Analysis
-
max time kernel
136s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 07:22
Static task
static1
Behavioral task
behavioral1
Sample
28e802b89c1971f5f7f8b8c6d2a6a87e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
28e802b89c1971f5f7f8b8c6d2a6a87e_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
28e802b89c1971f5f7f8b8c6d2a6a87e_JaffaCakes118.html
-
Size
349KB
-
MD5
28e802b89c1971f5f7f8b8c6d2a6a87e
-
SHA1
f5102b7faee60d98d70d75c32b5d5b8461e1dc4c
-
SHA256
8c9386a46e9dec03ca0a3e8527b35fe2b958d59304f38c11497430e4b60679be
-
SHA512
7a3b1b0b7e477721542e8446ef0c022fb455d2836795b50f39867758bcfdba8b715d1ac3cdb5b774e6342bf74bcea478c1ebb59efa3140bc341ba08f585ae4bb
-
SSDEEP
6144:SrsMYod+X3oI+Y/FJznsMYod+X3oI+YAsMYod+X3oI+YQ:q5d+X3BfzL5d+X3Y5d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421401245" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5000ce08e2a1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F56C44E1-0DD4-11EF-9387-E25BC60B6402} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000da492f0c653ca8bf5d34d1371941c855e7151153bd3afbc0e1aa443b32b827d9000000000e80000000020000200000004f68812ad3302f0f5b8890688866e813c4996bd9dd25324f677087016701cabe200000006cb89d5c03e2bdfccc46a2687b54a6c3851c935eaf97105ba34fa93ae44becf940000000125c9da317ec4dbe3f64a5b9c88b3bfb4a97e3bf6ed4a0465ad44d37a8c98a65dbcc6829d2d263ab64a3364e284f6beb095e3b4729b47354f6741d6c3aa497e1 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1936 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1936 iexplore.exe 1936 iexplore.exe 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1936 wrote to memory of 2204 1936 iexplore.exe 28 PID 1936 wrote to memory of 2204 1936 iexplore.exe 28 PID 1936 wrote to memory of 2204 1936 iexplore.exe 28 PID 1936 wrote to memory of 2204 1936 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\28e802b89c1971f5f7f8b8c6d2a6a87e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1936 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2204
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5354c361a102730898241350790038273
SHA149a6902c75381adb95591dc070fcbd59191211c0
SHA2564c2481610c4fdf4f6b6cdbf2ff414aa8bfdf6e3f64b10afabda8a7c8905c347c
SHA51235785609e427f95597db61aff13250e58d506b06f62d60bf7e7b999d8e97ffaaa8e617725f613951ffce6f36963c35a0669042005f65ae4a499cb47e506a3210
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5496312e7dd8c5994206253336be058e5
SHA1541c87b38d07323572e8c81cab38bba160b5b41b
SHA25627cea2951b525ebe01f38df06c692f5822bfaafe901ad83f96d5ee6b5e54119a
SHA5126f0351bd061de4bff9ac3f23416119e7bc59037fb972c48c43f92888d38e3d1f21956b9cea0b6f0c29b68a72fa1926147cf11454dd6cde53fe5a33fd97dfd373
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5284da058b2e7055c6dde8b9f23b0517a
SHA197860809a093e21c8264df65e7295588b4c2ec28
SHA256bd5b3b62e4deafa26825751c99e4fba3340ce1213768e517d53c2ee67f6b270b
SHA5121ed10ad3a9e3d36eb19d8d9ff49f1d016c94bf0ba2123e8590d664ac8bf90df3e66d16191c60aaed082c80b4bcddd52020ad3ee8ccec2fc117d21ccf76734aff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536a852025c3ba33448fb54a55a50bbda
SHA1d23fa33ccd19aaef9a37b1d71aa6131aca456cb6
SHA2565807af4041b99e53246515c63a4e5ffc59969cb0d63f416bc2e1ef47f6361383
SHA512855737afff7f8b832b30d8b802be38b2e541ddb1a00a05719a102b28e83fc14b27acad50ef223b8d4730335c3bb438e2234fa8e6046c3f0a18baf7e05324749b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55426ec9b843f3ba915ec2af15d16a79f
SHA1b88c5399aac9f6fb9d494fdf01926b1bb40284ea
SHA2564ae9693ed82846ee4d803571d62720d1c8ab88aacca59de4bc08612f87343f3c
SHA512c250a65f7fd6620baa5caabba4eccbf8ae449498a96eb12df4f9a844ef21dda62700e9c3cb4f469bcc8b1b3bce2b21e18c538fb60273a2a807fb3f4c0edb7f47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b31f0401da66768e6db8d6bb2d375a6e
SHA175757141c16539732b958ee078895098e709dc9a
SHA256b6b3ec41e0a6d325e8bcf326670c95e61a37402e176476bd69dc2b043e93e99d
SHA5121bbc4f9bcc24d00f86d90c8701db3ce653bc29670c510f421246a6129d66257ef5fb4551679d4ab140198dc6e24f2704fed62bb18bdc6d90464a501bf490d91b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a14196fc1a8a6893ea7bbaed93cf90fc
SHA130214a4c76d871cab93f83cec24d5337e610f2ff
SHA25641e58e02e43a0971618bd99be307d57af596c4212346082a038160013f6c3e19
SHA51273df100e7e033f7fb783ab608ef8787f8943d21bfe7fce7f5d4cbc6c3670b4b1cbf8ef330febfc3e082c9763bf0b83654e1515cb02585f8b24ed622fde4a2ab1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9f6958d3351d5dab9b58c17a51c1164
SHA1df40723b652970fc3c247b42010f97c67ef5eceb
SHA2562ba360bd4ac4ff3f480150e7cc3022d7126b3aa550792f4298923d52be515b74
SHA5121b9cdf41536121115cc9abf70f4b4683fb12861876fb739689374f9f94429bcdf28fd74698c12a37b2f8b775f3aa66db76c96555e63322c281c9b30541b9bae6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582158cdbc93a2bbdc9b297e386095503
SHA1477bb79a33deaf2c24e43f18cadfb62bf7947a17
SHA256ea36758ff6fe87f0a9792f36a7fe02067e626d114afe31adc9764b4c56ce29d2
SHA512f4eb0701405e3f410be8261adb06453e9f601b2535351f57e9aeec3bd00680ca9646a53d2df24bdb1ca8643817801b4cc37928ce9d19ad9f2a61d1d52dd6e9ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c8c6e504570dbc43c8d961794c7331a
SHA1074533d03267ade6c1b702f7e0d2de0165abacf5
SHA256684707c463e88530d2d93b3c1369bc38190ae96f03bd7c330a2c8ed3087528ab
SHA512cc91cd1940a2314edaff02e172a49dc53b4015d30f213a03c55496d5e741d8462c6427da54c802875123b1a7d8ce82e6ec8fbf0e0664f83e54a69b4ec4ecfa3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ab4b49e26bb905706695e2729ae6429
SHA1529b775b7bf9a21342f3384ae1ad7d46d6233fb2
SHA25600ccef647a858566eb3747abacf61afd8043ff549fe2583b12b2b54419f06eb5
SHA512ee24ac762e076f1e69f4b2b1cecbe7f9308460c38a22398763ebd43197a041d0c78fdd884adeea521090b4bf85f603b5a0fe581b075c5fc8df0ae3f97df6ac34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8bc062bc3fa5cff66228ee31993cb0c
SHA1359a519f12755ebf2f458d8d9c0d99241e883f36
SHA256cf33d8482067c2b4a03cf1a49bc418abfc431732278d6a19fc8da3b56deab49d
SHA51291e5ba78d698063518da3595fa6668071b2dc46901300528c9a420f57563a482880ee9c7b6edd7a4614d075549587eb3a1f947e02d63b2f328bf8f21971cab69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a56fac9064cdd1c8139d5f8fb7cf24e0
SHA1d25cc36714587558b1f0267f03cb6895fe28efcf
SHA25662dce67ed395d7577c171f1900f4b6eed3fe56295485a22e2895828b4bdbaad0
SHA5129d501bc42496047125a4da5b6075934ed899bf9e83ea776b968386b20a21c0ef2f6b9ea714cf54fad6be75d0848a716ebbf54e56812cd79466dde5fd7d8b0f1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534c4962575c4e4cdfbf33c0c2970c65b
SHA173ba5db0d476e4eddaf1284e952528462f0718e2
SHA2568ee0e2cbde372a5a8a7786e90f13ddb2c59afa91646b59c125b31de59dedd9ce
SHA5121881651ed6d25ef9047a6f9daa581d5d9d5405acbff3a18af13aa53d5c5c8456b4ac914f49102ebe157b69e9c87529f9bd81d763eeeda4a032e48f32d000c473
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c1e744f68a6627bf779a002046bca31
SHA14bc89757a9ba7813d6cc89f0dd0306120c7d653b
SHA2562d8785bb9ea1866b7919d66831a1c30bdbe7a568b0237e17a19452c60fb46523
SHA512d777bb6bcda8f62da169f2a04607b984d0241a004bafc28423b946ea419f9194b1207f8b5190f2fafe4c8aff4aa13cdb2e78e7cf1b60524696a9fed251efbef9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e195600103841acbc9791a7b1660f58f
SHA160a24b5ecfaacd46d68e94465a0071b337681a16
SHA2560e2f0975eb1870466f81e9aa3362e7adfbbc6762f701d6d0b77fbb638460680e
SHA51208e117a60bf74b32d61e3251e6eef62e5f91c86d8531d05cac6a590e9ffbcda51c1c661a7db7aa2dbe938f4c99fc56ece112f8f82b44aa56a0ea72491f2a9c83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4c314afe0f727605321a97229a5b9c9
SHA15a7b20a8a3adb5ed2fa48bb57ad501691a281d10
SHA256f5ff7db7d5fe96fac2f2a7efa19d4dc5da08d8e71d2bf8fc3e4001a5b60f7741
SHA51235f872e0947d41a97f6c2cc8c1df5f8f5e26ca8a735214e7233725eafe8b244953c03e28a57ac2002b92749a0d83cc784e5d124f001784b3e37a63acd58093d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532a94a4d8921f42ab9de4b15af56122a
SHA19fc17a8572f528ed0230b66c78323299ab4f8cf1
SHA25691a835dd126d63ece494c4c51554790cca09a5c3e237c7719fbc7052dbbac00d
SHA512b11708e064ca4008c9a1515df8d2037e8319ba6925d566718638b9d0747848a0a87de0f16ede6cb55804846b54757a564884b0b2575fa56caa13307ac7bf6351
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a