Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/05/2024, 20:55
Static task
static1
Behavioral task
behavioral1
Sample
21b10bbb7cadff9f124bc2925d58f517_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
21b10bbb7cadff9f124bc2925d58f517_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
21b10bbb7cadff9f124bc2925d58f517_JaffaCakes118.html
-
Size
460KB
-
MD5
21b10bbb7cadff9f124bc2925d58f517
-
SHA1
3ea48d2587d93d30ee0492de798e81275cf0e2a9
-
SHA256
839ce3fc487e3d42e1d0f1b1bb14f33045343014dc9ec6494937da01b1c5aad8
-
SHA512
fdd0edea4d6cfe962a11d9ca73c614dfbca76b99d4aa9efcc31d89ba6f2d780fceefd5af2dc375afee2b4d784f3ddc6d070c118d6823e1473f5e9557c204e30f
-
SSDEEP
6144:SbsMYod+X3oI+YhsMYod+X3oI+YtsMYod+X3oI+YLsMYod+X3oI+YQ:65d+X3X5d+X3L5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70ae5809c1a0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e0000000002000000000010660000000100002000000064326b190736911001819dda2e3e6569abb27bbbe8d5f7c718cdf5f0d91b320d000000000e80000000020000200000000f71a4332140c264cd3716c9cc49c59a5bceb6f1be1b9b3f8194f303d811730920000000675cbcc8728ad055bcb2245864fdaa2937245788caf55f2694371078110e2fb7400000008e5c17b4a7d622dcfc7bd996fad6679c92ef2a2152a7bee95558382d8be41cdb341058b174a69f72a7de239280d6dd36fa6ed403c65fd682e5674deaaac93103 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{30C26EB1-0CB4-11EF-8303-EAAAC4CFEF2E} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421277220" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1460 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1460 iexplore.exe 1460 iexplore.exe 636 IEXPLORE.EXE 636 IEXPLORE.EXE 636 IEXPLORE.EXE 636 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1460 wrote to memory of 636 1460 iexplore.exe 28 PID 1460 wrote to memory of 636 1460 iexplore.exe 28 PID 1460 wrote to memory of 636 1460 iexplore.exe 28 PID 1460 wrote to memory of 636 1460 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\21b10bbb7cadff9f124bc2925d58f517_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1460 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe00d1902ab83207cd75099c98023dba
SHA163962cc0ad55c5374111d846c7e2845a93864a0a
SHA256e2283c1f3869b126caba6e43c9d49fc5f5aaef410730e80007c15a35415cddea
SHA5120592440430896e9c7f1fa48e41342eeff1afac7b744f3d46826df070c9d91dc19f06a6b3fec01e9cc305588d19775315a9b838edcb33bb208ecef2ddbaf487cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd4e2914127fab49bcc4c2000bcd452c
SHA162d441701f3ad1e66d4cbf2addb67f08f9294951
SHA2563878b5680beb8429d54640738b31fe4b0bcf990faab6507ba7b2844ad964f906
SHA5127bf59c3b80f2406325f5483962a104dc797d0d8369e5ffdebdf9a7fa3ef171b797902e49eebf19020ad0a56667ef6c17e7a4d91cb46576a98f637dd15d7db62e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f70223fd7720496c4ea00957cd0cef41
SHA10a07f2563047ae53d7babec7e316b5380d60b843
SHA2567ec8b1c0680d1cad4fa1c111f3cc1c9a2afa29ef3084a9607cc7db2e7573ed9a
SHA512504c7ad3873c843485ed05cf0d6aa4b21a3f9dbb6d98998f531fd1b1db7774967468db55b38a671d4ce617c9ef91aa4718ec1bc022884ac4f1d311198b515c0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dcc3e0a98234d9101aace7be4ce82b37
SHA163e108839bc4f03539a83670e0b4bff930fd1712
SHA256f58e51e59f985689fc749e6ca6b4c3bc93af7ac62b2672298fa2441567c5ae26
SHA512b9a5544fc594eab519c37b8b9f16f657c090975654f23afbbf7e0eca77af3b690a0313576cb2c95ff170930bd3dc70adf3154cb3308de1a32c0ae0be9bda58fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d9092f4987faaba4b82837e84c0063c
SHA1c3a4d054c56da255885223257612ad5f0f67a00b
SHA2563ddfd66752c6850c938fec3d6e7aa2c5532e874d34c67723b7c6b2d9f42657fb
SHA51294f29eaf2f09b939904f546caca13a6df4ce575852f1987be41d4a62cf8365afac43316889b7a58625510ba886f53266299f6130997ba578975d6c2121937b52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6f603b48ddbc9e712c052cf396b5e07
SHA1b2e6503fca76b8b38948d10548e6b5f91463fe8d
SHA256ee7fe158d7d30ff899bebbae0845fcaba43685c1083e19763c154bdd8548f2be
SHA5120248c0f1ad4ac760fc99a3b8543c12fd97322b26b26221eff58601d808d43cbb5c2663ddeabca408f5bd7f53bdb712521c2913ad8e246c5daae98c858d988d34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513509500adb58850dc60d0911d5aa597
SHA1993dc4f51be53df3d657d9b5e70a04f6ddfd9e1e
SHA2569d5ccd89c2e769c6f460466c0ff29e927c3baca3c6dd8ac1b8af1e4c11881acb
SHA51283870ea4321b0e723b913740d8ea14dd5f0e70f7914e35f288c7e7bd8c38729459a776b412887213d930efddad1224a612f186804079f9ef0854e744cb14c80f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3ecc657fd6f693f3584de1ec7e90904
SHA101105fd75e32ebd833ed059a3fc42871fcb47a6a
SHA2566cfb000aa6b556eadc187bfb09b6cf5f322b543d7dfceb2a21f2234665d5faa2
SHA512afbe5a087a15ea7b6c56624307ccb0d1d30b710208d11daf7457951da24198177811fafd104299f24c03a9687eaa1227e22542b8dc2c7381c4fa5d70ae01d70f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5c20203a535c5de66e2072e1947a2da
SHA1287a1777754dba799c722c52b3f25b3810dc5122
SHA256cc08e07e2f438d9b46fb69a379d1c762197eb59ab6131d83a10cdede0dfaa538
SHA51235fd8ac71a9f6c2c5187bae5e75834beca16ba625774d9579b27cf2628a038526d12bdf668eb3726f7ad7d1d51860ad0ce3debd166538ccea3f23318502728b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c0f4e3ef913537fc0f613de56a06a5a
SHA1021c433c3fd075ab0c9e6ad761493e2ae3fb89ed
SHA2565ab1bbd78aeda86a0542fe680a3abaf1837cf9e38f75b7bb30cb8353ebb80bd6
SHA51258e6007e1d1c7fd9df434e27fe78c3745f8f6faedeb5c6d1d5cc7de961f1ec4950c9978296c3b1ca6823893492deedea37cddc218aab084efc0a38dd36fdcb8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb1c7323dd70e410b41b981d3f8739bb
SHA12baa6ecd9aad46c2cce5a8511e0017b663d68f53
SHA2569673aba4b793699e0680f91ae2017b66b6379587c522b08577088c4f399e8278
SHA512a7670786abb69eff3bef41686b824b211852ac1ae77a2c9b2d5bd13ea6edc0713f9bc5bfe6b0ec31805f84c000db335b1dd03c92b9d9a6f28d077b9fc7cc9632
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5653485cf21c305de2a4c5bf504979a38
SHA1f002b35122e5253ad2fd98741b809a299137bab5
SHA256fcca829d642e80cf50b196d46cc5b63cedc9a89adfe74415732907396f33546d
SHA5120f0502372ad37df1515d3e83e8496fed4eafd26f272e7c2064bcde36a5c6a622df11d5a0a69b8fcc2482057ca5ebd45f95581b1c897f8c651f8bf164f955123e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3cdc6f0985f16fc92a61e3cf53344d5
SHA12134710deebc319986f582b6afa4f6bc4ad24050
SHA2563e9947e68df4ddce3dc6e1a1d8cac060f64c05a11e319c942bb40feb17a1f3d7
SHA5124983ca275eac9b0addf73c78f192a23b1018bbecfc834e4e3546424e83b0aca8481812d6e9d50c0a0e2c1e840e3e8adeb0559e6c2dd5bfe21497946a02ea07b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be759ce39ffc8027260fcdfb9853827d
SHA1cf9db74f7bd582bb5c0ba924da58f367f4530392
SHA25662685d0164c2ba8496e677976921f85386a8f82dc622969eff18d12a14099ab5
SHA5123b40329ee1c8b7d7a952253794993648bb1217cf88a7dcf599ee461d90e42e91d2f1fcbdb69c9af3ebd0fcd81c635ff6af750c3dbba7ba3eb7ac99c9cd670406
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c4f6c007826d94f7efa58c66a4eb31e
SHA1f9b7a592789b96c54f7cb52d857d3858f0da677b
SHA2566249574b8dff9c5642c260f6bd90dd5bfb5415e6aa4bbaef75fc24599247ea7e
SHA512e021a49a8d1f928ee25f064b3a86628e26fd0830de69ce064df71a2b7d60f2effa1596ee48bf212ac7c526f98160060a7c31630f106122176bfa520dabb68bb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517c52561892641cfc5628a65758d0392
SHA15f75af130759cb6ec5b84ab31af87f35ff0ef0eb
SHA256de3d694293c966eac394660f08d257b6164fa131c904cf074f20af259f839228
SHA512fc423e46a6cdf35523933e93944836c2e216bf907d64a959c5787fc75684d4e29af26d7a35b268a51b96f62e753a2dd5c52b6b9f14db9c6319df5fefc7010896
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562dfc9d85c3054a03c65698f1b278c03
SHA1bd57de6efe2c80c99ce6bd00d380ca0dc31c02cf
SHA2566a0404cee89428ef9420fbdb83e6e4b5ef56ebc68db0dff4147890f614b91a21
SHA512f77a1bb759d2a05406d64107e3db35900adbe5b8fe89c32d5c30c998b401126e6e5673a83d888e85c45522fb5d119aaf26c9a585a9f685a0e7a46bdfa9b98e19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e2a0ef62724348ac576bc1b59455915
SHA16cfa64c661b29beca8ac8cc5facbfd74ccf98804
SHA256653630ff2de8a67ecd5820979062232f1ccac574584caa4a8b898e9571a5a04a
SHA512f06d0cd5cb6e5023ba23552f74725c7242349bb1e2095a9ef1b326e80c33255408f484f7766112f8ef1d7a683d408f5dcc9c15f01e88729fa57786beeacdd964
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a