Analysis
-
max time kernel
117s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-05-2024 09:49
Static task
static1
Behavioral task
behavioral1
Sample
244ac22cd1d62174f62d8a1344d0650d_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
244ac22cd1d62174f62d8a1344d0650d_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
244ac22cd1d62174f62d8a1344d0650d_JaffaCakes118.html
-
Size
460KB
-
MD5
244ac22cd1d62174f62d8a1344d0650d
-
SHA1
35b23aa65caf6063da56a16f39ca3c2eaf5662da
-
SHA256
8051bc9860d0c7f30d964b01a10544897dca166cd559edd67bb3222b35718ff2
-
SHA512
06be81bd93d8be299a09d262ade37ffddb0cd708c5f8c94b3ad2d0f686b1c8f6a6cf5f25bcb032044e5ceee1fbcbaaf83fdfcb8e47bbce7c21618c7e15f3a89a
-
SSDEEP
6144:S8sMYod+X3oI+YCsMYod+X3oI+Y9sMYod+X3oI+YLsMYod+X3oI+YQ:L5d+X3a5d+X3P5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a70000000000200000000001066000000010000200000007ec119053c8e40646bdd9da9ffa2d04ac83edcea850f5f3829cc4872cf06a982000000000e80000000020000200000007df4ac6bb384327d95260e59973741f0bbb5e2bc82fa29a705f144337f3d24612000000088292ba4e1a658fafb8dd1726369bd0fd7970f03ade6141028c82e67deccb875400000004a1c1093f5b362031ff7600caa4b128ceac15a3da1b83da03faf120e8e7ad1613fd372ae6442e133d9b9143eb88b4766376464d933d3f0670c94edbcb642c2e2 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421323646" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 403163212da1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{48D86B01-0D20-11EF-8DE7-EEF45767FDFF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1968 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1968 iexplore.exe 1968 iexplore.exe 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1968 wrote to memory of 2476 1968 iexplore.exe 28 PID 1968 wrote to memory of 2476 1968 iexplore.exe 28 PID 1968 wrote to memory of 2476 1968 iexplore.exe 28 PID 1968 wrote to memory of 2476 1968 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\244ac22cd1d62174f62d8a1344d0650d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1968 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9c4a34d448fc3e0cd84fe059d45bd86
SHA1d7201256974fd9d0df113c603304b3ce3716153a
SHA256b9c4eb3ede60ac43b204aaba66d2b0643958ccf9d948c1ad21862d584f3247ea
SHA512393de67a28248ab573dd416ff24bf3add194e1b52b042d76cfc3f3886ec4cb902284165bc65efd4d286aaaba27e22f149a25acc7725b0675285ddf6b366e4ebc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56496f7f24ae554bc45ad851ad9199e56
SHA1e8a2a130929e5d877e59fbd816dbf02322c6fb96
SHA256e2a14570ae08d8311d4d7778868ae213179e778e76508ea50258786e367baddf
SHA512a70d264e916cba9d6a7f17e0b6cef1ff0b16e13721a80b572b33e713aae8e358cb0b2a614eb9101505e4492e3076889305d60f3fc32644da23bc057b923e1aed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc1a22750ce12516a19ae084b718cf21
SHA16032f69dd66e45e96a8a93813d07ca1d392d8bc1
SHA2568ec425677f2304ea6e381730aacd88460ac4be08999f840837072d68733e1ce7
SHA512fcbab01f391e3863b4934baf1909babc46c181a610c2b56b0c1ad4cf0e36e6e2cb03c475a051a899e44b10c69d20869dda41cbda737ced42f5d505fb09fb20e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5814a62d45b919ec7e81ea6a3df70111f
SHA16e79ef4cb9a1cccc44258fa5e3a94682365b9b54
SHA256fd92bfb826344a0600a070f54f0c611f2f6b425cd2dee918c7a4dff11907f2a4
SHA5124cfe2cf4b140fc8bed2a3d2ce9f752fda5717b0c0cdcbebfe03c1fe722f80c73b700236c44066f777fd177c49686ebd27a445cf38dd691b04642bb7f8f0d736c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b475c67550270a8b0ff163f0a16f11f
SHA1b0525c8d32b84cedced808cc5d9fb4793e889c55
SHA256ebeb0ec1dd626dcc25eb6e52f055f46d362aabb2047ec07579004aeee288f3c9
SHA5123a3bf164ada080230492e63aef61429d7dc509f9ec6de2c39b33c29861bac794255eb0c42450eaa7a3c288abb09ac19beeed9668ba3b0ec4bde0325af8b29809
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e036c3d2f813b1d2bd6f798594c37069
SHA1d2361bbc21bc84a037a4504d0ee47a75da3537f2
SHA256db359f8a33b42a67ebda5ca66e419003189beb9a8aee9be67df5e8d7e7fb7e48
SHA512216142c7101b72af609cf8895206d7777e960b72886d9c94dc2f25571fcff49dd41abcf0f83837334d5c0bd5377d16684655628a49df10b5ade3895b63ece280
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5416c4368938d12c9f7d3bf1c5f6dddd5
SHA16cf37da38b89d010990e7b988e3cf0c419bcda8f
SHA256de808d311fbbd7b6e24a1eff61e759cf269eeb52a7478122bfd1827fe9cda42b
SHA512566d7dc6baa6bac942cd73c0d74b6946e100961dd631f3adf6af840361dd85c27ec489c9c4fdb5f0c6e19ac87b542451ae6a1062572e137028f6d63dc98c98f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f45152954edb1aa4679b7ef0278264b
SHA17bde61ba7935ec8f27adb022ad57210d77b4a536
SHA2561e2ef7298d8e657fd1c8682b059833019f269c6cb32f3d188326830d301c2cb4
SHA512baa6fbbfea2a0d0442780948cd055abe39404981f285656cb310940e3411081720a209f546d3c8552fe9af885390dbe9bb4bd893228304ebc2a75841bb57d6c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5295ff7e8a2bcc3295512cee98c21e75e
SHA15efecd2a0460d848368ff1785a8206e9ffc1c682
SHA25639bc44a609e366c6e3e163730ac8de0ad5881c0c38a21a63eab88e79263a5f28
SHA51258e2f753eec2b3ea4739d2100fb07c0fc12b9caa9bf4d99a4e736b77e70719d02095d557a1d7a676bb773b763920f66c6eeb2b7fd42c527196887b1f7599ab0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1693e276250d17ef02d4cf7d78074e0
SHA13f789581a1beda62f87059e26626ca7030d281cf
SHA2563f24f2beb37991a2bbbadfda0947357a4b469d9b3bd9a04f7959530fcee0bcd7
SHA51260c75ba7c1d2d872666bfefadce29d753a3e908f3d275116b0c7e8523a3eebca8acda4324dbfffe57c7b53e47b3f6b8522e9b40a3e6d697d31e1406210035c14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a96ce232e13f1bc1158f620d84a6e29d
SHA189e37c859d40597ae5fe6ee930b0ceedb6a39e18
SHA256fb2a126c7d6ffdf48113dcff39819d7f08c1b8bb930c15c1684881dbf4789088
SHA512e3a6c0bad09d75ab2c5309ee1af9c612044626992d001b8f54972bcce7b28fc0a3d1af32da6a2325b6df7bb7e6a02a319dddc8933c2e0819dbe0a93bca28a642
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589fe22e44da56803f45b1661143a1e62
SHA1623301428c829ecd1d1dcc40183a280353db5038
SHA25612924bca5e7c6bb20e35428603eb8dab0ea96d8a468291cd848b3dc75dfdaad5
SHA512cad316f6941c95afd714e747625290a6550f0f89dbfd76cb90e254642f389b724c976604da78267625c087ec79c822b64dd91a339e85b7882f0390f582804eba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5addb7bb370b21ef159039e1ca2016452
SHA1bda2d15c70cf2e47615042d25678e61352fd873f
SHA2563b0063319ad56888be5ccbb8a5d6a8858aa261c41fcb0795f83281f54910586d
SHA5124187c83f47b7a56873259a381323bc16557d8f2fc1d8b9bf35e7b264ee933d0abf1df31f656c9e7c7917381879b5bd326833c0d95d0e857f13a21e335fa8d37e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0bff773d38d2a73a6d145c66f0e40aa
SHA100de10eecad75058014c64adaf76bfecc907f512
SHA25663afe456ab3c966cec8dd8e73daec21fa0e8bf29b651ded60d5a340bdf41f869
SHA5128d20cdf674380ba3fbe33aa6547cd37ee1a648b1a53f4f69526e419f84d5dbff711d22ceec2f831924b8ac8f2aa49e7b97e562a424b7a1910c43d0face27da5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5153b0a5fccc9925f3bcf750f54f7a6a8
SHA1ee2ffabb35e751f8301343f038234cf052cb3ffb
SHA256615d061069285bfe12e9fe5d7163537ee5239db091a854e94e7e24da756f7147
SHA5126f7d824cdb85c316b5ab32ada496441db69c2f92d8f84d6d73f75c6fcc69095a14b5a4d965fca1a25ca8c949e1357261ee48f9bd316b81be853402dd5d9664a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea9e0fecba217e2908655e563b2fe0f0
SHA13c0155e70dcb6c768145cba60bb9638d4a864719
SHA256d6c19546f410025b2ec8a19bb17d0592b68c16eaa13786c5bc0f8b69138cd06f
SHA5121e9094ef6803394726ce490e25647f6dfff73c6af8605d37cf9b3ad98a6491d2d87b74c1e097397c6d9f1bcca87aa852573c40e49cab2803fe8283dcd1b2a6b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9415b6f29dd24ee763ac183adc0ac95
SHA1caef8cda854db8fa917768a7830ad52359614e32
SHA256ca2e731a3af106fb7e15c43d01e12c33da03685e5659b44d792e7c5eb3654db6
SHA5125f6042ef187f8a53dde759f1ee7557887a2132c0d461756e77fceaa62e5189428c48c35d8a48d5db533887088ea16e2d56dbb2d0e172cf58fd82f2e9f0459798
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0d66813df359cd934809a5da620580d
SHA11808d6eb98045c75a12d0279733b8d5d2683ad0c
SHA25667357864cef66bf517b01c85d0f830062e42cadb23853eec2d599d575bce7d71
SHA5124be0b4e94d006e660860b769c62cc212947beaf13b8cb4f3cf8e9a59c99082366c6c36ed8332b37f246e1629f5d01383da35d3c6799ef7cbae4e2f655fd636e6
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a