Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 23:05
Static task
static1
Behavioral task
behavioral1
Sample
4377f24a1d0c65a830b2e3264859df24_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4377f24a1d0c65a830b2e3264859df24_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4377f24a1d0c65a830b2e3264859df24_JaffaCakes118.html
-
Size
39KB
-
MD5
4377f24a1d0c65a830b2e3264859df24
-
SHA1
df9ee2f2013a0e935eebf66d960c88e04abed2a5
-
SHA256
5b3d3e21f86b1baecff71abf30b4208329fef5cca866b947f7943c35310555d5
-
SHA512
5f71dbdbec1facbbad965b2afffd920fe12629fcb23aaf57ae18f2f59eada40ad24ae13184574392e99624a3c92ef6d0578e9232e7002d54006be591c523f790
-
SSDEEP
768:xZNVotRBH5f83eJOQFW9zlKdtSUXYXbKI4CysM7oPGWrn7LQGR28ieGH1Z55cMfC:xZN2RBH5U3eJOQFW9zlKdtSUXYXbKI4E
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e0000000002000000000010660000000100002000000076093dec53edb91870e3b60babb989942f9decab24461e4306f8badb083be929000000000e8000000002000020000000ac060f9e8c724c9989afefcb8cdce10b727ad3b1729d5d5c531da23f4bcdfd4b20000000ca6a13ff6034d27471b29b5f06d682169cb75097a1ec54561142270aac33aefb4000000054b7659ee47378140ce18dbe00f72df4c96fca35ab9be396e920dd01a38688581564ec1a29100422a482c28399b2777c844eac52d0e9e8e6ff7abeec8753b251 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c022d53f53a6da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421889780" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6B065311-1246-11EF-9988-CEEE273A2359} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1888 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1888 iexplore.exe 1888 iexplore.exe 2496 IEXPLORE.EXE 2496 IEXPLORE.EXE 2496 IEXPLORE.EXE 2496 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1888 wrote to memory of 2496 1888 iexplore.exe 28 PID 1888 wrote to memory of 2496 1888 iexplore.exe 28 PID 1888 wrote to memory of 2496 1888 iexplore.exe 28 PID 1888 wrote to memory of 2496 1888 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4377f24a1d0c65a830b2e3264859df24_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1888 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2496
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3b829218503aa81c77520444d59719a
SHA11e008f43754e6dfd2c6dd246a0d6f04832e63056
SHA256ab127727b265e96d01a18bb776e9827728f72d506378419ee68235f4d8f02c7b
SHA512f5069459b4a461991fa2ba0cc0647c44428e2bd01bb042c2fa1dd7fece0bb477478522dcdca45ca10cc71a5175bc30e0a16139fae494a91c8ffe41c050fdcdc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515f7de5fe9bbdf2c35af358133a8065e
SHA155f9b7544dfe610e8edadf2adddaba24422911d0
SHA2561588ff3cc3b4ed23ed80aa5df21259f465967f776a78877e24cc6d251af67ade
SHA5127b8685ae7e04025edaf59db3e26eab269fbfef165d83aef3ebb9b2150b72f0377d33bbe896aad222cc60b8561ad890e8e68610364804a8586f40d16f7359fa08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578e3b008564595be70360878948084dc
SHA11d089f7dfe2da52929aadf3cb5b35587842c23d4
SHA256b11553225226550d812afc42b729e3e7f9975e343c7ebc4acb33ccd8aef02f9d
SHA512e60acb53623a2ade32a5baefd9ea2bdfb4965bd377d36dba4b33334671b521efa517723f8add65ca30b5b3d38eb626aaa3ff71a63f315a5ec555721887160252
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51cfd96f882470f04831ec94d06a58edf
SHA11b9b1dbae9b9e6a07c678c37e4cd80f9153346b4
SHA256e2bebb6ae8507c4bd7f6bfa53aa7c6a6fe5559dcc652624b47ac3bb5224bbfb5
SHA512e698d2d65103e578b3275c1e940807f61be04c4f899d68ab645746f59908e707a4985b51a6c3493d6236eeaca02c357bdcfe3a18264436e27f2b646571b0109f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556b727250cd9a025fd819b4ea9538a58
SHA1d8c5bc782e5f3c58cf065c410de68745304e343a
SHA2562ea670ef5ff1813029c32a39da29ce3133395364b89320e9678e03367446ebcf
SHA5121a585cce96ef43a9c4796cf39f7da23315f15b85f396123f04b263f0feb45fc6738395b3657427ab4d53f304a7bfff724071ee6df56f8e208580ad5a0a0e411f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bb3ec4e2e287f6731b738b855aee8dc
SHA16f0f8d7ad24a1e02c4932a99f5abd7b4e3ac7045
SHA25684526b33d942880de449dc5a1c602ad8f1d5ceee8249168e7b74f15a9600990e
SHA51276768f329d4cde49550c9261553897cd9f29b106e4600bf4582c91591bb8816bcc29e25177d16fc9394f189d5ad447f0d3739842ff77e1ebf4a333731f6d7329
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec10d3d75b0b461ee025a97974f680f2
SHA147b01ef6dfb93d85463f0be319bea05b6d88367b
SHA256dc470955a93473cc1578bf8b7a0f1863bf8b4d427c9b0cc7eeaf4b46e677c272
SHA512481702efdb45d841be30b1679500cf44e657bb6026fb57e9bc67032de322af706794bb84f2b25b577d4434c2ff1b9a47c00a31b75a44c67963ff5d8bd4680004
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56007cebfeeef4b4c2f76544358430445
SHA11d841bface9a916262826a80e82760438affd0cb
SHA256bfe1cc74304f5e295b1ec79558c53a51aba436a6adda146bd494c6d21b4edfdb
SHA51276f0d516a997cb7381f115702baccc152675defe6e178d8e4cfd6ae33e4334d50d9a83afb8943c7cf728c1b63eb86c70edb1921743435409444409079afc440b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d698d1c10297c850e8b949ca8601bf7f
SHA12677ab8fc0fd803306c471846e730cde7fb3dde3
SHA256fb77755bd6c55ae950ac76b7436b81dfad69ab205556d49818409eb293e8e178
SHA512f82855bcddd73a50f8cfafa0bf119d1334aac210193701af13be41ad709a492e8914fcec1df31b821efe89f0b6a2c13d9d0ff2a8fc99872aa077644ba17ba930
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520e660f1f8850f7e6005b946d792b0e9
SHA1fb4298021035bc09606e26445e13a3d60d8657a7
SHA2566d064075a112a481ec56bf076ebfb8c0ab9d63374e819856ca9e4f7e59095a0a
SHA51284eed173f4a809a44c8fd9b473085d8c9599e997024d8e798c5116838a1612305dbffddc769cb425e519b804d11df6ca98ea70d381492815c74291bbefcd9297
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52524da24220c480a4ae063389eff4c34
SHA10237bef2fc979b3bead7fb404f4b6613eff37008
SHA2561b80772e8499e6b8aba52cf4a150949675b16515b1511be934725d0941b7de3b
SHA512ed1fc2ec987a7d5b7ecad3ec360a5c6cb6e4e2700b881d6e78207ecc6ce03f60d79aab33f3b74196e26c070f7641c558d322050289f8ae440ee59bd7f624653a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d8c6586c93e720a91421bd14e21e3fd
SHA10386bb196d9e5a28b15028f43925a581d550ad99
SHA256599a789c235823ea696fa65a8bbc86323de2b012b12cdd093b1f6d4053c8b261
SHA512547fb13658b1a0c960bc54bcc67c3b0a70117ec7c8d929c4d949e0928f2c7d40c2aadf3376fd14ba49bc8ec953efeac71fe1b804785ad364fd8257a4b52337a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aaea5baa9dd121968cdec0f95f60c234
SHA167caa9fb4804adefbe07d899f79d588e4a9a29ef
SHA2562bd932e16358287dba1be3999699d6669de494bc4f428093e48dff1548b277b0
SHA5121e778a5d8d87bb118999b0a6659eae0d72d4ae05f32eae99c9f9210612846f5419f8e9b05fa1b07811e4a3e783bc14249dc2832c0aedbf2bfbffc56fff31dea1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aeda43e85f1f6f9e2963e333955d76e2
SHA1cd2986a043ebf3be9b12d04f04b91a34f2fd5387
SHA256097b13431b681eecfd07d8e5b470b0e5908f9c3b53ae2bd5f15deb6257a0321c
SHA5125e645c6d60fd961be6b47449ca299cc57d17cb15539b390466f919ed374a3738d88e72ae5fe10e8da6d5fda5fbed811497d8bbe91757128a99598a64414109a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e37818046fac630dd8de6aa2804927c
SHA18ca5d52bfd2b6fc0070a83f61ee6333f3989b7b0
SHA25686f21d899b3f5e802cd730f113f812dcaeb5be5e8f6c91616354a27f930e1467
SHA512e2ebc3e5742aa0b5bd3fae9e2a0148de3651fa8711fc050a92a865951f3b342b3760dc79d097746b14bc5ab604e67180ddb233cd779f12228f96eef41b895b13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587f5e3611b75de23c025f22ef8b1eaec
SHA1fb8707f5c885daf39e7b9c42fb585d4cc6c84043
SHA256f9a7c93c9a7f9f21b2f31c224c2a8139ae455811e71d881813e001328843561a
SHA5125fe7aeaaf441b2d1c84ce6b8e06963ca47fad7af68de5169620688308b0b82ebfaf0765e5bfa9e0c2bf85411712a0daf9fcb2336d5f341a05614d1f9a6e6eda1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b0f32d3c650d2b2b0fcb938810d0049
SHA1e76f526b8b2022c87eafa3cc807934e72cb34bcf
SHA256149b85d72b160bcb0b283207977e1d8ad1bd1153bafe31bdc5721aad8475fd3e
SHA512165165dce0910f4f78410791abdeb023979a22c9bc4c50934d175c5d719c9bb1267a6079741be3a75677d043daa56ffedbb38d00f1b54cce2528e800290a6e3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4df665bba22c1d727e853a71f858dd7
SHA1d845c1b00ad6a6c4798597f344d63afa7c300909
SHA2568a9782698fdd29d15da20a2b3dbabf3b9920229bd476001242612bf5397165e8
SHA512e389c1aa4d4410117fb705d36d8137fc0744c0937322c3eeb8620321ba387d8237316c58f5b0fd0f13201db53d9bb69afc73971c1a2bfe7c442d4657a9da10ab
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a