Analysis
-
max time kernel
139s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-05-2024 07:41
Static task
static1
Behavioral task
behavioral1
Sample
23db74a88ceac41528f96d39365a1097_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
23db74a88ceac41528f96d39365a1097_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
23db74a88ceac41528f96d39365a1097_JaffaCakes118.html
-
Size
8KB
-
MD5
23db74a88ceac41528f96d39365a1097
-
SHA1
d43f8cd6b7abb8a006fab7451244b715144b473b
-
SHA256
8542f3a613690b6058b0bccaf3d602ae115c0e89f3e6f427cc6b5b7b6a5c6beb
-
SHA512
5a11306891f5cb9ba0422ad69809b2b60f7921a1ef5931762a146b89407286de6cd1c2e61d9c4d8a893650777b18e0bb2942b95ce3074bd305ff3a474a5306d1
-
SSDEEP
96:/87Z9F659tkydiNSzwz5MLsM3K3qb/6aA0/eqk4gi5TG5VxT90uu4oIu4Fbyu4P8:/8N9F66yQWHK3qbCR0/eqk4hTGR5lh
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421315946" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000332e2c18fe0a20e4ad40de64b66a3812963ed31c996fcba902f62034a0211dbb000000000e800000000200002000000041171cb35556e6f15b6de2c51c8a029c46fa16f47086e369868468f45489882820000000c870a92b985645d78ad8727553f03d25630fa10b49a393d6c24d08a80400cd83400000008a9b6cb807ec3a8c3b5f50cfd5a85fa88642b9657add727886fa8e82df6fb54b952568e8dfd3b84f0ee507787162d6ee46c684175c6871fda24cfb1eb3aec310 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0f61d301ba1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5AF34BA1-0D0E-11EF-9201-6EAD7206CC74} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2068 iexplore.exe 2068 iexplore.exe 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2068 wrote to memory of 3064 2068 iexplore.exe 28 PID 2068 wrote to memory of 3064 2068 iexplore.exe 28 PID 2068 wrote to memory of 3064 2068 iexplore.exe 28 PID 2068 wrote to memory of 3064 2068 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\23db74a88ceac41528f96d39365a1097_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2068 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da6b237dcb1974c91724da596e5a70d3
SHA1c295cfd70f98e2f97263ed108df592cffdaf253a
SHA2562cffa6c02356d872bc2dae4901b295612cda8c43a1cd3b3b3333edbd9e171230
SHA5124e1d69a659da129fd62ebe979c8c665431b23477827a593aabf8954f02a13a940976132dd246ec2ca857206c407a907a4c4e75300c546ded7dc8f6540748d217
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d92e7be2bc3eb8fc9776bc521a06a8a
SHA1c1031731cf9d46bdded51db08edc7e8beb998cc5
SHA256934a756e63e4873e1916a16e14cf3efb7c5e86898841c28e627d773b2e57fa81
SHA5121a288af98551d1745386f34dd4e5fcfc2c40b061e8d762f1b88ccd463cb599c550528519cf627307d16457ebefee9c61bfceffa47746c2edd7f254e45f1ddfb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549321fcd0b01d2533a7289d93acb75bd
SHA107066bd5ec65064f6d1abb35c41aa6a8c0eacd52
SHA25657c2946bd52ab4bb1f6d745d43181a92965665824a7280bcc09ae43471e705c1
SHA5129be15c2657a1b199324f86cc40a1790722675c0a9984ad3cf51e268ba49bebc56308d98b834c6ad9b0f28bda0556f66189fb55c529981b789de56962e02c50b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b527bb2e6b2ca43d04deddd8e02711d
SHA12ff39165f256733cf7a0f9a550172af4678e23ed
SHA2561ec51a75892b9d552d21151cb37faab09b9b02c1fcddf787e0f1efb444796fcb
SHA51254e03952f6d5bf88c6e6376a55eafd37ac4d9272af5fa2b1e6f1c2647a6977173d30e466ce31deacb445bfd3287b6396c93ffac762cc866c430d703e83c54570
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5625e13ed19042e7604fa5ce6d05d5503
SHA14343372d5b02c57eddc4a8ed9c838b7ce552bfbe
SHA25657eaa41622a0c2c5774baad4e46c74e9f162cd32528b1c221663575f46121455
SHA512c85df5258661b0c392d81f05a05a515cc3d50dd24cf57f9e9166101f5310b6ab8341ff8042fba858b6f68e086cfe13e13e865fabb177910544efdb91a256d154
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ccf250fc1e18615dc3ccb7db8c928eac
SHA1def11c933e5d3c4ebaae7d2a036385bba71f4566
SHA256c206d084b6ffcc97226e8dcb3b4f0890f79a04acdad17b5cc4d263e15ca4cff2
SHA512a632eb2943fdaaa61501afb0a0f7d412a01f4c620d445aa5d82892fdcc0f367c8bcf9580592e0aedd9a3f2177ecc5d566a05f7fe22eb1b8442308a7288c9dafe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b56b339c898a98784b5abcac54aa0a2b
SHA18d4c5ae8fcdd684cc9fdffa11524da1d1ae88d43
SHA256493bd28e082bb58d517eb9c8d550b5af6ba05339451cd668e25edfceb5568099
SHA51283156b7c09b7f102014436d17445954292c8adef1469c43a6b6e2f35cc4c682bd1c6b9aaed5ab712add6fe9e139176067615eb262c086b242cdac326cfe72b44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f97e3370716c05d5ff6c887697be9226
SHA112c208afa1786bebe97cc8bfbe242768a89d234f
SHA2560201a89b97904ac137d8de43c31c48853bfdd8549ef2ec1b45c877c1b4f16c84
SHA512c4ade7eec7a6674b64fb0199c45cdfbdef8c545fd26c70f98463c1280d0b9b6c5be8d06b3a0b4c1ff329953d7b063d80c3a6d9c3a9f0c0133024a91935294479
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6a3eab942301b86d3e9de6fd92ca622
SHA115c22a8485b584280cc6def9a31c329282425436
SHA256ebfa15e0180a854d3369d96ef28c0f4fc3530b0755622e187dc656ac0c3ab778
SHA5120a1d8a4e2e9318e450d50dd63eab88ca8a2231e56733f26ef22554ac05192e97c60e73d2c9c839a70c0e230aa125964f26ccbce4669aab0dcb4d45e65b457373
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560812377b3e1a35054b8c263f1bc0619
SHA17579ef075155e3a1d88ec4313b73bd727977b0cf
SHA2569f67dedb1a3a47203e3d3e942c9864c9953d2008d621853101a579d91b5eaff1
SHA512317b92adf594ec3e5b7474ce8f58991109bece3404fb3f83f9b31cb6d290b6b4252c4c2610f8cdb946e8c0d51257fb93de84d3f4842c3c2cbe83157b3dc1e81a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509d29714ad869459c34e094742d227e0
SHA10f937c84040dcdda17f7117231bc4a30e6b99c3f
SHA256d630eb860f84253d65c536d926993c1836c82246d32045b3b85158c75dafd526
SHA51259f6a54899dc647decc6fcf117cc549d2826ea73b73599ca62b307fa6f7e643d508eb19476414f7255ea655f10e0d3dda8eab45a03388fae835c6575b2eebb0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5043b6f57a1cc6d453b1d21e8933092ae
SHA1bf58d08be7733fa5644f45adfa4a7075fb95ab16
SHA2566a463904228ab23ebc8f530045e8dad0e468dc093b931518e164fcbccd0e6ce5
SHA51237aa32faf90eca718019b0caf8e75fbf21b119a347a9a7a4ac64ffdd2ed11142f004e6b2c2988914cc8e790afcecb403edf412d021a01a151c9708447b757fce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579e2f5ef273a0ba8a64b41d39834da5d
SHA1a5ea0e11cab09c9f42c39c19079cddc3daefdcb2
SHA25623cd2c3f32e1a54922b2f5c05d287976a170f7caf2dd7a97dba5d7c0f0d1a1bc
SHA512d2e2a96a7a8ae146ee1fcd9606fae3f57738a3e73883448f4f77ff769616a782b02b44a99edbf95f0a3eabea78706536189aa49223e9ee80cc804a5fb588eb6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5252829363d0475387f1def55779dba91
SHA1030e02b9fac8780b8bb406425851e74e77a18e44
SHA256803d67df38114866844d27352d4b1af6048ba980cff7b9ae0eb421baa71cac83
SHA5121086ee4a555a408bb5c6c93ce53c5e4bbae834aeb452e4af5e3f7a91f8faa6bccc382057a47109b0c411e6998c489096c9582459dd491a6b1f4b7dcb002e2409
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab62df9d158503c33d3df1f7b13f3ae8
SHA160236bed23e5c455a8ef197b08e38b94d1469040
SHA25697ab1c0205702dbf869ad9bbc4694217aa21dc42395cf6bedfbcb55c6f8ec1ad
SHA512b8bb31d450b22a890c92c78f8e86a3ee0866873270cc37d415b9635dedec29ce2f1d908c669113de0f336e077737ae42851dd85b5ad952b8e6e3521db494ebcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe37f115ae629c0bb129f53dedfe75dd
SHA1b33dcbb5de7214f42a8c05a81e8b3a55449289ab
SHA25624142c924c0181b928c92db3b175afd358ef275f8d146052fa38e3c061f5e2cd
SHA51221bea19a12a431e133e382de888636aa8c3c6c4d5c0e68410b9c9a41ed074faf6acd59bc683aaea81ab9b3c98703c50e9a90ecd77d8d8a63f4ce3b06c67ae41e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5220c3ff36a8fc87fcae594c01dcef79e
SHA1c9c72afc6ef1e81df7821c7d7579768d1b51fef1
SHA25646cb1d39e3f315b0159226091985158dd52c51d8ce464cd25b89fac0a077a02a
SHA512cf27a0b86eff54d2e05aa8aa57e3b13d34b59a1ec3abcefba1d388e71a945cf26b46234aefc316d3b3faf98ee4ab5f98edd4b7e0a9b39e0d9f4d0af0de16963a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c678ca0792aa864ef6f3ef18d775bdc0
SHA16381d54885b5dce6ea2a2dc8fc5e5c05abe3ed7f
SHA2560adcf4215ed70eb7b6330ef0905b4797427f3f2507c959b82550284f0bb2ff2d
SHA512c8189b6d39f9a102748fb1f48214dc2dfe853431bdb0edc341a6dddc53bf40d6789ce4d7fa44f6f12537b6a518fef9fb002a9e0787ca0e20954a6b5205b59332
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517b961bd58cbd1e9a1dc74b6cb7cc40d
SHA11092d4edf4e12806e47bba51b3d787cd2069cdfe
SHA256e5f6bbb99b92ec554b32b2b17d3f8ba9fc236cb41e5edc6c93344781d7a001a5
SHA5128d27cd9a0f86249a0c008f83a22337f356d477e98de0c64691b020f26044d54493f63cd27c22bc6084b292f5a5b187b3aa425fd9481f31740688273a9fc6265e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a