Analysis
-
max time kernel
120s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/05/2024, 15:20
Static task
static1
Behavioral task
behavioral1
Sample
20eca195a93eb50c0873f1dec5e649db_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
20eca195a93eb50c0873f1dec5e649db_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
20eca195a93eb50c0873f1dec5e649db_JaffaCakes118.html
-
Size
93KB
-
MD5
20eca195a93eb50c0873f1dec5e649db
-
SHA1
e7fa76bc47df744c1a45a2a824af9bd717f37f1e
-
SHA256
cb99bb549f0d2a71e2e8485d0b524ddc6a24aa1cd7dd68005f277ddb83e7ab83
-
SHA512
9bbdb36d975c40a53050dde98cdf039fa10ddb7f06ab6134dffb3a28a2858045b5366cf1f81763e8af77f59498a791b4fda345891d54596eda4fd6d6d2aa58b5
-
SSDEEP
768:lzMGRNr6+bprZ3h0495mpeivt6nukB2Fu0+iWlUWYLVjAuwmamWrJaXSlqTn+WFV:LprZ3hbMDt6Jw/WlNOVjAJmEblqyWFV
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421257128" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{67A837E1-0C85-11EF-A6D5-5A791E92BC44} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1412 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1412 iexplore.exe 1412 iexplore.exe 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1412 wrote to memory of 2812 1412 iexplore.exe 28 PID 1412 wrote to memory of 2812 1412 iexplore.exe 28 PID 1412 wrote to memory of 2812 1412 iexplore.exe 28 PID 1412 wrote to memory of 2812 1412 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\20eca195a93eb50c0873f1dec5e649db_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1412 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5648c85839e7254a2fbc93f592bb7447f
SHA155cdd89cd957f4fd1969358ea24f6d68623faa36
SHA25620b6e820f80d6e85ed693c25d89059dce8eca4be24fbb2393c5c7c2fc409ab74
SHA512426874318871dc8f1011739836380ccc9fed292cffc4688a9eed74d2a3c6e0265c148c093db31945f8e73ebe8aed43ab2b0f936d3ed2bf76adcdae17e8c716e7
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5ac89a852c2aaa3d389b2d2dd312ad367
SHA18f421dd6493c61dbda6b839e2debb7b50a20c930
SHA2560b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45
SHA512c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD50a048b21a3f16c2645fb0157ff8f67f3
SHA1e26e6a1982ca7f889a2e57c06499dd1622b985fc
SHA2565737259b4c02c34e5cfe2740a946f1411150c5f4482ad3cd0ecf91c181403e30
SHA512ec3bff69e35d0aaaebda0ac1e3c23d801e365fcb61c26d48c8c8184070b50509bdf0e49e7d93bb6d4dd9880d12fa0b35daebd73638a0a2df29d803e97baf63cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD57819ba9b470da502543973f75650332a
SHA1bcf183f9ec29e33d45b5442822be983254b297a5
SHA256a51e17b0d19cf1bfb5219cacca8ba26bc8015811c8e9b37c7353e1b4f1aa4fdc
SHA512b1251954628dbc052669e2617e94fc1c80c26bdeac4aae5bdd142c030d8a9beafc5b6961696cb8a750c0ada86d500385a2d12ced8ba6042e2bb47cb65f5ca560
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5961c42ca9c2afe24c4286e1dedd2e168
SHA172465da23b9a231e3a75a077f08051a5943eae97
SHA25616484ff553e37997f3606fa89407753924051691495b854dc2bbdbe6e6df69a7
SHA51250b640343070439f7bbeca846d1275e514ad210d2baba3610f6ce0ac0eec6d0085eae79d66d3234a50f8b2709dd70d190843fe2e8c516633f07953686bb2b961
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5492ada7ae4fad472f0f1c1bb81ec4c89
SHA15447963e815b887ebd06d2513b7688d24d0cba98
SHA2568c70e81e42b9f13df44268c45d74e4ec4bab7002e04a3b6df64ef3ea6cbb2b0c
SHA512d60b8da43809272b1301f9a9433ee957764e42ce6380845de61d3d4021d945e121eb6c4a09ac0a121fe2144cd002ec6bbdb2e16501e295572ddcfc468a5f101d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519b86a66f3d3128e7fea13896a8cf7d9
SHA1f3d68976a2e8c2be0770dd269f6015a8dce99840
SHA256f516eda0e64650e681b1c8eaf9b39e569f3182ca3f107b1732dc4730a65ac747
SHA512a6f0c866df995f70f92ba875ba8ea8e035b06dc3379b4ce20ca5afd862f804bc36aee9b1895313c65bc93eb368fe1c5954f998c454536dc089a73038999d4802
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fbb8141bb42bf53e2c8f029619281b22
SHA106b537fae04384a6f762cd9b6c9d3d9b1531a0df
SHA2568448313f43f675552c5a50d3397aa5e084992b5426231dcd8f81d58ac1d91c24
SHA512b6ebaf778b308685381ca905222b4db5cb7bed42ec38e9f183d5e8c8433b73009333fc632ce9b7336653c6ab6e00ee71414c9594a9378d0186a9161c100e2be5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce4f97cec04becbb4ab042898c35b709
SHA10411e4026ada32774c60ce8aa8a04c15c3167334
SHA256cd9d67e62c84083607ae6c274053565c86fad4cdd2005cfb2c2f84bf947282bc
SHA51291a756edd6a4a3ad9ae87047a9d7c10e6070c6a8718cdb01c95915706954dad4aa1e8e05cb0722f8ea1166fbe768650012a07e3cacbf35883d82ffb2ef80fdf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc52edb294779a031aea0374b6008c98
SHA146d3cc25abbc2d4712f3fdfe957985a9a5fed97c
SHA256f6cbabee407dc55664ce80d6d8a30b5962b239721cd348ddcbe4e189dd63332c
SHA5121aab00b155cc3dae82c6342220064444056e82001384202fe3395dae6fcb5d765e634965e08f0f5b2f47b9ebc73300dc5a9cb59ee90db5a518891a4e1bc0a9af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0e487eb7b0c2900177ef5ace84c859a
SHA146e322f7f06cac4b6d9df8ab486b5b427248994c
SHA25604234a6604219e392ca215c85c5c9607d7966e57822aae7d85707014a160e1e6
SHA512874660921c67b569caabc9d1312abc07f35bc671d38da6250ebcb4556a50f86321a6bbc14c81d81b0fb5cded8afe6d7fbc5745d0328b1d1cbd0d87eaaf514aa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b22c1ec369351005f01a2a32c2878681
SHA1f29309207ce2b5b1ab5fadd9c5efa5c29f115dd2
SHA256da5d0248a215c75bad64c3b4fdacf2c3800294438f4ed38f88d5d5d5555c89f9
SHA512ddaeed0cc79c7e45ab7815383423bec361d799b666723758036aaf8f142ec9333c73658fb8cd7234465cb22386e84a2060552382ed24f1961d18deaed906aa20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD5a535520011c39b72f15a7357a496b4bb
SHA184ffbaf58e4b815311a377a69ff7798acfc7c0d9
SHA256c1161e83114f282717dd814028699dd40f63bad50369f22e0ff5ac25d9c65ac2
SHA51215234175df702cdd5a66a184cc6dd4ac410e1cdda9cd4da1a2f15d8249aa31e07febb4398e61c673bcbe8c4ead4ebe4d8a190f9b68f17911db81003c8f5476e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5c2719314a1e8154435c2e880a848597a
SHA1294183515e8009fbac1587df71c8c0914420ec27
SHA256ec5f7f5f3177e0c4c200a63411753b2f6a38dd8c6c1c2cb4d9487b4c786f8816
SHA512dceaffbf2c5bc794c918a32ee1c257f5246ccc29b7197963ebce384981761485dd24f1d4e32e69a9d841ee951b801ec2b43ece23e835362f7421b954e1d6c309
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a