Analysis
-
max time kernel
144s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
08-05-2024 16:52
Static task
static1
Behavioral task
behavioral1
Sample
25cc3e8d55a1b8a4d8afb6ce90a576a8_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
25cc3e8d55a1b8a4d8afb6ce90a576a8_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
25cc3e8d55a1b8a4d8afb6ce90a576a8_JaffaCakes118.html
-
Size
29KB
-
MD5
25cc3e8d55a1b8a4d8afb6ce90a576a8
-
SHA1
7cb7a95c71cf74893f68a3cd111958e0cb03b3a9
-
SHA256
b2d844693afdc72c84cc2a3386a260b1673d3e57ad4301eec91f5474402051d8
-
SHA512
4c1db69a1f5fd4fc45a254940e8cd3d6aa0375c11f37b1f485503addaed5241a91d452398e5309eca9cc522c746132daa931be063a371b9e0d58b4f0769e1a8b
-
SSDEEP
768:kZkMNbtfFHxcOVgxUKsgx/ukbNBghl81/u9XI:kZkMNbB1KOVgeKsgx2kIhl8du9XI
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30d4773468a1da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421349012" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000209d3c9256deab8a520bab25d92c6340210ad5f0e2d007ed907dcb74589a1c9a000000000e8000000002000020000000b07676315fb40198f2af1a9905943302db94ce6847c772a5b707e14861807d7b20000000356a36c87463de0c056af8f58463a45751cf4c21b801d924a07ba48b80d63cdd40000000a2835a01af10418da2202a0fef32ae0e607c65ac55f3530a9c67eb17e68b36a4ae6b036f3a8889e31edb5c009366199d8b4192b1f1d2e6355bcf8bb909d1e8da iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5520E191-0D5B-11EF-85C1-E69D59618A5A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2888 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2888 iexplore.exe 2888 iexplore.exe 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2888 wrote to memory of 2396 2888 iexplore.exe 28 PID 2888 wrote to memory of 2396 2888 iexplore.exe 28 PID 2888 wrote to memory of 2396 2888 iexplore.exe 28 PID 2888 wrote to memory of 2396 2888 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\25cc3e8d55a1b8a4d8afb6ce90a576a8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2888 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2396
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
867B
MD5c5dfb849ca051355ee2dba1ac33eb028
SHA1d69b561148f01c77c54578c10926df5b856976ad
SHA256cbb522d7b7f127ad6a0113865bdf1cd4102e7d0759af635a7cf4720dc963c53b
SHA51288289cdd2c2dd1f5f4c13ab2cf9bc601fc634b5945309bedf9fc5b96bf21697b4cd6da2f383497825e02272816befbac4f44955282ffbbd4dd0ddc52281082da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5230005a2875790090af1da9436fa68bc
SHA1e132a137e681054c0e4059ba26f205a4d0b91f01
SHA256d7bcae0bf4596e56abfa7afd9a18be35169215bf9ebf08c78553a972486d07b4
SHA512a1a8de98c2957c496a2415a7dd2fd2deb3bcfa8dc6eb645c56e3739433cc7c9968cc662368f7219e4b886768f66a7e4498eb84a66df0fedd32c99762470c7eba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c0dde60f53122ae158c1e6c710ef43a
SHA1d499a94500280538ee2dac382b7204681a85ef5c
SHA256ffa5130937d3765d32cc54b777068ccfa22b26e7bef479dbc117687c24307941
SHA51230a2cfa6802444964c717a5a99cfab35236dae5e9cf4a0171be8d950b0a7e8a94b357ac1f4cdf8652863d6a5af663695563d0e87e3dbc7b2e26d68748843f74a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568408829732ba6992ac38a46bda007e2
SHA1261979dc788f2dcdc32a11c11d0e6c709c628e0c
SHA256529dec9e943ac87fba0c24af57fd25cc8d48b21a882310b558b2dde993ea16d8
SHA51217e2c12e215457ed610d84f3fa8754a6922602f90964391ba24d09c9583fab1ac0ae8ffc2e3c9dd2c5e6c5995edf5a280d8489e7901a1945c772d74654d38c88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a16ee584355b124507046a5e85dfe168
SHA12c93c31e8fbab90a84f6dd98056d22e5dfef643a
SHA256a24f2e80e940bb3a5c52fc089937320e923097daa265ff80adf0f234af00b487
SHA5123876dc10d2305393bcba2f49c897c1cd95d3dd62b5b3beabb86c2c5b04a1f0ec47d310797574b36cee2f63b5e6f9cc915c2bbaf34d8ac25208fad08ff86c0172
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb73d04d04a77b8319c55553341a8e3c
SHA110e04b5062dd8a58b417664d0f6e8ac1d1b33f46
SHA2569496284fd088cf19a2f6fe1935dc978dfeade62db978e21731a99837908a1fd8
SHA512cfb7f014928d1b18dc30c4fb26e89eaf06f7909938d9b13b66791b107a00a7eab69158171a55d02546262b19851dc510a344909e3db85e14d8a2b3701c3074d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7a2d8bec16d6f289698313ab0cfd8d9
SHA1442d3a56ee7b9786e845027529c1920d8ad4e586
SHA25682ecdad5d1c6f17235bf55a798bd278b00243309a85131c5b97c52ca93557624
SHA512ceacb3f896e6ad5b503bc3d10177b8296b69c75dd1c424ce6e746e3129cf8b6391a9a34ebfad8e6eb5785560686079d50adb289224a1c2930125b9a319f8647c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb1817ed11d01f1122a93abb5ba86bfe
SHA127d60b34d87b272f424567d61c4c9bbe3582f97f
SHA256a7557bfbf20c5116e0e3b2449b43933597500e530767f5badefddfea51bb69f3
SHA512f15cd67fb00bc68f873edbdaf3a6f80916f5d61f2fd62fd66bc5052c98252d76878bf1dc1cf2dcfa4ef4b107fef78d79f11a31284bbbd77c1f4802af8889a4c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c21d86597db5b8a2fa77171b79379e9
SHA12b12b353118511b2a949025a2ddf272e8b9cdb25
SHA256bd852824581ad2fcfba2d98e5000d1650c33a7dc2615341e190cf6ecbcc1f7f4
SHA5123dc5e4ac00c7f9b16248111fdba53113b3c97925e0341d64389b81a4771dc333a6de1d18b037e29047afb3525c50f1905d7425ba233dc89aa1006a414ed9508d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6e23705c14117cda90dcc151bd3015a
SHA13f653ab59767aa53143b195badeb5bd5862fb0b3
SHA25672b9829fb673e490e8f13d8f197574065caaba7abe1d467fdc85f64b595475bb
SHA5122ac27d133348019959f5e75aa871420ebdd3d0ea08881dc4f28a071370838306db743496231bcb0020de9539bba1f08843291bd3203672f7efd5a8513911dafe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5620b27a9298ca4bc4d95fde5d50f03c4
SHA17c19f40c6608e55c69149fd2b4563b6df0d41b40
SHA2561484610d683d59ed2a2d33804011ed03698bb88fcb501780e79440aec6bcb99d
SHA512b326a489d2a6d6b18a5d26b6d9f44faf3af04ac0bed3ff9b81a52bae24c0837dc7070f6e00f15bec5f7b02093d4f8e54511d550f0ef0e7a9bb98db035de7f8dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5374d888360d5f6e4b1b2379e081fbc77
SHA13637d3a4086f06b84c25b4d5908ee79dea113161
SHA256024e08d3071fa6d71cfeab8cf715c86afaaa45b6c3ef235c993378b0b5de21ca
SHA512e02c09de81aa0b042e140b419ee3b61ca6424acc18930bfae569345740bbf07cc3432d8a8fe86b731f2443d9ef6b400dc5dd34ae8a256b1c09c6e1b9189ba801
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d47a156aa77bc7377ea8de4219a6320
SHA12be25d5572b7d969bb3effbbb870bd68063280bb
SHA256e3d552242897dbf5a885f0bb50e6f5abe0e0cc38613cacfde2ca510db0ccd536
SHA5122ac3093fb82f9669c015d37b9e2cc1b07fd7a805615c64695059b1bf4f5707317cf4c5170947bfac107bdb42ba9747e722523ec1cbadf7023cb6861dbe0211af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b29abeed0848c93c1469d0f3aed44b0
SHA1176357e3f7cb2fd2a945a79f0afb65a159dc46fb
SHA25611bf68ba608bc92807f145c8849e9ff10afa0c5a69b603b56fab3019fe41505d
SHA5129debd265953b6c9b48f403193d3682c455e82bf9eba330fe2a3135205df765b749a51c7c4ca9fd2398a094489b193fc11064b44432f5b5652a45cf0497455f9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2b814ae740535e3c5d532a614c97b35
SHA17a903a2227860a2476868ee640c296fcb62d1236
SHA256354f1a00f668ea362cf3a49b99578baf08239b99ff86570b7e9512adb82af120
SHA5123ae5031f28686a013cb5ef0b954fb9c79cd15a9528f00648da93452545c036e80d83ad9210e18a478a17f95777c79afd9ba449803bbf8acea4ad26a19adff78f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569ec372d01b3c4bf055cd95870c0d12c
SHA1b4d5f45035e169776b8c7e3e52e0ff84e3d399ae
SHA25648b48eaaa2313431cb684b18f9948ec3e2e63a93acaa11a59a3851b6c0ec6493
SHA51257c3976e12b81c824dda88b380dc989c74cd35146e905c8629a9d2ad31249477db7790bd3d6e152e9074a654b0e43b6eb8a6f2a82c946e8097d6ac517aa6ff1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515bb192738cc6aca685a9fdd9e1e5626
SHA1a48f168f93dd3c60edf1f4f13e5d7566ae0d3730
SHA2560e8e83cb5f7178295f5aa36e212d24d494e404efdd79739a5872fea331dadf0b
SHA51202218a4713a9fb8606047bd9c8b1bfd83e06c066c9a68e960660fbd006842623745b80fa4a81c28b15d6f0fe262cb37563e9897627b28745c43a0eb654246a18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55580f00d5138449616117d1a5090dc21
SHA1ebf86cd9ba2de00f75c92dc31740503b5e796f43
SHA2563b16adef39b017c0ff4463e0124535654c187301db02cb9afa14f4564d1b3331
SHA51216791fd0f8b2cf5f7efff0e3b1cb3947c81674aaea726700617182fa6d5b30349ba927f146e8ded4e2d3348f39cd107315154707795e828c5908ba6c99e13257
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F59A01A8B782D93EA6991BC172CEFFB1
Filesize242B
MD5c2f16d22cf6150620f04dcda1e1a3785
SHA1ea63421a059cb339368e7c7fa723da6b60f55187
SHA256b5b458679fd27ef993430a9104c9ccfa4b8668c37f4b6954313a1d86752a947e
SHA512a82d26d58186fa48209666fd02342e702baf731fe59473a5307cbf2b02785599f248c06742afdb3be56bd3efc8c5df042c0b1ca696facc1cc4ea89be19523514
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a