Analysis
-
max time kernel
121s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14-05-2024 23:06
Static task
static1
Behavioral task
behavioral1
Sample
4378ded1b5fa799b9267749a394f15e8_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4378ded1b5fa799b9267749a394f15e8_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4378ded1b5fa799b9267749a394f15e8_JaffaCakes118.html
-
Size
461KB
-
MD5
4378ded1b5fa799b9267749a394f15e8
-
SHA1
35b66065783bdbb53f6a704efd344f1eed616ca6
-
SHA256
80c02fb6c69ee62234bed6fe7974ebe97dca0f93c08311db8ab86d6dc589c51d
-
SHA512
778b45c647b6532d7d59fab5de91d655c0651bfc266c4accf8004b216233dc4599e68e013ae12dc505ed8b824b05272a60ec1a274aeb42f49c799a5adef34f60
-
SSDEEP
6144:SusMYod+X3oI+YqsMYod+X3oI+YIsMYod+X3oI+YLsMYod+X3oI+YQ:X5d+X3K5d+X3o5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20e88f6453a6da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8BE71291-1246-11EF-93CC-729E5AF85804} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421889835" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000009993a9c4773c277c1de2e8c7b1a370b5b6b3daa8a46f0966f34ec3c749a4754b000000000e80000000020000200000005411e0aad2bdf7003cb42ed9a75ea71d89d4fac057881c01f7de468c4534fbda200000000520e96150d81448b785407af83b24f8269ec7c3f3074c953a036d555e9fefc440000000f5b06aa031e96f496db4ccb24e1df52386b5db7f57d752c203a8aaa8fbff68afb056f2194411627c64be404e9d8e4aceb04241edbb5f37242759a285b54b4ac1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1632 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1632 iexplore.exe 1632 iexplore.exe 1804 IEXPLORE.EXE 1804 IEXPLORE.EXE 1804 IEXPLORE.EXE 1804 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1632 wrote to memory of 1804 1632 iexplore.exe 28 PID 1632 wrote to memory of 1804 1632 iexplore.exe 28 PID 1632 wrote to memory of 1804 1632 iexplore.exe 28 PID 1632 wrote to memory of 1804 1632 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4378ded1b5fa799b9267749a394f15e8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1632 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599a56f9d50ab0a9d9dcf13590ddf272a
SHA1cc44cec766edda0fb4e78803dad655fe8269fbb4
SHA2567690ca5b4894dd89f3b76fb399bad8ebdaef8992ae0cdbcea6a2a839e2e6c41d
SHA512fdd925ebad0d2e8e981d4519dd0cd36e2670186207a5f5c3dc70b6a6933ebc3dc6c1c42a5c2b94198b1de6a9c16591af2110014ab735a195264269c56b630853
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5897e98cb0731a053a82e490d6a0809bc
SHA1597b666379157fb2dce2b560061be2d80ef18604
SHA2562a7ecbf2b763b8da019ab4c65c7290c5d0a7c2956370af3bbd9f4d028b4abd74
SHA512455547a2bace5c26d9a6c73c7ce20507a9bd2682e028055a25e389fb2c336f0817a9fcc188e9e5d1c3199f820e0b3bdc3a822a679e80f78cadc6c3a14240838a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac84ddd0b7dae3fc1ee6bfa6418f647e
SHA1dbf7ecfa8316dc86c680d7a80ebb08e17bb8a0a5
SHA2566a102a8466c71965f3dc1f253e891ecebf5e3f909e0e11812671c8b2c1340a0c
SHA51230f7aa555b9b712cbb5cc8e08960650f87c0f157ca391940f8732581dc9c10aab83886354fb67ee64bdbb829b7ad10cbcacb9aea791957011ea863b3f4b06711
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cbe443a4480e2ff76a0936380ad06967
SHA154990ce76a41d71a900cfd96c81394d110effc70
SHA256a8e46099aa15a4227bf52e6faa2467372bf56ed4e272244da79c12c08d87e25b
SHA5127a681026dabc00d7b4788d008c00a1c220b326b515efda0105133ac5c5411861bcf8508c9445f076a3645e7e94efd675efa34c1b60cd4963e628e65b582312b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55662b3c7294d24016bdd8955ab9c6098
SHA17f25a7f98d9b2c97dd2a39de54c42681e49eccfe
SHA2566dce05a78cc089e37071e55de3489fdf5943c6843e1515f09e917ef7c5467367
SHA5128dcffae81937f350b83591fe1a0944a92809472f9fe47cf21d364a45d3cdbffc0159596f7eb4d94ea67475d4e5d14d8a5fc3a377f899404837b94452f06904b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5590c3fb10bc81086b3e1cdc7522c9ca1
SHA14826e05072ba5fd8b1fc770b14130df411efc118
SHA25674256a4510ea4a528fadb149a6ce772446ed06cc201d090fc45cd3bdc88fdda2
SHA5127bea11872b077ce2e4be9be195103a712aa17f57c42ea516cf2a3cb264ea2b97708f341025ce11d5e2701985963fb4bc85d83ee3e8a9a9d3c4ee9a227fe47923
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50fcfe804c5ba2bf36799bdc4c296d9d4
SHA1058d5a292db3fde8ac07d76f40e5f32b96cfdc35
SHA256a652b436f7bc30f87c310d2f3fc44f5d6ddfc22cd317b014a8406db063366839
SHA51255a34bb3058b44d98c997b5f093c5c4fc827d19159b544962ed90b61e64fad2472695ca819406b51c12bb56e16b935b19003b584797bc15b2a1fa8027687caad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e93db1fc221074cc76ba6166b104dc5
SHA16116d66a590ef66e9bd0d22a366a4c88b9af40da
SHA256c0830f2230fc3a0b1b0fd149f38faa91cb5e5ecd21142e436d49ef82fa8a6167
SHA51277463dce3f5b67d32a8bab4c2fe0ee0b1e946c211e8b1f5fd747c6340964dacd78676caa705c9e5f277afd03887adecae5aa697f166c76d51363f4a1ed200ba9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a487b344a6fa2770aa264d6d4633063
SHA18b7e177081e064f00087a8d775332707474f837f
SHA2563834a5da108d24462b08ba8d30d1b5b7635ddbecfb2d95f92abbb8cc8192b383
SHA5125abdf2251e7598297fd16cf8628f86e6b723a49349b0dc685af1e89f4686375f6447e3039d132e904a783aee25696b00fb75c9f9a33a689d8c2a0b8a138b413d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af293b45838a0ed2005d968497602473
SHA1f50c1eb68c258b14ca2c72b898d47d1206ca887e
SHA25613d9eca72c51cda502dce013e789e34f4f1a75bfe8c147b0fa5386348b5685d9
SHA51224260013027402d156ed3d015a4089a3f5581a13667b088c035e8652e132ded4361ef013ddb63cd9025cd81e6a30adae920b12705ab88260a6968a445c0043da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589271231e5413fcef8f983bee8ccf8b8
SHA14bcbe69527af82013c2d796fd061b5691d04ccf9
SHA256ece146c3d901cfdb6c460ebd19c83d45aeee8f24189f7032905b46a0463d20a7
SHA5127dc1f1a6c274f173f5dd4d5af7fb4d7a6f270c04dc993426751851b41f9d4dbb6f342dff89194d4e4e85441f53688ddee71e6fb9d13276edc0c69d05c15d7f1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516272b5bc7323f71d210e53758c0e797
SHA12843338b38eb6258858159fc04d93bb33629c760
SHA256365be9051d59cf4cb5962ce1178bc4c5edd79435aee485ecbed76a8e0b740f11
SHA512fafd10bfec015a4a892fcf41ee23fd339427bb6bc03d283c977e325baf1fb30ab87ec4475539310d0ecb6d4770be20a4e51a9020408e9c92d230b242067ad364
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b030d3f6986921ccfba4c23084118cf
SHA157c2fb9ec060611fffd7aa6000af2a71a54c585a
SHA25656390a5e8820214d69aea040777714595406711b8be645002deadddeab62c430
SHA5129ab8a49742f8dfad8a2d64aadc065873b253324a6f541f78e38740d907d562e3e1b0371d4612b1d91e1f6430ae964bcf021a7a44172f4b69fb6fb6d69a072d49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3a8b6c310ad711f594a774740c535a7
SHA1af4a50b55d89cec7e56865c89099d401a072c2c2
SHA256cee5e37e6abf441b4936afb449a1ee787635705798025fe890de7b1f3458c9d6
SHA5121371fee9f690e39092d962b180e81104ef7cf178ebbf3ce3e204f72b4aeab1e707990582a2e3b7b85cd72b70720a6c58ab2deff1cc9b7fc729e5008840792351
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4c152353ef4f232a50c6ca5511487cc
SHA10f90346fc51d060f5d2cd2bf92b9d7db8a65c029
SHA2566d6824ccac9cd816452e26836abcf179fdc7274f029451c1a5fa4319ca51bdae
SHA512729cfea35d00155d9900619333bd7abcc210daeec298693e529628d082553a9a5ec7d368587f52a389d5c79dd9d1997bbdefae74a792cad9a2e2b206ae6950d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b19069ab4646dbf14c16062c696172da
SHA1b77fd68279add2d32aa1a4f459f0ba1e674f4ca8
SHA256407f0117fb33d387f286c86003740f070373a6b7c7aa4e9942971207b71f1c32
SHA512e16e2dc637bb44f625abb38a3a6d6855f4e07af7d78d07c0c01f5f35f509b229bcaf0838a2e90e2ce64b2d00a42b5676cdb498c41c148f1d11b09b4214641051
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4c1434197d0a7647b346b0b0505a65f
SHA17b3445d170c647877582c5ec323d0838e4818976
SHA2562e07b8e14b543aba6dda24303edb37cf6de29f48c029bbbf6d547299be45e692
SHA51213a72fc5c9a48c1cc05d48a960b41ec0d61901b017b2e7b2850a475da0a8e328546c18d375821db7a7de9825c57ddc4b50fa165aef0e122ec85e76a4caa0be43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55dafb3608e119f7113a2d902fecd9136
SHA1c5e0933a744ccc4de407fc21b81e18d00ad00b84
SHA25603e2618d631aed64181c1d0ea9a320fd2845a17e22739df7e9a869b01cdee443
SHA5123c735b27c3418c430cb4cb312ecca83f2986b38862ec19677ee14e3d92f36fc0a3abe2a5145dc2a2fbc0c1c0482c274334765868a6c3580150ced69b06a74be6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1058a2c9fc336ae935ceece4b2ecbdc
SHA1f8dd77e28e91a968e038ca2a40e59a7a6afe5aea
SHA256ff05f264659b1c29ee96764e0832067e79592163b1082e33afde268b988ffd8f
SHA5121b484bfd5c0408d56d2df87c72787d7533b30869312c7b5d57e14880f2a09b9a79a34db4e240417c40b7c9fca9d44287778862cf76cb4c82ccce37729aa98fbe
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a