Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 06:49
Static task
static1
Behavioral task
behavioral1
Sample
23ad6b723b5253b8a1db084dfe699d50_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
23ad6b723b5253b8a1db084dfe699d50_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
23ad6b723b5253b8a1db084dfe699d50_JaffaCakes118.html
-
Size
461KB
-
MD5
23ad6b723b5253b8a1db084dfe699d50
-
SHA1
37bd141bbcd4f9212c9e8fd4177be9f10bd89ccf
-
SHA256
0e6c79b83fdf5e16fc4a7eb079fed72bc0504d20162aaa7533e3bd3f78bab295
-
SHA512
f861cf0b825cfa566561c815fff68dd844a0c390fbb0651a78c2e35ab46b14f06622b4ec186776718bd9f150cfad4fde1f8180c03ef87c963f3650a9ea32b096
-
SSDEEP
6144:SgsMYod+X3oI+YKsMYod+X3oI+YesMYod+X3oI+YLsMYod+X3oI+YQ:j5d+X3G5d+X3O5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421312814" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00d0e2e813a1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000d5515d341eddc5d80df18e30d56678566910a0ba72674dd09f82d70efc8e8f8d000000000e8000000002000020000000635921ab7dded2927ca17c5c60575b19d592b7961ba598fffd2b48d64af1f45e20000000d57c19adca579eda008bbed3c24a1646135107bed980a7b68aef4216e888604040000000fb54d680f1c2900eb63869ace78d8060e2e66eff9798ccd1fcafba0015e121caa54436edfefa6e8fd8f760179b52435ec0b001c98d99c46a519b688d0d5259d1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{10652921-0D07-11EF-B238-4AE872E97954} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1040 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1040 iexplore.exe 1040 iexplore.exe 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1040 wrote to memory of 2944 1040 iexplore.exe 28 PID 1040 wrote to memory of 2944 1040 iexplore.exe 28 PID 1040 wrote to memory of 2944 1040 iexplore.exe 28 PID 1040 wrote to memory of 2944 1040 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\23ad6b723b5253b8a1db084dfe699d50_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1040 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dfd4cb9a88f4d49729579da78f4e57a0
SHA1d4b1f9188928846ccf2f2f7aed1780c9ffcb5394
SHA256032b7508e64dae8116884c5793eee512dc3094546d7eb7daa2cf02e8d8faa8c3
SHA512c3cc1ef97d9bdfacd82c71b17216275b2499907bce8b68fed7fa2ff6f9c2bc98fea9caf794733d47ba6201d317f024c626cb3d1c2e4f24a7550f89b0b1b94e7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537f3f3b3a88db04587b3a0e38c0709cf
SHA1125a69de33a8b39f6c593e2e74a66c3a750e2b99
SHA25620dcb0e623507e7abea47d932ece9e11d548f91b455a86366c8c86756c8203d9
SHA512032aa643f815d492d317c3bd198528c7d0252ce18fc4cf7d54aeaed3665f73be34ad1c990526ad85b82c285f6f56199057c6007e2ba73a7a0661a4e27438e837
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c2f6455d12722f3837109fa5464416e
SHA17605c8b27284b46b5b7652250a1f10aa05781a43
SHA256fa9f51f7c64fe728e376c695d29b1a8a833ae0d4b204512f06690401ecbb3a8b
SHA5124bee5ed1de494946b23f7baafa1b3363374962fd0e45808b539fac8d3963e58483aa87d06ae9e1fc1656af7b00e30ee4d1c0e93af78554e8dabd3b0f86420c56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571a526e5e4a9868b3d499c68f9837c6f
SHA1322fe354740942e76888b1ea2a164ff0c9b44c76
SHA25666ca7a9e9d90f43c1ebd79689853bfc8f7239ad845dab006666b78a87f961f41
SHA512ce1e44d9ac1173bd6ab35b3ea3d640f878e9b1d24916a791d06904f5824487efdf87cc09315ea2b73a91ae8e1bc79e0e3e616970af39e58e71f24331d9af9848
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5705883c20fcb2195412cf43b952af1b1
SHA137c2f8207869b3021c7e6e951e73892da9de3eef
SHA25603e3463084daa0207cfb3bca46fe794cd10e9e5d6ad025809df7899f0801987d
SHA51269a0bf8806cba9a1174a3bb333e500e01169b771ada53104328a69439e5326df4062b243e5a4131dace2aaf3b7000bdc8e0cacf1ef3d2868a74a0949942a6f82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565fa0648eab1cd9a77bcfd9916982acd
SHA172352c4f2371b78076e0691b6202ba9f39c8a17b
SHA25639e4ffc4c474ac262f435c57005c1f357b34f7bce458a9a2d577a09b2e1d6f5a
SHA51234f4b627b44753e8fa9941cb0bcf5bffd54f2bed7a6353cdfb4ad606b01326bcba9b3cdc68d74f379faa056ce04d537caa5ccae2e7d5d44f70a1d9a426784544
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598225a8578141c100ff33289bf15c064
SHA15d7f61a3823f6378e3196aef56a1359bc339960f
SHA256be92c98cdcca296218e3148f8c8850a75f7336b8b5ea3c7c7c8d8cf25dcc511a
SHA512cadaee0f2bcb49e88a5d9550d34b02ecfbc538a4ae848b89e2092260105190a60eea9a8f954216d41996dfa5a4c8491341a4552e91bee96373fa0b049706409e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b46708a2ec7dc9fa750f7630b5d2da3c
SHA1b1250a5b181b399b3902ebd26b0cee3db98f838e
SHA256165c89c04fcea19b33699781c4436b1268011dc6edd93c4f6ba6b59bceb9ad08
SHA5121a677e9ef90efdf573334ff865cc720ca8af02bd24b6085f22743be66f8fb905510401753915f940b2a1c6fcfc981d5a80f7a622d55d265b2bd02db3b3aa75a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5579e5fb96959244e71ad9df3c4cfc6
SHA1909d0b9bbcb6d93ee6c1d17185b18e3749a99704
SHA256d6c17c08b1c90aa17d306fea5e0f6cee3bfc257e025bd4df60d4e6bd53178ef9
SHA5121a181eebb86d3a9c43d3685b4c368462f89775cc89ab5dcb6f1d2dd6cf9d6c7efe4f45626c0860a485b3599f7b6df95662bdc09e20bfbf9aa61b8f3b0278d93c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c28b7adf8f76a4cd6bc1647a448f807
SHA1d717b2ce25bdbf200088305df61cf6c2508f0a0b
SHA256b038338d4533b0905ea6e53da91ddf2accf58bf56fee62cdf3568d116fca7b8e
SHA512fff31d88e28391c68b83a53abb44cc26d8fcf87bed0505e2d1ae80a85d9bd2be6a056f9b31d4cb4e8dcb73458339831a956123eaf84335fd0c8f5388f4c31a6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5014aa426d44b75b1601054886182ef5b
SHA168066ed7e986383cd0e2aa0dee3d9b949d6816ce
SHA25640ec23d67e8af8fe17251ed2748ed65b714935705253c1a440bf1275e70facad
SHA51228ad419547afd6fd3cb24f6afb503f2b821096180fd56058b480b6d05fbef7f2c35ef303fb6d4272e72127f1fb5d02373362fab6a0bec4d803c7d0c1350ea93f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58728255ec317fcfd01a2ff24e2b79ab4
SHA1e27e7c8ebb64abe41855ba0639ecd7be2f2d6848
SHA25604d721cf38460dcd60e52eb69d9a52d7e1b0539702d73fa9417a0bc458f7748c
SHA51280cd347431463cd8d4e0c43929da923cb052422a599d774117c0f447f2442eeb8bae09525c5e3becc5257576ecc6e1e66858538bc7a8abf765c7a1702c3b66d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528a426bc6883686d5feae987f90db49c
SHA1a4c76349a002d8d24b3dc412219e13691418bd3a
SHA256dda98fb6858111ff263fe965a14fe7134c07d0a657fe63b2ce2adfa0c928f4e6
SHA512c1894f6ef71903f2a89816af965728ce38d445473c3fac3a6f619243337a9da4ea0e3076ef0b6826e313e538143c495458e11417170460aa41f07216454c90a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f06a15091fe746c20363925c724f861
SHA142e874651fea3854261b78b04629de97981acce4
SHA2569db7256ae3d4e25f9a8877f62c74d4fa0c9732638ef202f5eba911c65756edb0
SHA512764cbcfb480765ffccc79cb1d3595cf464d093d4bb251706263b1b9c23f2ae5bf370e1b6dcf98d34c9a03b03cdc76d7479f9814b7385a701adafe8b425688945
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d52fcc76e6d84dc2f160249ed0beba3a
SHA1d5ea25c0f7dff7e67bb5f91e80dd751c3ff2edf7
SHA25673abb702465e3a8ee952eb60088d830cc9f1710a279d83eb76c2732e34ebce0c
SHA51203f3063cf50e5329ff669a33f5f87b9c7cd6d1b3c508ed8912040f8422b0bb6ac32101a623320d3e9b35f8cd7700172775e984c1719d9b6b21e4685036fd62b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504ea62d7901e89231f2623da4d2726c1
SHA19354da702202459e64b25aa16348b9fa583ff6d0
SHA256ec2c2fc74b1486cd1a981a2f257ca77bdbdb4023aae4199a51588164e0105bb0
SHA5121b31906e7a8a6eb2b59d4a42a07eb2cf4e60436f94e4257d5e0728fdf206d537356c272685d0f7a25ec819e6ae542690094b292851a82b362c0859d5a9b70b4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522573de6ead5c0d0ea09a69d3f2df14f
SHA1f6a125709e872d2670c6abf9d8bc4e58d174578a
SHA25688cf6851e6a04c6b3caa0a51b939bd998f987fe242b8b2c6d1c33e6f9c1ab9d9
SHA5125569b2acf47c4d58fe5deb668b337471bf3a691e6f9c975939040f2a4cc25ab80e617a896675bdb6657c919c2f78212b6ec34e02e97b32fa281f5fc9707f1e20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4b831442c0f9e1faab7da8e8aa5aa03
SHA1899a9ee3ce25abfce25d8b98880404fe1be99b32
SHA256d612169c4946f1be68651d3dfb757ab45e7c41b1927c857621733fe7c3c5f9d0
SHA51207fd7bd3a5de6c9f62fe1f6f06e8e5487a7c8062ee638be53e2e7d46bf07b400d30c17339ba16e8f0b38fe04c52a767886204046d07f14356e1a404df3310c7a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a