Analysis
-
max time kernel
133s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 05:27
Static task
static1
Behavioral task
behavioral1
Sample
387c12a72bdd3bb79b72c1ea3544c797_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
387c12a72bdd3bb79b72c1ea3544c797_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
387c12a72bdd3bb79b72c1ea3544c797_JaffaCakes118.html
-
Size
4KB
-
MD5
387c12a72bdd3bb79b72c1ea3544c797
-
SHA1
6283b2c6d0a7d883ed02fe2221568362a7e23925
-
SHA256
bff5d7929d284d6e62b70f4b17097d85fbb5b1601db7b2989d54c53efd1fefe5
-
SHA512
db28de8ef75227939e8261dfe25ea59a558075a79dd8433b3d50da207add55f477863801a3f008a89c40a109883ab35294891c5fcaf0608de5b89431aca38b5c
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8o/CvdXd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDv
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0d84c1d2da4da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421653499" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a700000000002000000000010660000000100002000000053c6059e8af8865a19a666c3f745defbf5822857d140ae4107ca44787d529bb3000000000e80000000020000200000005dd38e457a9617130de3c0de4192a7a71283193590617dc964064c2aadf9b32c2000000024c947b57e6ed0559648df3a79f662e39386e8146037a876823296d206f1c9614000000026c3f035ec7f56f722a8507575951dc5670be0adedaf8e1251896305a44aee149616a05c66691905ad2f670a73b02cbfe19d2ad31e02618fd9c41aac2fea6993 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{48950BA1-1020-11EF-9371-CAFA5A0A62FD} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 860 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 860 iexplore.exe 860 iexplore.exe 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 860 wrote to memory of 3008 860 iexplore.exe 28 PID 860 wrote to memory of 3008 860 iexplore.exe 28 PID 860 wrote to memory of 3008 860 iexplore.exe 28 PID 860 wrote to memory of 3008 860 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\387c12a72bdd3bb79b72c1ea3544c797_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:860 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2348961b3f1e4bf22aabefe15cba50a
SHA101e321296b3614072d22b23e52f69441b804619d
SHA256600f30780cee218ce5494c4b0267b26105d2608509717b96a0412e74f6c14b61
SHA512f8836d8c521892d635e7dce42330f8dda255f3736f02d0fcd9b34cf30fb2cac4e31dae5bf838fc7f79dbd61864616eac99d30d8b40eebcf8e37d03265669fb20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c74a9316ef112dceb328b2dc5c1ca43
SHA1ed056371444766683301c61d599d6bab67046c19
SHA256f0df07ed724b67db4c29d9541a58079a6a9e4e6550ad079d8278834c403287ad
SHA5125963b208605c3fba1781073e5a85df4da5a4ef5f45feb18e3a1eeba6ae0ea956eda95d6f556208831daa68c4b5b758c9de1d6dd6aecbbf98aedf85dfa5790d6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54145f15a2534c468205ea96fa187f866
SHA1570d24b367adfc271ba08087f070e977d4f62346
SHA25646fc674d020c2c97cdc2c9b0480eeebcd47afe53f38650fdd4b9380e62dd431e
SHA5120730f1b9e953b24f8707c294e159f2b8d14049d264df3eec633270076e8b0dbbdf2b17381ffa6ef2f393bb960f03ca7bc4124d3c3ce611b6beb96951f2a41586
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c6c44f00f0c541b2cd02597ce41b7b4
SHA1208421098e3233ddcc66def80900a42c8f5fe992
SHA256d2cd27f88e6804b8d07bfeb8f7ba25c9fc92c4468710bb37ec11ef301486dba2
SHA51284b2e11b934856425b963de5722fb15e2a4110e4507b19259da0bd2418cb6b3c0e1e394fc12e9f21993f0f3fb40c3843e1dabd8769ce829b507e072c4db3a2a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e247ee8638c38b16fbbfc1e91112e23
SHA10a3504d4ce099c94fc30988d9e0f2140b2a149fc
SHA256f3d59cf59fd75f46b42dfb5de8dee1e0a6cc00e3b9e51c78387d0bfb53c3d15f
SHA5127a03ddfbefc1a041eeefe6f21f0cb16823e96baf3a92cb3ff52a86c47cf48abd5387439dc1e0c030dfd0068e8d028e2e146534ef77e378cdd025852e5012e6b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519591b21374735a955ab31f940f74cb4
SHA10fdcd31bb2ff40214b014a17f223d61f171c20bf
SHA2564e04ba0306df4cc33b42fecf93f9423eff03a958614f6fe61eb7a7f0d52e25f6
SHA51228df4474d71ce68fabc64075685a05142ee5b999abe235b308b77aa9a08d427b41dbb3c710294639fead6d0869aa1313181b6534a297b103a24abf5c1444f61a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5abcbfe9776850b11bd8491a172ccf96b
SHA106ac05e7e9bdb00bae56b53b8b606b84661c050a
SHA256445535876c5e41542a7cc389d43f89e9d822e414e6ca4dd8190a2698c092ba2e
SHA5120d5e2fb6cc735590b40d0aef8514d5136b8cef7fd18a888fe3e91b49cd542a08fdc530acf13fefde3ac3d8b73932e0b2b414555f243de3eb03d15c66d350f1a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ceb5f36ad03c7d4df1ef535bc08a16c0
SHA109d4c823a2bfa9ab0d241a426711454492a4eee4
SHA25690113e3fc176ab347bdcd826e850e02d0067cf76a6277ffa299533828d7056b5
SHA512c36337aff4cd22f86f3a9b23810c7e943e37a6255aff51282fc7b84159166e4af255ffcf174efa8288f560d99f4cddb23266f7b80f9737a5c35cd86712cf5748
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fd14a59418c4bee40300902fb4778e7
SHA1374e794a175ff43370d07b089a4411d362d5c02d
SHA2568eebfbc82739adc0485f9029207cdac9bd90dd5a53e927fea61a2fdca5a87c39
SHA512261d29c20ee7bb481d0da08090687673025922ac490470205c28c8ad99e19d03a8ff0e8102c9fd50de1a91b5a8904d6a5cefd18c57a81e844fefecd20444d9d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52fa4aa15775ee1dd64716a80914056be
SHA1e1cdd90bcb87c9c29c089063da75095039b9b3bb
SHA25648afb9c43a8ab494ed65198c3711fbbe056980f06cf3b97bd61e1ca48b20fa78
SHA512b88d874b4f34b2196bc2936c78c2199f5756e61bb1cabb0ac2d3045507ab4de50d32471a4d850297b6275e1a03f48f80031c982fa610cb015da6b2d861256b77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55af207340d1e6901d37bfad8a4a5f59a
SHA1baf9399acbf49d64609b129ffa5aee7c16aee0d7
SHA256be605a75c6e2b96618326f3e9ffcf9d806ca252cf875e9f6ba38a9b060352a98
SHA5120d59134d64e375fae4aec4950174e99d7491ded86f150983c07c9d090416439c3a7c24e40d6e04c999fccf6ed033363faf021dcdfa5b62b20858a947914ac9a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da4e1a39925e52fb15375635c7ccc544
SHA15042329240011e076384e8fb4022db7f02a3443a
SHA256fbf71f06b7a144c80ee8e47637c9b7c233ece6e1099f36a8f75625906f43511e
SHA5128493f218d9f4c8ad58e3f9912a91b7d81412ebeb024020bea45b9da956b2c43947207ba81e2f5759ca9110e2141942ede3e7ac02814d028a46483a1b30a97153
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548510f4c4d1189f6b67fb1c094cfa730
SHA122b69f671a060ef18c316fc81a9016a9f21fc6cb
SHA25691cee5557ff51ff6fd2b3cae59c76d8a295dc67407c68e15d7e5179dab97e246
SHA512540ecf1e1fc453b928719ca56a0597f2d9a4966b86207b87ce17686812b3905e28b85c1d94b6a7cdfebb68ad22ac4c4006c004cb6e9c839277b4830036f797d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531d95f3d176709dc459bcd24ae5652be
SHA1bfd3958a4a4c423addb1f550676204567290f351
SHA25675bdf467537ac8ac319fddf88757bba744e3401c806b17e323a3c199a81322dc
SHA5120260d6a9223a1d3a8f093acf96b23ac597f16e6cf4d147c8aa9ee94f9a227c8012b83504e7ec4c0e8a1ef216b8ec29862efca6acdb6a561efb5845147ebb5037
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ed685bc037f0c63ab26f7c6cf702937
SHA1b47bef3d89482395b6c9043fcaf37c8e11b9b64b
SHA256c2a9de9fe00cfee82d0542a83893e2583b907e3e6e4762dfd3680c010fa66e49
SHA512fe4962471627796576c29e1fa0a59c7ad33bb1e63a13a8ac2d08676846dd3b55b2ea32540e36a96a0e93076ccdd982cd371007a013dac39ede88d3752f86e28e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5723464f7a3ba7604437064019a92ca4b
SHA1b38badd47561265017343bd0239897205ac0b2d4
SHA256402fb6b3a5790af8c87463132a168dcb0a26e9aee4a0925c884d950906c9a9b5
SHA512230d97a878ab20ade4061aea15b970cfa267585f38863ff6748e571074bee15cc2cd22afbc7dcdeea6bced5516764d3ccca4a1b335a8b467e82095d7792a9529
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554c46e6ead3c7eaf5e07eefdb5c734d7
SHA11ce0d90a5dbf126bc5516030a5e30300b52356c7
SHA256a00eecda5632dad4c222ee01044dc6ffcc1532df5c7a4ee1cdd41b8c8e1f640f
SHA5125e51fde5219167210052eb9121e0e73ca7b215b1f66cc169a8e1ab9e8134a6de1b0ad30567dc57ff2d2d9b31cdf53cd0f2e638e5360502d066fd32ceeb83bc7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5adb3218d4e7573581ae191875964742b
SHA146d56c96e77441e60e45f136f28ea7b7402a46f8
SHA256d3220ec7d6ad7489f2e02d15e1f914df915e40b6f933cf1ead70601002dc1f8a
SHA5123327da341dd01f6a586e6d83ae1ce3971ffd811b7b5a98b419a30c1661b33789869468dbca7df9b4d2fbdb5f66349357ecb4adc1cca74dc88b9bf6bd3de95d1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a52fca0bc31cf61f846a3b7e8e42f6f
SHA10bfafea10380b2fbe5522b9f13bfd9cf9d0822b2
SHA2566e1b4b81f2ff6b4e54730fadef957bd37408bde49d020dfe1b505e9eebc8eaa6
SHA5128058d57ee627e06dae38c4548729435cb543effebf2cb2c7df6c885e8fceb12bd531e8b68a05f4edd3f85a938a0dc436cc6672c07a76eaab314bec9da127c926
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a