Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12-05-2024 04:10
Static task
static1
Behavioral task
behavioral1
Sample
382e966c2115fd7bb15ca86d9d90e971_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
382e966c2115fd7bb15ca86d9d90e971_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
382e966c2115fd7bb15ca86d9d90e971_JaffaCakes118.html
-
Size
461KB
-
MD5
382e966c2115fd7bb15ca86d9d90e971
-
SHA1
b766a14e85ee7d2f2174f51e2fd185ee5d9aced8
-
SHA256
377609f6f80ba47294593a57f024a0342fcaec2d49ddce4d2ced01e2afc3c41d
-
SHA512
7b788df8d5f857ff7b2480eeba0c88c8cc160dc2cb4071eddafe076adca0019cd9c3854ed2158a51480923192454723f5fb94418401682df1a1f2eb547b88c36
-
SSDEEP
6144:S8sMYod+X3oI+YosMYod+X3oI+YqMsMYod+X3oI+YLsMYod+X3oI+YQ:h5d+X3c5d+X3r5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a70000000000200000000001066000000010000200000001b5e5269283da440be80af3ad9c1b5f9a12c0d934d078f2c0f4d3475905a2ae8000000000e80000000020000200000000cc45eda444eef30cd45ce71f0211b7d7c741c87bd7bffbd90b3d43f2e90825e20000000cd0c6cbc71979b380ac74a32c12736d554ca3bcc6ed4223a76aeeefb83d679d140000000c9b8a164602417e7bc56c4b08989e5ef3cbef8b6aac072253a1bf8d27ec7c18039910ad159343862c66db3cb74114ab8a7c6df608c0c47d37e18261e150e654d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421648870" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{82039061-1015-11EF-815A-6A55B5C6A64E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 409c855a22a4da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2524 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2524 iexplore.exe 2524 iexplore.exe 1384 IEXPLORE.EXE 1384 IEXPLORE.EXE 1384 IEXPLORE.EXE 1384 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2524 wrote to memory of 1384 2524 iexplore.exe 28 PID 2524 wrote to memory of 1384 2524 iexplore.exe 28 PID 2524 wrote to memory of 1384 2524 iexplore.exe 28 PID 2524 wrote to memory of 1384 2524 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\382e966c2115fd7bb15ca86d9d90e971_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2524 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1384
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e180097ef7e8396fe3162344af9a3ffa
SHA1774c1c751d080f8a131282aea9d12383dab7ad43
SHA2563b0d0cd031334a38193521b98ecd57e8f0187fae8de7fd6e4fbde80370091b1d
SHA512f3fa79d508c912aecbee2f74187013c153fa3106e1fa84893394ffb8f036be39371fef8625ae66a0e84d81e23d9f6b82a1b9ee2df94f5651e470c12e48c8a8f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570ebfd8bbcc3d714f45295a66a61d759
SHA1358318b1815e57432c1348e4bb8d7be9fae8b8d9
SHA256f75f5b7029a58925eb503d2e7dd3670dbd5ca5a4bdf4b80fdd95b1dc4b582649
SHA512098a249cbf0e129c105aa585e16770529663f59eca86ca4e0ba558a8acab8bc4004eb9a997e03dae0c6e48ae0d173d4a082a52fcfc2acf3b650715f2df590101
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7d0f23511efd23a717778c7367c56f0
SHA1ec0901646b22d7747a6c74601bf3834c76a3c23a
SHA2566d61c9171f9f986f2194fcd70e4c679b61148c5d3b0952cb027f960d3715530a
SHA512d3ca71b6ed008cf9abf36c6e270c0763c2f1cdd6ce4a6b16fba7842e50547f06f59ddf67838a4b951f16d036a6ca66e9f9a8849ca8e90a7e109888489bcfaee3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7edd98e5876ad53234fd3286fbef7b4
SHA1a9c8fce948d61fc9bb1348045ee2d990008966c1
SHA256c3f1afa5ed4fbfd7d2da3a8464c7133f5fac4d301cde2b339abe9523e2ed30d9
SHA512a100ba91d6a5b9e83725710843f98187066071f88f3b42e0dd8842e02e170c212410c92f362e63392cc1497678cbf7e2fdf01c848918409c1c13b12c99ff1065
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed26d76b0703c089d52c8b75c4ccb7ab
SHA179ae9caa6c43d3dc88f9a8b0fb1ae24a88d4d9a2
SHA25615c0c9b786a957748eb0c81bb15d71848810633d28ac75dd29bcfd6c9cc8e747
SHA512d332190ae74292a58f74a262ad8118fe467509b2ef278d4f73b6253bce2feae53e3c6009a09248a83c8a57d23aa14d124e71580f5969fefe6a55106e0d409fda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ce2e31c8c54f47855f588ab095e0990
SHA196d235f581f22b947d8ed5dfb30bf46a5540b37f
SHA256ea8d7d61ed0563f8d9bd5965d60e7c5ceb948f1d5d2cae553ad3823930b6bc06
SHA512946f384cd1b5127d51bfd23567676c6389c7a07eadcf00f40d0b36d6e0584230f2e4a00129b7c5cc1d66a84cd9994cd69df9749781e148a57c5749d04d1b9996
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50948559f4afa173c1a9dc2098ce93723
SHA151734c934d055dff06f02d0f5efcb45accb1afe1
SHA25619f14278dca399b02f3b6388b10c4550122452f250072d4cea0da052e749be9f
SHA512f53e7d4d25fef11d05daf29a1d61dcef4aa990bfdd195e5876ef4d66bf50301804247355d30836d37bec2c8a91ddb42c68c99955b32da64eb3b7f7eb6c3750b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c51631630a89346142e836be1852440e
SHA1e9bcf929794e906f3e159f09f16c8528d4d17718
SHA256e0e236157d3675f882dbe489f0bce479e692e3b41a9910c40a6f6d01a0ac5a0a
SHA512989187c203e3a6d047a60ff4d7dba185155d397ddef61772deb5512fa037f5f7a4811825ba008f1393823fbca7e0662d197a96941060b183057c62621528f239
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5563aedff2ab0b1356a5fe05e12c25f03
SHA105dbbed16fa512685a15b51acdd66f97ae480afd
SHA256213b05cb302b7c77f8b56df536b2b6cdf1699a8ffed11db04d54614f5d20a08f
SHA51212b8c0a626f43aaeb70a3a5b58673630e7da527298918d994b4b97729936f0b857492ca91e4046b489ee031fe3eb8b4e8880b2df8f259f59dc777f347ad85036
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f5d4e616a3628c1d420144d4f6220ae
SHA19bd945e23d075790ea7f2a0ddf8a290c9fde10cb
SHA2565e927d7ab0b3d0b415d8710db02974d534606d2d280afe705c6cea080193e261
SHA512670cd4095bed977c494764b791502a6eab7bc9c948b9507489591bea3878e57d500904b2c0d86132b8285582f3ad0cfd585cc88ec67707616851185afc54d1a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e3c5b94db2d698d6130d6ebee8cf9f1
SHA1c389861c1269a40cdd202625dc71a70fa3cc39a6
SHA256438f12b85cef8a6ba0f7a11e4984fa9456692599a1b412d061ee3ce79f4fff5c
SHA51207332db9ce5b8f0a043522997ab3db9f6ba211224bbcc65b52543e79e59320cb2692c6de0ee71d4275bc41275224124e50f003b6ac55836f5a1f074f594f451f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a79cef4f258816acb2b7d7bf0a085fb3
SHA15ee67b9bc7fe3f76f5ed0589679f72127ba665c9
SHA25666a79f609acda630a6d1fd61321416927ba66b93bcab787ae6e3ca9823fa5a5e
SHA5123dcca37d25a4d0b36ff829af72506d72b390784a42f5202a7e69803f23571b32ba78e43786594a98ddc7da39a1fd55729adbe589b5b679266e55cd8765676bc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be62f54eb7ce67c82312210a8033d63e
SHA1871cb36a6f1a1c9ec1f9396414b40930ff6d0454
SHA2560282de4faf3e9ffafba11aecbfaeadf5c226a69e7f3aa8b868e434cd1284d772
SHA51225d6f19f31d0a1b17e8fdbc24f25b04980ba8f40c2d9ef2716602a4083c3e337a53abad266c3d5bb9e547c4cd8aa8f17b5531f82e46c54aaee16619148555ac6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584d291820dbcffe1adf2d6d799727281
SHA1a724fb7e5bc1bafc5e0fb7bd0286ec51380a8df6
SHA25642d73fb93688fc763ce7e6f79a5998593c7d62eb6ab7c2e1921757f5056db27b
SHA512f78013ee9dfa9d0178d7eeaf052c57fbc7828d54b4225423921fdf51aff8a1c189d19a1c6960aa50471b6ca492810b0f8019b03927ab28e96b76938dc4719c96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523484bfb820a7a8565ad86c3d170eab7
SHA10008d7f926be24a8ce35b50c31455b4c6c26ac21
SHA256ffc4862b426ff5376b0ca4a672d65a6e4ba167919750692a2cbf1fa8104e7b48
SHA5128fd4c58695e8a96aa82d969a820a702d27c3576ca92ab024d21dd1a92b417307e6ae483208cfffdbe91d92dc3529e94f34ec8f9a2de72216f85d284a1cdca6cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53eaabd7c81c1097221a4b71d535f2297
SHA17c240c1e314c34643e8608b57c4611f19a72d177
SHA256a830dfb8777813772caa727c1a00b0ec9167ac00ca8ad354d0761beaa5f40d0b
SHA512e5e24991fbab8f4c7dfdd600c73ce480457aadd11ecf4eb86d8f76b0cd5e69d014a7b037acf9e1c557939bd34e2e5375c79d3015e2c399708df97ee5c3d42922
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4468c363eb6f0801c7c71050fab2521
SHA114e7cee4cc1661695f69848c72a3250c60046226
SHA256ca6e145cff7d92a22a5a748744dada48cf7e9e85bfb27eed2b6a6eb4ea740dc3
SHA512797473be39f7da0e6cce00b27065e334152b2bc680fa9634cca7e8a649e7234445a326c23541aa8a40eb783c30fb451f58b8e2f0b50c52890c6548ef14a37b81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5385057fa502424669e6f30ba21c8b648
SHA1f7c571a7129b5b2ae2dc3a1764746eccf8be787c
SHA25678bd5e219bf88e24b893b19d71f0ff169ed6e29e3409985575b20fe8767ea605
SHA512007976af8e1aebf9b7f0007c4e18975be9a0bcd319830fb0695ffd7c1b6b0bfb4306c565a1a1535a21ac074392970ebc721d64688dd39472834e0b865cc147e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b96df22e8b71c342566aa88403d0a50
SHA16c3e46f3fa77db2ce2308e563395de223df00f8c
SHA256c5e0edc78f9b0f359e9b1abf319ae72e252e980ec6ca732e9ea99124f393588f
SHA5128865ae112536d2e6bb08bb27dee3166b83f7cc463b41d4ea59605c7c534b375f3a5e4ed64686db17f9697aeb0ec568bd67cbb0eb5912c55d8a76e68d0a9af280
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a