Analysis
-
max time kernel
121s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 06:16
Static task
static1
Behavioral task
behavioral1
Sample
2391d10c1fcd0e881f44ba808066bde4_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2391d10c1fcd0e881f44ba808066bde4_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
2391d10c1fcd0e881f44ba808066bde4_JaffaCakes118.html
-
Size
461KB
-
MD5
2391d10c1fcd0e881f44ba808066bde4
-
SHA1
7d804e12392fc1eb3e56593a9c3e783c7467c018
-
SHA256
af27f98d293627c5096e8e58299558d4fc39c0003948d5e8e825bdb9d6cfc96b
-
SHA512
7fcec8d6c84e8776db46d812c58d2edf34138a8dd6fef4b3c7749c484768ef59c131e2bec6ffef22c119517e48a89ad5195e82b2351e8a2d5f5de1b7ee7cf622
-
SSDEEP
6144:SpsMYod+X3oI+YHrsMYod+X3oI+YxsMYod+X3oI+YLsMYod+X3oI+YQ:s5d+X3d5d+X3T5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421310872" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a96069000000000200000000001066000000010000200000001ca72a5e5a5b3cb4bb15ff52b287d8c7395bd65b92082c2544caf5bb1018c453000000000e80000000020000200000000395c5e93957c61419debacd63961442c138360debf6402f60d90d34789179e4200000004fa5df8be2696660f72478ee922c175a67d3a06cf386a106ff93eccde4ed952c40000000997de358693900b21fea6a130c634bf2d2a6994e5eb5dd031e0e3e7279250d9a1d7c6208b4d6e079961a86213727adc29879616498714be8fcd38b72a4048044 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 303c6c630fa1da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8AE1C411-0D02-11EF-BEEC-D20227E6D795} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2124 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2124 iexplore.exe 2124 iexplore.exe 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2124 wrote to memory of 3012 2124 iexplore.exe 28 PID 2124 wrote to memory of 3012 2124 iexplore.exe 28 PID 2124 wrote to memory of 3012 2124 iexplore.exe 28 PID 2124 wrote to memory of 3012 2124 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2391d10c1fcd0e881f44ba808066bde4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2124 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5420388e3e75af8be5aea8820a94b5089
SHA10fd3e7b16c22eafd78e88727665240a43b77c022
SHA2563952f75ca4023b569b3ff8273396d1fb92d5c9937afc19f6d155f1fca1c5777c
SHA5122badceb75e56c32810c1abbc1b35d19b3d540c2b032dd8a6a8a1dab22025310ece8164d4f05c2765f7c0ebd1ba18ba348cc8a95033d32f14b5c82be01e5c1792
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53dce898bc4bb67853ab2586b4f16f5f2
SHA17fd90ec65c25c96b9b3ce25f4d84783aaae30f64
SHA2565c48d7c447709eacf6e66d36e8f0d8865fbf57135d6c75280f47fb9156767db2
SHA5126195064dd6a9ca9736f025fc2941a79e2b9f32ed048c2d14381f76db2b2ed8c5a7285d0abdfeec82399e1fab6203ff53ca0ed41ec7e3fb516843fe5c4c3bf8a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a70a3cce6ff77eaababa866ac95ad56
SHA105267303fd61b3c7e712933c0f1887e85f2b677e
SHA2569714b63a6ee954cb92f9fc477a1d414088e7701493f95bef8efc62bdf57a9522
SHA512dc12fcd3043104d99683dd5898b2d86cdac90921952c16b4d87d18b51c229280d1bfa8ebf76d125af847a725122ba2980ddfba7f5c27a9a657dccb5c426aee3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de5930d2a8ef57acf152cf5868f85c63
SHA102a71dde9f66a98b1a0c4e840a0bafb82d12a59e
SHA2560b0c969e128a85394aaa770de65785dbcea2e19c6cb6ab80e770821b3935476a
SHA512102d637176d7e294dc0fbd27cde9b4c90750e445a76ed630b052ff29d49759bd1175f0ba651eee65266c07b1489666fb05565fe423fb51f17432407bbeb03c5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c6f9b85a2c49efa0ec1e137b34c3473
SHA10ac25ea3c99eea45e9ef763e52976a73802bdef4
SHA2560d3390e811f7396e5501a9578669f38b3086a9321968954c4775a2b1ba71c867
SHA512d190ad17ac98e7bb2476ceaf535a3becb69702ac8601b419e73124a4489c122474eec682fc6e39d7dca2294bb6d7bcb87bc6bb026d0eaf444b9d57192f053fbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5092720c91c405923d38344ae5870b8
SHA1ef1bb2101c1da05752c793c74e4d03f63762578d
SHA2562c8203196066e647289d73a21e6c3f3a006783ac88f8b30a01b955f51896206e
SHA512103dbb8901986bf8d400c1e3265a04ee4dc0ee1fe0f573c9748a63e488fc1ea9be8654198926cd2fa424020184bdaa41e1b9bbd462058dfdde0424d9d5f5fdb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591c3a868bcaa563002ebd6ba02f73514
SHA1d0b1115dd28308de76660cd281bc2f62cbc610cc
SHA25664f83af6092d6ce060c596f35d3924330826288d0c0b1bd5720470577fb0f441
SHA512afc53c5c5e68ceefe1ab428a84feea007768a44407830214420c551721533afdf54bd2cf00002ac8245c789a63dce5ddfb122e0331006d4a0bea939a18d609cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556123ae4b79b959a3a2e2fbaaba455bd
SHA11a1f1f1b4f51b561997800ce54fc205a0bd228d2
SHA256eca2159195d0574e43786dbc6f7ddc33ea10f58db8e63737191a9f0aaa4fe90b
SHA512dbeace78b33bd30a30f055a066674108dd1322157fd775c7a7a01e6acb8576871fd0ea44b295cb65d033720dd968d6ceb317dbfde7f7a0321f8ad97f19d3112f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd35241bc98e3f9133e9ba28bf526ef1
SHA13a3845b0d23bf085a8cf5e21ee6715b518ba4843
SHA2563b81e2912c0a9e22daf0300beec4a42107e7269b3f1df4f16eb4c76454975e78
SHA512101ae9a3d8ff83f39aff1b7a0342875c92c2ff3740722bfb03d722c1bb39fe91763e9b26d0f2780bbba9d798027cae5bf02b400fd5a776e0de5e1af16ec956d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53582918310e256256c6a8cc7ad3944e8
SHA129186697d04badc0834bb7c6114990071fa5bbb7
SHA256e77701e4e8bbc3b707ac54feb1d112b7da1d689c3ccc1fe3ad8dc6e0eabb4db3
SHA512da4e1c1e1a5c8a7cdfdd619cb784b9fb8af066ffff22e9cb45759a1af86b4597d6ae452309f1e067b1d9799d27ebfdde13f4e35db0091d2bdda953c17e3a9b0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500e0bfb7245f1904003cec97e31ea554
SHA1da58e46da94971f1a005d979159b78b0573a56e0
SHA25676089e00382170c443ecf14091e75450f52e52f72bf54611df90bf7bc36bbb3c
SHA512ca0cdba352bd0ba01f51a9e945db2512ee345e8cb3a91000304328c484992111402dc8423bdd6e04b53e5ad6a77d8ef58c5bb36f8508c1bfb670e7a0bf7abf5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58908dfb2f7df373ef32a3923146a67a5
SHA1d577eec07c402663da03b39818d80178f54a6f71
SHA256edc613b9e71bbef566abbb030172c430c4162c97da5bf60c091c51a7b1adc6e4
SHA512114453b9fcb2bb2e6029f3f7ff424cc5723d5cb2e2cb8cd10d21ccfb26b7ad3ee6f61c69ef3ecc6bb4eb0f9c09ea2bce60361616fa133991f29da48f0f96879e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5266163ba62a7c029d31e59decdc12ac5
SHA119da15845e9b5c558c5846d8218c6b94752de114
SHA256b5b1e1ad9e5b1b0ecfe7542f933de251e2e5817a9c40a1b650a698760f0db9a9
SHA51206f74314a07bbe2cb9d90356edff47601ede0468d9cfb7ea64bb774a3ab785eb33425c0bd316366907e4cd33cd699e4009f67cba3010a8d55f8914289590711f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5216877d4985bcbe44fd0d5636eab79a3
SHA1fd4c5361764536927e3339c3a745f56f6e6fbd6c
SHA2568e6e5e201cfe72c67dc51cef4cf0481f01de93d9dd70d2433c6e6a1248122564
SHA5127f49a43f6ec9ed37421d2d1f4952b09174f76692699103256a7413430adbb7c8a4a659f2a4918279e56db73dee720d53e57799e389971c167b1af39648a649c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1caaa1cc87b13a6b6705df111e45892
SHA197a251a753394ddeb51c4b29be9799ff34da1aee
SHA25605fd1d8fa7387aa7ecdd95a30044efa72ad0efc0ccdd3a63fa9fc14e09448249
SHA51222003cabdd974e90309856993d005d57c239727177f4936020c7bc04ce683dc97d9dd9ed64f20e487debe0c704593a144b72e363f222770d60cfbef58ff76b3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c62abbca30feb29a33f8439104f2c959
SHA15be85322a46731e51765ba9b332d6880885c61b3
SHA256d942f4600e7867b31b6df94cad684949adb57d83be043f574f861adc5e57a578
SHA51277840e92fd9d1e8721df3b07de3b3488afeb5e8ae4d01641e64cd1247f9eb97a783eb1f86f8ef30f7072bed48a95c08f3daf9ad498447cb5393fa6518ff6ddcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519802db61c208e517f9bf3f2212af38f
SHA1da3e23bc7305356c8760eb7fd18c984bd87836bd
SHA25669fe080d19bc2487113e4a500e38091cc2dbb7db6eeffe053f3378cc78d38e23
SHA5126860eb138bd87fe42518d69bd0fdffb06c1920df2ae08c7db9e23d9968dce31ca98a8a2cbe568cf91f17699ceb5bad7c3b59bb6def447e4f31e41a257c94ffb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd93e9467eb79749c652e4474f02bcdc
SHA13691cb5ab19db72f9a40271f46b70740f804275c
SHA2568a3853a5ec371f71f9176f77e8b32ba6f62bf696b49d825708dd0889c538aca8
SHA512f20344478cb80a66b78a01e25fcfca8949cf35d8400ce0e97f13897fe12b3c8754a7cb6fd35f17f60f8ccb67e46ce3c0c600bcb0cf7751e8a09b07ad892641e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c75691963aa097c7f7d1375c34872341
SHA1d93486558d52c0658d65e76d73820d70e85940c7
SHA256bc68ebce079f25515aaf186032b8fd2dcb7cb10f5c1e26a659a4d5f1e55a87df
SHA51218567ad70a0fb448e83e783559944ae9394c2e6a8f82fefae492bfaaea67f2bb91cae4b7a4b0cd89bdf33cbb60381fab995041f54fd431e911a366756b25f737
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a