Analysis
-
max time kernel
120s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 14:00
Static task
static1
Behavioral task
behavioral1
Sample
34eea3c5a1a8ec6c771b4d4f41451442_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
34eea3c5a1a8ec6c771b4d4f41451442_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
34eea3c5a1a8ec6c771b4d4f41451442_JaffaCakes118.html
-
Size
22KB
-
MD5
34eea3c5a1a8ec6c771b4d4f41451442
-
SHA1
b11ba738824ce920660fdf576785a3188a21df9e
-
SHA256
e869aa2066e07d7d512177785da64cdd2140963bfa778a1b8ced9ce840982c4b
-
SHA512
d522d43f18ba2054761148a276d58ef627e5a517b6a2440a1cc99122f2667491189db17ed1f18f2875ee5ae3eb65c606b91c33e8c3f14e054db93c2c26ad4be1
-
SSDEEP
192:g83GVwYzel5iYzel5+eWnLzyw+U6lt9Xrn4babDgdvJfHVp0Td4/zJXZOGXpsEBQ:GDiN59CfDgdvJdtJZOmpTvuZYaSR4/n3
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0c83098aba3da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421597874" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a70000000000200000000001066000000010000200000003bf9f989e745c34ca733f1ae20912abda43736511fd53c29e34eeb8c52ad6a6b000000000e80000000020000200000007be28d986ec4e27d75060341df6c641b058e0b90f97f90c3f994b071952a636a20000000663605b3a42382e6c328da7c216ee5d23bf11840056483dff69fc1a6060c0b7d400000008f0675b6d04637fa404af4c3a6df8ab84d48e5e0e57040511bb629ec4189e360f85ae21066c6afa6c0421a06e3a63a516418d5529e46030b3b2ed28b4abec765 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C3A28C51-0F9E-11EF-922B-6E6327E9C5D7} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 868 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 868 iexplore.exe 868 iexplore.exe 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 868 wrote to memory of 2320 868 iexplore.exe 28 PID 868 wrote to memory of 2320 868 iexplore.exe 28 PID 868 wrote to memory of 2320 868 iexplore.exe 28 PID 868 wrote to memory of 2320 868 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\34eea3c5a1a8ec6c771b4d4f41451442_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:868 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577e0f1abf50a9b7a9da13366f2fda7b0
SHA11876f50815c933b9bdd312e0a43b547535280adb
SHA256f2d54afbcb608c59219f9742d57adad53014c673494c0f3bbd1fbed339e9b09a
SHA512407da1fd0de11feb40a735388e60b63d242dbcb5929eaffc0bc528629dbc627def2423f58e0b24adbcf08dea799096ad630bbcde2fa749fdb99837c6f352531a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56dc273d6cf157afff61e4dfdacd43026
SHA1ac5d5547417a90439670ba0f4a620ad1385c5503
SHA256db23f9c7f7421fd3530aefa7a2a44320611406dd1ffdd4df87a8caf8a269ab81
SHA5129b8546505bd188e7b6b588e580edcc88c086021491cc75d58896ce47a1ccd0dfd714daa8b73a008e3b61bca5fc93864179358d2606edf5af9b8450ed06ed4119
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b189e7326cc0e0f9c84f7b80b983716e
SHA1725ae986daa0c418b92ec095da81b4983948aea8
SHA25627f8ac0475e22a7716149279765b9204b4a08e8b0e2290868d239c369f413e9b
SHA512229b43e8ca72e884a5c71cd46d5c13fef2dd7779971e452066b6c95fb9f7a625d37ee2058d756c06123a793aeaaad38693a14d3e01bef6dece4315051a235d9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f66b3ef1d7fb4875ec10b67b847763b
SHA1e80c50d8480267e4d217073e2121d43b40541d13
SHA25657c4b4c7162a45eeedec8a4534f9e55d9344e5fd6eaab06b4e3cad580157d570
SHA5124d2e165f98e076d46833ba04dd7116e4163b732d5b3afd157a5c6eed53fd369ff315559834dba079577c1fdcd4089a4f3ed600b844e2fda0478349e340843a73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa4da47f2900f360ddd74539f8d052cd
SHA16430bf59d74228ffc467112cec5b1c2f0bfb54e7
SHA256fa15279f91a6b7fec5422ca846edb88187c5f65cbac27997afc47ac9a4cbeb6a
SHA5127906c4991600546788f2ca25096c99b7736284726603fe17a9ec7a084f0258e5c0a524637fc1257e68ce844df32aeed87bf71215d69798894a0dbf9372faea24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574a5cfa48ec650492c125ffed896e83c
SHA1997677aeb3a968c7a914742f5d17b936618556d4
SHA256718ccb857fdbc9a598d7d678c6adc7707743b0106822f41122cdbfb170e00784
SHA512d14bd0481348f873e32dbbca992581364feeabd97b0c1e8f2d1c3e39cc195356261b04713742837754b92d8c47cf9a224f6195bd1ac9070a0d57ced7ef80ed63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f128adfd6a98ec9f276ae3d631201b8b
SHA122fc922f46c784c9c2cf99ddd21405b8bb0f150a
SHA25694c0bcd9f41a365924ec5056f1b5385eb5fb26a85079351d4d1a3eea45e166d1
SHA512265dfae2a941399a3a62cd42a0dc3200614edc1ff75ead7cefb2db65c75b778a6782ba579537ce2db22f90e0dbc9276528016a55d7ac0ced7782161060c8b1c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ab60fc9a2bd338e2cf50d6e6a537a8a
SHA1a582430aa467c57f8f4f3b7384132702344e6e81
SHA2562b75b357f032c5a9f1c390a341ca4b95c2d0ddff89f780e6461072c719dd239e
SHA512abb33b06fb26bd6c68c84f1fc0f6323474a7372df0b208cf6dad963b52b75c144e626d86ae4331b40f172776748e998e44263c2c9e32acc875b660f7950a6833
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599ad3a554bf113995bf2f98a8a4e3621
SHA1ed5516dc2e2427c1fcb7b7b029521501e33149de
SHA256028659ab35767cbbf02fe31c046fbc46117ed06b3da2f7c5a4ee90f194558a0f
SHA512d6cf6646e3736a486b390e5a21d854fcbbadfdfa59118889204f6afea565e850daad97d226b571bb2b54694bbff69faae20f082fcd4de26662211d1a9e0baff1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538dac8079fd0c9cd77939e8b77fb0347
SHA170145328803daaee4ff7defa4371489900f846af
SHA256ee1edf09281c6c478820b3a2b642fd668b87cb59d77e7a155656d5fb5e81b058
SHA512076b0b3dd5c9da7fc2511764223840505ecdeab6770a6ddb1bbb2c360c85eff2d42eb7e4431cef13f0634af759c8a281e689280a366ebc1da48aca454939d657
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552872ec58688028aa2f376c7aff3b08b
SHA1be15644a1c56176f8293e4694bb0eabf97e62ead
SHA2565dd63e07c889879448a4fc063a7e7a59edc9cd2a2276b483d31aa9e0531bb13a
SHA5129813cdad39165010412b3999c084135c94f96d5238a6f152a587b499a8db9416fb7da1bdd56664ce1b6a5fe9b5a9a68aec1873c54d356d3573ba7fd1d962c600
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4aa94d1396a41474a1a82158756f6e9
SHA179b72a52fd0bfd1efbe7eac2d2b0e6cbfbae34af
SHA256a48dba4a8fa4981de0c352404f71915925fa7f9484ebcf1438fe724925d37118
SHA5128193a2ec06743808f47ed415f5b2dc62ad96ffbb1b430756338f5c7ed8346f0882badaf605e3362ead5187c061286a32e684dab7cf21b4717d09d8a245f2c9d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec9dfd90e5ff7e7c7ec9c293faa1e745
SHA1af749baf3f4e9cd34f6769ab9a7595c25e5293f6
SHA256aadc11ff5705106805b72fbcca31fdd9e44dd3b53c247aeeb2771bb82763cb32
SHA512a48d66bd7b586db371ffa66024a0c92b3135940fc3d558e66304cb1339b23d55492b31334391681bceba59e74c499081d7282b5ad3eedc65f50e1864a5282302
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5787ba080f7003c9e7349d528591a5bec
SHA1594020a4401ab7f58983629992b4621a5267931b
SHA256dc3c23cf210fcb08f9365bfcb3b13a6b901d2ae1a636a4a3f9c0b12fccc45b40
SHA51234957ef357ca857119217ebcb58c9c4c0bbdc1f5b2b30e270bbec4ec12ae7918252da69dbf93b1877665284a20ee719dba3e43f5db0c155a93fe3bba8be1bb60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55caa5d31092f3799ed017ccd7f6d752e
SHA11ee14dd1500b2a4b90f91bb815237ec8a87e0c9a
SHA256efeda259592841d556410c71974d902d96133ba64b4c60a9c0b4e35097649420
SHA5128a9d7c8e9f10ac157c33fadc254a68192d18da30e466d73c008bd388e7390d56e1114dca9bdc3e08866005ed9451ba0522c0218ecd67674782a9d95af855e65d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec48c27f03cff614d9db2a63e9adc218
SHA106468d66052fd9ab6fa3ab08e9437c833c0cc597
SHA25623d36683ded56b727f3073827571d14f37d73a8fe5756a4245c94aa012a4499e
SHA51221c29d4a73517ca20d8886e62c6a4d29daf953747598b3de436233af940403e3000edf3ae7e802e85e2626e91388225aa32bf1ab849ce30519e4e98e63dbca8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c06cbd1df3565c72561409506bfd646
SHA1f40dc906d364fc354da7e7877f80c04d47786e57
SHA25620871b4614f4279d5cb97bb29998db0fe61612175b3381980e1aad478a55b63c
SHA512a4d74e8459d30fbfe3e10181581e4324164d4b756a22f72665447dbe47433818ab6056469ed65796988708812ea4852a240d2d30904a810b90bfca6729412634
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a75895d796f6befaef25c12cc198838
SHA1adb26c1d45038669f7b5a524595527a4a54eddd8
SHA256b7c93b9b912d2dd7849e53ca54c328b125227cf53fcac8033a970aecd4a81a60
SHA512fcfb1ce3aa4007a53b8f12f66a932d6be842b71f6ba64d4e38678860784197d9f08f6f6189db5cdc217629bb4f6735cdc7cb6764515d6582a660d57b966f7d33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3290fd2f575724200819db01f6261f2
SHA157739925be83cdc161c7ea258b9fde57603a8b7a
SHA256e065c058dbbe6057056981a68619e3d448b18fb179e6321f1f5bb95ee6b4777c
SHA512b1f21f1c0c214cc2e084f496b4796719453f4714c45e05267a4ed278f69ab4d3416d2362b0246afe585ac460e7fb70569b49ca38b222dfccb79c55beac9a2690
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a