Analysis
-
max time kernel
133s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/05/2024, 08:34
Static task
static1
Behavioral task
behavioral1
Sample
200bc6ef6ed10d627836a6c3ebd4863e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
200bc6ef6ed10d627836a6c3ebd4863e_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
200bc6ef6ed10d627836a6c3ebd4863e_JaffaCakes118.html
-
Size
4KB
-
MD5
200bc6ef6ed10d627836a6c3ebd4863e
-
SHA1
eb5952f553b95262666a844776d1f0f323d22610
-
SHA256
b0992d9ac47cb58737351e8dbe92f4e88fea2bf4fdfa1017b54ec3066a74edd2
-
SHA512
98d3b6848425505a94a6d11ab8174cdc48b9f5a768e4039e15bb18ad6479f230c7a50983e8bfaccd083044b60d55cda6cce1317d17a0b92f076779b97d6e529a
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8o+t31kd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDE
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e0000000002000000000010660000000100002000000010ce25eb4b1dac6572e6a632acafd04085a06c65b627df25d1f0cedf21ceff14000000000e80000000020000200000001f3c4f35551a1ae8cd891f65b0a289870e9880f7d7c4930572f0c27e2b5af89320000000b8fe5d84ecd028beb2db1b9fb75d9cbd08ab8055c1f57e74574fa58c5b468e7b4000000040de6af9cf36189ef9f63caa04b131303570050dc09cf2dfbd80e199ab9802653bd11f6789912593d176e19b53c789c1250bb6c3f33802a5623ac27b1d907bf5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A8EEB231-0C4C-11EF-93E2-EEF45767FDFF} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40646c7d59a0da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421232754" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1972 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1972 iexplore.exe 1972 iexplore.exe 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1972 wrote to memory of 2480 1972 iexplore.exe 28 PID 1972 wrote to memory of 2480 1972 iexplore.exe 28 PID 1972 wrote to memory of 2480 1972 iexplore.exe 28 PID 1972 wrote to memory of 2480 1972 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\200bc6ef6ed10d627836a6c3ebd4863e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1972 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2480
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55401af34c41dc73150cea5fb42d1036e
SHA183367afe7937a6656d43d1059fa1867bb61be9a7
SHA2568075884b0b55b9c9b79f14097164c5663f310e7b826b7de399724de2afab2d26
SHA512ab2d293344f692d0f781bf36625c5258940b13bd350177ef70d446490c6f82a83af4748c4b79d4d1beb2ef92a5e6cf6971656e1ac17728a76528654781c00124
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4ae80ebaf0df1f672153a4b20a1729f
SHA1809bb0bb57a3b91a197b8d0440c1c90be1c0bd1a
SHA2561c12b7aac00f684e1dbd5a5bf8424f6ac281a7a7affc8e81683f40f4c4ee6e4e
SHA51268a9f1f713eef64dac9db0433f590c239564b994f3ab1bbc4a47f749cb82cbae6efe91204a8f969aa8e8f9c33651205d16ed7fc18fba628f441dea272857a1ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff03247981babb9fdb6cf21e9e5afcef
SHA193b30dca78a734686b1eca736dfa2f1faaf13201
SHA25610b9b692902973a840ea231ab4443a9197b5df00e5e87174c4167a656dadf024
SHA512913aa388cc7a72fbb23c173d578f022580ba31a8eb79dff8a85f26ec03179630019193a6756077a33bbb646bc5843298637022f2c41f2c099b36d9d830e8d163
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6961bfe44ca600bea670f493b4bab14
SHA1c4dc730db300691a17993a5a796fed64cd7b9612
SHA2565c34ff0365b8d849f53e2a05687f1b6da1d2d706acb78389982921183adfd1eb
SHA5124d983fe104a0f225a5b37fc5e5aac06e0e58118a61d88c7855c2e6be7b35955d4636823725145f92fb7a470006fa01bacc568b89c317fc46feacfb5b8f279cb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55bbfc3449b09472b2fd451b1430f38e0
SHA1cfc2c160f5e44cbbec1553a3ba8c32545b161d64
SHA2565078c70e4fbb380aab08df99116a6f52ea7394fc574d6292bdc76a4016b2bed1
SHA5128ce24d85361304daad87cc49713d67dd7df1f83c59087d261e2c6a4137e89f031c9777989e5cfa034401ba7b41edd4f9250a113d2d3cf3f344e81c8156f2c523
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f5a1a736d11146ba4dc30396ea84168
SHA157b51b9298414d4b9181bf1c9cc1c8cd92293d32
SHA2569dff245c45a039c146088bd04f79c1fa3dae2bde1b4ea3cb3daf0ecc023c0fa1
SHA5126b431f39c17142da5cf84ffd0909c4bd9143ed706144d77795eb0b5957e5c8fad16ce06b07da36cc7f054176dd052c05391b6ccdc7488cc88cd32e0c41825209
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e65185cfa0d0e015042ab1b8c98dcd5b
SHA1583e5cf94e145397db003843b4970bf4a787b479
SHA256e593ad7b970702eb197bd77d21e767d0961b192a1acc436bc386e5baded648d5
SHA5122d423d9330b0e60ef3a3f1bc43be06d9b6420c3d92cf3c6caeb9369a17437ef8aa7a77b8ba96d00acd6b19ca5c157c2fb325c97bf21b320e883bb7be19781c0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5081b04b40562914e1b7c4c31244e7a25
SHA1ec76f8578c3c04fe2d1e0444229c322df9b7076c
SHA256027b5bd12d36442d8a0457c709b9a1b0b27b5f3661683791556c6049671b4987
SHA512b79df9ebf0872b8ff10271124cc52e9e566e3539374b33c8b9093858bc9768774b8954196331d32e1677cfb74de36e7fce629e355e4560e7bf88701bfa12cc68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e08c619b3e432cb563734a166efae20f
SHA1af7d8964a4a44855c8a5d7e75f915e2a3ddaa9f6
SHA25625fa8ae3a101584979dd34a5f93ec117a8a303d63c598166914da9b77150b258
SHA512775ee66d6e4a14590e2416c5eab41b82c1cda1c6fc2c2365aa877ee494c305b5e726f60cfee5cac2b6ebf4faf263ebd2e64fb2964c513aa4882c7a369b78113d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51cd326fa46c08d60e1423e9ab9e78eee
SHA19dc95516697ec8a0179c38c404f180d341d9f5a8
SHA2563054005fd3eabb203e9f72e4ddbd51bb39717e5bfe1883e46b8b31486cf1d4a3
SHA51286838c89c2eec3b1cd9d6a553faeac44776e2d2b71d90bbb74d8822bc890afa5428fb2ed23f912384550cad1e27b340a6de716cf034816266109b7fb322cfb04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c5fe2b56c4a1552354904ff85a5e44e
SHA174b28a3fa26f10aeb9402b025d6049f817d4e7bc
SHA256fcdbba46a9f63feb8c88f5d1ccd2311ad2bdc38b2cb8a0326d591160b3dc1561
SHA5124f3b782fa9b114c4d69b35cc7b1b591c02960067050db15943982bbcaa1184b88adfae3b35eeb9f97ef03052876ebc45cf1ec3a10597e78451bd402636127ecf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fbc6cd6f6e49c4c86230e4b710b182cb
SHA171524218d052da10fabc06e786957c1d7468c02f
SHA2565e5a1e4f96f872a28cfaee53ee63347e9f5ad94e502dec35683a10a15ce3d49a
SHA512d1cb614632f8d8545f4bfb266116f94339887cb9535d654a7215b686857df33150d8f0d442f13456818fa7bd41fb7810a71e7cd26b4918383ea424b1fa7db264
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ca0c411907289712efc172c38c790ca
SHA181827e58bb28295d8e3ac93caf1e4481a9fd53ce
SHA256733b250a57b97b242f1756097f479178b1bb266197f4e60256dafc33b036d90b
SHA5120b00a055b96cc6b2cfb8ae06e3cdf3af6f93f7756733734b9c9aa1684f34f96f53f8134dcd28d9c07c015c699a39cd8bb57c3c8b39fabac2e85e87048dfd14da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e648948ec655bcf4dee5aca683055fc8
SHA13fc6540df971c9bb9a762377ae50e10c645d48e5
SHA256ea1b9ea33733c11b7eaf7e4fd0ae100c2de8af3ce95e7c1ceca690d6f45af70d
SHA5121aba01d51fb90bb6077e18f0d92ef811532b60b93da3361dd130ae1bd4cf8f5c178227b5f384e5fea1e2bddb9251a63fcdfbe201061d6906c3d5150cd71fe23e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ddb5619873a9fda6dc84381a959b5439
SHA12f211a63cb4a94c06470a061b0e2e292fcf32e6a
SHA256a2c35aa0fb8ddb01a080738ab4244ae54daeaace19bd6a5a7d5925c006910802
SHA5125a5caabc6d1eab2f09325506d597eeb105d1ee4dd65ef0be059fdf8d3ca7bd08e2f6082b16cc0736451087ff75083623a88c62749e6f70f9c81c3ebc9ca7cbd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd84885e048254386a8f430a1d90b2c6
SHA12d57452604e2930920c209f12a6daca08a106ac4
SHA256c3446454cfa7c9e5238bde82224568808d4315322c164619634b3e99f0ea5f6b
SHA512699d2dc54f8eae2ef6f6b6d510d4514f6d884c80b2b530e3cf0b551958e65acbd4c3c33c6daebf3c8e8d44b9464083df2494d37c3292c0731c7ddfe13f1f47ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe8c600b122e5f9b68da853ac102d825
SHA15355461891885bff41d5d677f322527679d42557
SHA25661303390c60395d59a3eb0b462d6ffae8cf380158b01f6a17b55c002a73b3f89
SHA512a941a36512539804873fc5cff7940385d924465dfce38f341d88f7f75f38c2699f6d4178f0d5c59c9e94c678df7d5fee46fa840650d726f47001212965a40ec6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6ba0a675429167ad3dcd16a413dd861
SHA114718734d59eb4ee32f2a66b43a925756c1b8a52
SHA256d93910d93e539d8ba5cc6506d9e2a6934633f2907b05ad2d2b922cd77da3aeff
SHA5120fbb6ec9fd37abfbfa90fda330c8cf09f4e1962279eb5004a5a77633b8fa893eaf4634facfa5500d913a3c4bd0a96e29b627e9b4f7ae6c8404761bc423b444ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574b117884d5f28cf4ad131c46a36c1c9
SHA1db59289f510acce61f46b1d0033d03fc0a9af275
SHA256e47b472806d9d27518c20a75ad01b55c517336ffe33945c4113e0c6c2da4cb81
SHA512e71e5fdda000c4d36ef800fbaa7c60e1c43f5636d834132e7e0e7aee48f346c64559987b6be62f2c541f24114bba37f43f434f0f2fc9709f4a4f8f0d7cfdb00d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a