Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 05:21
Static task
static1
Behavioral task
behavioral1
Sample
28780c2df60262b31e1702e39cd22b09_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
28780c2df60262b31e1702e39cd22b09_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
28780c2df60262b31e1702e39cd22b09_JaffaCakes118.html
-
Size
460KB
-
MD5
28780c2df60262b31e1702e39cd22b09
-
SHA1
bcbb31ea1a7ebcfb20980e885b8a6c86c10cc066
-
SHA256
041aaf47111359046a3b1d39a0172a8226ff277ff9afe0217306452a944603f8
-
SHA512
daa2351b789941d44077b77a88fca510fc041eedc1f2a3c33d019e749dec16013ade84e4de80d03f6b2a65e4ec9555b636c6b8eb0de45b1405c930630019ac64
-
SSDEEP
6144:SXsMYod+X3oI+YAsMYod+X3oI+YgsMYod+X3oI+YLsMYod+X3oI+YQ:O5d+X3o5d+X3A5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F3DFB961-0DC3-11EF-B411-768C8F534424} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421393940" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80256cccd0a1da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c6000000000200000000001066000000010000200000000fbb2f39d0d79a1622fce4d5c9e58fa9ae5f4f3235c875a36b91faf597860204000000000e8000000002000020000000a89662b505aadc23cc42006a9ae3f7c62b56c1e0d14304e92a117758c9211b5020000000626a1b003952c6df2a3986df52753eab1cbd0b870ae9ea7915a1ad6d5c39ab0040000000d77e22f41bebbfda3594eabf5bcf5e8f6cd2d0cdbf414a99d17274e2a2ceb6748561e70d01e83f3bc3f80b3d9562989106b245ab62ad71106afe47931f3b3167 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2240 iexplore.exe 2240 iexplore.exe 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2640 2240 iexplore.exe 28 PID 2240 wrote to memory of 2640 2240 iexplore.exe 28 PID 2240 wrote to memory of 2640 2240 iexplore.exe 28 PID 2240 wrote to memory of 2640 2240 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\28780c2df60262b31e1702e39cd22b09_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566242f962e0f595ad735bdfa523970d7
SHA159583451444463174c7c8a485c3484d4aaa807de
SHA256ad31da78eaf79602b3f3e8c56907057750fb85a246892ede7959f572715251f6
SHA5121b871cd713ede78c03f7b08777cdb479d23a2ea91205eb0828285c6082825137c959bd629769403a11ba3ebee9cb96b7ee49e6b7766809001e56ca183762721a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546946dc1944ca7604b0092bd2d4894d7
SHA12e4774f17d04351dc6c5bcd0501ef2a91a11436a
SHA256e90a112832133b52ae53631b796386763b7c7fc07748f246d6901bb18401a180
SHA51264849516bf00caae6682d7719de719d0f34dc9afeaff12ec41f64ad85b2dfa6b0a14b2d62b9698badbac97f966b795832dd0c268e61868b92819969d31fa28b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547ad6b28ee5621901fb48a468ac1aa9e
SHA1b9384a005642607517a42fa01bb7feabb1680bc8
SHA2563bf95d713bef4be354b94588f61402123c57e1a4ddf093043d50558f9e201f49
SHA51235be4d6b9089cfa6306f624665b46e1c7015cc1209e8dda48699e0bfb0e32aacc020edde59bf2ffb3478d99c276dbd4d6229d7df39ebfb30bb70584c4d6b5752
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d79fe5cabfb816d0a8855d2d39ceacf
SHA16368e725f2847cd1da21af4dcf6fb09a0eae3249
SHA25683585e2b66402f0cf8dea200f5a54958952a4b56041e6c0f6707a576e1a7440e
SHA512b471c33ac96a93eeb2b58584e2de915c705afed09e14b5e0ae86ffe19479a8e6b6f0795918417e9459ee06cda407c215f16d76439f892ce001eda140fe5c9104
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5657b2dce42f6ca6739cd3b52b82b15e5
SHA121151963e62e55762c990db57e2fd0d29634d7d5
SHA25655f16ee2a687fe70d69fc08927d650fce620349a511a40565da7f2ce46c6fd85
SHA51297de0fa2cf11ae77ba405157c6a2400bbdaf70dcebd5bfb82580acaadcc710b5cb9fe81566d7a0cc82b90ecd78e50c3d27c92e00adbacdfaddc6545fa554976c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52291c9f2f72b62b11e7324c8d35766b2
SHA1c44b2105d246693e7ce54aa538abdb455ae4550c
SHA256973bb6f2b77d5588cb4674ae127852abee7e7700c67c6bb36bd717698a16fe80
SHA512ebc68ddc33974b0ecd827542ed419e50543b5ffa4fc6eb240fb4e42ada46aa971d5b72df8e6ecf884c951554e43bb738b1e2966227742abdac2c0e1d2090a250
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b33376c807ef7a030b1d2c46cdf8e9ca
SHA18461f63e26d8357c34b7a0840d87a14c86d2e415
SHA2564aafd2516e42dfcb2d8e8b20a79e7a3e7cdc2598daf5d2b55c15d130a6c2e34f
SHA5120373445095e1d0151ae4e1ad82d1a544ed97674162b4ac2dfa458cf9fbd872659722f9a069c2d0022a023f5837b0669c74a4c6b93adec78aea073fabf3b35c64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5695e2c2a99573c6708e8ceac26e25438
SHA1b48559e8dd9a21dfdf50ff4bd1c9828e24077e79
SHA25662cc17611054f9ed01ae16529c14cc2d0ff2595c420c60c1ad40ce533cb83c4b
SHA5126c932417a64a8d60cdd29478f53feb5cd25c7c9d4380e2a202c48f4645800a421a0c701e74b2317d0869aec7597df170465d1d58518b90cd1ab5eccfeb00b8ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8a3de6a132b8a008c5b8496cc4d2524
SHA1aaaca0cf491e7780235771ebae565058b5638214
SHA256fb7780d309966778f6d1c87de888795a82f2e2404604e40dc11510bc50734401
SHA5125d40b1bfa8714bd9a2aa4cf779184fd9cfe996dd4c3f8dee4e0a90ccb72e3c9d0d1be4f1254a23326705d11c5d869c861a12f27307a1c76c56d81fc64d185ea2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a86dd4c4936e1e195e95b9ea8856218
SHA19e86328d3755d6fe96c528a3a17b39ece19692bc
SHA2560cfbecfa1c62a9c22c3ef256f2679919ff4b3c099ad0acab79a98a53efdaaf2e
SHA512b84ea9a9acca3007078a900b3ba309fba788d0333f82e2d8536b21bab00dfa48e99720505fcbe0c7ff003b3f08c610d8e92dfa27cbc4b8324ca5dd000cf644d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58611532165e52c832dc89a5c4982f707
SHA1326f6fc6af3a37d85b94b64219c39ad4ab4cdba2
SHA25656bd4e0480d3ca163108881bd42433fdd1d8979272a4d79050bddc94fb3d93d4
SHA512b1366d9192d47ca6c808e70006f0235ed543e4cc3d220ef14f8a7bbfd928caa14be62228cb786efb8b8b1431b4490357f7eb7477145ca351509c777d6bf4346c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51eba66d230465ae4bb3bbbad43816fe4
SHA1154d77adc9621fb0ea43e66d8b9947322f985fdb
SHA2566d131cda9a76ab0ee0524bb5da2e14b175e2281c6226ac86d36ad87fc1777a8c
SHA512789a3ac40875ff16c1f3880f897d5317a98aa7347ebb89c9e6b7cee4ab0e060c1521188d925c723fcc0178ea111c1439935e0bd05bdceaeb8e62dbdf14f29da9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ddd269cddc6c35aaeeaeab8a05a8bc8
SHA1e64e1484e6156427d38e126435e0f56537fcad8d
SHA2569eb2175cdadcb2c9cead432e6fef4054d6adfceeb2070d97b3a8ce527165ca74
SHA51276710891554d9c323b4867a735d844443c50f694dbe319fdfb166d6909beef71a55d2b5c5a01ac8ad235c25562a0c487aadb005bbdee88413b57da42053a5a3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c7595615a1bade1d7505e584c209362
SHA15fbe4e57db3139b40c233dbe4c99eed0b7261e0e
SHA256d675397bde6d65339c4003eca924c4fd0455d04a13ad76b4ea12c602c5568716
SHA512f2985714b3e85ba4c8e928d7229770e64be3db183c640846b62b69d25094f9d69c0f061d19d0926d89d006f4e422b50c85a7d2b568920ed758b2502b5b7c5b57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585cbdbf930116a75850a4190465b6c9f
SHA197533c0a868403024774f06a0d7753dea3af35a6
SHA256c9851dfcadb215a82104e18a81a2b63e38579c882a28f08379c35e00ef7bc7ea
SHA512ab474de94e7861a7bf32f76e81bb06ebe1915783ceb7553513e960926c0b1fa11052e250a994118497e6a124efb14c217a1b515ef045535dc4b0713ebe9e95f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5967ccd84f6c8a440999756a17841462a
SHA1e4ed81c3630e51e596cd100158c964cd4e8e4997
SHA256bdf70f358cac57f31edbaf34cba23f34bad62b3f384243cae7c29c75579e3291
SHA512c5b8605761b7c39afad5f643fa642feb912bff60a410aa8b5928a2b3c1d6be640b9c31f5bcc03fe24666976e9e668c6cd1ee93c1b39ae74fb28d86d5189ed129
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ccba8e826358529b60edde87be70e2b
SHA1477e542d0b3a8212ecbecf83d6a5f2451e2e7864
SHA256a27ba1043816b5a7895130ae636a8eec99d2aa9c08ffe4c4a902f7a11d5bb9bf
SHA51245f7e75a4171d9c643a95d95985d32d34e59842bf8488dbbab32c620ad99af7949f981776e4ff8988f20f00243dfc7e20ac0ef56255a0d0bced70a9cde3d4b59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5316e6b5038cdf38be5dddd9f2841894a
SHA1afc299142bbb5ba8a4bef54e77872377c3e227f5
SHA2564db0eb81df1269baeaa4b7c72d6c548bc583e8fbc01d0a747226739dbc829f78
SHA512cc6a7083e730c861624db0da349d4174bf63881647c47aa43b2f1b21120a37e3312b58141f5c2f79b1ea3189f805a8401387dc856a93a11d9f6ab3b3598ae106
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56838055484759adc3406638b02bb53ad
SHA170b99abdfe85b4df1bd640aa0ea2e69df713e5e1
SHA256d19254cab98f4d3b094e50c96535de658feadd36e0c96c502ca523c0ef54672d
SHA512116f5d0a8378b8aab62d752212e7d6a4ec608886d51eb83f21b619819889f0d2691e7e319f33de72cabb10567fa5180a11477d875e4bf4717c4766ad1992d535
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a