Analysis
-
max time kernel
120s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
09-05-2024 03:05
Static task
static1
Behavioral task
behavioral1
Sample
27fedd80b2f7af0e952bb83c91344771_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
27fedd80b2f7af0e952bb83c91344771_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
27fedd80b2f7af0e952bb83c91344771_JaffaCakes118.html
-
Size
68KB
-
MD5
27fedd80b2f7af0e952bb83c91344771
-
SHA1
777908ac83f8f61d73eced337343b5e6958c9b1c
-
SHA256
28b63c9f10fdb8634758520996b13159999d5793b04c3ca1c80b5cfc8e474ff3
-
SHA512
f564432e0c35aef90afc9af99d40734156c350eb3e0f71d346235cc9d0a4681261de3766a9ae199a6814fb67cad25ea5d5b01b58b40c3fd269eb8108988ebf8e
-
SSDEEP
768:JiEgcMiR3sI2PDDnX0g6UVyWy3oAoTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVh:Jorry3odTcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5016adddbda1da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421385812" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000ddaa04f909f6b5cf54e571b9a45f7a0753c57530fc3d449a1e519ea17a1cbc95000000000e8000000002000020000000f71216bb6de4eb7f90ef8112f0fc8f3e8a78b8845450d147470f51e397b4c5f820000000aed441178050f0a120c7842f48dc3b8fc1d314bc5ae91344f50594ebedee365940000000e15ac26c15f5dbc9596217e9fad670c6774c80fc26dfb578f0b828f19f86bbcb0f9b13cd00262edde0a8082ffead20ff9d951dfef5bfb7cb5651323db9d04850 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0736D831-0DB1-11EF-A3F8-62949D229D16} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2204 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2204 iexplore.exe 2204 iexplore.exe 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2948 2204 iexplore.exe 28 PID 2204 wrote to memory of 2948 2204 iexplore.exe 28 PID 2204 wrote to memory of 2948 2204 iexplore.exe 28 PID 2204 wrote to memory of 2948 2204 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\27fedd80b2f7af0e952bb83c91344771_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2204 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54da255d3fe2aa0974fa13a6d1cee65dc
SHA15b36d74b0003d6d8dd5033a8e15618d00e065390
SHA2568d65d8e0d87f86484af7ca39cca7938e3508aa02666442e02ebbdf1b30c0a83b
SHA512772edabfee1da0c334a472a4ad71461ef099807bc5a853fa642e3e65a8c5a38068020ebe0179b91a7b522508356e7c4855359965977e97434122ef82b231e2b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565e5dfeba590b0e35fe4262629341235
SHA1dd8653de64572c8c9c0625259c60b38473314beb
SHA256d9075db49ec818aabcc179412aa96a409d1a6c223ceef40af0baba00723d9b5b
SHA512c389a0c312c69f9d04b2f7856b74022ef1d83628d297e7fcceaa644606251cecd02a4a7912120242516819e86ae3ab6b9d241450c4dea276851d2dc945fc23eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b07f396cfc8e0d34e512ce124b3414b4
SHA1f01b5f42af9f27739975536e5be1c21ca92d8712
SHA25600cf6b32a81c9dc65720ccaae9422438d4a9d0a10d1886a27461a6e7b1e651f6
SHA5129ae69f617a2dfb8ee2cc6402712b7a041ce2398601c00ac79b6adb7b117aad868277dd3b7b431d8401741605ce93a88437fadf755501610d330e2375a5904898
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520e2a68544fabfa1be0a9c8f34e476d0
SHA195809cfb95e46ab3fba36338cc4df8a440f3b1eb
SHA256f796540c2e2dff15e9b4815a6d6a01dabf3de11dd47dc68956c788f36036aa2d
SHA512756603e90cee7c4346a04a4a3f5eb8daf9c20681bb957476c76a487ffad6aa55efa4bad96a642cdcf65e006cc95cec9547c5cdc48928951eff8762e4bf0fa871
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553223d616936d32ac727db0c4250e71e
SHA1a3ba1fa0921868149093fec40f65f3147400a0e3
SHA2569f7721f1378a3aee7c3b4856c927bdac1f42cae16f39ab8e3e7418e33d996a44
SHA5120231ab139d2626cabb93b126f47ba4b8da046ab5f5c50b5a120db94c5195d6315f98c7f1ea357504459e429a482aabb2c7298130d1138c8522ca81c60d7726cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efef3a7b044bb6772f70ac6e3939c1c4
SHA1acea106adb10b126bee0b03981a1c4962346fd9d
SHA25634f432b02b7393b04f588f405fb8cb72403d6e7def0a7adff5ce03c96265188d
SHA51273b5ba034b43fd91757b2d859dba490ed8a8566e9acdf7d1738478c752e35273619d44c7a6679a40b0e2e5dc39b43bf70f98c8605b76b26226f6e1cbf1a33eee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2188412202861615e4ba2a983f60b05
SHA1fd29aa8a4c24983e2a4f3c28e028a8b81ae0d774
SHA25603a6752ae5d61f8ec4a40d5fc50baa78c739ee9a3aa8231b18d1c3ef489fd469
SHA512da7c3befad5fefb190caefab9d5dd275a16c1a69caa157b0ab155a35da6ba8bc665aab1d6986807b90a8458e6eee25987a074770aa9f8fc7252bf7662b83df36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b989034dd230cc13892a1f3d819378d
SHA107ec86f5e3cf2a0e0af048898f84477ca03a7630
SHA25668aac3c09ea081590eb6edd316e32f65c94fdd5c961c18cecc992446b93df1b9
SHA5123dfe3937e814458566dd38626bd57bc1273d28d13bb61341531e4f43fac36455962d9e05b5c8577bbbcbc983031afb4d613aea9b3593fcf454de3930d85caaa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cdd92e56c7601b9c65c9a82767722aae
SHA127eb6f394c6934a9055ca4db8089d1e7d4ea7e8e
SHA2569fc2f00ab166a6a9b156ef15734c7e7b193947e1dc2e5dbba1da6ef972d4b3b2
SHA512e7c5348bf4bd07966f40658cb7942accea8750a01987b453bf51110514ca354d4545e0f40c708f1f0aa2b32a11f87fa2eed394b7ce2d9ebcd909f5e4b3344a67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8e4c790628afa7a8f197042e91c72e6
SHA1641819b75d66a997a2609fe4677ec540113c37b7
SHA256377438406be83481a7394078335a9f5a0fd231312a8c01fa1aed7a1d7195b46b
SHA5126ad07b4c952df93e3719da3af13657737b0a7a558f1c4cb0e17095a40e8b841d1c2bea0137c8c9def568ad14694c28dedcf64916bc968ef03e72310045f29aa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e20a6382e84f4e0a7b38461ae2f27cf7
SHA1b4417e1436e03c6dae532343e67dfacc91a6494a
SHA25658c6109f9706dfc54dc711f8f7f94137e26785c7bd3d13f284bebd494ae2eadd
SHA512ea87471ca31bbbce715f57ec8f5da437533882f27f04404b2ab9a994e82ca5b0b11af807e172528d9dabec511c4911f6f2d94d4c6b044ddc0d4e351adfaa0423
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56dcb4f569fd10e7b498e3837fe4dfa92
SHA131d8e22d71fb9cbe7a349b38cd27b35c12efa95b
SHA256c273ec881513af99983914077b76d4b02f1f4f588581e8a8c884ac50c73ed48c
SHA5122f3f4cac33f9dd3bd1151793bf970bd72c15d5b373653e301b7e3a708758beb1256719359ad9d26063fc32ee6fc0163aee7de34692f921734396627c640d9def
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524c8f7a5173342a122e59a6644d2f091
SHA15ad98ab76000b6825f77345b7c28726a6cb3c7ee
SHA2560fde7195438992c1bdcb3b529452dd32543cc49ecd06c1c683340a412ce2ce94
SHA512e113b8d605ce72029a2d8e27e2752d8954f6c2169ee8f862b7789a893a71155bd4cf3b692319ee2215a28a827132b28936be5f5319a121b72297a1898fc69d1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b056fa64e14c75ea788877f87d24237e
SHA1aaaec29fa10e4e8680463caa46aa743308f4cba6
SHA256669024a3ab6e4fe8d3575fb2324c012290f3a570064f664efe9cb08119de5728
SHA512766e1cf4736b4f9697f1e81ad5f77ea477415980a25591c8be505518dc279f06e2e8503eb8015870f28459b74daa77af91b5a8ea4ec17437f8fe3c450b7e001b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a31e3a4881e9fc8439b2267db64b66d
SHA18fbda92f28bd334cceb1d4189c55b0f855d0adbb
SHA25662ea354dfcacf3baa5b8101bdb7f4f0c398ad5acef1e95b840e94fcf4bf0e064
SHA512d611abe91b11cc0f23458e162f323becbb99fd40699a79c89d479052f0b587801477e3973db273c819fe1663f92d7a4c81060dfe1f3245130ffb5284178787cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b63eec145249e81fdb53297a8a5d3841
SHA12fe0a43f7f015feffb1379f9665a0144a72779dc
SHA25674b953a802021df1725140d2a2c1949065f0b10e75368c84633b95628899a836
SHA51286c2aaad9406352ac31f78f03f334c833bb7f3ef2230b0d748b8cb7d01d97f07e6eb8c745d9bb71cc93bef53f948f38d0aeae021d7b542371821c9bd1dafcd58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a984464293091e4566a137c416bcbb3
SHA1db1133b9647d1cbb703a804d97b20ad4d6afdeed
SHA256efa587b66ce8d7709e5204f5b4f0cfafdb5e9fca3d265bc2b35619a2711c3aca
SHA512f1d2323336f3acf0095b1f19d3e6a880d2f33a8fae9e8196155f3e370557569ae721f7bb7c5987b448b21a65d404d5cd2fe70c5fb248cc7a3e5c985a4f16bd5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1c3cd8e52b5631ac2898c1b4609f5ac
SHA1f6d19ce125c1d337c31570d1c1cb08c0266fb3ad
SHA256f9c990d016d72eb63fddb8ebfd2dbf090564c92f962cfb5c7aed262e424cf7a0
SHA5120ceda3cf701de9add57ee3fa4b47e51d45d694fbc33cca1862a626a943ee3e7d3097c0a352ebed0295d26ac5a84044653f18399391274285bc8493d0aaa8067e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1ad713e47a2389d8aea824fae5b68e0
SHA193d657f600aeddca0f540726f29ce435b1aa48ac
SHA25620f40f72e60777fb1e8343025ea3cc5a5b86006de48a9265f6a0960ad6f3dcdb
SHA5125f2de4d8d160114cb8153d630e4afb24702eb7a39e4aec714a3d1c71107273956c08efecb5da91907c6880507cc413f48b5e6839117a64b7da6471af8700fae2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a