Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-05-2024 18:17
Static task
static1
Behavioral task
behavioral1
Sample
261b5e6cf02a0311efdf3e28b8f10a29_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
261b5e6cf02a0311efdf3e28b8f10a29_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
261b5e6cf02a0311efdf3e28b8f10a29_JaffaCakes118.html
-
Size
65KB
-
MD5
261b5e6cf02a0311efdf3e28b8f10a29
-
SHA1
62d0e69ef02b128fea49b26414faed8685a61f33
-
SHA256
939c013f0b3fd8acd430315e9d265b81cfc33210837bbaf5748b907f7929a1df
-
SHA512
ebd22039c239af5cd64b9b9a7a936825751025af2ce635b5ae21b0384b0d3ae34c69dfe5e753ee3539a2c3ca9271d02e7f5e74c1cfdc23e40f54e355caebde84
-
SSDEEP
768:JiTgcM8St8tN99OIss7SQbQiQ9oTymhCZkoTnMdtbBnfBgN8/oyo8QFVG8sG/Ijh:JpC5TNgec0tbrgae+NnzAC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40fdc81674a1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000fa077109b200a406f7bc9b4be485eb209e89d03cdc895db62bc55671a8a67d8d000000000e80000000020000200000000abd2bcd5d65d01fae805b7ada313827f4aeffc0e6c323414a08e9ffb5dde39a900000005786a6f6780ba0889d4c1ea465b90af72284de96d6cab79db70acd17996133603be6a7bc13cf94a937c58949f062e268324a6a0ea0261bb3c219140dec045a412654a7ebea6386abff117257d0682c48b3fbe274a569e94002fcfbf265abfa17ad627d2b32d6603f7476fd40e46332c1b2c0e3495e9bbb4fe3cdd20cad6773d5d49b9ba48f26eed39333eff3a1003f45400000008e87daa5402500e3d9fdeb0c3fdca7f12bc6e4f0b6e577ede56e747852a884d0d67c8dd6d83488c23e2925c8d317e3c37524f3ed613c197cd42e47c6ae727272 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{42147421-0D67-11EF-995F-5A791E92BC44} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421354128" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a960690000000002000000000010660000000100002000000011f84930b6851aa57db077bcfd67d53f104440c9c7032a4f387583829c140f5c000000000e8000000002000020000000881bce5c5fb5f20d515411f6a46b6f25cc2f7aec93903801ec4934b245ee7a5920000000d15169befa895ef298eb51468621c1ef35091d845d51e0056c13d4e17dccc277400000008208377c2a3c35f4c4c2b31bc1993bda73a23394e4933efdc8744ad28da8802deaa0214c2cd15eb7cd61f2e8b94ef5e38f1eb929e78e13a1544fe0952a9e220a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2760 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2760 iexplore.exe 2760 iexplore.exe 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2760 wrote to memory of 3056 2760 iexplore.exe 28 PID 2760 wrote to memory of 3056 2760 iexplore.exe 28 PID 2760 wrote to memory of 3056 2760 iexplore.exe 28 PID 2760 wrote to memory of 3056 2760 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\261b5e6cf02a0311efdf3e28b8f10a29_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2760 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e452903542d0db136de2912ec355724
SHA12752ff85c1f3e6df14be398a1305cb24f20db520
SHA256c757458b599daf03c96c063e2361c82007ff17c75bfd2f3a7339bc95d0104eba
SHA5120b7e49a08d9887c20053afa549882c15c3b1d3a8942a704c2fd3360991174ecb1f926adfc20ed7e32d6fc59fefee3c0277d98f5162301757f140510ae3506504
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5394d0af9660ee40af17fcf5dc3c87a43
SHA141abd8cee84ff371cd97c3757fe11ff5d5bbcfc1
SHA256f78de5ce61ed3fa98c3517a0a4195adb7b000babaf286307dd5aced028172810
SHA51265872f4e5fd96facd0ad13c622622bac697222e1872fe679675530a1b82059c756bf90df1c0629f277a6d47ae84b8ec1fa831e016286d7751982fecf990b052a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ef8c67fbed17874a9982143a3ad6b39
SHA1853177485465f3984e13564bb392bfa651daa0b3
SHA2560d60572c8abec755ab0b897ad3d81f7a047f3fcebe4db550b5ed96e1e2584be4
SHA5122dcedf8155a75ac65e23fe91939a94c6f623b44d89dd8f569468849d402eb06cbcfdde202b19d594e89f7277d4a1008072f3e550d499c40eff755c1ac0059eb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575a841e73437cea99cf6b77133a4b824
SHA17fe28a24b0ddc4d68c1a788e26dd99f8589f9172
SHA256d2827bcc4ab1226d8fa5b0e9672e80910e4f5597c47adda4ce6db0b8e2a875e7
SHA5120889bc5a75c02c00bb8e30b5d698b761bdd612bd8211cf648275284b074c14c4753a12e02823a402b41563c6e8abf139a766b4a5d805131bfea1f1ef11e814df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5364cc4e9f706db17c18af0a7e29e7178
SHA1a464e909d7be4b2c1258f952d69a21908eae6cf0
SHA25657095e59e54af0173bc3d9c3c5832132f2efec455a611f9eccb3e450e155632f
SHA51214195ff8b192f6aa0e5c98fe21ea9b108cfd5fd918e2adb054e7a9d4e529c3fb78f8505ec554914a9dd50e02707b467d65841045a6670e741fb1b4b0957c04f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d837ddef79b6c1ca48a380967acf0b29
SHA16cea04d0a610661baae12b821f4519979a1f7504
SHA2563e73a719c0e20680362efd38b63a5c251b28c629771d7b43b3e673da4bc9a292
SHA51291339ef681cf19abf302994b3f233f5ee06461b24d1ecd4e7ab191062ed6139e540aa3c1b59eac6c7c2f6367b25759cb7943d8c2c029305f2afb191cc97def31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e037a752354fc868d985857ca1dcaf1d
SHA1696300bc82de2ef83e5b5aaeb8cc5743c487de56
SHA25673afba0d739232e91eb39e353b611dfabeabdbb437d2c466c77b691b12e133ad
SHA51273575ad26d7afa44981c085f807304c43c2477a69ab3878d1018e2483a0f712d7b04ffa286ed385142762e2e36bfc40587665b540979e69c45c73b3ee4d35aa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590b5a0fed365d2b1e020ed71432bbc7b
SHA1350d15d64e75b06b4d10fd5a5799986190cc8e39
SHA2567804b9036519653b0422bf07127ca7c122442bdc1c1cbc89ac6321a5f2d90c0a
SHA512f2721fe15cdce2e974441933dc110ae19d1a95aa9eb45caf1156ef8e422ac2e2258b34256e9999b2d2a739dd05a65846ec48bca983348e2abe45fdf4a43bf4c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f33a670b1a89f8e27f5e5b4292c93b5
SHA1f4912cb09ff97d6af18af02f317471a94559929b
SHA2566657801ef770792f186db895e69a6e88af081b18ae0b05a37fadb62ce4aa6a0c
SHA512ddf91dbe458f051710e41b6f2686daafdb9c32f33a4d900641446ff3a03df2bfe02118649b310b2b39daef7e2c4254b9eeb0d68cc9eb35677ba0dee7c3e65e4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e366ec48153d4e523cb9640e2134ee2f
SHA19f710aa95febff7e94e71c12627f16673a4119b9
SHA2568d058b3045561ea1ef11f05b1f93660a6615e5dd923e7c100f718d3ae239b6d2
SHA5123b8810cec0afc8a6dd9504b5bea42bac73f5a6a949f3f9cda2f8dc3657f861432d690f97dfdcde8f245f970bfda341fb0c6477c3255e67032a7c2bfe4d1dcdc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54cfc4840b642f44a0680233155836be1
SHA1467c523b4ba01a490e628329fa0235d1d43a0ce2
SHA256810951af26d65d5d16eea3a80b8793023ce6f156ffc7612828a6448e1ae34ff2
SHA51231ab67652176a3281dc30c6013f1de9cf6c3a43c3372ec50803b8ffdfb2fc6ff708234b88a5da0d23c8e46b452fcfdf75e4ef5b831a1ccae13c403d974aabd10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518e420b848df22d002212ad51558f8d6
SHA1b32faefba03b13368d5ac13f9604ac3a1638d2b7
SHA25697b1e53ab09ead40c4a58a3baa9f88670071c6cdc1afa4542617b340da609026
SHA512b674e42598119e4de8d79772d78aaf59583c5ac247817ab38f051b75890448870b757a66b34fbfb1c6764a78b135f395b59a8805abe2301ae7a8f7a014faa6cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ca904efcbd93a9a95a2fc4def179ca0
SHA192a33cc5a9cb786f074b180ea1ba49ab3476e897
SHA256f15bdfadc121e2b59a89e72e283e54a007603ae27cbaed2904a93c822a212798
SHA5126376a8b26930169cfb7ee94e6188f51328c157ddbbf4b96f2850a6438a52270b5852f1ae5b2ab50d7aeeffb64771f0013c702fb2552e8f50f677e0df088103e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b6d215b603d280992587a64d102bd36
SHA11816e0890d4a29bf721854e9eea60e010b130f35
SHA256c89769b117e4761c6fe378068728c081a3775f65bc9459d17094ec644fb800ab
SHA5125762e84e00b86dc58544eee9778eba329b86aa92f2f9759e583d9911396671b1553a57334f2dd2452497640b5baa4d20179c502e10ccf81ec3499a4a7c5ab3c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3e2b44528cd51a4cb30bafb87f77542
SHA1429dcf522ab232bd1735e4932271c0a3e224e5d6
SHA2567b9466c9dfd1431510dd65771760fdce64cad95fe3892c07fd153a7c475cd91c
SHA5121e73319538738fb2adf092d82399c8a70ae55c82cee7e4d548aea072dd94c84cd7979a9715f4269288daa68449c09aa41598386e336f39a1b005668b9d7a853d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547d6d577f2652cf5edfb2de90a090203
SHA179d792deac33a3dd263dfa1c0c7b03a62ffbd2e8
SHA256c0d8f3eba33bf7d32fd9ec9c52c0396cc6e274599332c05787774d714f5a2bea
SHA512830872697ad952628fff4c45498d78beb43094f7c8254de38ace6feddfa4d27e8c05ef5a9ee83f2c56cce83f444640a0bf6b8d43d273de1024a8f26d17a308b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572eefe091680a1d1504a7b673d6e0e7b
SHA184524fe2a89057f2958cde8324fe40ed8800afd5
SHA2566763ffe7918c18af4bfd1eece6469bcc9253b23ce03708ad7b40aae23816f3cd
SHA512d0898e0f4802b03662b860354c4bb67ae3d124789d05189b942dba53eaffb4e19fd5d6fee1dc49b06afc835b8344ec41829c10deff79fd3b549ecfa561411cb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51af263da1a9d2c85f05f159c72a913fa
SHA1285696f7e5205f4a8f241ca119dc992d3f695d3b
SHA2566db37adbd281bb99af11305229e727915f4e4fe907d13f70543d4b35f76df87e
SHA512a75005348846338317fd22d69bc4c83c7e680d831fcbec24ea1f81ccedcb1e9c152246a7052c866c53dab73165ab6fa686f3b1108e3391cb1cb6f944a97d4785
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a