Analysis
-
max time kernel
117s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 05:47
Static task
static1
Behavioral task
behavioral1
Sample
388f57db28335dcbad36ed0f60b9a5b9_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
388f57db28335dcbad36ed0f60b9a5b9_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
388f57db28335dcbad36ed0f60b9a5b9_JaffaCakes118.html
-
Size
460KB
-
MD5
388f57db28335dcbad36ed0f60b9a5b9
-
SHA1
06f97294c662f3fa8d76ac1c490fd76ce84976d2
-
SHA256
11b4506205d2331655c83dbb22d333329833f1be31a20e96212a8014d4030f0e
-
SHA512
13f418702b77a8acffb6614efb2124748eec9f49b61ae809d9b11f545dbfcc4f98ad0987cd007c0a4325cbf69dc16e84ff062eae740adf03e0dc6e6a411b3060
-
SSDEEP
6144:SAsMYod+X3oI+Y1lsMYod+X3oI+YQsMYod+X3oI+YLsMYod+X3oI+YQ:95d+X3p5d+X3w5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40695cef2fa4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{16C27061-1023-11EF-A30C-E60682B688C9} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421654704" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e0000000002000000000010660000000100002000000022af1bc84e144c460264854ec4f17c6cd45ba47a6ad37339e7ed1a844b29a848000000000e800000000200002000000002ae7be2ef149db70ed8e91124499b3f099e1ee6b8b77212fe54da4b0c98acc620000000d5fd7a1a9bfac2d3a5b041efca17a24601dc395a7980c0ae191fd9a51723a6784000000015fae4c3e304b7f6464a9028aa0dbda0fb771e5857378c28fee0eae5af75b1ab9834a8a3790903690b30c909c459588f2a8e50d1a332e6f7018fc05dbb2121d3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1728 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1728 iexplore.exe 1728 iexplore.exe 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2552 1728 iexplore.exe 28 PID 1728 wrote to memory of 2552 1728 iexplore.exe 28 PID 1728 wrote to memory of 2552 1728 iexplore.exe 28 PID 1728 wrote to memory of 2552 1728 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\388f57db28335dcbad36ed0f60b9a5b9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1728 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d097aaf1e8870b4e2b9f6b9dc44dd75f
SHA123e6168fce7148f322e2f439703b0ed06a80b3d0
SHA2568888640844bebc90cbfa432868ecf2968090efc61cea4295b794f3558480af5c
SHA5128d5b94759e16bce7b8b54ffc190fbfb676cc8bff1559aa7c47d93496ce76261e4a48fd0187c871cd1ae30e7c1d493c545e0c7c7256d7077bbd54eb8c51783591
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5bc2c610344d9fc543dfd890b70bd75
SHA13c9188930d9ff60aee1d8cfa20865eea0501b9d7
SHA2566ccb3d2602811de7d1c4141f1cb849f32ab87474ea6a18024357d475a89bd4b6
SHA5124c39824d0f2f9cd7e71df8c4569d66b654f7cc98b562f463b31253bbc941329addf05f3add501321e6c4db5a244f1911f59b4ec88e3431eff2652eb86ad8b35d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c48051f759374991ff252f0e0c82ac5a
SHA17b46418939479586d9f6f875c4a2aa7f9fcbbd2a
SHA2565cec518bb62c283cb8d2e3ceadd7257340fa110bd1615d570c3975682f798848
SHA5126bf5ae2e854c7bef56003fa7061702762df81177d58e6f104639a90c8feb14543a0a2d04b92fa53ff9548458f584a573d324626446b6a0eaf0aaebaec5103611
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56af461ce8f98eec745ce3f4cbe18a8d7
SHA103b15546c0c58c3062b6363ffbe29eb2a9c37dfe
SHA256fbe862ec872cb1fd3e5c8ccc9b2b9625725bd76d3b1a4a2324eca273b7af529f
SHA5125a75664a2dd13e202f9b77136413c9d5fef8902249dcd4841a89549536ffa72874cf0e046d4f0ab074fd23716c62deea13b9d62c49f5c84ae306c6ad12f6861c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c20583393dca71abcc713e73e6135aa0
SHA19cf74f953169951221ed3e283f3666e4204e79cd
SHA256d9096806177cdcadb11a07030e3c8228ae0485ab3e1336dfde2ee44d624991ab
SHA512849f0ef1b8b27b8f523f438556957c52c32ef8704073cf9c13139463efcc8e0cb91e7ef66c1cdeeca468e7b1c9399f36f7b220734631a00354ae5dbc289f8b0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572e2eb91385f38868ae2743fa5acb099
SHA1f48f2bb3f0a30de5b924f24f98a2d4bac48e8e62
SHA256365d600a28c56399aa879996a724a6a7485ad56fdcff2310e216bc41c4f30b7a
SHA512ac1b3e37e917312535704765443e506f598e531c895a8a9b9f81da38d05e7d392b20fac2308c22b4d6a99ad3f024f191ab368a74310dc1764af2b7f2bbdb5c6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1ed804f28e2841384dd29925b27301c
SHA1105ad999846e4f502a5457805d7a28c4c71988a6
SHA256c91c33f9c28e47eef1bb00d07a3850d7a20756bb0450328568371c0c92204575
SHA512068915ada8d98cae14b3e5c4c8e12cce1ae09edcd61b72b83e4be43b936c8e5d20ea7d2fddba3e6d8e024249bdc27894a6b3898d821507d1be1b2ccf027b8b9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d70a88279dda8afb456848052de2174
SHA150e3f045ef6cfdf565c63b89c75e695978892520
SHA256ff313ae1305ca76c30f4f09b41b5a5996bf7bf9f8da18b70bb339097cb797865
SHA5124a58695f7f7d8e285fbab91870c748e3c7b8769294302a9ca22f3250fec39a4c0f81def93f4ac9cf93d02936062e662561e1a767a499a4eab5ed50c23ae22fc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db76ea09733e442c5f6432cf81c4b96b
SHA1253f3ee7d303a8da2ca0aa032d49c889a49285e9
SHA256fff6af0de780df34cb33e649e2f557f4d614db9e389c090036a42eb4d79c6c9b
SHA51291b354436d02ab4078cda8c190d61883e6098ff1924fec403b579065a4614859db1a203e26fae2d199aa55ed1ac71eb6ce304067a5d3efa619de77ecac288dca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a1fae825b73579dce5be2ed2f8c7351
SHA1cf9d6203583f8add559e25ff477ccc6ffb331f8b
SHA25612714e956d19aad3a4e7685ed5c856e3f8213405c69677cfa2d0b6a6dc637c24
SHA512e0d98d46e178acd289e49e6c2cd5f27e3f1ef94743395a1eb30faf5daddb98a173f3c20461148516662a49cc36e483555a1468c5e082049668fe4049f9e59069
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8e35461381fd4b7bb7ef780850ad5d8
SHA1761591561c7b1e41da07e975e30de9f8e97ad413
SHA25615f02cc5290e89187e891f211d090e082fb043793bf92718f334676ac9f0ef38
SHA512b86a94a5c60fb1ed45d7a4f36de12612f3be444ae56a93514c00d91b530a8426a495a0824a47f0851529250f58348d3ad6d7908ff6e404024306d389e45bac72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0a9a1b33d2c05b295355c15df206a3f
SHA1fb6e56b2a2535a0060aaa8d98a1327ba04e8c882
SHA256a0fcc40ce76be515aa8cd12f76586e137eabdb2753176e7bfbe7377e488237cc
SHA512512c196f8b36d2bb952365a28aa5c47055b4cf15d7ffab473b5f61b96a86a7ca49619fb8eedaf5e8868ae3a34de1560e5082bee458ca32bceb1c5a6218c0e26e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b974015cc1f62fe17088259808ac4fb
SHA1cd994dc97cd89205b2c7e7274d04ef752c6682e4
SHA256b4d72003840ffbdfb904455870fd8d35c4aefe9474f0d46bb543297dbe956973
SHA5126d8197bc93b04b2aefd9be84cac099a6fb8af4a3757cfe658ad7a7e014da3209bade27fa900447ab4d263fc46b2c8cfa51b9a25457d4d288b106df0dc6ace08c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8ba0306a0c85e04ea00153639a1fc44
SHA1a693f6b07ec5daf13ac882922f3bc66547a78473
SHA25604c09cae6815d4bbd1f888ea6d5e70bd5d553420d3057164576ee727de97e2f2
SHA5122b833173646aa0371b01f3836036cd3f0acb7b05092c49bfe7708c5f92fec94c377150722b454cde77f71ff6da8deb8cfd61aad91f4b416158423d4105f4e7db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1d5490b4687a0d6068d166709937b33
SHA153e18cc68524bfc909dbbcef1b288aee8871fecd
SHA25655f6e3c927c60ffc0d04325cf31ce27c2a61cfd445a92ef488a2a7f51569ca8f
SHA51298b2df0f122953c497a82515834cca6057c4c2c73ac9c9c79c98834b533be9d77450532d5de75ed9f4fc7f483fa7488dc3d26a6791dc194f7ebcbe7161f29da6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fdf83dce365f0eedbfd409479261cd71
SHA1a1049d4df6bd07e64086f3fc2fc949b2739a27b7
SHA256ae7d9734f9b4d49db617b63d8c2964ca2f4de9603cecb9291300091b6b125df4
SHA5123d371e0821ec97f4df45109ee6d7415fc78c0611de469471672a33eecb3c4211b2fcb9a10a13ec187433a21ca76c6204db9256db7a10bad1c31e59122fe0bce4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594ccd5e4050042936d5422b1b9a5dbdb
SHA157d0c90d829624ae738ac7afef6325f0dcb489b3
SHA25601d537240b1494e52a4db0a417415f03012a711ca24e75d95dceea77894ea73e
SHA5123e66eb5ca8a13dad5e6e1b5bee747d0215e87edf3ea78232111974e913cd7727cce68319bc5face96e72c3cf1711c6548e4431e5c30547c10c1b17cdcbfcef09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d63a1a7c3900d5b35458f8aefe3d6d9
SHA1cd5bd1433adb5e0a21d5ff8a9bd203f3512e2f8b
SHA256c127974c6f8768d08d3756dd3039601d040c1fc468bf9ab23c8c48bb1d31414a
SHA5122bd6cebeef0e68f8e50bbfa3e5c0430594b24739c9b72a92cca142cfe6b34b6c714b15346f51b0e9605946562fd981302b607da20fe11dfdbef3b75f35fd255a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a