Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 01:56
Static task
static1
Behavioral task
behavioral1
Sample
27be14c19b89e701676e6ade933d14c8_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
27be14c19b89e701676e6ade933d14c8_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
27be14c19b89e701676e6ade933d14c8_JaffaCakes118.html
-
Size
11KB
-
MD5
27be14c19b89e701676e6ade933d14c8
-
SHA1
f2999de874aabbb0bdeb171a0d6278dca9db54f2
-
SHA256
c09c87d17e3ba4b629637ac140ca0ca8a203d85dd141f69e67518607e3a0ca39
-
SHA512
f129a21577e8540c02e490816ad224b52516f8c55625e0624a3a320a9b0ce4958d313d3b390064a08416483d8a64bb90a8933592471096da85881b955ea6fe32
-
SSDEEP
192:SIxf1oqju62VxRVV5/BOcYGJDWjrOEOKaVVVkr6gaylDnTbT8lqyH0JaM:SIx9oOJ2Vx/jJOcYGJsrEKaVVVkr6gaQ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000008e3dba222ee16952245c18fc618c2dc448ca64f27d33f6f741872624ee8fe460000000000e800000000200002000000093b056f72a666429b4c81b9de1da2f79b3b9c857ff6c77a5a0ee00254a5a79a82000000093a374ec92b7ad631cb2bd3327451b0e1111e1eea1fbf90c6d3a2e515957452b400000001459e34020b60f1100b8795a723443061bc781c418978da4960bc8f114f0640db8b6bdc02fd20739584c964ad0a882329c96da48b517c3bdb617c82f648291ce iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{61CED861-0DA7-11EF-931A-4205ACB4EED4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421381669" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5078b077b4a1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000472e5430bc5f06062565c79b6e114e68aa50d37c410bf0b8d7e0590975c87bcb000000000e800000000200002000000025e50097b15584172a06863773b3e25be3012843d59a5b1059d6963b4837cbd190000000413f5a46c886df8a63c8a552f7945bd09b5d5c8327678a0e2bd3f8bd359d77145cc02ee1654bdbf94d3a47a58384f98d1b116aa2aa2e5106f578618f37f535cef500b04a7af0a0eb32c4dabd8760f920e7e2e74c2dcde03734795765e83111e3d5b40fa9e9cb2c39204dee0e6b4d6b8d07468aadd932d8306643f34ee74653d917ff5d7879ae6e25e25376039940145740000000b30ca557932db5109f88066f8cf6215dd2cd03476d6802fdd3ec7ee1a1dca3b7a218944779fcaa506d52f2676ce2d4caa605b48d087e66e5b212aaa8f5394d13 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2216 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2216 iexplore.exe 2216 iexplore.exe 1632 IEXPLORE.EXE 1632 IEXPLORE.EXE 1632 IEXPLORE.EXE 1632 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2216 wrote to memory of 1632 2216 iexplore.exe 28 PID 2216 wrote to memory of 1632 2216 iexplore.exe 28 PID 2216 wrote to memory of 1632 2216 iexplore.exe 28 PID 2216 wrote to memory of 1632 2216 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\27be14c19b89e701676e6ade933d14c8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2216 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab02db36ab4bf122d5938d5e22050ab1
SHA163d103d570323107c2241db721ac1da65a1c4ddd
SHA2562e8aaf6a16307db23b5b83bfd42d4621776da3526c5af53eafe6aa6317da3191
SHA512fb19005bf12e48ba9bc33bac84a6ae65f75397a7ba67977ee324fa3898af4dd35c6e2c8e56ac92c69a38968a40733225428c5bedebe5cb3ce3b7b1361c10615f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad6233226c1d82baa14b1cd72cadf071
SHA1384b2ea839d084b6c6bfdd097e1bd051856be78a
SHA256a2daab8ec3b90676419cfa8078686fbd93c5aedc2cfca3b28300e995cf369074
SHA512b96fceff41d631dbd57c9c4d93bd0b2b9b2e041050d4ad90abc775b470d3bf1835513cd3c1cc6818e604f40e4ecd4230e5ad567e8cc870eee3c2cd2780bc052c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efb0ca0511969a2f86af5ce9dc575e62
SHA1de8139d4886f50968ea4c432ef72ead1686103e7
SHA256b544a669665c052fdab09b48747d451bf8d0cb66d3babc5e78dd2a47119bfbad
SHA5125b1da2bb5ced6b577980ff6f766700f2c7cc161b23c33b640baeace9d10bb1c09f2cbaa435b400a5d7f49256bcb16cbc7756f050be493f54f76fe628030c33a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f8f418d7999cb63866792c41ea1b9fc
SHA11ef8242f6869442f28df355d43898ef3f633384e
SHA256f39507b9bc3bd7eb3057abc2a56b700edc9a89b4c0c4284c1db09755c93f30ba
SHA512c8cd0bf23ea12674ed50f5f63424bec08e9983870682bfbc64a4c72bca99e3a6798dc3de45e5a6e19df9c5555823847be5c177201dfb31c3e1956b35b40195af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d26c1d323e37dc8deac7cc76e1e68cd2
SHA1e169d6f89ea6052de3e1d3874aefcb30a23eac71
SHA25695fb3afab4aec37dc2926706af24833685b54d585328764998c2f06a27c93fdb
SHA5124de4d1f852f04374f8b12ca84314dc4f60d2bfc79346d531d7b9ee69eee492d95725d8510bb92f68a7b1aa556d7d7d0d8aac85a9a0cdf2fcf9b7c91d719604ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fbf9414081745f2d5b6cb8eb07c65b51
SHA10359dfd15c1b6789ae48e1d206df0648fceab98d
SHA256ef9f9ed8976ff16ea4837cdf8581ea719eadc8fc0ae63d7cbd7b1b62678ff6cd
SHA51293a4a4d113cc8ecca79db32d2a88b9d9c29f79695b5a2fb97fdce67998655168a273ceb5eb6f476a7125d13001bdbc5c5d7f3c69f112cc6ec0e44148334fa10e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585063bb3078adee7b0545efda546ee60
SHA10fd8cbcc4126787f1750d3684074866b932eacf7
SHA256dce71b82368067c95efe4d83d46d89a848614625e0bbc02d2f40efad85bd09d7
SHA5126ec67bb77440616330e0a4d0f04f51c3fcc35b2bf08bd5e9448c19fa908737ead2fcff0b9daf4a504af18f99594c1c91c299a3e4040fd1fb8cd4b4eefde21e93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae8c673bef5509e99877f9aeb4097c58
SHA1ae3ef0ccb8ef457e80973013ef1902b1c26801fe
SHA25609d884d68ed499bb6a3c891a29c42ad8b5e6564cfdc9c2d8711340b25a324725
SHA512a7307061cfec3321a074e826116917b61b6771b6dfac54d6c16542c789666d0d45345303b9e3635c871ed37434c6ed662b9167c68f711b36278598352ce9f875
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549fb5935b8c421aeef2afa4f001d7ecd
SHA1cb0ef262eb7885ee31f51ca42d48f342aa5032b6
SHA2568488a44105105e0b9f87d7c57ec4cec784b25712608cf1f8624d6f8ab186d2aa
SHA512ad4ae8f6d4f1107b8fba5916c639a1c5874ac8db0f8ecdb3b110c16c781b34aeacd8d3b0ae0db4c70e58847de3026795cbba1fa08c1f444d9473bdae1bf7ec05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4070139c79602571442df91aadd531b
SHA1777994269d4eacc7e266f3863a260e24230977d9
SHA2567cb0f9a71955d961637f8b86323387a0311e6030d229bd81699b882e9d3890e5
SHA512b56960e5ffb8804638ad02cf7621eb9112c5c7bd284825c1ec74d9d96649697c83a0028ec5595702b5823c53cf56a6fa073752a823dfcd90bb8d487d8e93e6aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5702fb14e5997d11d710144be8cd17ff5
SHA1df35090af8ec024ba4f963638d1f2f8773d7880c
SHA2561aafdc09c5b06210d3e370b1b9727e1c9d9693e123febddd91be40391a93133c
SHA512f396668f3ce1262411114b2b2320fe92be4ce3c7fc0481b58bf3bba0de9400993c92963379ebd82e1b531e0730aac174ea1ec7c6fbdcd3d64c3547e206704127
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d534704156cb53dd86f4bb3fca8b8e4f
SHA1e8fd532e7acfc4a5f3a39fcf13710c247cbd17ca
SHA256d063bc8694ae910e8e75fe886ad59e550611f03b52888b280ce1c9cba8bf7eac
SHA512eeda839dea0dda0e800a6c9d13f8d97c0f26cca13fc564de9a2980b8ae9b0431cb43a7430f099ad94f846fff8b33d3de50f7b7dbb6bb959cc6da9fcfe772ae0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59135f62cc9cda605ed5607330f094580
SHA156a14247ffba46627f3fb7377de304e3d99649f9
SHA25676c7ecfc51afebbbd116449b75146416bb33e55a808ad98c7e0f8db2cd9999a4
SHA512513021a86a64b8b15b099174be524e14540763e5677af9732130fc9b1f8354c04ae5c7eb89aa04efa23997b798def3cad77fe9559e332abd115a4fdc1dda4902
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57bdbde57c9129aee1ea16b1ee5bcbcd3
SHA1938129ebb1227011601f4dd842c83e29974cfbf0
SHA256d64d6a628fd3ae18f93fc493a35f8e5cadb02d23694a33fb377d26e745d4cbf6
SHA512e3730f60c079ab72084933ff59152665281b5ebf885920788c94a0b53fa151122dc701c0714a49981c9d5a3f5acb2e79f8e13b6d2d135a3602338b9034293625
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b516e78a60caa13769e09807e9ef0188
SHA108f687cc607c6b9026d8a48eff4f9c3d34a46e17
SHA256a05f13c3b980d8fb97446bf9b8254e1e35921edccc2062e1cfc033288ffa72de
SHA5120a9d5d68d9909780af6999cc5ae3a6d177ec78fbcc33cd8f28e51b1867b48b78b469cdb712626432f17fbf831d8521df72056a8a52de4576fc095d73446962a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c42c6a19cf88e2f531ef09300f4195be
SHA163319e64d5fec68795db6b76d98ae5a75a72c160
SHA256fe460cbcf0debe6c733168c92f4efa3a0c10707649ab402a31d0b29f50c2392f
SHA512ed9b71e938c3ac878bfbd2bc37b6139cf7533017452d21082999a32e11ec6f020375f71266f8e3ea44f26747fe05dd77833ba6b27f2d54f08a0dfbeb43b0127d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512ed3e498cab9607bc0907cc697fdb65
SHA1f4bf855a3958468c65a87ff5b59eedb48d6d884e
SHA256d015103efca7672bbc88c0e2ba1dacce79788051efce7f2891a8865036b282ce
SHA512e2273f2a3846189b581a02a58672d2c4775f5907002fcf9b8eb9fbce34b8d193d7502615342fb82625b8d0152007a717f61e43d9196bd98931268d3e319daf63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f714afac4c3752765cec1e9ff05b1927
SHA11d8cececa4fd1dad47e04a70f96ab6bae3082895
SHA256e12d57ae94b3e87c694ae4b9aabd99e3ec70c12aacc08bcfbd8abd67a69f5d13
SHA5121a30ce5d2a0ff724f3c156e175beea79f41713669eafbf9168325ff9d4513298782dec613707f12ba26e8ca7c107674e068e46b088e8cd11dc132cacbf227acb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6f2e284783e2c81e1da699f40ca9686
SHA10589bd324a8afc830791bcf52202a84d7b12d2fa
SHA256fb7d6a93ea1d02a2ff5681c82c307fa444c4341c21200be9b07c14910eec6b2f
SHA51251db86fb615f3be2b26ff0b56be6d0fae0f8d77c1d17b92e2cd37ebf4ad84dbd3a52e5e2653114622615c8e19a1e16892b9d539181ecba459ed49a264370d546
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a