Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
07-05-2024 10:45
Static task
static1
Behavioral task
behavioral1
Sample
205ac43bf6b8b314d2f816288cf71c75_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
205ac43bf6b8b314d2f816288cf71c75_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
205ac43bf6b8b314d2f816288cf71c75_JaffaCakes118.html
-
Size
36KB
-
MD5
205ac43bf6b8b314d2f816288cf71c75
-
SHA1
5501de2734cd36668e6855c09d94fba2112af093
-
SHA256
8aa63dcc41f814d29d834ed95c657a02ae95e3acde4a17e328661d6acd97a3db
-
SHA512
a989198c790c8bcc66bf4b750e231af27d0b3c85859a31f3d9207991c78d346a5f4e2844e6cc9b3902acd9a23a67723e0d5cfa08ad69861ce6622f6ac281f8e7
-
SSDEEP
768:zwx/MDTH1d88hARXZPXOE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6T+ZOk6f9Uu6lLRz:Q/XbJxNVtufSI/g8vK
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000132e4c76d15e5d27a13ec55a9a5a84285f720301b95ba1c3a0c75b3ee1e45e66000000000e8000000002000020000000aff7ef487049385108ca1efe6bf11c9f5158eb72ba5f4579bd8b45e9adcfdfc020000000e6aa15b2e4100dcc4400c8b19d3a98aaa411addeba25239d6c2f6e0bbb80044440000000b2d9bef57b4f7d07d605d10f25fa417d428f861f454e09fa202dd2b1c2ebaf501c5fdaa879d0d9b7ba8a8f963bf11b7b84da3bb53e3f149c16ee531534e0a0af iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421240590" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E78A6A91-0C5E-11EF-AF73-469E18234AA3} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10edf2bd6ba0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1200 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1200 iexplore.exe 1200 iexplore.exe 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1200 wrote to memory of 2636 1200 iexplore.exe 28 PID 1200 wrote to memory of 2636 1200 iexplore.exe 28 PID 1200 wrote to memory of 2636 1200 iexplore.exe 28 PID 1200 wrote to memory of 2636 1200 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\205ac43bf6b8b314d2f816288cf71c75_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1200 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5648c85839e7254a2fbc93f592bb7447f
SHA155cdd89cd957f4fd1969358ea24f6d68623faa36
SHA25620b6e820f80d6e85ed693c25d89059dce8eca4be24fbb2393c5c7c2fc409ab74
SHA512426874318871dc8f1011739836380ccc9fed292cffc4688a9eed74d2a3c6e0265c148c093db31945f8e73ebe8aed43ab2b0f936d3ed2bf76adcdae17e8c716e7
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5a18410c9711e636f22d6414e8cf8c2f5
SHA160d41e79a5935f0ae3c35630b2113376f5fc4935
SHA256969f26981160ef5d8baee8e558bacc2a224e7812788129e1505178d2c1a4af67
SHA51259b31d305830bcedcd323a0bca5267be1c8bc3881e2aa24b33390ea9e94ebe6b8fcfa820f1e6241f353e0d2c8f28657f8f9c244aa5609540e75784a3d156ffdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5d480971cb4f77a0e1b06c21631bf725a
SHA1327672874f37841c0fd5d6d42b95daa3a077f6cb
SHA25657ca65db1710334383f9ab6557627fe05000ff8ecfaa391db655240d525c2a36
SHA5129aef961702acbdf596412d58ea0ef3b029e1800070be16e025f17e9322088ee2e19b3b831735340d169aeea7f2292eef9c98304065bd56b3c49a2f34dc7f5e2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5233f131686b61b02449bfbed737c44ff
SHA1f000f549fb5ae7f1e014406014c9a61c46e66c35
SHA256e65e6bb2f801243736fa5fa3a18a38075884858882e161135155ce6fb87d85f1
SHA512e4084899d753f21958c50bf88a81bc625d40ad7c600e8efdec35fe53bfb5bb7986c1316c85d49e1d97190a0c462143ae65be480d62418f9acb185a6522d82368
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572ae1d6803270273e6814df8e0728f73
SHA11ab5643d07c8bf10c0b96ee169693158a8e752c6
SHA256644574dbb4b7bbde8009d9e471ea48cc5269337cf413904a653ba2a7a6e71ef5
SHA512e8e966b4fec574aee98f21f199ccdff6410aac3bfe14a0a8bc1627aae96ab602807b472acfcbd9e00cec09189160b70133402f1d817de85d1096a1d865d3447d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550908ca2cf7b521b73e310a1e883037c
SHA1403c5c7cc85f9681a79ff24157100b28ccf72cf3
SHA25664c559b604298d9cb4e33b541aa7e4a32a25192fef9c0fe9561f1cd68e9a1347
SHA5124a97bd58ec82f685460f391c3cf9efed9c2ad0d8e9fa22cc43594bffd60260738210650e8e8824804075cb1e3aa16ef66bd0a811314b7eed84898b18dd471085
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a52ea6697e1c1bc84b1f7acdc21d0712
SHA1dfd03159549570082add8c1faa24166e12d7928c
SHA25620d6d9749eaed9f7347c2671df2d23888e9b70e2f6f3088e62f918b554589e67
SHA512c171cc5fd8424167e68d29ac30ba36dff8c5327e7f5827add8446428700cea0e14c0ef7d7bd9d6d824c12127eb90c36f907e0dc4b814275fdcc71dbb31d923f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f53949ef72a6612685a819aea63df3b5
SHA13da0bb89715845912d3272723f3b95ea7b69e1e4
SHA2560a658741c0ad2b7f9cbfb0ceadc10787131670e270c6e032c2caf92c6eb024a5
SHA512a4961273cfb74f97d35bd5f36ccf85af73a955a6784ebebb518600e3a481484e2e83930d4df863e021b759737d0c5898d192d22c73cfafb31444c8f957f65be8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ac120a22ee25dcc15843f445751e7db
SHA17d7bc7cf32db700dc71a2727c17c2e99b9c878c5
SHA2568671f2f6a7b64a75f309259296c711ede4625a44a03b2983a02e379dfe3e8621
SHA512139a6798a877e310a209781c822bf710a1c7128335b414ce58f2d5cc8c9003028e78601964a2cfc41337b6977b9eab4179dc5e01eea9ae17e2ceafeaf342f35b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55bdedc53ec01ad2054cee055bc88367d
SHA178a3c64582c4f5f7942ddd8784dffa751996de4b
SHA2569997e7f365251c5f6642401db1d10c83a2029d7db588dc75248109637cdc4e3f
SHA512790eaf65f017be56d856590b7809e11ea54346fdbbefa0fc25cad0ad9a780153498cb7b3805524fa35c57ffad32f59c540298ee14261a76559b939d47fb7c8f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e63b0125bd6ae91456a4c0ed2350460e
SHA1f4b8e74fc9806265c8454c4af2902080f9bf016b
SHA2563165495bfda17f4038aec7cf05170a1f215fab3c0ed13fdd15cae65b3bef4f2d
SHA51265318758fee17d3d6154e2b69feab6175af94d733d52ebe9223dee7030de2422285cf38d394ef2f3dfff4d8e333abc440c63b6559ba9947e6a3c7fe86b491a33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9979c0ec979ab3f229a3a707e43577c
SHA1043d7cb36b276e441852868f596fcc798caf3a5c
SHA256165df3cf07d1b24fe417b866f976b37b62b2018534cf06f1b0fa371135a78e3d
SHA51240b328a4cb77757a2fa57787b79a04ef827db01e074e4b0ab3a7caebd2db25d9bc29a4f28464e1f1a579b2236b06d4f8de4c2b6b1868045d2def3daa0a73a0ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD560b908d2bb994dda3dd22e0a61115de8
SHA1f5d1c4dc14116517de71db5885ec2fed3febec4b
SHA2569cae8c5cfa69b54af58fd29734a9452ae9a60f64e71d967f156969b87d226000
SHA512fae80ee4e01b40ce59d2e85268f1e7926f21b0d2cf23dcaf8116316c2ad428498a04ff88929e19adb1b48e029d97f5c7759155c491c7672f5365c96461880a35
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a