Analysis
-
max time kernel
126s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-05-2024 03:54
Static task
static1
Behavioral task
behavioral1
Sample
23153bfc0d06c89d1febe305eae981b8_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
23153bfc0d06c89d1febe305eae981b8_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
23153bfc0d06c89d1febe305eae981b8_JaffaCakes118.html
-
Size
38KB
-
MD5
23153bfc0d06c89d1febe305eae981b8
-
SHA1
6c439d8bd46a27dd987f73a4477dfdd06c202968
-
SHA256
d70fdeede659371a8340ecbf7a1c7a56e236d319d67fe9af056128d9701d90d8
-
SHA512
947e742275238f3ef691a9560279613b821cb5ddec864d936f45dab4fe418e45b38a417edb73ddbb7ad8bebbbdc0999c67bd86526e03698659d8f9cb04520cc8
-
SSDEEP
768:TFiSbE1bItCb2vbviDuX/u9bFupK3JCoGeX01Jt4JWYAX2VRw5wFsP:TF/C0tCS7iDuX8JupK3JCrdZZGOXP
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000851147e5e5a91303654e06368d25184a46d2e3580d18ad6ca6c42c7dfb6f8309000000000e8000000002000020000000607a3549db712ca54b85a63df29619a322f6e4181669e9fdbe777aa19d87c49820000000e312aedd30016cc2ef1481ae627d99fbe616031f0e26c57860c71748105a5c5340000000bb16e76f28fe43621aac36c302d7aeecb33eae23ee42da01205068630081250dd34e062135fbebb6b6b9598d07c6a81e186fb690d0ad31541141c48d69a57ece iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AA7B8C21-0CEE-11EF-B1D1-D2EFD46A7D0E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421302335" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 806dd681fba0da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2864 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2864 iexplore.exe 2864 iexplore.exe 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2864 wrote to memory of 2860 2864 iexplore.exe 28 PID 2864 wrote to memory of 2860 2864 iexplore.exe 28 PID 2864 wrote to memory of 2860 2864 iexplore.exe 28 PID 2864 wrote to memory of 2860 2864 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\23153bfc0d06c89d1febe305eae981b8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2864 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD57bf2e747f737d7f98c93e5d09f0a2988
SHA1c20c6320985de34107cc388865527736a8f7c127
SHA2566dee24b4752f3e727b6294c1c6522aa41f9f98c48b06ee98fc8d806c3818815c
SHA512cec02047b249d304171839a3b02416de571b2533d0df3bcdc3a398c2f3f327fbad24ce7dc4723e5b43c55e48e8d6b1351379d286699d9b83fdbcd6fef6c95842
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503aa8c2e0d912d8a51abb086883da7f6
SHA1252205e5bc22b4e9a799c84a8950eaa48ff8cd32
SHA256f55f7d05ce8b9348261844c402701a402781500c9f2795c2b157baa4ae35bd19
SHA51230c31f82d7d7389e53dff26d3544c5f238d535c923aab733852b34158db57c2d6f14e812557a29d514f74539e7ecb1eead1af21f7e27a6d7ad3c2c38099751b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518a70e22f4d2dc08c988ec42d5381e88
SHA1859cb641af2b555a879fa77ba7ab46937a8f250f
SHA256e6ba86541d21f1378bab031c60d70fd27487d3342f4a49589a5403aece34bac7
SHA512cc437d50d42841e42d6c8dcad7bb05c8cf754dbdcdffc563dfd0204ab52a73b3cf3c8764ddd6637f7cde352eaa2d42df2419e3841bfabdd8c1e81ddb33ec6a43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591108fae3368a90aa67fd3e496fda537
SHA16bab069dcc99f42e26bf6ce7a58afa4dc8d75f0a
SHA25674f41bcbba0e36d98c4bc8be9d9d9879875fed68c3f8a59ca49e7e1832928b08
SHA512e314ac3e04218c014efe794cbf5aa3eab68875076ac2bf153003010ccbc57e4e125b6dc2e92517bb29dcd8714f8c5a0a23ccbc969dd4afe4cd8890bf1056f9a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551c4f705e37ae3c62b7370ca4901bd27
SHA1df131afdde1b8f16c6594bf596ef6526f9b6e4b6
SHA2565ba4abe3aecc1e6e68f224f67f1f9c43ff24e43b991e098966489e87d7d1b216
SHA512a42da75574e46a6243d530c4ec82164cfb5e9961e49eaa303d24c431ef4f34be13e78f10bff01630dccc420aed59d3bc5c06d68cec57d021c97ff12d1519b4fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a0a14562ad52753738b42322eb1d2b2
SHA14d2e47bb6458b01fba121bdc813e79e287fb8cf5
SHA256df7d7c009ca9c7c904b83db7acf8ab3d012be4650e5e8f7fecaab0ea902a9fe5
SHA512facd93850f24f4c029cf503d858b58d41de03add08dc4aeec2c0c84b82f4b3ca7a075093f6a0e9943b929a10056b4d445fbe0d9f4b6de25087c016ce840d309a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55bf638eb5b9d63469d8ea9af8f7d4db7
SHA1952c10b5a51d58c1947428e5b364e7ac31697c36
SHA256f3ef5351ff365cede7a7b655ffa2671f283afdea19c9333e5e0c16e6af419d48
SHA5127d86ff868bcc7934719634a019de56262e7db8d3b707d78ed2415fe0588b5ee52798d6859f259566ac60621105385e50152afe1915c59a992721fb85c35eb85c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5352662ad40f6dd64e48023050bf07822
SHA178eca35fe5e05e433ad76eae55f8869aaf80c7c8
SHA256eee07466b23d18a1172a3c41ea49f1629803f98881055ccb5d5718ecad9ada1a
SHA512c4cc1678bcd12f82851e17e85aacf63e2fb1c9b391f0170f393408ca1cd56fab83b4f87452f43bf05778b9756e9eed05821c643c1c5292f0be3f72a9cdadd2ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c26bccd3010f80d7c36ea17a6bfac0ca
SHA13b984419e06fdae8f5cadf73145fdeb871acda7f
SHA25664613cfbb96800b6492031533d87b3fa055b8454a70107c1e701f0a2fa33b8cc
SHA512148fa1c739d66a0e24b5c100fba9c9d60661d55cbc5a22ed923172713e0bc9c218be8e107db68897cc7eb0e84b0122dda5fcaacae7e16f858b65afc9053f4fd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d8887f453a318139213318073c2a10c
SHA11605855b42c96423c928698ff95dbad36f6f5f58
SHA256afa078db1b30868faf9eafe44eb8395ca77e44729eaa6773d9b2a1d68702437e
SHA512d9e8e6bd9653e77ffe86952e0b8d042a886974bdf0ab4883100cb038796266a4aaad4450d93f40742fc0c9ccfaa2ef709152423a073298ef83d675161a6db174
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52de4072c2f826049ff1d04372197d70b
SHA1d1d0d2645251b3ac5c9b911c4d047ccd54521687
SHA256bb2156778f41ee09337c8dc16d1efc912f376d2d29afa1c6679655e010679199
SHA5121a8d0832180629d09faa022375908af27cf930aba57cdfb94bda73445241a887b2ee0714d47632cf7573e202579333c1ab62813b5f291ad0377354bb98105afd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD51b0bd8b7a3a07e4f8f31faf687806602
SHA166a09d13fc688b83e82057ccc1fdd21ec94b8f2f
SHA25658f2d62316024f67c5fb5940f42ab9955183a49f97226180d8d990e29257818b
SHA512bd430604bd8c5c12285e2272e97fb0607c97bd3992061ffbf0160c5404fb7e40d190bf94ba77067e40c3d60d48bdb59ffc4aa8b8d7215739ec1af7abbc670c32
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8ADCJI8Z\3604799710-postmessagerelay[1].js
Filesize11KB
MD540aaadf2a7451d276b940cddefb2d0ed
SHA1b2fc8129a4f5e5a0c8cb631218f40a4230444d9e
SHA2564b515a19e688085b55f51f1eda7bc3e51404e8f59b64652e094994baf7be28f2
SHA5126f66544481257ff36cda85da81960a848ebcf86c2eb7bbe685c9b6a0e91bca9fc9879c4844315c90afd9158f1d54398f0f1d650d50204e77692e48b39a038d50
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8ADCJI8Z\cb=gapi[2].js
Filesize64KB
MD563e5a0b45632b3dde3694ffcaf0e3f7a
SHA1923736d0cdc308331d5cfaa0ea159bfedc83d53f
SHA256889109910477919b3457416e7764bcd0add19fd959848253026125c7c35c43db
SHA5125b886c4b5122d61f0209ede748aa84445c9388cf38813316c41b3dbd2308216e88394d9a45cfc27113c0cf3bc93b9c37d808f6d3c67888244c176ee095d42259
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9ZQLLOZN\rpc_shindig_random[1].js
Filesize14KB
MD523a7ab8d8ba33d255e61be9fc36b1d16
SHA1042d8431d552c81f4e504644ac88adce7bf2b76f
SHA256127ffe5850ed564a98f7ac65c81f0d71c163ea45df74f130841f78d4ac5afad5
SHA512e7c5314731e0b8a54ab1459d7199b36fc25cd0367bc146f5287d3850bd9fe67ba60017d79c97ea8d9a91cd639f2bc2253096ce826277e7088f8abfe6f0534b63
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a