Analysis
-
max time kernel
121s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 09:01
Static task
static1
Behavioral task
behavioral1
Sample
293a986b3fdcf382987bcfb9363359e9_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
293a986b3fdcf382987bcfb9363359e9_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
293a986b3fdcf382987bcfb9363359e9_JaffaCakes118.html
-
Size
43KB
-
MD5
293a986b3fdcf382987bcfb9363359e9
-
SHA1
011f52b7762a515267d3d57bb70c3eec32c12777
-
SHA256
4091898245f3110dc475f4e169968e6a439df94588c23944e490187e5b6d080d
-
SHA512
df2cc52096c266a3791c578804b815a9fbf91a05d340357d8b73e43226f6571b91135eada0eefa44777a75c817bbfc5c20b8ecc8e4181d969704f6323236588b
-
SSDEEP
384:P4BG8z9o6hUKzABKeLa9mWgWr2DDOvZC2OA2TAHDviJAccSzoMNdCfRzg:ABXX+KzAgb2vcgT2iJzzCfRE
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C360A6E1-0DE2-11EF-93CC-729E5AF85804} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000e49cf4ac820c3c3cae0316b6c5db1360e1acc9277e4df2ca680cb8e9e1cd6ce6000000000e800000000200002000000039c1bfe5717dec73a1cc89a261b99c3cf8ee62332cba4de99b91e4bccd8e456920000000c9eab7b32d36ca920c196334bb9a8e46819534acfffa2e2882662a623ea1b6354000000093fb9125217392b9ac032f98e8b67cc7f8a66e2f5747fc222eceba490e75edc88f37faa8b435a3b39e2045c9faf7c5116a3cb8726013a3d5d6cf7bf884468b29 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50cd25c7efa1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421407174" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2204 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2204 iexplore.exe 2204 iexplore.exe 1048 IEXPLORE.EXE 1048 IEXPLORE.EXE 1048 IEXPLORE.EXE 1048 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 1048 2204 iexplore.exe 28 PID 2204 wrote to memory of 1048 2204 iexplore.exe 28 PID 2204 wrote to memory of 1048 2204 iexplore.exe 28 PID 2204 wrote to memory of 1048 2204 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\293a986b3fdcf382987bcfb9363359e9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2204 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1048
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d33fbc53eb4197c596acd8dc1c166807
SHA1898a8f44ec75e01e2d8ca0d8c064b3c7396fb6a5
SHA2563cc32de118ddd024039c2daa86f5de9c16cfc27368dc777c5d79c9dbf00deeef
SHA512ae15e37995dd1dccb71cc1d6956021149318195e9c24aa4aed59792785e1e917baef3984a6b14ba30b03cf61265e50361d99aeef5b57a71d46c268e91b93fe87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef394f0da5aea050d67067ff4efe09f9
SHA174fa06ded4b273528b88c8851be2aa8909fab07b
SHA256462357e1c0ea0e852586febacf3a1043430b3908d4622fb515270f39aac3402e
SHA512f91e7f015ff9b6ba147fd1ec93c0fb56abb2a0234255bd72c98317f678883d1bde4da7bcd222612e57cf765357962a03d33911958f97d0ffc5eaf94ca6bc8c14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c61169fea78081f0679c909d63c911d2
SHA1b640e54f65e16e8f9c49f463b2f869c701fecee5
SHA256a9e951ee5288ba91fb22ac4e8f7eb2ddaca919a8bf425141d0d66447e5fca647
SHA5122721b43e8f14409349b14fc5d24cd0b3b636041bc5653ccdd4f6a7f103ab2fcd25eab51c3c0b7e986c3620a1206c9b4c8b7347f6e839bc1bdb0afb6287390901
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a0c4f3614076d6b64607b7fb444b014
SHA169bc5f149e7d27bfb13f98e2dcf7d0c7a853f983
SHA256887b2249e0c2e61bb10a6bd61c38e351c5dc9d87d4ea98b88bdecc80cbf1f66c
SHA512412cbfdbebcdb13db4cad4d11eac74fe22c47439395b620d114a76a0016da3497c8d4c4f2f4fb626baa7ac5b2edde2dd11b1e9fc5da0ebebc76d26bca1d0197d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8d5577945bb4e894258de3517afab80
SHA18ce671ef0f86524dba395d0e9b170c52c45bc81b
SHA25669db5846350446e5aed82192b08a00e4d58d1f4bdf327cb5012f34c91679116f
SHA512c4ab7263560e80cde41542c07677f3cfd36b9f11e79070ed7f7b96a2afa9806d95cc311ed972568956c5cf0ea9c892f3a48b7252b7abfac8fea030171f935022
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a36d5463578c6cd4bbb1ccb995802c5
SHA1d30c20bb2351adf3db6b991ae59d584871aae8ef
SHA256d189b4dad71dad0b78e941964e2ec4be63f50c51f00cf4aee6a36aef8904b6b8
SHA512b96f0726cf20d92ef67dada39c1f0db85177da5cb961f9911c72c4de3b87e92f13945eab21fe816729a0eb8b198e65e4dfbe969f812d5ef72fb1b28c782ccff6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56842e7e217ca3a77d379fd4facb6e38b
SHA1a7724a3a5500f178d87b1c65a3484985a14fa3db
SHA256f17d3326b2d90594a5351c25f6f29d531740527cb972c90c4e8b937ec3e6f686
SHA5122761a9994af62dfe78124b3d8edafaffc0e0f155dd9f0388fa643af9724ca632d11a75de580bc9f02a480e0165e9b64e540dccf9b12f53c72731138f6d932c71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bf379d18a00f4a794fddaf84ddad678
SHA16fd5751d4eb03a9ba5c69ec6772208d4b629c92a
SHA2566c6d738b8deb6e3254962ca5cd79c0233411fe521ef39af284b64dd91418e74e
SHA5124c69d148192931e5ab12b7dd009a30651144057b5271a1616c9c1f3c1e8f1ea7741a1050bcb948200091dd27096073518de4161f3c4cfeafd53bf0f62de90878
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf96eb8aaa48d458532ccad5c51a939e
SHA147f9b10e6ab8d76e98e1810dcfd897b51fb5ef05
SHA2566dbd38722f24292b7cbeb43bf64a363b012bbc366a977cbdaa6981535d827887
SHA512b7fdb828fa87edbc6ab62af7638378c95d0cfebd4f7e2f57e6aed07944c4cf3c9f07b523f428983a080af54663e4ce3b15181aa82b3f45b4460785d68189cde8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5091b76236d863c23630ca8f937e03728
SHA1a62c646d6ee4ae300a6822b500967063ee96c335
SHA25668388955eec14e4eadd784f065edc29bfedadcd1d793f1cbde2f2cde0848ccb7
SHA5126bdcf70445d10ba0ffcc3b12c8815b4f66f07dd11e9966307fafe6706ffa8e68fb1dc4b772494703c3f2802ecaa7568b91ef38e09e1323e79b45040e4171d664
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ebb0fe02895fbd80f857bb8a8661342a
SHA1b43b6bbe993db757ac41ecb9d3bff47ad858eb9e
SHA25636d530362fef445035b27b2698bca47b5f434fddc8d21e709a33bcaa2e310abd
SHA512592d02dcc765f8bb6c006cb221f83761539211e63f74a729f9403194591d1d60ee5fd0a26da592728d4d6cfd64fcce5afbaefe8754c51a5ee493f53a9033c39c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526817ed4f06a89f1d8942ca87e46ebd3
SHA1fe6aa6065f9036f347c58c26cd1d49a6603039d4
SHA256035b59e6f81841e585da901894f8d8012751c637be53a99af4af9aefb54e9ee1
SHA512d05f8029e1813e72c7620e4415cfb406f1dd6c7a34b7b7c4be8fbf7510edc2cf58e6afd8803a636a85267a5eb5831846bd88eab22c2d54ab43630d999245f279
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562758ffedf582a8c1c37a8114af151ca
SHA12568529329da4a385c7e42fd41e5ee5f5c44aa4c
SHA2565dd952d331325ce4ff4e4a25b26fb3666ff96fcc7da0b201703130f20db9d73f
SHA5125b3cf186690d4db3f5b62852a8e4c0eab837685872e348720a9598325adf003975256e8cb309b357a4a148b46c5c6016d2e922faceb57ab4597f47ce56ce2bb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9ca7480861365ee14efb890ef2ff9e5
SHA159b3e5d15ff9c73166d6fcd56420589e96181ac9
SHA2562cf953f3b2e6b536052056e62cc089b739208d48019240c93c473d0a76f7185b
SHA51230764c9e5c42c440f81418f2fda1d7237ad722ec0c7f8432fe3bf9dd781a8fb0cd2a1036557560b907502fef610027c547f5465d74a275f7ee9bc3c873808f35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b9fcfe4f90400c302235a6c0fe6b7fe
SHA159858eb379d130904d25a4e6d255e6fa76d27ca7
SHA25636122f5447edc4141d3b2f50ee8ed05fcceba961ee8b54ed0c4ba1aa4467a59c
SHA5120929b25b36074cd2bf677cb94b7746ef6199315ef721f9b800c36573b3ca39496d11d020c62988cb0fc64430ffc14c02b66853cebf0b6d592156b50a74df8b58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a103a6cd6ae5a664a482edad00a142ab
SHA17602ee1e37b82ea029ef78d2c8e12fca9abd2439
SHA256cbe5c34a91228bebedbaa2aba9df61919fd6a013859f1002e1914a24b77d4d0d
SHA512034d45e1a94378fa5da71b8a85f2abbd769cf73e325cf1c9c506bb39172e97ed5b0907bcffffc3d5fb650bd16c6da449b3ac6c0bb3713a7e0687648e9ac9d26f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58eff2a372dbb3cbf00d02cc873fc8ac5
SHA10e9f5a66e7c90991fe5bf98544974de78ab66a16
SHA2566a850535d777ea409822170f8d9c38661698a2d65f28f6af549c2c93f73d2161
SHA512f2152daef3e6cfc5e257ed0808e65642a7caef567a4744367227fe06b8e1b707873bcedbbbb82e774202d7f06eb6cc01e2d0559ea72bd23d8d7bd513471281b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eef0fce3ea84dffd0c0de078fd9bde07
SHA120b64a87a5a916543ffa0cd8057f1442d5f31800
SHA256a5bda63d178c7dabf9655b1ea1c777a90f08b0bee321bfcebd17db20d5b51e1b
SHA512c91498f23f4efcd5365fc45d4d965913ce628966c2e435f14f742a261402520f752c91a0afe1ce66990bd4cc126017be9b51de7eb529c49d5dc14857e6f44502
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595b4960bfeacb93e2ec1c11fe26b917b
SHA16780cdc9bed0494876a9c135ab664c0248311057
SHA256177a5a4cdf2864af4bb4a09ef6432d5eb9f178058f8205cb99af065cdcbf470f
SHA512cf963dd36f6a78e29dc34b48df5702a0cfe01ff5c15febf9b1bc1eec31fbf1bfe25535fc412888f585ae8e786c1b33377fa016f6e73534156c330d6bb5edc5f3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a