Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 07:30
Static task
static1
Behavioral task
behavioral1
Sample
28efd45322dc8c4bdfc95acd444ebc06_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
28efd45322dc8c4bdfc95acd444ebc06_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
28efd45322dc8c4bdfc95acd444ebc06_JaffaCakes118.html
-
Size
92KB
-
MD5
28efd45322dc8c4bdfc95acd444ebc06
-
SHA1
0a673ccbc29b827e3177246163982dd7e07fcac1
-
SHA256
4966a6a85054a4132b4c4924842de4081cc1f2ccab35156ef01bfe6b15b5d372
-
SHA512
f103026519e0d8379907aca8b59e9cd467efa0a3ffe7b949f736e740b6480d09499b74d28e3cbc372989c485f56c7114ac864e03d77f1e4a144107802a0a6677
-
SSDEEP
1536:lXS+Mml9osz2VSzitBu0ip2CFVBvzNz2fL0oUIQy6el/fKs9/zwadhi17+:qkGz9hwyi7+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000009b66a5a7e4d8660504b1ed0f4377aa43251ef083e2b52196a3b161b1da3ae005000000000e8000000002000020000000fcd7d1d9ec847ca71561d91687145386799da70b4004eeef75b37a527e2c657f200000006feb98eb3e54816d25ff505b38d305072f7f140c866cc396a0207fde3000921d40000000c2f4e719bbd8733d653357f8908f14c15ca35d8e74b37792ddf3edcdbdf2347d71fc0fa6cb34cbdb9f632b1d41d04be9d64aae696fe777e6874c8f322d6940dd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c034e6d7e2a1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{02DB5DE1-0DD6-11EF-B02E-F637117826CF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421401696" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3016 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3016 iexplore.exe 3016 iexplore.exe 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2936 3016 iexplore.exe 28 PID 3016 wrote to memory of 2936 3016 iexplore.exe 28 PID 3016 wrote to memory of 2936 3016 iexplore.exe 28 PID 3016 wrote to memory of 2936 3016 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\28efd45322dc8c4bdfc95acd444ebc06_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3016 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a18e1c0eaae30278d8c4281b68305aca
SHA125eec3c5f5326eaccc46a4577de312a5c6795530
SHA25617bced382942643db7ce8cf87183701528e0e2fe37338b6e918d94f9c71ce179
SHA5125da64ec035da0161dfbf67962ac72c75db560f9c97c9c600d8c7e6387ef05ffde05686448cc0ac714b5e15d2e00a37e32be8c30ac3f3f14983ca581ed757a7a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505943dc4dc61cf5d546e663dd20e7694
SHA1a13302567422657c400a5e26a613d630f592496e
SHA256e1d039ac94731bd7d5d7a875d801c95f43129290f22f01a8f99fae5d912520e9
SHA512bb51ba9258aeee7140d71926b7ec0f8c1c2df38c23c1626714e2d41e113e86a744272a0a417c089bf39720c138a9f36fe6c0465dd2d1ca8446e9e99d43542762
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551d9e79fb97083d509b69d5e93a95223
SHA1ea48420608a0ece7bf1f53f2f3529fd00ceed371
SHA25675002e89edd767b82b5c4833623827bab8e5ebd00328728d92b807cd923e5c12
SHA512bcbc05ad671a3f84a0490592b24c99db9193f8d21a960a9088d16f21cb33a2075b5eca2d269aa1303e9bdf45fd5515025d3a91e51d94aeaac42ce6c0126f3919
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3bd4e4787493fc75b39adf52ebb3b64
SHA181201b19081f1d38890e9cd56eba376b30b91ea0
SHA256e7b9f519f33db72b8d5d8e3c632e214037d0538a089f900187b6da30a0c76dee
SHA512178d08ad3a8b7c038a5cee4da54d9433df1b15c1d8bb9f23d0c83282605eaeda03ca9cc6e38a2ee7e6f48db67bb2f6b55a7f7640b00bfc0c308f8aebd452e691
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5281f0bc674fce239cb7c77d32a0f4ae8
SHA15c6fb2007edffa23b8f06f5864e8c98c2d2f12b7
SHA256ca647e4fa8c28564a938b85f9592c886d02da263b4ab8b82e45bf64ac99a8080
SHA512b7f4007eacd99dec8235e003a8d1af405db43e9aa752a04afd3ed05b4b420bb773a8d842bc23eb14f4d540c4fdbc1064cbda6545ca1770d533eee7a6c00f67d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbd3b88630368b0aaf2d320fd523bacc
SHA120fd4bb0431a0bfe4d2afe861fb6731a3a4ef9bf
SHA2561041b2b39c8d5b987c4a78d9ca9e6ae2e7f0a22fb6cd92b9827779a06c26d6ee
SHA512e7e0424986efb321e80bbc83ec83a53e0bda5780a49f3eceed0d1d13c7bdcffc6d4d51818f952810144aea1a687fb8ebbd16b6a46aa35e5d51847c8cf1336d5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e690ff3beba945962632b039c14eeeb7
SHA1cbd041a2456348af4dcee8b6256c9e788b42c210
SHA256f755f4688bbb53dfb9bb8a8aad8d2014ee9caf6c4e91553b324a3e9333e6762d
SHA51223851d8f26ba93d3bbdb22b0722d3739304d6e76d28cdc3903012ea810986fab668edfd5f9e080c56a5d6b58ff4bbfb02ae856ccb9132ad4697dc616a0db51f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe4cbbf37aa0870646de20b88d4d2bca
SHA19c6cc0790e1a9c5fd8e3218aefb0e15ffd4d880b
SHA25674d8ab67d17255b42cdf86d6eaad7624231326a45b30587449ee88494f39653b
SHA512ba36d2fa689ce6b60313a5e83a102c6e41942073cfe10780f910b5cdf9ea5daeffbdd3d9db45f99a354ec0e4ace7e88258a5d1c2be0994e1d3b31781ee26ba49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557b2f985fb08a2a04a1fdc2a1625d4d8
SHA176dd5e234efa3589ebfe8197b5cbf1825529c42e
SHA256ae3cafe6f7c82e0392ac48ea44faf5c4d47bdafe4223af1589acaede3c4ac081
SHA512a07e4aca628150601e671bd9a5e677c35be5f22f0e7b9abff8cd1a0007b29e938daca0ccbc199a7545c4fb594565fd7b51dbab32843465bc05f545e85d149b54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f59944034a88ddfb694f35c0c3f4b869
SHA11c7dcc883474fdce174be5ab3d8cdcfd5593ce8e
SHA25650925aea2b70d6b64011d1ab8067c03606b2f087d40587474da3c622b075e8f5
SHA512c97972275d54e569d18384dc24ca005f9a3561dfa650199a7afc4deb9a2f1a7e653ea8477fbbbb117c0158ae691bf4ceda7d32b592fbd5f141743a450ab088d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52eda0e4d9117f678698753615567c183
SHA1c4ecc49f0459ba303dc645cce1a6d53759e35e62
SHA2560b4a5a33e3adb72c8fc98529f0d91d34c546d21a392fb836e70cfd5c963aca57
SHA51238b70acd8229d3c1d90fb4cb68a21ea2873ffbbca35016d2d5407fa83d615a65da93cb787caa2272bf75168e6846b9be697bd57088717a139b4fbc00fa2c7e08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55da9c1541f0f2bd5af1761fb56c1b272
SHA1fa092c986ed33415ff494ccf1ae9390ec3a2ea57
SHA2564e6a20bd6a137996ee249a368a91ca734ea6fa61f4c5591e8140e135f60aaff9
SHA51236c0fb0b0c1e4acd266f13f1a5196609fd37fe6b927a0cb1aaaf406ce827eb9b16c55574476e7f435c8efcbde9703001682bff5ad56c89039b478a5e4554c69f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7becf4382327d71aa014607a5d28d1a
SHA130e172d62374f50b747ff06ffa106736d73594f1
SHA25640bc3efa2a1b1b6b2c06f7c308e2c72a4d430997dda971e99e67bb583230e463
SHA51255e61500202064eba0c5010cef68e0035c0f86fc616f5b93917a1fead5103bebf4fe4feb39b2236ea761342c185b2c5d7a0adccc63018e4af68bd98e93006c16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb34c313371e69fefc5a5dfb5ee0f46a
SHA161d813a83a720d1b493e1e57cbb37ee340c03257
SHA2560b08763a0c3428160f07f296cc557f18de25e914a7619376e9275f1390a96517
SHA5120248364bd3f52345b8d0186e304969b9cf35e44c9e3e15865d380784d2bbe54c2db367946e94d158f0f4145097af873b1589b8b75df249822d429c0d365f7274
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f1ef27a6cfc2fa87752d3668198be6d
SHA10e91d176da8af241a9806c26e85eff654d6cafad
SHA256c48ad9ee0ccf65a1062afefe4ca1737f7713c4fbeecf9c0e282a6ddd9fc51886
SHA512d4f805f736f4ed40edcf4822ce1ee8c69ddca37cd92f782e023a6e53c7391077666889cb98eeef72c3f174ba307c01ce5aa369dc653576f93d472b7dbb01d328
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5772b978da5aad4585e7f603c72f7d5de
SHA153d68a0ec5673782cce62a451b7e4d820ef91f24
SHA2561abfaf19db40451f73ca83c25c3ce3b4d61e89eb2961346bd818ebf92db1cc8c
SHA51211dc46e52ad7165a05f58d9d8d9de5a2565ae7fbf09e2701edb7d4f734424fbdce4e5fc949dd0f72adf91755d0ba679588719b706668382bdf52b16605e39306
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f13e894e877d15ffa05817a703f34b0
SHA119bc87dd82d4483c918e383d68996798f2331be6
SHA2564dbad9a0b37724d3a85cad2a81cd486a37c143d955ed39ab335a2cc2d6e8269e
SHA5121c8d45f466ec7c2af86c487e5190e4b19b62fe849041b836183dbb968d7422d1bf038078128a355bc62dfc6e5dd1f890fd7a2e86705467c810a6a8d41a117458
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bdee8fed78b5173207b60e93b0757281
SHA1436a92cc2d6972711fede3c1063bedb01bcf3626
SHA2569c50d950599c25033d5215edb5e60421c5e92e0769a12a783c376ca26b57a505
SHA512671a350afcc43bc200481970c8f245dfb391001932b75302bd355f176f2206e48e3085eadae83eeb2c5beae5af3ccb3682b230f9a169969225f71b0d6326602a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5203502a13fbcb34e66ec4afdd70f63ca
SHA1083755bbe70408ad9434e6edcbc9d547d1731c70
SHA256a3d8eb73387d1ea8a5f54b7378f6c2b715fc934284851bb8ef9fc1b60c965099
SHA512810f29d672451f607747072e7009ce9082e4fa590d058c2e3d0982002eb05952957c2a00a0218df373eb0d9fc04e2da828b4cf722d462c177c70f58846efdfa4
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a