55c2dac12166dc6c9b45b20d9f7e5e
SHA256a4e3e85a81b3b93a066c214cf9b84ab9b99983dd950e3a1cb1b563c6de3a108f
SHA51268bc8d1fcf2ee0fd9e0d0a904cadfd07cb885e04da6d90fa6da82ffc86524fbb225525fc3ac8096c0f87c7adf58443699234803b8abe9b62b93db3d7c7c5dc0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598d4a1e747a2c4573a00417753fc22fb
SHA17ee461fa7b16dd9ab34b547be3efd5369768557e
SHA25646eca68a6ef78afabced0a6ca2fcd0de8706334fd52590adbcb7064e59769af3
SHA512e4008795bac6b94f930f8d1f7d9fa4766dbdf800dc7dade6012ee088a47fb274e6814ba8dc632bc1f0c04ed83dbc20271b2ffe98a0aeb667ee4e26d69e3b06d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55313d28589b0f1f5af1b321d73fd44eb
SHA1a0ad29a737ec2475c0b3a57bf8edceecaeb28e2b
SHA2566fbe8fa3a93de00fe4593bd89b076560147de3779b5ce21e1a8807fc4143c785
SHA51273334b4a9de8b08f40f1466f6e0c9600dfa3e4c08577251a2bf0204b6b30137006d8d8f5a3742ccb5e64d980ffa043325c42b339f9d9f3ea4b49c351d0360f80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512495f6558941f4bef179280829d938f
SHA16b913da863ca9c90798bed427a1fce28194f9115
SHA25665407c36bb8a604abaa761a2b557bdb0695a8ae8347804bce7b0a7a53b803c78
SHA51242d33b9aed6cd76ca01af199cb419d71920322ab31c9afaffc2bd7f8d540c28dfac9b2209943259750e2b0e0ad0545d909101c8b8025280ddbea5c19f744c6b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d83190cd7163512d996b6b9121f07108
SHA1e6376aa636c4c202dadfedec6722432b10aad753
SHA256db5e523ebe85560bfe00f2216b632ff8b03b9f85ca1ae23b635c7bcb56eb5fe4
SHA512ab9258aaba02e2011e3d0cc7f71ddcf39d304e974405ec2b1fa49fc3f1e15ea77c69fc78fd1aaa1db46cb6b6b6b3d6a1dd8778589498e79ba30e6f8860185fab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aaa56e4cf908c8cd4b8995da6931b430
SHA1028e4a37586dd2ab338d29e3841691ca5eaf0b3f
SHA25670bdd11a534bb58e5a975c9d2853f486cb091097f97a5040d27bae519d81995e
SHA51265d710722b642465cd66036834c3c9b28c7c230f06c5101231f7c6337450fd756ca773e3be054c4c71b5fac1ece96bffdf1c6b3ebef408b4ffb207f5f1e9d48f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55978b57ac73f893b17d76d6a96f147ec
SHA162eae5e31571d2cce41da02fc48cfe8150434157
SHA256b4923986c0cdedb62ce840a9960492d25e965556413a057815e27f87e5ab4414
SHA5126d621873c337881e5507240495e4695890c2ec915542970356157e0f4986a4934e6421843889f18bbd858a1fd4c57032c7b78698267cb97570b2259dcc1bb7c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52471d7651a7a439335c7a4fb0fee9c2c
SHA10b5b9bdc4ca3fe9e7efaffbb6be6ddbd36e23b91
SHA256b59a95dab05d31f73a561eedf9ce2b51d62d477a016672287396ab8364a7c2f4
SHA51237d2f1370b6b983731cf99c8e24faa50177b1049d5526d21990a6dd0b1d4fee67569db1d1f0795cc8e431c92c6ab8e61e5ece8e5c97fc1a8e4367acb9c96be81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab64b245ddf59e6e7f56506e879e96dc
SHA1daf9b9d698ee94efa4ef05175e9fad92233b0916
SHA2560c78e1d48b6d046e81b7252bd26704177af246b9a27580bcf423113ae4ff11f5
SHA5122cb729ae9025008ff08fd118a99026fa227516f6b8ae07b6d4a5fcc6b7f0ca092961435e6fb7b9aa06649247da6d6b87474c8a67fadac8c46a9d0173c2e3c966
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56333824e2e511e9dc5f7d9ce86cec34a
SHA1b37d3632648ac4ebfef7781d8b73d709bd4fee23
SHA256fa6ee0a28c43ce688edadee5659df59505b1218d170ac1c5b53b1f017ef65326
SHA512dda3bfa4cc1df5b9d069d36df4bdcdca6da6e49b43c12c1d2a1388862278a3572f891325093b1e5680b33bc52a701a70922e491dd5aab1ba7ba4bb5229140d2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dccaf0c5b2037e18f5249e3950d8228e
SHA12a2c73622ffdf68e148b8c06af56a1a947fa7f9c
SHA25625b83e9f9c048fd348c88690aa19942084a18717ab828df006c122afffc08820
SHA512c1a809d07aa3705491c93ed6394097c833b55c7136bc433984eb630d850c9c413cf52eee124f92a6d19b7143fea180f32444b28d482d16d88f78ae5e9468a355
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c50f9c7e01e576082c98e3be9bc3ef23
SHA1ea9d3c2350a2dd5c69cb8d5aa021065f8cd84f11
SHA25609367faac3e69d4dc1177fb74b3f4f236a9fd9a1e9b060f6ce6c0e0127883c4a
SHA5128759091dd16ab2d434f57b7dabd9ba83870f3e2062a43aac267f05589615a7419f75d996744424a976d64eaa6ae174db7a3eacd0ee170106ae2618ebb0cc57fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5797abbf199fc170573d04e73fc69bd24
SHA12b2d89e558c6df688522f1799cf0265c0f817758
SHA2569be2bd1bc0215f5162096be658adf3bd67ee3dd584ab44bf494e0375289b5b2a
SHA5126bd880af639be5267c2c297550943fa93151a1e3f2068089780b1e099f05a8efb4f5c437a5776639dea9030d11a8a7ffb16f29bc0b9b72210d75a1b52cb853f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5490ce1f52ec8a94efc2a1815b0b41c20
SHA1e5fc32c6174a91f69d177af07cb4a607bd8c1b18
SHA256aa63e398fe4e4276c4b933fb691819a667ce18ad179218e527736f8ab23600b0
SHA5127bd85523a1dad06a9bdb776b87a77cf3964c0d38e6c48b3d25d298a0fbfc2598c6ad3fb0c6fa450e64433cc9bc5da17ba917238b650c5fd3c5b18c10d7c94a0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f1bfdab88c5a3bea7b2495dc93a7152
SHA10e78864adf5f261fc144df6c647a6f312704d09b
SHA25672eacbf9969230800c5b68f0c93a38103e6ce89c1783ff0437282e8100d70318
SHA5128888f7e5727dcb86b1393ea8e1977867555af98928054474fe0e727459945926418ef62f73034d2ddab06654286692dbf6747fb5fef6f1f2172d84f6a171dae8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f53a96580e022451a2c41df1c7415656
SHA11364913428a626bbaeb4f953743d6ef8910a523a
SHA25678948ed78f5c3b7121883180607a3081a87e580a5e43075b3b3375df74b19202
SHA5126fe2694317398a32392a6afffd60389ea8b67fa69fabde7024f05a160d00098ac0d52e342d6681d957fa14146b28fa8ef25eccf9928718a3bdfef54f1c3bd450
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a