Analysis
-
max time kernel
120s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14-05-2024 19:34
Static task
static1
Behavioral task
behavioral1
Sample
42baca69efd69d1179de6198f354d915_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
42baca69efd69d1179de6198f354d915_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
42baca69efd69d1179de6198f354d915_JaffaCakes118.html
-
Size
118KB
-
MD5
42baca69efd69d1179de6198f354d915
-
SHA1
714d45dff6243b035b3cfe86e909186cc3bc4874
-
SHA256
e6c30dc5b845dedefeff6aeeb545f9000f56af68ead85df569e70cad0d7b0347
-
SHA512
61387a9f835e6c92ef918b35cf9aea544a94d825f37c69b5e5dd78bff23e3e44b56e97fffcc5834fd1f50014eb06241745da0457feef99685a34a86b1fdeb072
-
SSDEEP
1536:SLeCRyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGL:S5yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 106b70e835a6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F89DD5E1-1228-11EF-B35F-5267BFD3BAD1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000274bfc0bd11abf1758f444ca9b8e8dcfe423b28773ba71edb0ba8ead90c66f9b000000000e8000000002000020000000566ebdf3960ef8bb69ea55cad65733dcbae61253c5d8dd3a538b13293d33feb020000000a4b47e8cf6491eb1d0917419011288386fc56e5f47d477945e972d3d9cc83895400000008e794e9180ebc26e5cd1a75b58992f55955a0b37df38cc6f8722d63531e52179dd38088de1cc08b4ebdb297398ad2bd1882f83ec93521daca274d04398dac9fe iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421877134" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2140 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2140 iexplore.exe 2140 iexplore.exe 604 IEXPLORE.EXE 604 IEXPLORE.EXE 604 IEXPLORE.EXE 604 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2140 wrote to memory of 604 2140 iexplore.exe 28 PID 2140 wrote to memory of 604 2140 iexplore.exe 28 PID 2140 wrote to memory of 604 2140 iexplore.exe 28 PID 2140 wrote to memory of 604 2140 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\42baca69efd69d1179de6198f354d915_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2140 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52912b0236b8ef7bb6dcd325f3d9df532
SHA12e3c2ac1b8e44ec387474f1bb832b6aa756748d0
SHA2561c355f11a5fc3312e04a8f5fbe5698e7434c6ab67ae13b1cdf7413a68bb46980
SHA512c6ef619d55969ee0306c4ba05bc3b6eaad67c4ddbf6d0199334af5302ef58b5fd601d4eeac5fb78194649666b4fb1a86b95adde3913e2f8269e2bef4868a9ff2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c5ac48ecfc2eef35c969ccdfb250497
SHA1971fcc0f5fcfbc539e37b487ec98e05920e29793
SHA2566acea20abfe91ab78da220f580c1eefa07f220028976a66fdf6ce0f07ae868ac
SHA5122876fb566a541cbad52b86ca6442684dfdd0c0e2db7b23eb4bbd6803f3356779f8cc32e3eb907c29d7a02e5e577be455fb042d1b756893727dc40aaa141c4239
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4af0c1c9a0d8a836ca7ced222ba5d8f
SHA17b7f0b5eaed48dae32c4f5e573ba55ad6675324e
SHA2565525c583f72d6beeb73a7c41c430975a4c1afd3d5fa3e896bb70c315926ef11b
SHA51276b862f5b9fe86e98e75410bf773317d0a9c6c06c3cf139b24f1290988f3d4c9f2774655303b70134dd1073fa55b019498b3a289a77b5bb3a44142fb875d1e00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51854533e1f029fb8e2bef876178678fd
SHA1c12a24d5a306f0ae048f5937287e7900f43f1d0b
SHA2561d814d7a9c92bbff052d017e81212c1b11caa2d1ef66e1117b420a1752bd8872
SHA5124c304f583f4be5deb119349d36f176f22940f4e6ce7f5b6f4999cbab0c7c2d01151bcc51f5b035425efd166d883261bcf223d3bb6a0417d0559ffc0eeecfb97f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530d41baa89955c186d6a4942536b907a
SHA191868ede984d9fabdd4b0091ded9910544322b2b
SHA256ba1b289ba57a930345ed6ac1cd95b70bccf1f969a8151dc1d6f30c0e1ff6d986
SHA512727c1aea994f3c2b603cb844a3b9cca0f671345397d9ce01e4f30bde5fbc3c0d031d1e94f5f5c95f24ce67df2ae6ad9b7cfd51c8d72938b12a2fb99842bc1684
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ea8b096ccfa51ce1f689b9be917ef5b
SHA11a7220dc5361b52617bd6b1a68e7f9f432a70e6c
SHA25675e43a8a494ecc7779301b72b11981348d68e810aa0c3aff7b60d8964169a7fe
SHA512d54c80977688977ceee33624f641351d45322c4adbbf136af1345493f31c06c26e3d84472def73d578a4c95be37b614c05bde133ba1b9f286c4512f54420c7df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5291e59c137d109880ac5302d036c751c
SHA1c3bf694f92c1c686dc0d18fdccb6ab4a2a7bac81
SHA2569ea629e4f0eced7c0ffeddf017074eee407ebb0a9035012431db2a0e4931dacb
SHA5124ff1a2ae19e3055f8eff421fbf2ddc4d5cc94405fffc1d00b667a0bee80171d6763c2a4de156e364a414ca2d4442db55f81c780d72483fa963e9e215b1513ae1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55cd12929daa0981f4fcc80e0d22ebcc6
SHA1ca84df62696622b9433c4078b6e9402575c1560d
SHA25651aea499f9a7166f86bb8fcca3cec641993152a22a8cf57a646fff313d207418
SHA5122e838e335318d2ef08f6f0bbdc2ae9ed4a016d6e3946727ee17a1677eb99399ebcb6aee17e46607fd5846430608d79645b7020bfc2cac4d6f7d9edcfe1b92be2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531673e298a0b23983c86b3c5727826d8
SHA1deaf0e77fddf2074edf9e0b2c9399341388284c2
SHA25610f7f4a82e9beb487ef5173c45e9473e16816309bad3d148456240d91cabc84c
SHA5122ab296e01f84ba682c9f270e6e04c43618b68455c267903c41f2df2cc93e151df10db19f29890cb5096afe10a7c91cfc239cddf238007c791889a3c2c25327b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f65066b804677c733a9af09a1ae1e0ee
SHA1c26387956719e77080c3d873871f0363e93eccd5
SHA2569d5e4f3de6b190210615c35c60b6d4b91743321b606cc1585a6e33857ccd333e
SHA51268c1b4775bf1073a6eaca000f2fb53022f2a64eeeb3c554a2d78603b734c15c52ce8bfbd14eaa9a1fa6fe6fd2f714a2c2ec23ffa5a5793a9241977017972fd9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ceb04fe1e854e01de8400038d3309ed4
SHA1c74b45d460137a3b74d1a5d1bf49a649fa803c15
SHA256cdb7d20f8a2b14cc119f8848b50a1eef06c3ba94079cb71d671686a77ca27bb0
SHA512f12238a5a6c9454e02e7317b921980dd3a81fc233fcfb3b6be539ba5bb5f43521aca745a367a487d9cfee11e78c60b4a9f31f424586a92d8ddb39dcbd91af54a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571e9aa91460486a0f08582d3ad1772b3
SHA1953d9eeae3dcf1897f17bdd04298adec12e1e85b
SHA25607ad9a2f364c9c42e11e7518d7e9d9a2311d034ec48b15c3be68ddc8e6d41480
SHA512411bd9ef592de9ae3b5585d59f8add9f4c06ef0238f3e3f52700f70a244655af7687c6525dca0a0b336539fb433fa7f8a2cfa3b4748699723209093fc4635f1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5169650eaab8bd35b000801bd8e2c6b54
SHA169ea0ebe51efbc5734c5614274c411f163282154
SHA2561c5fe85f71f0d521ab61bd96884267eae9464ec4ef9a18c996715e7ed3e512d7
SHA512533481924158d011902cd6f7c60a8a9ee4044785970942189fd81ecd804d4e32fec0e47735a4f1c8abf09cbfb687ed8d51634d4bb6e91c3e98b0b763489bfe33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58fb2ccd66b4e89a8f92f8d3895d5d7a1
SHA1752ecb8a739a619191d1639393992cdeba6fa9c3
SHA2568bedb359b852b63011aa5c684fbd2414a815e5be0b23fbd2fea3de5f3ac8ef8a
SHA51239484207fd45a24680263086cfec780c5cadde29bbb650c38cd84d034162c5885efe536df6e10bdd645e7f07ca74e0db7d9f6ad18a5728203ce4271bb4706b38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5955f3bd87e8cdb6982684a5a32815c
SHA1cddcb75cb6c7530121f70b7b1f19ea7baab1b5e6
SHA2563a26639e2efc145cfcfd264085153d56150f48b9287e9d7987b2d8c76bb98702
SHA51221ff97155beb66820a7567bdb0627c5951e0e209e1c4c241cbbfa1a0daf90306e3c5133ed3b3e5c9af65835fdd542444fc19ebf402094904f88ca356e3ae5793
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f599f0cb080eb66bf275072b723bafe
SHA1b12e1ff4fe36626202e02544317eec4fe994268f
SHA2569789d1b73ea4105312b252869e8b78c0def34b73a36c458af691ba6f7c656a7f
SHA5126dd5683c82962c90f4f92f316cef2758267078e00e7d5f33369b2544022cfbd135a9cae4be538b979c44c5c80586e2019cc881c8d0014fc5adecb556e9771c60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de9971b2f1072811417b4fc6c8664b4f
SHA140fa0822e6d2b3cbc86adcb2ebb445284bac61d5
SHA256bfc736dbdb79f8827706be078199b2525794c6f26421dde603c76478c1363c68
SHA512fe61abb742d5258f5a58c1c7fafd9b1950b77fc52a2d1e4b354dc94aec6e3fa99c2f867a123394d4c198a3664ec1d9f68ea7f5da80436c41a231bf162993aed7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500417eb1b45b7e0e8979a602d726f1a7
SHA1c2f6f99a198f6f7553255d80d09a21f011456554
SHA256053b6d1e187278b55da3b0608150ab7dcc296e636a4c307c875dde1bb4910500
SHA512aa1420a6c3a8d45ecde55f2b6d67eda34ce51764960c5155f19679cdca1220f407e06fa438cd734c947c542555ceccb0c29dc598f1ecdf69d20e925c58b049de
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a