Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 05:30
Static task
static1
Behavioral task
behavioral1
Sample
387f8a2e159d457822cc28acf4460262_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
387f8a2e159d457822cc28acf4460262_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
387f8a2e159d457822cc28acf4460262_JaffaCakes118.html
-
Size
26KB
-
MD5
387f8a2e159d457822cc28acf4460262
-
SHA1
bc8eb693aef65fe567d68bf742f8f5d09d35e0c2
-
SHA256
3899fbdca91b283621935ad7a0f6fd30102c42f0987180dad9f93ef06385d7fb
-
SHA512
e32fa3bc49c162d35b1c2ece8ff0bbf8088d170f4d406a89a2c95062d673f6fe028d453f5ade17dee12542c67c68c5f79e9adc24e8f1deeaf99daa26577db3ec
-
SSDEEP
768:jrxe0NcT6yHv3jkHGP22BJDggqodzbYs2:jI06T6yHvDP2MsAd/Ys2
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421653706" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000002e6d19bcb29005cde73d47c9a0599b4dfe2b7b22755379bfbe13a386f34d220a000000000e8000000002000020000000c428d6547ef60dd1f159921e2139aba520d2f68cb420d2b5ab0245cbf864831920000000a8ff7a131044a35ca1ccc98586687c6b0934606b1f38e82ed685012ad0b6625c40000000a7f61deb1c0a5f6158f4a43289686e2d7348c8982028f963a2045b477021d61ba6159b77bed435d2a2a6675c1004ba0e1b103c13803e842acec01376f23a7255 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c03ad59a2da4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C478B691-1020-11EF-A296-4A24C526E2E4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2904 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2904 iexplore.exe 2904 iexplore.exe 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2100 2904 iexplore.exe 28 PID 2904 wrote to memory of 2100 2904 iexplore.exe 28 PID 2904 wrote to memory of 2100 2904 iexplore.exe 28 PID 2904 wrote to memory of 2100 2904 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\387f8a2e159d457822cc28acf4460262_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2904 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf02fdc157ab5a4e120e4be5155bd82a
SHA1c75e489184b1a19256a3c682ffac1fad2778f9bb
SHA25692101b1f4b94a1c86b22d22413fda3325b73e38e4ae0403ed58c5d47169a3c93
SHA512c8a615ad1e307e9c9bbe1b96d0de459ab2549152005f425e68f54bd46634e2e616a10a19a8eaab7ae6e01f29e94679967915b3b507edc35bc12a65af639dd5ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a63ff162b0cfdff761eef4875af2a42
SHA1110f304ce2ad13a708da29a01200ce5d7b85eacc
SHA2564b8682d709117102b5efc3ca2d9e135ea4b7d3cfaab9d89b705032ebb79e822d
SHA512629c0bc68a45d2b14ad689002378575471154ce5e6f0596cb4b5821296a2e4f39b19c635b6b8dce331d1b316033db811cd2a0e216fc2b1cdf637abf876d8c8f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb151b4d9b5660c030126ff90812bbfa
SHA10f4b2b071dddf4fbbaca0f2b112309b6184f8bd7
SHA256cb1daba35e170eafbdb34bae4033e195b73734848b2455e245f5616b3ff8ba3b
SHA512367111c4483d3500cbd0db4438ae5341c79601bb8f5a399fdffb1e8d96000a107ef643d4a4b96b979e389df8422aaf01ed63e13e9b5cbaccf976ab56d3449e62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf99960ee180e60d9fcb8612164c5947
SHA1dc573ef626e0e75adb0bc6ba354ba916dc8cfa63
SHA256f633579b6f582c07f226949a293a880620a6e7a620a769bf4872a5ec08821250
SHA512861e09bc14e84ad7ea7228fe1ce1f188042093f848557b8cc3a2806fa88e3190b82e7652963831336d5d771cfe91849dcee81f0dd82c2fb63c4a979707a5bbeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502cfd3fd7c51df8693608e08e4292aea
SHA1b2218c817008615ab578e8343f1722ee90ea0be1
SHA25619bb35e549e4c90cc40b7f69944e11c0f8733600cf3d62e8ac480395e2e5ceee
SHA512b58063b322bf5ed9bf0beff039e135ed7935b4845911b73254f2b18e7b249dcff073a61551171c02e1580324b8f0430de99ad6aa21855125a6d51b3d13183dee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dfd80479302ffaeb627be012ef60d11f
SHA1ca9b128422dddb9ead8a51e5399584c6be5efe81
SHA2569ba86aa19a1bce280db7fa4ec223b2516ae1baa0686f98f73369c0d1daaf12f4
SHA51254a81ff3e024f595f20506cadb041f093a47d8a567054b5b1cd4b8c14ab035a5cfb9aeef0a1715a266f43006817231cb47f8c3e0b2997b41fadb7e400cdfe8bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58559ba900781f591acec115219917ea4
SHA13eae78c6d62c310ca4337b87314bf222dd215775
SHA256f17b2393d67c4babd49afcc625352c55eb0e831e601a2ebd181ec8956f931311
SHA512593d71887f60e36bf4c6d6581ba4fdb8ffbc9a4e91cf882a0127dff008005446930a987c9bc4a525e314f0a6555f13009d45c6dd5e642360c669829e3337b4a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55064f01dda83a707a8841877da3e23e9
SHA1b1c268beb6ddfb696d9058e32416c8ca2dcb7c96
SHA25649077e14d4adbf7e63e510719ba545347e81856f2b7418fad8a42bd55e4058f0
SHA512c852209055970fb999911179343c43709aa37fa5796196201fff5c6e2082b939986dc37435cb8751acf42e848529d7b2277ebe2e620997a32d29c0d3bb1d604f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8b3da4bdc9059981d9b1aa127f7d32b
SHA18c9c90b0d621fa53ab80451a8fd982a5e7fe3fce
SHA256e77e68f8438dc622df529e631eddf6d814ac1d16fabb9103228b80e5c6c43334
SHA51296e159cf760ef60c237debcc826e9ca147654a799906b303e78b6d730bd70b73611cd43c27cebde809fabc58020968001ad6d7877f5cab6219587ed7a3c61705
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc8e97e1deffc4355dfece5e7d769ff0
SHA178fa5c4e487dabed6ad7bf2a3ca75e88fab67892
SHA25620fa7c4f4708cd50606486f06ae23aa6cba8a8a34e917f10c4b935ce64ead0a1
SHA512df6e88a269bcd8b496d1aa0c82ceee29b873ca209dc8878fcb14c3f8c6707319a844f3a0e8d7c63aed02d1fc1ebce97284b6cab1005ffbaec691f7ecd3508e59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c74f9c4da5febfd85594ec14ea1d4a5
SHA1a7a43d500e4cf805b8e088431b211dfeaea9fb63
SHA2564a3f686a5711ba9a8a3fe67e93e89b5d905b3d686220a08d26852a5f912d2417
SHA51290a6dcf0dbd3b38e6d84ac752a31c807914591bac907b51e00520720696204822083746079ea7fe5fab980afc5b7e2f7f542bb525b82426ac2472b346916d1a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b131161db5f8cfe8e7f4833dbcc5929a
SHA14a9cd81cf4c06d78eb143dbc56eef1b89466f3a4
SHA256eb88d56cae349f802db3cd73e7a73c4de9a6c550d6d75fec2b2fa78eff9bb035
SHA512445fe86e639952748560a9175941b276a589e6adc3fdaf6b71b6932a22f5e8f0c4aef66bb9fbd8f52028c014ba09588915867cd36d8156b9fbcfa6691fac05f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5262c076f9d55772133cd9425cdb247e4
SHA136df95168607756729a399a8cf384c5cf2746bf8
SHA256b8c2f40f26d3b4c523ecdaf32929ec57e3cc68bf3a4fe11594088d2121f25eb8
SHA51244e8667cf1eaf7dc699d22a9675dbb9973ec8fd7772f7e12623d3603ce29884a5546224a33bfebef60e270e62f55ae386d756f59db1224c4d03582cd988ca0fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59856a7649c0e67b5bbea3bb5be24e1c2
SHA13d9d80afa4f577a90360ddb41a9c057b9f2f3166
SHA256997cb2b58af3cf0cdfb14daa64f4446c68e3514c8e64056ad45fa4ec122d144d
SHA5122fc026ca94437ca173310a0c49fd3d49084d6ce2f69f0702f33e7c0a1d929982082db06aac52cd59506e92034f4977795f56ae9b09e5b861605f681df21e78ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d7c15442c489b6f1a14b5a9331ba909
SHA16f6abfbe4e27de294cfbff421094b67c934207c8
SHA25600dbd7c114fdef1f7149a16104f514d4ad940e467feca581842a82e3331eda0c
SHA51273bb31505d84330ba61dbcca8125dc53ddef16616ee05a134939dca95fd66b470c66dfa0b447a4ad09f63fb890ddb5c559183dc57de5dc8f29f5b89a27876e46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7a3b19aaddae48bfe446a38bae869a3
SHA1b9163fc7f38cc805ca3daac018c25823cc0a86b0
SHA256d7b500edc42554c81173ebd6f3ef45827216ec7a9f4768b0e3ef99651ffe3b8c
SHA512f196eddf33554f83c5517e08e96ad7dfb6ab78f9f03681366a6cab9337f2d9644b54c533fc26e53434b7801041506d2485e37229fb28042c098710083c7d57fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3e6eb1cdbd1c6fe0f5ce8f5a7362472
SHA16daa2342300c9830ef0aadffb72df037d115c448
SHA256fb2a3e5994aa86661868a3c348936efc854780e0dfeaf68936cdcb5085abf01d
SHA5122d62ca0bb6a4f87e6b9592a8f0efa2552cbd53d13f2b0ff9bb6aa125903c9d219bf2d859bec34b8bae7e5c21031d3a0b1b8c5151f15fb207564342d005912ed0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f082d830a73c90f4972903038c51cad3
SHA15faa4ef606e81b0a45cdd9cbe6f2e5d288cc32aa
SHA256c4fd934fc2c22182fd990f38da889100a956c99a26ef4f12d984a1478290bbab
SHA5129bf48814b0ea6ffd4231d92a9185970b319e43cee778f72215cfe8742699b23a27df14e132b6aadd6b78d8e9d37396e06dc29167461120c393b3543bbad6711c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I819HQXH\desktop_style[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a