Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/05/2024, 08:47
Static task
static1
Behavioral task
behavioral1
Sample
2014e6b1fd6c6a398b701c54515b5d5c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2014e6b1fd6c6a398b701c54515b5d5c_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
2014e6b1fd6c6a398b701c54515b5d5c_JaffaCakes118.html
-
Size
461KB
-
MD5
2014e6b1fd6c6a398b701c54515b5d5c
-
SHA1
d2e659be59cad6f6113ff30f905d655de820b438
-
SHA256
c6a8ab380dfa2d135a7a1875feb2c11a23210dee256797e29073314bbe7b0923
-
SHA512
28b1f9c90ebf809b0826d18a45a6ff55ad991ee984122ef9d637a86f8b7c599e37ef9b1b381f344db67c2821c935d9fc653d3c828ecf3f674673c98717fb114e
-
SSDEEP
6144:STsMYod+X3oI+YVsMYod+X3oI+YmsMYod+X3oI+YLsMYod+X3oI+YQ:i5d+X3r5d+X3y5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000633a5c3ebd58cf9a2253fed6c6941a03c07547cc110b08eeb965b00af1a7c22c000000000e80000000020000200000003cefb448b893832c52471af9707841321af9ebccbfc5eb063fdc673f344ee12d2000000087374b7f2b428db1360948fe0fab7e9faf45fa5449af22adfd2d5397c939cd1a400000009fa094cf2fafb91cfa57f1d5a922c17e6c97665907feb32242deb32fa09c03ee3642f2c9496f05813d8f032b0ff7f5f98785b696f9942e33e8529c3827e751ea iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421233538" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7C3EE5F1-0C4E-11EF-B937-729E5AF85804} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 701ed1545ba0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2308 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2308 iexplore.exe 2308 iexplore.exe 1832 IEXPLORE.EXE 1832 IEXPLORE.EXE 1832 IEXPLORE.EXE 1832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2308 wrote to memory of 1832 2308 iexplore.exe 28 PID 2308 wrote to memory of 1832 2308 iexplore.exe 28 PID 2308 wrote to memory of 1832 2308 iexplore.exe 28 PID 2308 wrote to memory of 1832 2308 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2014e6b1fd6c6a398b701c54515b5d5c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2308 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5763776cdf54b8ee7a97ae006865bebd0
SHA16ab2c9cbf35d63ff4b4ccd2464da84b541c5d4ec
SHA25695a48f88ef91db6633661472991c9a816ef4392551c00ec26f6ffd79a6ba6849
SHA512d607e2010253bdc6de2d8c5be8f9e1b032b75ddc1054cb0c32a98460f668a740052acb7be05c3838d5e1d8083c02436dd23ee6a0d8294d1211f71dd0fe2a4401
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db5c08bdc80c2e6dd097a64ea4f3aa11
SHA12db19a59075e681d65e623c47f676f71cc8cb509
SHA256ad6d601e51feec617514dcc9168376875f9361df577d500dfd65a4e4b32f1215
SHA512b615aa19ff5344b43fe9de48b87e939668ac7420aeaf0e4d50e41b6a42c807faed2bf2726981992e313ac16bd26ecbb08319f19fd9a0ec35db21f6f1ebdada5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef95cdb24a35093f7f9ce4a594c87683
SHA19c0b15b4081da8e7fe5c5e1d843f1cf31607ab27
SHA25637d176f1c61b575db165e12b155fe4ab6a93900eb96058ff796359ad2520d727
SHA5123c57f060bea2e51e6ecbb8e1b53ad06f38719998465f4d34634a7b8c5a297b16a4f6f1e99ff839150cec5c01f5b0864eb13b65895107cec17302a9a9b7bb0579
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c1037355195196f621d8bc86378eee0
SHA1db016e343153db8a32efc21e4077eac13707ca8a
SHA256d3c43534fdd50f8bc305c322ce88aba6ab7b7f2909e529328f2066cadb2d3fc0
SHA51210a17b6bdf76f302d68a30d826bd504086bf6eae29fa882be057c8936e764c5b6c046466ce8660345bd0efd985d3ed86a154572b5f6b0a9ba81673467da853d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5054124482cf9ea8abfb44dc7c0eac849
SHA10a065b5f0d62f8c3d4e5e424b1c5c6e9e8c5fc19
SHA25668c1150816150005aa8815afa88cba689ef5af9b810835e6770df1340adc00c5
SHA5122d671f8842c7fde90d5b55d7d10ac69b644c7b4dd747a0eeb2f9456e2e4d880d06a2121f5607ee1554ddef79f3f517e64926d71e1b1ce636e888ac69439c6674
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50564319372763f0c395677821008e64d
SHA18fa9f173afb02f1465adb67f96a81c7d6b8b0525
SHA256448f6f1f93da6daccfb8dba6091a645192fa667dda9dd085a5fb5e0ee3bfba1f
SHA51204c4625deb6b51400efe5484e0e45be31fd5b92315d7b16962614dfc4ad614aebc2eff9ddf0a6cbf3a79e5e6df4b22d8db3f7dc72453f859d64b8c80a83c1932
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf698fa1535561b105f8fdfaa9c8b882
SHA17f0dea1b6690254d19de02acc5b9a5faca6e4b44
SHA2565865b3e0be33d3e96b6b1e042db4f71f49073884aab382bcdef92e77e02db443
SHA512924e3b70e39079e02dcf33ad3cd2f4591c5ee4caa17f680ce0941e3ce8fbbf5519c87861bcf1318a05a19b8c5b3c1f1522f0c9b768c3e1408d7a9347837f8225
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d91b7f4b48451f3f7258f364d7ad1ea
SHA1b69760a387cf9edaa3d8f6de8fa54cab7a217e4b
SHA256b29db7b1c434a500ca82e8c2b0d4c7e210448ac4daf802c5327e01d02245145d
SHA5124dabd893c607493ecb7a77e95c16408ab4b542945be395515d651a91a78d09fa7c40c9c78f676c20b1355ff804ebb940ca6c2d7a330700d9616d5f49776eec18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564f55a64011efb92971336f0a965e00d
SHA1b812f4364ac98f1b64eb71cb30368a206025b3e6
SHA25621dac9af2cbcc6761d6cc62ef9968d81de2970f3bd15cec7d4265ca9c5f85523
SHA512cc787bbbd8b63bf1fc331d121e89e293e232d88966438a569d46c7b8ad43a6e23681e5d737d407b18a7229ee6ab6c73c3926f09582c0430bad9c7334c7b69879
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58286567d099e78422838c64e2e62c95d
SHA182135a337341b73655bfdf99ef483dfe020fec96
SHA25616644d80122c946ddcd32bbff28bb973a9577532aa4d3902ac6c05eb558e66ea
SHA5121b26548fe92f4e79fac90cf84fc4ec9be9602db0c4b409937254959fde92a259bbf007e643de82c3a89b620f03dad0bb411925dcbbc157a38d05c84de845a541
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eefa92343263db166b488983d675bb8a
SHA1643905ec543540d0093cc4f22ab1836da2a3f330
SHA256054b21022be4cd37f0e987692b591cfd107f59a332b5026678f5e2a0cc1ac9d0
SHA5129c22a17063ca1c4200fe998b562430a318c62fcd9a809965b1b88c3839e4da807bfca760f8e5bd1ba1521e9c4208a5f851c65b3859cc13a95c77d4468c086adb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d82e5721ce214e6575b554fcbdc63d4a
SHA19914ed80cf509b692dae203fac587ff9c3d3ec01
SHA256bcf0547e3f5b7c0cb2105ad0e812d7499cee9200e5d41186fbcbe2a3996dd26d
SHA51263c06c2750761d6316e8f1fdf774f87598378bd7608b275e164e46d7f02d375f049538abedc7947e8e239908246d8740222aaddb310ae57786a608b68f06199b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54598b4d4ca463470695f4d70f540dbf5
SHA1836ba90a9ba6cddb17c503f9732185b8104c7ebb
SHA2561748f4951918b059912fb7d7e69ba34f437e582b07bde52366077a14d3ce1e6f
SHA512fc831ac59aba95bc020a8a9da6842c4a52f577a912dc13f0eede15064e4ecd2a87ed075870552f0c1ce891a147f77e30ac44acd75cae2f9299c761afef50bd5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a80e52d3b404a0f78c0e68803da32a66
SHA1d8d5b71138d0cc911780824722726645736fdf85
SHA256febf17ca8848693677e42f6b6d98799180f69dd232a50a0a7f8756dbce49d731
SHA5127cbd4754e8d99a1f5b14037d908c1ed0c7849ecd43ebbbe2c3a4290692818382dcd1aee652ba1e3afa582fc7a6c34e041f5bd772531563c119bff30a6557dc85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57055862e8ef42547962597c902cc8250
SHA11e18d446c55951b795d0ace50a09034e3e72100e
SHA256033d25c262dfd4b641ea6e99d93e71dbb1985a07035c949175c08e6e1f4f9584
SHA5129c141002919c632eca2e486a45792dacb06ca9a5cb0c78b5bf130456a49e96f3c2bfeba362533cd0809aae78d1b311542a88bf7cc5dda5975915b3081c7957d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa9d7888acbc64b32833e061a66c7b04
SHA12c62625fc099479370e1c588209502dbc2df94ed
SHA25672967f808a6b8401f30cbc7b0c3cacd091b596048c7f306809cda9d7f51c913f
SHA512775a7fa849ac2676a9a0cbf832fa373067f7029d0d564f8a61d26c6e985c9208191bd7c83a5d8b631165e6c49bcf5fbdb987940c7705410798420a5c0e86e6e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bfe6a673775cf880e280bac9c0c1e15
SHA184158e1f51e42618267b7ec4092128ad846ca4e0
SHA256dbc2f9a22dd38c00060c12a974f6f72dfdf49d98a1700b85167838fa1e760e5a
SHA512b3bd78532e36b646bd3555726d5cfb1f9285921042010ca7dcd0762542edada3427c1eb88833ef6c69870e0ee87112d8e54c59fe8d8499f65db1e58875263482
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59692595b79c62b77243224f4d453ffe7
SHA172ccd1e480658f9411b4e57df1ea4e90b3e6c29b
SHA2567f27df9b0c456c980a34c517ef429c185744e1b93b14e2bb42d901d18037d13e
SHA512d7c761c1168d01b8a4f5a70cc36ad30b48a0e8d72cce5d33b56962e4966f14f0ade95f0a2a667581f0c142a123700a777c16ab88d91f97d820e880244efcb815
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520e34c334edf8e06695a57767b669287
SHA10f25b4e8c6ac872effd475969da724c0cf37c709
SHA256b7fdb2f52f2935a647c1d2f8a3d6602e727fefdf64676a41e7dc6d4bb86f9c39
SHA512190a189756d77a0e08b28288a60ccd1141dfbc015f1f9268e8a05dc5e75bb009a83abc091716d3468bacd744441be70d98ac03e6486f4c262855757caa083c17
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a