Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07-05-2024 18:53
Static task
static1
Behavioral task
behavioral1
Sample
21417cf88853144293fe516dc4139dfe_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
21417cf88853144293fe516dc4139dfe_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
21417cf88853144293fe516dc4139dfe_JaffaCakes118.html
-
Size
18KB
-
MD5
21417cf88853144293fe516dc4139dfe
-
SHA1
adad014ab9e719058eabf4fc33285807f6987feb
-
SHA256
a54c795eaa74e48f824f81d3f5d4c7e09c8791ceb3d468a74229ba877d9c1338
-
SHA512
264a6020ce61abe7f2e9757ed41b40302785ae8c6fb24dcfc7e12141585d8e96bd8c94bff4cbc604b613aab6a8423f80b8ec68269f3f031266d476f3b2b186e6
-
SSDEEP
384:SC+4kEiqe5pFx+hREyTTOQ21PXSv0wCwHhWJ7fmW1271Fjp:SCvkFpFx+hREsTOQP8wpjaiTjp
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{247D6941-0CA3-11EF-92D3-66DD11CD6629} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000c7551635cf4383fd79da2ecc2c30c1302f23eac67cd70bd6f23ed183063cf482000000000e8000000002000020000000b4bca8d593203ddb84578f1c3ddcb59e91115d60e1bdc0e8e397412cd0deb6df20000000b25294476a028c23a57e1f64e15f51773ad1854013cde235b12a4d114e5f7bec400000006ade69f468146f1d8ec016d5711530665aee7c481235234e67a9ce8cf004771d1f7af82c46d986206f014c460f47ddac1f94f8f361f40366c581e047a4c223ec iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2054db37b0a0da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421269898" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1420 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1420 iexplore.exe 1420 iexplore.exe 1448 IEXPLORE.EXE 1448 IEXPLORE.EXE 1448 IEXPLORE.EXE 1448 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1420 wrote to memory of 1448 1420 iexplore.exe 28 PID 1420 wrote to memory of 1448 1420 iexplore.exe 28 PID 1420 wrote to memory of 1448 1420 iexplore.exe 28 PID 1420 wrote to memory of 1448 1420 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\21417cf88853144293fe516dc4139dfe_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1420 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1448
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0067f1b09322a77702e91bb543434f6
SHA12bc4730e751a9a62ba532b92eeceb1e1da0349da
SHA2568f94b754de2d912383cc122b77c7815b1afa41d79547ab0c43612cb7e9e17eca
SHA512a41e86d9aa47433d965cb8707b30aed8ea75585aeb5a7e26efd4d2f98937e6411d65e394192a158650e438c7fcf0870703ede002ed497c1cf8c2846c195bd8b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fbd1ab61ca09e23a8286bd5be66073d0
SHA10569d34bdbce8dd68406419500b2e84d89537d5a
SHA256059daf2ec913c619f3ed4f1c51b5592a6369f2db01944e0973f85fccc2da3479
SHA5129730acacf8a551d03f7b3fdf41ad8a851457c90d44e309e6dfaf30b7ab425b379e8c8387f50194dac8dd1a960a98ac75672ed47d5b6fd2cd86fab9274f7da5f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5186c0ee7e2d6386e126aed06f6068ae8
SHA14188f8db6366d53463a7c6cb4e8577a1657d5136
SHA256798cb99bc2d439a0507479886fc2de7596fe54e12aabe68aa93fccc064670025
SHA512e383ed697eab2f58de5c84037e1e00e2927aebf3e5fffc4b169218b6eeb43f0c18e498ca007a3dfa940e7d3bdd7f192a10ac2d52b8cd50309ae70c3ec75f1e9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c2589625c97b49b82abf8d9a2d31ffa
SHA13e631f2c6955c51499cbc282d83da776f926b370
SHA256370f9c58053cdf65e3b2a9086629b299adb44a5d6e1c9f04102d2749093d3232
SHA51258c6bc631d5136eac90600625ea9333307ec1f737c06e5eb74178bad3f3c920bb379fe2e7a9eaec7d8a59ff35870834db53d0d0539b7a208adb9803d1f689680
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50730d9d4b6a3c8fdc80735b534d69d86
SHA1b14630cdd04b68c993ede00278814653c924c963
SHA25650286af228f81c22d80a882a3f0a1229ad042468d44b3d09c863c77cfa84302b
SHA512c81576f6fd3120a8cd964394465cb29975c8b85913f405be532abacff0f190ee7df4281bded1125a85e85b65dd48533b1b1fcb4ea6efcdd8530c4e041c9a4117
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db7d3d12fd56e7bb4ff359837952b207
SHA170ca31b98ae5212b872ea472565f00cb9a0f1c0c
SHA25679eb42c5fe9f7c9319da8ec744c874420b3b0715a11cee1ce366521820b52dc7
SHA512e8a197ca5b7071549ee99a1166af13da8cc9ce318d3d4e529a08850fee1ae2a2e545962182fabcfee897eee148a73bf127ac67d5228a58c3f5ea6e229ed9c381
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566f4d1df6120370d68fef7fc20d5dfd5
SHA18bb9e594cbd1fb07b3f6aa5128501ffe6e99b2be
SHA2565fc3223417ba36fa7d872c1f230e5d4b9c1d224b48a391ad9bef42a0a1c6af16
SHA5124f6867c2d4cbef555516120ac8a74eb40a5bebfba7d41db04e0de223240ebc029909d245470306e61be08170c964ba51f08bac0d85e7c8daf24c1c27eb1404db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1ec9a173a686314de9e75f413bbf4f0
SHA18b13a5cf950cde86f683fd7de8c49884ed4bce17
SHA256701afe80ae7c7b256eb3c7ff13b3577e309ba8c88ee2bdc5dece9159a4ed7b06
SHA5127bb6d8ad40a16f25ddf4280ddfc1f3fa655cb1370bbcec6a24e2ed3c3f2111e12ab9a3b1378745a3142bca13a701dde5a8e2202e34ef91375646efed57a40e76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc68332892a2c3c667f4a474d000601d
SHA1fe2cc56c1887caeddbc8fd50117f4407d511f657
SHA256e46e012f7f19c36b9f179ff5a1153ed3886c0d48ed0bc9e076517c7bffd52019
SHA512f69dbef432ee1838ae77b25be818daea90006e4d65f939c32d7bb0ecfeeb9039ff1910d3cefdced97ab43596b5f26e8f8ab5571201c2ee8b753d8c39ecd37d7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57556c746584ecc0a82e32ee489cbcda6
SHA192afb72eb3211e039103d21acf4603052423768e
SHA256c6952c918ef2ac14b8e8d32e84f27df7a8463557332525661018b16567a2989d
SHA51237d7cf9d8e2c95a7374677372cb92408c55bdfb0083c9e7617052a0892deeae507775195ef02942f8bb9477b8bbb53cb38f67ffa58a8809a9b3b92cffd3ebe9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50630276d86016d11beff0123117edfd6
SHA187ab6730946608208260558a30eec48210ff72da
SHA2564be62aa6197cf689c5632ef0f5d5eed67f5aa3c92e59c45140dc8098eeef429e
SHA512d3fd11a035cf8a5a37571acaccf1d89690f18676fec38a2c241b1f81cc8ba6ae33302ad09cf9b5c1e0b97aa78b0fa4d5b6670c9371cfe4a88f42f2511ca4cb86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51df151fff717218cd89e1324230c93df
SHA1c8eaaa73ede10d69b18d2d3d0d67d97269b9d6a2
SHA25696ca9a5eb1057ea64a93fb0ff36b5a2a5400768618fc75eb75f28b22d40f80e4
SHA51257fb7c3f1d3cc1a06f41bae10684b5838d506b874ba7786d21bbf0220c73e34c0c28a03db072d08da2f3dc405b90d645a6f2265df113e372dd1b6fd3f22375ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b6e28ceb70acbccaf1947f51d19e281
SHA1020c9dc5d9ce75c2dd545895cee956c834a81955
SHA25688572873de9c8c0444f9819f8367479801a66671925eecccea93e77d219b0d01
SHA51240fdded47c34ccbebf345fe7309aa04282538eb705c3e86d85558000b726a3a2dc1d4bdfa2eb4b4bcaf7a46190a0b8f31c6e0283011b810751e4b479adec6c88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c7761c67e34b63e502279cad3dcf561
SHA1093f96d77858e133a4ab184a09d31fadbb01c345
SHA2560bf5ca91dd58978059747afd22b1e7b7883c5aec095a8919073d6c262b5901ec
SHA5122119ec69987553bc1487c8dafcadafb2597bbce51be170c663cccd9ba28f4671494231b2661a2224d28d197eb2f6e6ebb0c57aba7f4fdb11b433ed4fc63220cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536ad1e35acfc5b4fb1b767c43d394074
SHA1da3034b24cf5d808f83512ef4bd443b38bccce7c
SHA256d7b95cef68e28767f2afa7539e68f86d9d8071d8051bdabd18faa485d49f5f88
SHA51208c0a278df7be736ab59f207791b357460fe2b9186110ea06020d2c033d67de50a3e6537c64a4dbd6382d4734b02b053b929288032085726ecea38c6d289548e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538917d2002088e004a3148123c0b5c34
SHA1c03841743d783622c476869b8a64e716224fff67
SHA256df56294430616c98d7f87782e69d2ebf476e7c15de65f5837d94ac3d2537f3ad
SHA51213e2dbd44fa3da27f80ecc7ad569a3fe8d41af34a6f9b31578fca8d188eb745b8e2b76d8faf8d29ad1a64605ce38c260be7a3704a030fc171c24ebeff397a2ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e33fcd7f075308480ca414d82432f617
SHA1cb57f27cbbbb83943b70bad2981bda3ee5bf5828
SHA25621fb01f591b5245e74c82162f76e122525de48cf5b1cd68748de47952785f3a8
SHA512972cbc429d0e7d9ce88113a9bdda24d6e609131ab06165ed3ddff491187cf925eba78b5dec6f269cacf7771968ce58388342dd5f79f6738a5cd254dd3532cc69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a43aced9b4361e182f707f9a76f90a25
SHA15d1b2a5fb6f19e439f9dc0d4f994088c1e919aab
SHA2565c4182aeea1933dc6ab151961ed1fd373a631710a2f2da722638080ca9a818bc
SHA51243bcdac6c4ed46eae7b801ba349bd6b3ea119b03ca1718401c2e8b7bd23b0b8e90898e11457f7a2bd787ce94d08d7cfd26fd38d6c8734443c8c0f9dd63ce9084
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a