Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 06:08
Static task
static1
Behavioral task
behavioral1
Sample
28a392e66ed7e73ae66eb185c18a68f8_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
28a392e66ed7e73ae66eb185c18a68f8_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
28a392e66ed7e73ae66eb185c18a68f8_JaffaCakes118.html
-
Size
4KB
-
MD5
28a392e66ed7e73ae66eb185c18a68f8
-
SHA1
1d949ee913494c3daef711c9537016691a013c5d
-
SHA256
b8fe2d46a9d86bd9432dfe8978975d009e42a1a639394b9be513e46585ed352e
-
SHA512
3d8562136580c05d97a702e66873d253243385ddeaa6aea10fbfc9d6f859eb30674a8ffb73614aa61ab04521a9566ae780ed3f4526aa9309b8f8a29a8df8f4b0
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8otx28d:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDA
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421396755" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{81B79E01-0DCA-11EF-B6F2-56A5B28DE56C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60b34556d7a1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000848c0397b7634e385683cef71797622051c78b81ee394a9a20b7e6ca543cb7c7000000000e8000000002000020000000211b496531be09218a9e39ce552e870b2d527cd1abc7fe003f704fa11b443ea32000000091c72550242d619148d6708109cae27241567004768ff935515937ca37572c0c400000000c1079a5182a137deda7c514d521153e8851fff42802fefa30ebb73db3450303023934b47b3359185bf52ef84900adb4f3afcac874765007421dd963c33837dd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2320 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2320 iexplore.exe 2320 iexplore.exe 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2320 wrote to memory of 3052 2320 iexplore.exe 28 PID 2320 wrote to memory of 3052 2320 iexplore.exe 28 PID 2320 wrote to memory of 3052 2320 iexplore.exe 28 PID 2320 wrote to memory of 3052 2320 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\28a392e66ed7e73ae66eb185c18a68f8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2320 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5993e8cc79f6f4030b06e58c283c88a70
SHA15f6b42cb663647c10109efe288f2992e545f357a
SHA256478dc0aa28ddf4d63259f0020add2c7a37e0cbba712da2a0e576482b56cf6371
SHA512066c425945f3ff9f576838e33962b84d02abc138634a4510c13384bb4a25fd7ff8b4cec297750fd948131cac3dc337721efadceba25db6154b2ac73343dc551e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a83bfa785ce4cdcc905fa08a03786ca
SHA1cb926d721cfd6905cbe38000d287f4a9d52fb564
SHA25693eb22fc7d4a067f0731e56100abc6f873a6bbf5f78e9d383fa02db55fd2d6a6
SHA512b94d3cbcbaad6eee431a7ec9e02b91d153a79eec0375b81db7fa6a30e0b36b2fb0ed0fb47031ae3184fbea8deabaf3c1380939b186a46e06435cf8e42a6978ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5712134aee6e0081a59123a26b21920e1
SHA18bb1dd3728c3c6c7cb19a2129a0bc298208519b8
SHA256213ff5c244119c878621ec2da02ad6fc5faed69313ee307139288342cb05b509
SHA512ebe59063e9ddabeefc246804c2207f94c042e4884eea028b65b95f381c3300fedd6733c195c72814b4b4b9512ee01715662f5a952af854e33fa23d3cf8f233f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0b378a2878cced65060997928d78349
SHA1db1531cba5df5020cc154e7ca59071812a197ae0
SHA256eb236e51802612869308e333f92adb6d86ef0ec57b6208c1f0f1ee9d6ae9b7f2
SHA512db7b8329de969480f1ed949c75eb499831f50cc1ed7f29170c102e92db87902912b50f20304a543cc30a7872df0d72557c1f1badcf8e7cf6816f77d9d1599225
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52666a997b402e359ff44d786a597f06b
SHA1a3e4791d8e5591be4ae6644b3bba3ada5d607ee9
SHA256f7a7df059d007c36482bf88e70f6868b1edb451aa62caf81c782183e5b3631de
SHA5125aa7b8eba31134e29766ceae0ad731943821b5d7944d4aa9504a68a76fcd071a735fc983a25e72185b37eb40f00d31839b0bd3d168dc763471c9b772720dc45a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52bf785606a135f593d3b8ee19b421ab9
SHA17af2a789bd0ed64fb9f7985d102d1a7713ab1a9a
SHA256707ca5aa76553348f97b6f6da04fa88668f8609f80d8df13c2a42d189061cb52
SHA51233a7913ba59c57aa49383f9485c394a5698574a2423f9d7142ef07c9b1e519601451061559d930b56e18b4631d7fbca9d1e6b7766bede42eb961f26e0edecb3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ae73c0d491613c7444aee20fafaf3fd
SHA100129379caa9d0e0b419bca04324eb7d0fce7c75
SHA256f9617c75f57394fb5441988fe4b00fbaad2e36b81f15c88217215b257fd71c5b
SHA512485a602e5ad6ec9867fd1c44a4e35362a0829a981ed86d2a950839d57cf81f3f13b9808dda62f8c059c3d682d95e5f5e1772036fe8db32f9247dc2979f6009a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50960e267fc1865ec30c78b58804ad184
SHA1d1b09ac1f0a56c4a0e671c7aaa6d09fc99f66622
SHA256aba19e1f08611704e7d8892b7bb188a12b712a2e86767fe0f27d196ea2fd7ed7
SHA51274b8e8d187cae5ad66e0f46b23afdf39285386fb4b71679811bc31bcc8ac50ce7354b4f60a453f92311c94dcce1009785b01f9ab04d3f781bcc5b8ce21bd0e2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5207374439d3614d99a4a4ff98be7caaf
SHA15275d0dbc81eb440f909b9c471b4a139eb554817
SHA25691b70ea880ea1406bc6194f54a2c1779fc9e3b1e9ea7708535fbdcf3ea230cea
SHA512c578dd60d35bb1d72809970f98f9553126885d62d4a8c2b60fbf4959a883a30fa81e5f9f847ab320da67599d5aec4703d94f7e665f666b9881da994141eff7f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c90af336a6b8c690376af9ba1be4fe1
SHA1bd7159ce2dea6ffa0e9ae4a237b41674fec63fd9
SHA256dd2e05ca7056054050cdda9ac34c04161063091eec9a3f8e7e86a1704b2524a4
SHA512291dc5c6cb3d816bf7c28ee3e9d5e5833e04a7949cf5a826ad6be1afe7da2eeebfef3be6cbcd164774be1c598082f27cb70593c5a3e79ec4c11fa826e7df17ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54874f2dacd44b72652457808ccd5e2ba
SHA1e4ba1f91997c56a0a6269bac37e5449ae62ed568
SHA256d815977411303f6ca690a314ad621fe1193e1cfd42e0df56075ae3eb2128ebdd
SHA512a3782b671153768470d8348b42a257e0f9866619a73965349602dadbf6779cb602b87bbf505914a3ce5a78946e99997d66962433a58ffba6bb5010e179944187
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f2eb00918e41fbda4f9ab10f0a20d21
SHA1c9997d50c2ba670302107d19267471e0b0f6d70d
SHA25658f9d6af692efd9a27c4273acf807aeb37d95e9900c9d606467add6c2343667d
SHA512b00e23103aa0737f912cd97189c2be52c541b891725a6faf7563254a0138f57979d0f132a2f7a254586e6e49a77209d8bf63875704c1d22760cf37aa15c99cd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580ab0845fba3574d71556ff6ad4e97d4
SHA103bb618f96882bf45df4b299fe2c6c1cbfb69f9c
SHA2569767abd3ca4c577b285650101661e9d60c304a625ff6ca812f86a5e9cea97b59
SHA512626c0d54373b1c4d67c950ff7e804638d6f9a6db892f81fcebbad10f15f21a7cd024d2548f6782b6f53e1b9883ac5614f628878a2ae2dee5cf374dbefa40f118
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c70940dde3bc978354cc1b0d0c6bd060
SHA1ea2afb95e3b6061c146bc7da046537c75c7e62d8
SHA256c951aa956610e277f1c62974282b8356606fa7668025e11a07c428164ee32980
SHA512311ca79fb0afa7f0028cc54af24e04dd2e59f8e3f43abea2325122ee07c28cbc590197cce03803d47155bc572cf0015cff0f0406a021d4f7f22c70af23afdddf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53293c388ce1a61209dc75e173bada929
SHA140655a3528e97febf65a87da2eaa939c541aad49
SHA256fcfb0886302220cac0338d2b2ecbb1c2830b3b913d26799e30b038c8a1f40437
SHA51259e2089d61b384db29e63b9649ddb589998896b560159144a5d8293304dbe0356d987c14611a4a89cf6186ddbeabd893aad0d7162458b7817b0ed9cefb28f248
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fc9542cf50413093f2b45edccb1edcb
SHA14b1c1865d658c2d0fb2e0e1f9854ccea48ed2ede
SHA256ac152d09eb65cf571d3b9a8a5d260276bf26432b4fa1a61df2323da64948b063
SHA51218d78a507cdf1683b0a1644473d7bb8e53cfe530f9c0876992e9ae778cd5f213142a9926554e448d8de2a9606abed8934a15f19a5d2656e191f50020c314ee94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55108b5e2802de1af1a73d5f63dc3ea2d
SHA1025147b3d630e143de5e6cf4da9a1ee1982016d7
SHA256626ac4f036d549067b3f610f17c7d533ef536a5a977250897f39245dc72c48b2
SHA512a8b33496a4c90c1722d77294f6e35e63845bbcc2866571f09c21d2c7498d2e75e1cac37854101254434048f0501224a1a493d68778e49fc44320f77904ca3d9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5edfa46d2d396160cf096ad567e95c588
SHA15a9a4b537d3735c545163213fcbea59e799ee491
SHA256d24432fda19ea1e47bb1b07bc05d9f66f065a9332515b279e75fd9dc2189d847
SHA5127d019ec945072f0aca030bbb3019323fa63235acd89cd8db83e0d410598a7fc07b2ba6d61cad205e4864d336257d40f8dcae95c95de3c89d5d8379572cc6fbe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513bdb1eefce878a7925b3482af085d95
SHA12adf5b8687ff34c6b0c6873cc9ae46119da96485
SHA25683aa90e3da475d939c9a66d8dbf10586b7d12e255958caa680a0b30d75ca4001
SHA512330ba21c078a5ff9b2c3eae705966957262b63f50a37597ee0e0dc16f0193b3c1c69147909982dd728ca33d0b0eebf9ae47bec07ffc0386d92e3d7ff2ec68318
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a