Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
09-05-2024 03:02
Static task
static1
Behavioral task
behavioral1
Sample
27fb9c4e9390f334ad7a2eb11fbe7a48_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
27fb9c4e9390f334ad7a2eb11fbe7a48_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
27fb9c4e9390f334ad7a2eb11fbe7a48_JaffaCakes118.html
-
Size
4KB
-
MD5
27fb9c4e9390f334ad7a2eb11fbe7a48
-
SHA1
402b571c6d6680ef014003f9d8e935fe4bcb9a9e
-
SHA256
786b6fc51a3e44ad672827793beed2c23d16149344c442c148adc32efc3e76ea
-
SHA512
7b9e6b64c269595f2b389e4c152d0d646da93fec96a5adefc1542084f8ed854df0d6ad9de5835e19ec85666ebd59941a3e7652d9997b54639bbaf9e3c499b1c9
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oOF5rKXF:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDI
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000ccfd2d39b2922c1a203dd49a31a405cea5c953dc7889705d3b4f25e70e8c9c50000000000e8000000002000020000000f0c3b6e2a2c6a454fff5d97947924886dc10f6fcc31154beab95cd6defae73f620000000fdc4d8815e34e08fc6ed76cadaf4a5d3d598514d4e1ae17167280ea7843cb65c400000008934d98a5bbb8c3e3ed72da167fcbefbf23acb59707d22f9b543c0fa55f5e4ad6e3e1403614419f8b01e430c9ffadbe9c222b3486d91f8fa32484afac4970fe0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9EE5A4F1-0DB0-11EF-8FD2-F6A6C85E5F4F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0265173bda1da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421385637" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2924 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2924 iexplore.exe 2924 iexplore.exe 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2924 wrote to memory of 3028 2924 iexplore.exe 28 PID 2924 wrote to memory of 3028 2924 iexplore.exe 28 PID 2924 wrote to memory of 3028 2924 iexplore.exe 28 PID 2924 wrote to memory of 3028 2924 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\27fb9c4e9390f334ad7a2eb11fbe7a48_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2924 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533ee4420e73c0427753823aa8a524353
SHA195669305cf58a884d8214fa172fcf25a689a829d
SHA256533812593b1f527f3d7d41227337706a6b037b2d1f3a0dde4d24511428b43bcb
SHA5122c6642b0ff3c5bd2ea9034501b6822dd0331a8cb1b97660ed70e81fe1e1fc7042edd7c4cca9d7399d83b6245fa4f0cb63992e5807ba623630b83e76b459fadb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a54fc0a8932ea35ed9476884d98c6fc6
SHA1d8579ce31bc98785630d53e0f83b8ae430139ca0
SHA25652f779a2e92ecbb8a7616f2bc89c215beda108014eb91187314ea15729a2107a
SHA5128e203d35f56352539b8a37006d0b0aa1e5a4d954a038fac66b5e294dd2061bcf0fe3949cfbc01d228922dacee3563b355af6c4d3b2f175409400b8c039d8f5b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5737f3083814dee8df7ae5bbc9839c693
SHA1e08e5923a45a4ba2f080cefdcaa6324752cd0fab
SHA25679bd3a6944dc90b7a895e1224db91dd0c4822544d5d0b947caf0a40d5d4c39dd
SHA512481c8966ca8b0c1d81bf8f7b4bb24756fd44f5e35020abf1fa9db2407708d3d0a3a7503cba11a31d5f1584d4757c6f482b406089dad3f1093039f636b159d821
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b83067ca4f0040670ed24d27bd732d01
SHA1a003ad7c7e7cc28dc785ee538b29d0e98dea1b6f
SHA256f904312105fb1648ed08139a7019bfea566fe6953a8c1f68a5a0811cf6cb42d6
SHA51254c42b41f9698e7d9c4c1e1b27e2e5a7eff6acace758055b5fc8bfae4147422478a54d21c7d533d6de2350f968f64aae3f8cfb63e2a2d875297a490494a78daa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542d7f92f3e5d67ef5fe01c3770f5a260
SHA13c688b1bf7c21bc84ab9a22b6d1863275ff56086
SHA2567b07533ba1fca2e873d23dd87ff3ae2d63343606b5522bc185c2e4970e175fd9
SHA5129ae3950a20f54c4954b19ed9f194069106bf82f3f85498b40b9562b09e8e49c1d0490c6da0f7c71b0a97c0df47a2bde1baf38be84e6e31c6da9731770f015236
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584873eb3aa52773bb54aeea679831421
SHA11ad916a95f8ba8dec59fe378979f78136d1afbd4
SHA2569602d201fa25b36d52f581316ae3b13a05ba591d615ad919b4e5d0c1e62238f5
SHA512d9426c9cc6c16f4a8c6ceaa973425443939017c0b6c67f539eb84ee71efd34c041897abf62d4cd5ad31554f685bd2b2e995d90fd83dc7674b4e9c2f43c9834f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fdbee69526416f4a5abd900be8b45fd5
SHA127e282cfce28fcb37446f6c7cdc8c1c0e4b6849e
SHA25633621e91ca79b640b66798d888f7cc2a9a8f48ba5d7be008b4aa5d9f7406721a
SHA512b778b4aee3d2d164474db1c1238f8651aaf6a2e060334cadda47fce6c61ab3d248acdf1342a8eb8b69ed5b8e3547dde4c2c374f6b1dbf6ffaa71146b02a4a981
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551146368d55977510cce44ce79a0ac4e
SHA1e3123ae4668505cb4c2248622c06fbe2427ce5a4
SHA2561e00cb31d782fa90ea63b38e781755ba79ee18863e1e0773dac279c04187b5c1
SHA5122ae638d3ade749255ec35bfa0b8c294d2e9c011004a118da9d7c0f66576928a564a5bb957e7b7c1b56b93db13de1a1d3c75e3ac325d23e0e792092191360e233
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579095bcb805601728f054ce28d119e5b
SHA1e2c8fd7845f86a5ea47d6a855906239b29b667d2
SHA256f95a4ed0f77ba6f0c77e523bb34d21d01f42a47521390d819d880363419ef891
SHA5126de364e3dc0c02f3020e02ff5f0551d6c4565373badb58b517dba376f2bf760b514bf66c41ec69c85484c3a8a052ac609accfc6d62b0e8ab12567b066488b8fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3793327f43e6310b96a9738a021ffa7
SHA16c10beb4e6ac52686269f89cdbd51409fdc00f96
SHA25600cca8fffb4198ed8c2b039ad299dfddd605e8aea361b61d383b73b2bf5cdaba
SHA512deadee7ae967b81ee4dccb509c852666384c1d54eb5408065578a717e929baff30b4a69094bbdaf80bec97480300b3f145f48ac10eaacfd2d58d813daf609d9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db00c7fbe6f654a9b99fff82dc98f181
SHA1409d20a660e4cea9bd169d5d75f06e55e5ae953a
SHA25644a4de0283073e75ac0ff45cbf09b583c7d8dbe4d8048e1e62b4f631343fba90
SHA51214bc286e2b26bf84b251d6b4e78dc1a05e3d1bef2c0893119ac44bd9e2a38bfcaa78d8e680d5fac6bd0358c7f1455af5179a204bde6c9ca5edd6c21c2bff9aae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5563775a534bfe63d9932149c8bebc161
SHA15054791bfcf9fc71afba3a1415e8a11ddd07f54e
SHA256e64e892ebdc39ccf029a48427de8dacae0f13a79faa083b5190881e8a61fb8cb
SHA5120a5b2b6199d1357d545db51a5ffc9663d46d96f5ff69ffe72ec34897d4a78a6f3d1d02dc6c2769f6ab4d8f00edbe32b87b93b13d8d52ebab12700245aff15c45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f5b4aa336d1c4f208b3f0134d1cc4c3
SHA10fa2941a2002ac938bc7cf2a57cf2d7aa7c1520e
SHA2562f3d2910a8218be6950e32252fcb22e974f10129e96474f9aaf468da4ae147a2
SHA5126014feaf06c28f3d2c33d3ac32908a1918d2eebeb74bd2a2a7d19ad08606228519cb89afc0918a48e297a262ec00d138852e821047fabfbf23ced9e30fd720ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543f1c8b176e77d5bb9c3e3c18de64115
SHA1c60f4074de8f9501a468c804fbb3f8d530dbdbbc
SHA25604226e6b04b5c172f3f68e1c3ba6bb8becd91f44e5e9adb8ea6e9a4d120ff2fe
SHA5127ccf3bf731984e9387db01069ddca004b39eb49e462733e3feb8da708edee924d98d7b5366353d743dcaef4476323cda2729345297d811b59e0e6c97956a9c26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5758ec523331526a252a088e2da722acf
SHA13c06f8a373eb9954d3297d955f1524996cb709cb
SHA2562ee3d9752ad2257248ef378b1d28d86c0efce6b2a33b30ceba201b16f0cdf372
SHA51259c67e70606b3304ea85840f90432f9e4ffce5cd5f20a174669883603c5ce2adb7a2e84ad3e17762885f701e0f516a96701dc7a2d85c7adf7eda5fcb8401f014
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5046897aa50644ea499b478e2ee10bd22
SHA17a486d15111d351f8313e75bf5158d608d800bb2
SHA256be9d4f864f19593fe31af7d9852638127673e8dfa701f5084661faac72367e1a
SHA51217431f528eed912c642cf1ebabf5918e18ff21d328c8efe87473a720a91345dde9f7ead2d5a6c9ccdbcc8f31c7ab68e9d84d1044a3022acbfa4e2ac2fc45043b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec0d43c8b1b8c3bb1361c2543e70c449
SHA12002adef5bc102b0527cb3483d6a67eba6bd9419
SHA25652a8ff13e99466cb21f99ac45cc1ebbf75e883f8ee1cb04fdd6012dfd82c162c
SHA51213fed7f0c7088e198efc0c4e50eb94646f3a18661862ea6dca1a65a6f720a1492b5aab35f1f9a7b444a655c3bc4451f3a287670884975f15b10af5304fe16478
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4a41cfd17ca391c192c4a920379701f
SHA1d08a5bc83e0b35505fad6aa3e88c0407f5e76780
SHA2564f912b09a5d14a3c2237fc4b82109330c7e4abdb0e76a5fd52067460f6a1898f
SHA512f3c9cd4bb4614d3900eb4cb53017f9ef2df6050d99a4af879690ca5e44988d31f7075f465d2129fca9c807ffba06f014f37dcc60628f302bc690a01b2b426483
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a