Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
08-05-2024 01:10
Static task
static1
Behavioral task
behavioral1
Sample
228af696293bd7d5b93614830b0f7aed_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
228af696293bd7d5b93614830b0f7aed_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
228af696293bd7d5b93614830b0f7aed_JaffaCakes118.html
-
Size
460KB
-
MD5
228af696293bd7d5b93614830b0f7aed
-
SHA1
4b284ae9059424b2da21d77a1a796a628f2464e0
-
SHA256
71f96628a34e84e4837c12d4fc4c22699b11bb712b1292039e7b67790cacdb2d
-
SHA512
ab3d9a59da120f6ebeaccebd9f5b884217ed55c68f80957e96571525b003fdd31247323b83d4dd3383f5d9140b8ef4be7941272eefd1a29caebf285db640064d
-
SSDEEP
6144:SSsMYod+X3oI+YXsMYod+X3oI+YPsMYod+X3oI+YLsMYod+X3oI+YQ:b5d+X355d+X3t5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000008f6c6c168b370b7206f3254ce63041cfb5109d55a47fdbad817c38c729b955c9000000000e8000000002000020000000452d864a8219f17dbc566af38213c2a54b683fc3dc6cb7da7f2607cec90f9dd320000000c4e15acf24fdabe1e588f76ccfa3bf6ccd90f665bcc1b13aef3cd23a6aa6d26c40000000ba2311904eacc3b140013c632ca298860ae7a9e4f67e24f34603cb8977055984191883790bfdc1e16cda1a7cbe7c31e9c78aea73a8a8577ff521783c257a38a4 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421292529" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D595C901-0CD7-11EF-82B1-CE167E742B8D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 106214aee4a0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2728 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2728 iexplore.exe 2728 iexplore.exe 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2728 wrote to memory of 2540 2728 iexplore.exe 28 PID 2728 wrote to memory of 2540 2728 iexplore.exe 28 PID 2728 wrote to memory of 2540 2728 iexplore.exe 28 PID 2728 wrote to memory of 2540 2728 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\228af696293bd7d5b93614830b0f7aed_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2728 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e17882ce313f44c63b8eb3b77c6a53d9
SHA14fb74cee2f5ac8fe33b62cf2af04c68a2a9875a9
SHA256fa9431b7f4213300fcf95de7c3480658b8f73c756c5e6984ac11b485a194a5c4
SHA512ade25b2f1e4f3abc6835330b3d47923bc95ed801416d937f226dbef3097c086eaaeda8367ee5be6028e7bb6325987771042c4e7c6c8691ea0597b80845068c6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591a11b882669f069a9ab6a35019223d0
SHA1dbf0063774c5cab202e14e9b601059562eb7b808
SHA256bec2702c1f5c114d22406d6244f03d22b195abff9f6036ab2fe30172977b902a
SHA512dc7ca58f2e02a6cf31c29176b89e75eb659c23587ec8688bff144e518601a457a6763c7675b284bfcd4b92a7207d30c6664f03252a40e62cbd7eebbad25a9c6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564745e6d0451c057809f824d2ecadd5c
SHA188baaf72a38853667dca7d3fbc6b8c6028afd83f
SHA25683c513b8ebf0eab90b0a8b44e642ae959f704bfdf7c2d0812b8e019ebe864ff0
SHA5124cbfade456c0bc1f5aeec8bcea986f220fe4f3bd727c0c061a09b5e79d571fb6f6f5b81e386d67b97d29b75b5bf5c3bb337e8230cc418e52dfbdf671f616b892
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5490d04749424406bb910a94abddb9bc2
SHA150b651cffdf9e8c6fc2c0e90e9aed2c70318175c
SHA2569ea5d0a40701a301868628bf81e9a1c2e6639cba4500197661e07d2d72ca4272
SHA5120912b162fd8143d829a1419ddef01fe08fdb7429ed12bbac1f92330df486a78a5a0239cceea0e34fe54ecb3b9b4837262e6d20bc1a8c6e0b462a6c18e13db6d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a6bc47298ed7ce0ecdbd736da45284c
SHA1f613fb8dcba95c85eeb09f285a0cd2442994d061
SHA256b16e73d17b76b841b7dbb7144dd97f182d699933745524e47e2693b1dca2699d
SHA5121d521f550312a5e5bf0b8cf9b43ce3996b5c6e9307da3c8c13bbd1a17824406c885356e6106785aa62de482b0e929653d0b91bbd554a4e938dadb0570c7adb35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db87654a759791ae53c1b163965fb8c8
SHA17627fa2dbede82affa4fda71098493dfadf193a4
SHA256e70beb2be516e9a02dcdb8c2493a25e21c8cc7aa7ba64289db1186dafdb0d216
SHA512c928f3cdd02e02bc403ce12b73680bb1eec2e79671b6b4cca9111d1f1b10dc543e6e290a5ccc6473c7427d3ac9d2ada4e0736ae19d6488f613ee9419e9a12512
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e3cebe526590a85199d85bc876b70b3
SHA164a0f232857f7fa77b483894f42737ea07362fb1
SHA2565968128ea18a7ac6625995ca713070461dfd7c48a757a2ce8adc85c6d34f647b
SHA512b003d7618c0ed2dfc3e329d2d839f284319c2e4c5d23e8080bbd6b69b0b8431f44dc7435acef8c57abb04703c57509ab9c82220583a38074ceb6cbc417a861f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b251105e01cb8bcf1cbb434e49bf5b4c
SHA18ad702eec3b114e80ecbff47e5bbaaba7d33d23d
SHA256f8a6d72fef04a5f1b8f39d5a713d6c2b5e18eb76300a34d27eb0736a4136c6e2
SHA512ba258ee896b4449977347083008f89d9500857de13e0e86052ded4d81bc70844924039d1764325c59ae4607d4fd1dfe8fabe60e549330708c0f98863bd4e4c8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ee0ae8703942f971e4921add1be68c6
SHA1ca11c5d57e5b2bed41552de32bc65eaac840f5d5
SHA256bc112a7be87eddd648c64256c2b8a4eb1a8b4c9ef3a0fb60d78c4442bddbcb5c
SHA5120e2269366b98b5d3b034e696bfd7aba7fe24cf0bf56e1404cb110eb29a4371d04f3ec2b36762c5c64d56bdc4ce220d1c40bab01ddc59351aae268ea1c4774962
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3447369b68d87c476453d4831c676cd
SHA11d963f825be4fff7717c4e60573513bd00027992
SHA256dbac63e4bc125e40398a1f5a01b9e2d568ef353cbdd04f579efac645b9ca2390
SHA5123e3cc06ce6bfbfe57340a0e577191fb4c7e13ec118982a9d616855daa5c96d990292a9f71cb556a18d89e725b1cfd98a838ac58325c2ff85f720a8cb762c26f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c6e992de2944a74c3bdcac88968ad18
SHA1e5b4d626e097eb90bca308a6140a4474397e3e60
SHA256c5f671f66b354dfcb2589d0e2930011cbbfaf9f84a0b5cc82d2ab4092178abbe
SHA5123759f73661671345689784dbc99c60393ba26db50c5e99cb71bd5235c30d9dec7445fa0f74b522596ca0429a330b7f30d244388adc57117af9be434033c54de0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5acf8a06b0996c5fd4d05f90aae49f5d0
SHA1adab31cadaf8c4a016388d00ffb2f44d00cda7f4
SHA25684fa469b08f21d875c31f363d32b7c3b20700a9b536a831a5404c2d781c9cf8a
SHA512a16ee29a1be3fe77bc9619859649869ea2b6c25c29cc9e9fb22bc60a4478120e38ae2e8d49c73ba493eef604b28d17c0927cd03e1bae952281aa0b0e5d6f6f24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507cca5d69eea9248ea704f3a7b712627
SHA1ae6540a1c877afb0c2575e613c2934fdc5782b1d
SHA256054a35a87fe2be6dc567a88adaf523e7971bdc86b9bb7ce91427bac1c386648b
SHA5128a5e9d04b2e74de610e0f0a74f89ca105cdce220669b6c72b02ed81e11b7e52b8806d2a710609394800335d7a7e77ef8fab6b11f817fc8e3077e058d8313876e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580cf288ba866e4dc891a76195b81c0b7
SHA14a870d51b58ad46be585693d502adce2aa901ceb
SHA2569a26b84776ea1f9941991ae19144b05f5a105d18de56902ebac54d643cda2900
SHA512d3a5a50772ea42f81d6f7796d5e627b0f53a752498b5934c47b9b6e33756f400f559e3c9271a6c77883adc73fa86324bfb7970b614b72294f278b3f2cdf88620
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e108f2129bb03bdfd50c26ab98999060
SHA1b62d9e8c7fd9fab29401eafb74cfb49b8956c910
SHA256dfc47c58418c77300e8d9ee8eb2c427bef85147fe4c803797b1a35a0147254c2
SHA51255f4fae5d49a372eba01d897c0c85d40f2eade7dcf2d400b7d3be5d2e051dcb003b7e9a1a4d89b4fde4476fcce12e46f62b1ba3cf7b6580d4c63f33ec27bd5ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1945680f873c8b0783f084ee817cc6f
SHA1f36eb90f39db16f42a4c80669b041bfacdf7568c
SHA256a729c7e754f34c29e40caf43cdef0b96abbb8d6c470aaa428d84704f85306c30
SHA512a8d156223b7fa0a3504b8a4a42172041ce16732f06c38c24659a208604484e7f233891850f86fd54de3783df310d051ecc3cd5456e155cf3e87ee8dcb921aeff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508cf510ac5de4341b527fb332f4f7072
SHA147e6eeb168e07bb41ddb015d090e664254fc11ab
SHA25618f82408b8daaf70b5f88fd4a3f82b4caed42e36b8ab7e3ea0e380ae7152c07e
SHA512e6bfdfbaf7376967a83b54bcbcdaf6307a3bbf7ff20a0816ef1a6b6b861f4304217ecc7eb002daa77bf2a14b46741fa6e5d4073b4b1daa62a3754e98409ce357
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56820fe16614991c11451a7905660e0a7
SHA1e8f1c19427bfa43e64c2b590d69272bb0ab03ac5
SHA2562f47c59c4bc29961d11b2e4c321d47b71beba7712dc39bd6478ea72c1c54466a
SHA512fe0464d0b90e11670ce91462fd06bb45477413a3b894a041fcf217c2a971dab85d70a01235db642eb30788a8c4049f7402818749fc92bdb8f047351869efc798
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5adf55876799561d2d73e2fc10002aa36
SHA190272c97cc4fa63040276e6a07ce3a36d8a21fca
SHA256a0dee43a4bebe38af0ea49dd674b1daf7505c8929de2031236663f2d455bdc77
SHA512cf94e4030a126ce9ca88afaa3be5bf6b5a4698c575307509e9f327936f555ab460408f6ccc57f5641036ff6f1d01f2d22b12c639206da5a8b328360cb2b7c648
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a