Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
14-05-2024 16:38
Static task
static1
Behavioral task
behavioral1
Sample
423187a7f89b5a7b8ac5c64979be385a_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
423187a7f89b5a7b8ac5c64979be385a_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
423187a7f89b5a7b8ac5c64979be385a_JaffaCakes118.html
-
Size
4KB
-
MD5
423187a7f89b5a7b8ac5c64979be385a
-
SHA1
e714a4506256a410f5ff904faac8ca182ad8649c
-
SHA256
52401cfaef981ce125ac020aa53cfceb5c4dcd768b6198ea4b3b34e5df7a98b4
-
SHA512
256990450a4ed8f2a0d42a7b695af83c85a8815444e67f3e8b798e26f0d0d46c7a5c36fa5915b0e4dfbab6c06ebacdba2c0e2be8a97a2a7087b6d8aada8b77c7
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oRe9d:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDF
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10d0953a1da6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000004e9d5e8ca7a15dc091763ab67e5da9e6b34d5c36fa711be50c99c5da750c4c31000000000e80000000020000200000001da808f7747495bd9f987a348effc267957357691d2b7d2d6b64bdc7916397e5200000007430debc16b9148e19ad0a517eeda0ab8a224905b10549b55f8a32b0d73d81dc400000005c86ceb2549e7f69fd71e096bc5225c435c0060bb99f76b258b64becc1bc4cdefe9618c12b50258c51f18018280998a1db16e4a444c234f922ecf94640ca4dc5 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc2330000000002000000000010660000000100002000000047fadfbf52355d97eb66aaa32050c19589755f9fa02be667930047fa2c4d8d2d000000000e8000000002000020000000cd785c42058bc3ae2fae82231b2c8a351bcabc9eabb423520799be450da80937900000006388bd68cb398f1e1934940375c39ec225785d8c143e122494fd0e834346666a269a05d85a4c5f75a4c607109229369a544a3b8f50678cdb48130c78bf247816c1ce082cb89c677168c46737fb9a2312181811e8079037b968d3e7e10bc11f948ff5c5d596b7d1b7ff0656f55ae4876d5cf32728e347d8aeb412733687346a8aeb9ef5c56b411caa57077421e6d4d5bb40000000b201e2d4af87bb40ff21df03b9cc55a69579d4084773e45761a44f49b5a0544b0e16af3d049032b4cea195ba759081364c2e337c03144bb2fe8f6363f6055425 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{66118E51-1210-11EF-A5A7-5A32F786089A} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421866579" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2928 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2928 iexplore.exe 2928 iexplore.exe 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2928 wrote to memory of 2432 2928 iexplore.exe 28 PID 2928 wrote to memory of 2432 2928 iexplore.exe 28 PID 2928 wrote to memory of 2432 2928 iexplore.exe 28 PID 2928 wrote to memory of 2432 2928 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\423187a7f89b5a7b8ac5c64979be385a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2928 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2432
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c89caafa836435c52d84e56008b30b1
SHA13a0c4b00fe110bf429f8f66dbe6ac458f95151ed
SHA256717a283b1b163b4b833b8e7c6b1d760bc0273dbfbdbec723d4c5bcc65e7fe87d
SHA5121799c08bf1541e5b2a637216d66d3f4ac3a0231d6cf4e26b5b4a889ab3c0c5d3b8a4494b98b08f28fcc7e89b800ae8307312040bd27232a56cbb91d1ea5f2e81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5628d1e226c0ef7f07fb4eedaaa7bf3d3
SHA1015a19d09c420187250d37c7b982cc6f13eea8f4
SHA256fc5d1a11d4cfa44cc965c72b9fdf3a03faed93ce00826129680f1674a188766c
SHA512aa5a57ca2f23f017abc7a62604d11c67d32b2331686d469cd4aaa818717cf968b72e32fc1a63701b7107c05da4a4c1eac5a2df9e09418c9e02a374d269c0fb97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557b5e303304ddf40bff5dfc796634292
SHA149bbd566c19d4ba7945b10c8708b9c97ef3b314f
SHA256fba1f2a79a3b98533623f0a1f2880451e99f55aa3c6c4ed5f2d52b69a505e98a
SHA512cd54aed24dbf9507e9b1f49eaafd0f22af4e85b4a0d16c635a94077701bd7f2c9d6b9e77486da1a96484809fa6fe258cc9b9ecd0bbcaff81633de1059e59e8aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5174ca0f64e1817993e712a127fe99f41
SHA18a5892e5cbca3ecc48c1e7fd0b9c785844d48d20
SHA2560e82cfeb4112b85acdb22fae343c8ee8308abd4ddf591e5bdfe1249eac628cab
SHA512c0ec1380b1eb30d86b15460618e969c3a996e87e014470a072b2d7f1d03fe26ee1fed25bc53b5047ca6a49a77a944c200e0c886c01e96ed4f7171f6256dc2a09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efdf7d1e3d428108af7449d806a7be85
SHA1c5fdadcac7797e43c430fa524630ece4fac9de2b
SHA256aeb75fdb162f31661281acc0fde00dc6a9dfddbb040cff36e2bd22d60c8164a7
SHA512e6a22f810fb0f16bedf5453d59fc2221ee968d389f78abe4faa9d6b412271e4c61ad08f36aa6e5aa3736ed0f1ea1801e6e66abd6ac3a7a13dcb2ac759991d483
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536d04ac18e58a2c499dc5eb71c9b242e
SHA12d0873aa715e42983e0c0e1564451409b349681c
SHA25620f4982c82477d632a41c7ab971dab711501508598f4d0c2119607dc7770bc4d
SHA51240e89dc46917f4989df743988833efcbc07b47825b11025f2b74620a7a95cec775fc68b7e46a68d8194ed822a585a53af961ac819a523ebe53269a0169244a2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a79244c833446102f3dffabd1c298e5
SHA1795535b947fdec3177a50cefce0d7517632a630a
SHA25607b323dda5cbf92e1f8b3f37925394802477f66218e26ca1377242849633f6e1
SHA5123c2f67111ad69ee6b0dff2b7fda80b3c1e2b54ce3f2201f9a34e801416e4000f03ed0423f5eea0d1cd5a2ee2ff61730e6824b47b6fb3f6daa1128f6beb5a39e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527e4e01891fc8724b06abde332b6214f
SHA1269d253b156dc32cf73ddaa05767933905d2058b
SHA256d8413d132f883352c717d4188f65609ee85417780adeb180887bcaf33b36f9e4
SHA512c8036c5012059f457a22aea8d786ce309c081040a6916a3a42bb37f0eb2c7664e9ecb72974895734cceee2d11861b5967841b3027823c17e2c87c39fc7b90b44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf58fc966d09250e16e730bc0eb574e5
SHA1b83325025ce66ffbdbca97c0bf40778312e000fe
SHA25635e7be086e3c0533e5f1a241519b877f29c4643175acdd03c00b0d404de30369
SHA51281b8be2ce52326866d5c5bcf93646bb6b4af649bccf741c1aed2ba0a17b9c4963c532ceaef8343c1490cb6e4e562e1a365f3af2cfaa01ca03bb2d978fa4dd391
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ab697a1070a6cef288463c2f2bb0b34
SHA18fd6407b1fb406b2278b658b6c172cca5fa623a3
SHA256a16652fa3d0847af6df4742d814e2d3a7b3b39505f67b1109cf1a4333eacdf87
SHA512214388cf9c7510be6a5c100930cf188f46fc3db2185861d50324318513b05927ae47e7a5a976d583cc089ca00aedda76643b659661e28bdbcc31864164e76102
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5238af5f394eb2fe4f851d94d41edc7bc
SHA182b9aa5d8c8e030e9450de2d955d0199be5218bd
SHA25619f821197f24c9a59358dfd1ff8af7d00148b5b7398c3b8de27db7c0be43b290
SHA51258f1ed995aafeab82eb2ab55b47970eed1ee9ed2f1757cb4669c4fbbfa8722f3a7913b71ccd50c097aaed52155091eed394cf1d8321b0b3e01c057523fc7311f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5523b5a64ed4c8ca29307ec8d10fc2d8b
SHA1df5c640bf078f4bf477b7458f0e226f7337cf41c
SHA2564abc6f4fb8290219f65bfa2f33ad88ad321658d35b7bf42fd8fa1e07a649b3b8
SHA512de60a8ef834d3af17591a89367bb86ddd7c4faf1f4c5a0e502a8472c3ddb5b58a8883a7b0947bbc24cfa4a4c29b66a104cc648a880b5d1f3a001b948ed5fb09c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502c22cfea8b3ceb49602f198621d1e57
SHA19302d25879a5f855b0455abf4b749e957c25b183
SHA2564b977a96fcad8d780398d6f945346c6a031fdc4b321b14c229f5b79dfdd38314
SHA5124a5ed563025ebe2aabd714a731bbe8c2eccbc7447ee8e9f6015e17657107b49e1b028a373bb21e2054a44fcd29c25250f32bbfdc5cf1429bce9fd48323659925
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e61887f9e63680d96b18c88129b811ef
SHA1378a710f064964f069b6cf0c7d9a490b23e81143
SHA2566df6b6a111c5c13665e1871b9eabc5b9c843af19980b9067730f12b61ab7bd46
SHA512a69c06777ec67c44eafff1ad41f90db8ab1704db8af1321080a3c024c2f74a4f7adfa6a911009e271689ac0651c575bf94e82cd1544eb0a3240c04d47ae3cc1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592ad6f47bd18327fd6c5460da2502356
SHA1615edd4f93a25e36f11e24bb26024c56709a9104
SHA2560d00934edce36bfc90dcae659248b347e1fc4d9e34eb07dd4989f103fa185e09
SHA51205c4b62f3c643bd5448713c3866c3a6158135ba02fbb6dd0ca5e3a660e4935f2e5d06db6df13906d71fcd17259f38fb3fbc702cd31cbb34a26b1e17bc5e3f51a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9e779ff38c654117ee457ab1b6451d2
SHA1e4bfcc353743e08f6afbcb12cbac361f4d42c922
SHA256885a381d4254dab344ede35a940ad0769cb6d344ebc0ea798d1528ec26e698c5
SHA512f0b32d9e78e5f569db6a8b732fb090d1db5f9e160bdeb41e3ca5d4598cb649fb95f797b70a28b1a22a60ad50f5d902f63df6fb1260ce84cf5b4f411a7ee9662e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573a77af457f1b3c8814658d5ead00aef
SHA1fc9ef520c45c43ef4e1dbaafa9b7709ca35a34ee
SHA2564d2e69945fb0bff750118875f347d520368d226c760d4d3036ea882d83b163c7
SHA512705c7af8b462974037402a456e98525cc5fb3a83ec0d95f7574a4131f35e07724f421f268868cfc2c691c608f7f19d5f2ee296fbad0f0ee8174363bf0df395ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547ae8ea4440adcb1d7be06d2146cec2d
SHA1928d2ede396720a5b17afe04da7c53515bf09d0a
SHA25617d4aced87544ac2188a1ed7e60b46b677c73e2fab072492d7151cf967df56b9
SHA512075939d67dcafa1e1a32de5733c5ab2e7e15f3276005e4d72ee6bd7517155b0839b1800197762b4e484b758e52f519d84e6efb62bd7a5df348db7f03688e65b2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a