Analysis
-
max time kernel
120s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-05-2024 04:09
Static task
static1
Behavioral task
behavioral1
Sample
232126057ffb4a051460fe034bcc2e03_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
232126057ffb4a051460fe034bcc2e03_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
232126057ffb4a051460fe034bcc2e03_JaffaCakes118.html
-
Size
68KB
-
MD5
232126057ffb4a051460fe034bcc2e03
-
SHA1
87b62c9ff50d88a64abb4049a3a4c84339fbbcc1
-
SHA256
287014310592196e921b37d5206907db43bca22bf534a6b2269af7d8178a1808
-
SHA512
acdb3ef394c7914802b092caf4fa08358002da3454641e1824bcc59b77170cec04f97fdc2a3dc9bfc77b83a689ddf98a0e8be5fe7cd9950bf33d6c5656022c63
-
SSDEEP
768:JibgcMsSZ8tN99OIs8Yt05FoT2fQCZkoTnMdtbBnfBgN8/oygcRWQFVGys//Ijk3:JVWS25CT6Pec0tbrga6crNnz8PJ
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421303230" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0993795fda0da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BFD4EE71-0CF0-11EF-B2DC-EA263619F6CB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000a7fb76ea559be1c8f31375f601478d840e2d6035201c6e656b710b2cd0044365000000000e8000000002000020000000ae193d3ec620fe2482499f09e3db7a7ae454ee2c0875d1acb7d0ff911f91ecac200000006ba6cafc4bbdfceea00cd1f121801d2196e38033b08bd04d1a1ed9148fc67ca640000000a847b55c12aeaec7788878e2e4cc57c04f27c63c770cd6a585b1dcbde6b782d1204b6668abd262ad7250148a529e5385eb17613b4eab3b519046416a0584af6b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2896 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2896 iexplore.exe 2896 iexplore.exe 1960 IEXPLORE.EXE 1960 IEXPLORE.EXE 1960 IEXPLORE.EXE 1960 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2896 wrote to memory of 1960 2896 iexplore.exe 28 PID 2896 wrote to memory of 1960 2896 iexplore.exe 28 PID 2896 wrote to memory of 1960 2896 iexplore.exe 28 PID 2896 wrote to memory of 1960 2896 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\232126057ffb4a051460fe034bcc2e03_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2896 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1960
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a9379c3225931cc125037d8579c817f
SHA1f3196ff470086890a466e36dd198a93a6d589f29
SHA256832b0d4e9e93772c04602478672d351a5e648855d6fc11ce6c3b574839671935
SHA512e4112531bcd9c11021314b175fd4644ab7e447a434814ff2e305eda41f89b6b63631b7b7e99c8ef998c5d474b16430d772edb016ac93cd312305fa0d7669b564
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5631bea10df144583e9c48841d6a69031
SHA1acf15a3d806e136b626c1f18f93071146234bb65
SHA256b83d2398f89ee5d5cb7d1b8b47a8b57e95b1f04ccf54cb62c2140a7acd8898b5
SHA5123feee895e67d5df558d113f2b57188dd9c609b038427996cd7fd520565f698670d59d841abd78713782a091a45599f7524e67b4e52e235b2b2d90d699c4cda12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5086b8bde063b385eaa37edce6736ad40
SHA1cd82de10d7b5d3ef1f86fefff47269770d9e52b1
SHA256d82598d76910a9ce0575ad2c80c065a6c14e6e799f48e64caa5b00245ec0a7f6
SHA51236c7415ceddf0531957ae023281bdd69edef09122d40bfc9f9ff0ef3588efc21e42badc008f39b0571dd42974cf6122dd69a477afe1c927ceae8f17fea2e4aba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53cc42504a0dabc95a47ab9f932c00b75
SHA1aa4345ad0109a72e99ce34112108b24b2be94fa9
SHA256b5e6f7412a13868ca91ac8fa0605b3d488f6c7ea1df75caf8afaf399ac352b8f
SHA512d64139db1336145085f689ea69cbca90ad579f4e4b8664f2eec8fde0ace76712a25c731abcb34e22535a392bca29c40b3d885c3f2c89cf2bf3cb6c46fc53cec5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc6a7fb426412b3185e2b42c1bf66ef9
SHA1a5aeef5d4b926aa28e79771a99fd0e0d7c5b9e62
SHA256c6716a773c82f0b60094bb632f7a784c0cbc33020ccf0e60abf8e985cee3aa9d
SHA512a647dc3e69500f3839441a4c8921467bfddb4b55735a01a6ab8650f84a3ed85ff728bfad03c0375ecc3ff06c13b16f488e8a01ccf352599a42acbcb5d69f0c5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c1fd0c04a55f0093e05c54168952abe
SHA17cbd22443fba8acbbf76c3d0c3ae9e76a19581e7
SHA25684fda0f8c642a67825bcba24c5430f2c6f4c58d0223038a17aa0400a33b90b87
SHA51285da399377df30ab84034d799a6d6e3d3bc60e83e6a656f1679865861f0cc61d082631ed4a8504b39687e14f6af0569386bfa46fdc7b1e9c68fb586c1a3f997e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d1d43afe72c2f7b0dbf6de611bad8c8
SHA1bf77eacc39c079a99dd420a8640bdabe31a0aacc
SHA256a71b41eb92b60a2d993199a522e00b2b864c1204bb1f744f67b888137926b43b
SHA512508dd426b395d40fc8dd277ea8c838a18454d3af245f19240be10d832e03319e73ca63d904792e5ebbf48883b1f646fd1af1f787a4b88d3292c481c6561ad832
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a60c1c88554f69cfdbfd75a6bdf6e3a3
SHA131c20fbd9a8c91582938fc05224115affbae78c9
SHA2563eb738b8dce583fa644a243d9dadb5a5337ff1049de297725fad9e9ad282353b
SHA5126126ad3e08522b028c98c3f033fd7ffacdca4e4dfb42c9875294199607a967930ed0b60eb071868d5549ede0fae41042ff69b5af14cbb86546748f09945bc6d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f7d1e5369dc20d69dceac824cd37b59
SHA1e28eff2a735936f610e99a1db3682c05b4e33b98
SHA25603272b3112f780487be1e921f2a3dc47b87a640917ed7ee6566e00a04bf197ce
SHA5124ab3649a9d70e686b5302959a603ceee40ac67ee1712a95ec17d8f33e162918df0fcde8f2cb1cf0af2bbbe0e8f31dcd74734c946b9281271d019b66040d65ea8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a45a055fc2574438fc15b5a78f19a4b2
SHA198940176adc55f2d4c106a93d24d96196b70e683
SHA256d235bd83e35a7047a4a6e6f41654ca20669ffb196870013326531a2d36fea35e
SHA5129c9b3839162c334fadb30fc5c969203b91f560f1ccd49ce50f10026eb14618bfc3f28f43d892fcf44a5953baaaaf7560ff2b610fa2b4a97c9c7acff9d25be019
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59195105a0cb4030fba965aa77bce5d1f
SHA1acb5017f6c85d09542897678bf7204a45896850e
SHA2563d1a92b2a0286df2278a288504535b79f3efa2667d8f293ceb56506f37e0fdcb
SHA5123dfdf86854e787171c80991621f6da4321506fb545f4b2efbb698773f609d12e6ced4ee2ac0f3555d631e588ad415d4249f241403da891a2400bf18e91f23479
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56809f042e0341570d61def4ab31f6ad3
SHA1d293aae220cd7ddac9b31fe4447b9f32910f860f
SHA25699018360fc0005893b9c9607c5f4a44545d55dabdda2130b1f8e469ad1251836
SHA512f046c520890c254edb3505d0fab0e3301dbd6b5490ae655514bd4fff9e19aa3aa8cfc0c6bc37d4b47dd35ab238c79c9d2b53cb9bfcb5e1f4133610d6886a8b97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce3a3d628f3da759f9fe4a325215a806
SHA19ffae4482f1ecb0dbf17d4e4fdbb19bf285e4f9d
SHA2560f215940cb8124b84a5af283f399b8801f08bc2b64df74f26f8ecc0b1e37090e
SHA5128d804d806e55c8ecefabdc5d01c44ff3cb5e4ab4b180fe6a10d7cfe68c1ff8e6251bee30c01fb43af6f33c9982faaa9e7d3053fd906a1a1ad68b040dec5f509a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ced7fecc46aabd665ad4ba18558de0b0
SHA162a94718557cec2296a93d4f4187c96a99c6e4c3
SHA256944c55afdf37026e7e0ab66b4119f505b8ad7b488fa8a05108df95d86285721f
SHA51268f466cf0eb8770ed97cdbeaf4424c99a1e738a5c6417b89e7fcd7dcf9a8890f37d62ea7ee4617e5c22bc132c98648ce640493ccdc4cc5eeb9066992b3f9c122
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c3c0d9600f556262e474da5f4cb78e5
SHA13f9871c597c237362066061a01d4bfc840e1a94a
SHA2566cc978f3cc7043bfe12940c3159634cdc745e331b8d7299ecb7dc6c9a727c84b
SHA512c47a4029c5129be71433b723dc0b7f03095511925d0f23e9ac749412b37f229252bc228ba306956d9db1f174e02a70670d4b80302f4774857c6585c3a57aedc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ab3563d2f7d2e975c2ecd25f5d19ef2
SHA1a45af179b478207dce8b06fa975fde04bb27174f
SHA256b88c19de2b32e08e64094e5554700326a32359d8fcc77d68500da58191a61ebd
SHA512a84e138e37ec962fdbd22bfafeba47ad8d4ec84a555f6b8c0114d51eb244e5d584dbb40b68fdd0afcadf80693eb99469d84d0cd0cd5ff9f8453d514c5de2a09b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7d0732328769aa8cf5b2ca69cd33f29
SHA15011fb4d1b52a2119bec8c03348a6317166aa2bd
SHA256177825a534e7a44586f9d6c0ee6b7f6ba7e5e4f626e2df3e1fe46c8ba34b7ca3
SHA512ce4994261a8ecd4f06c1e8721db16028ed726310d5d24344bf19bf39ee00f062629496b7078f6acd700b8093e87d92a64466dcc5055889e58121142e80a0f830
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534dea6ca5799d0f1a06cda58597f0a22
SHA150526e67ead911e330047fca34a7caca66a12937
SHA25614775752ce21d32634cefd95ac18f1d76fd585510d438bfb42496add5bd98003
SHA51200368ca0361a4943e5fa0d22d3c1d119cc7674c1aaafbd0b94a116b8c173737f7a4665128ba66a96f929e7ea6a0cacb9067ba6b95d1b491187c3ae008d2d252e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50caa347119e81ca4f407cd1e22672f87
SHA1fe1bfae9c7cc74d21f9dd12d0f266eafa66732a6
SHA256a5b824d6d1d4f56943f15b175d155e05b2160ec225a15ed684b33e9f08dbb2a0
SHA512f8f4482482867ff3d4e6f3fa6bd731f85142b3df9ddcba2068c259425ee40cbabe22cbd8f8ac16b7da0c60ca04099fc4d0094d336963365f58f56e4e0ff48450
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a