Analysis
-
max time kernel
126s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 08:11
Static task
static1
Behavioral task
behavioral1
Sample
23f3df5cdba957f5f2e7fa80724c0650_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
23f3df5cdba957f5f2e7fa80724c0650_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
23f3df5cdba957f5f2e7fa80724c0650_JaffaCakes118.html
-
Size
36KB
-
MD5
23f3df5cdba957f5f2e7fa80724c0650
-
SHA1
3c38e6af649a66041e9ee7b4d3d502996c0cb3d6
-
SHA256
4abbe43b8c3c14d0d764e8ae86d5df1c28379f312cedd608feff51f09488d038
-
SHA512
fad0efb6dd26b13d9b6000aa4e9144b4a025bcb81f69992ebdbe4f27b325f1122261f52eb67fd075bcbc823b5bcba566042d86464de4251b1d8b016ef36e94b6
-
SSDEEP
768:zwx/MDTH3P88hAR7ZPXKE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6ThZOg6f9U56lLRb:Q/vbJxNVNufSM/P8qK
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000aed073b2a9ef034bac74be56a9a4ed9111bc8f52aac22e8ed33208b35342a07d000000000e80000000020000200000005cd90cd2f5056cb58cc2ee95e2760a47d0a465a128d47205b6dde68d6b2b6e65200000005e80aab7949c51f220ef9b6ad1995d5f4f1840bb9352f68e715eaad033098f4640000000dafb2739aa8c6d4d57aea5ae8f31edf9b804d78ca51f91a1b6de2f51fa9fb86c7c046636714ae0372d94baea20f0ba3c75a346767c4f903d7dbe5a1c0a71cf0a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f06ad16d1fa1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421317757" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8A5A5921-0D12-11EF-A5A1-E299A69EE862} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2112 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2112 iexplore.exe 2112 iexplore.exe 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2644 2112 iexplore.exe 28 PID 2112 wrote to memory of 2644 2112 iexplore.exe 28 PID 2112 wrote to memory of 2644 2112 iexplore.exe 28 PID 2112 wrote to memory of 2644 2112 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\23f3df5cdba957f5f2e7fa80724c0650_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2112 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD52a4e2b9c9043c50036d180a30bc5a8a9
SHA126ef6beaea66aa9af64690e328a9d58c2f13b92a
SHA256fbfad30d09fbbd40dd2cc272b6e0de9ed1a96879e1cdd36ac6dc7deadae97ef0
SHA512ba4e2dd13fbd76b1efc567b258a273d3afdf5ace07d0862cbcc338a06f25341b309039f1208f7a84dd328d35e30d1c877552ceed7f0b0b764d3f9653e5cb09fd
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD542318a0c13376ae2af4c431a2a42157a
SHA110a6b3b7d0204d4baa4f08d54546b0ef2f54f05a
SHA256aa8b090dbcf5700e949b81c0eb01e5ec9e6fb1443c808053d426afa74a5a06b9
SHA512e6f7a04e6d86b8dd6562daa06ec4a97d65feda318e34ad9a6434e28f4237b53809c8b8274fef4891dc99561a2b873d6411ed9ce3a37c75b4e8fc00e65e2eb169
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5f0c59d18ce1ae9a773b377c7d28e04f5
SHA1e212bb584174aabdeda2db7b4586e38cbfa36418
SHA256e44d4c001fcc294876b9c19d1f4d846efcec11b87b3bc36192059fd0ea9df3d4
SHA51279c84f49109488a5d0f68daea60f27597797ac3488e7244fb6dec08def7b40e5c43342282029e84c917200d7cab3fb7418b93a34d39111a85ec7977776c879a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522a7056e725964cc48dbb5f8fd03ee7c
SHA15d9cba4c55677cdd9e8186f07de33547bbab1946
SHA2566ab42f6a462d8c0f3b72000c220789e0930b4a5749423971af33ae48750260f9
SHA5128710cd08438e053c795954c9e50aebf925fc74ea9a96de51aa67c2b0bfdd856d40c9e8f6236c48fbf4c756f0e3ba5dcd5d73ead958e281822061b655bc6aef2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f51e18efc59affcd31e8ae4f831d8c55
SHA15cbf36794a90709e29571860f5a9195a89aa32ba
SHA25604d47fc2b4aaca9be073ad07fc2617e2b0c1b5963741bc1ac8e3a3e8c944a73c
SHA512cb80a6c822234adbb31670ed25d6858b60035cc544baf774cd21d15bed773721abf269bf5028c75e75e3a236d772db48c698164d74af84c9f4fd98565f8f8101
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5518ae119a875f7ac0e7cfdb67ace647e
SHA1a1ab7279d8b1caa13a144759d9df49a3cf4f7507
SHA2568c2773e1ec7da402ac8c7418530f0de080d3e6cbd6b6ef262ca4bfc7571577ef
SHA512e8768b02f92d39e539d40ee782be40822abcc10b48464dba31bb0e8d4d369bf7786930046d19968f1a677655114642f46f86c7e59b4a410b622c78a69ef4c8e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55942c8f9684df5d6ef85ed507b202b2a
SHA123ec319d33a77c59a531acb6fbbd0344bd17d675
SHA256c4cb8966df92d4a927ec46e3fe819c67fe8dd2cea1e47bb15d39b866e6207a46
SHA512d520cdef263ece7d2a3a7be3367112973a2ffd385670cf14eb51deb5c0ffcb5fc2cda145d9a9f6384291f122897b583bbe0986b716d4ec5160827c1931318ca6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4d1a7ded2ae721c698fb17b1af5c83b
SHA1d16bdbe64b80cefb38f9ec5752171f3113b4c1e6
SHA2568537aece917a7c46735a0ceb70de91460c93826e25092def61bb2a9f82003dd7
SHA5126a971ecc08781f2b66303d80c7c3677ac4e65b335769f65424383f1773a94038b3cd68bbf0abec8022632f6a4be10921ab949198c47053c8d0bae6e59b06a02d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508ef7f9767088df7572e6d4a34cc0a89
SHA113c6a6dec3a097be666a51e6e6acd6c5f45c7fe1
SHA256b127ed7209180b477eb5ed6ea45e26469f45d672f7b7523e0ec156584ddfcea4
SHA51257bc35ac9d74f9304417f170412c1fe022f53fb14e1b857d48db2a404a24d481ef0c87213a4763fcf9cbef216236e4a497e0a88e67f1f21465b4b0d152088c9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5091f7562a2982395e5cfc3ca3fa1c715
SHA191bcfbdd6b584b6faf7993e5f0ef705f9ab6989e
SHA2565ab3398d53be1f33ede6aa2eab9c2a00f6e73af5462ba78c9fe36e4a5c5459a8
SHA51203d9782f8be3aca280a94182784c35c360a4b3fe4e6dbcd221045090dc3ab9a9e427b20e27ac8169f0e7d6efc0613be4b0e7169d1eaee13f26648744dbceaeb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b29f3490da35b57a75e7960cb5284be5
SHA1fb0f64568601aed265ae3a5d79db72381a7e30f7
SHA256a0ecbfde92062d6e0fcbce2c517aea6db3eec931afd5805d41c56350b8c734aa
SHA5125b245d83c7803e1ddff4b84be2e93a98cc03024d09d6add5ff670fe325c8dd0c1a1c1bde370bd493d423be36f964f6d0998e7c125390ea52c135a93fb60462e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5d762efae3d23212881f6d5f1a16baa88
SHA1390b85cf5cd92278ccdb69743a3b8c29670882ba
SHA2568ec97e981c1c4c79dac80363bb1d2cce25aec63ae570bb9c2a9a9517ccd21e2b
SHA51234776e63e543c057675520d804f3d4d0e823cbed01f83bbee64be48c7b9191acf40312fe2417fd9cf20856b029babb474cfda30209f62357782066278d0d0668
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a