Analysis
-
max time kernel
138s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15-05-2024 22:14
Static task
static1
Behavioral task
behavioral1
Sample
48470b795fdb3114aae0b869e3294f95_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
48470b795fdb3114aae0b869e3294f95_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
48470b795fdb3114aae0b869e3294f95_JaffaCakes118.html
-
Size
67KB
-
MD5
48470b795fdb3114aae0b869e3294f95
-
SHA1
e90d04784ef94a50a24ecbbe4b750c2e99aa1da7
-
SHA256
efff5655f2114f49da0606d4bd5f495daff6d004e9db23fb02259ec27c7cc563
-
SHA512
fec63a3b6bdf7aec445578997e4a0b68b898d9bde6e2932d1e6fb27d567fa95b5e6ee674fcacd0e61bf152768812990ba2d1648df24f19624cba3cfc5fc1437d
-
SSDEEP
768:JitgcMiR3sI2PDDnX0g615JualTWoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVh:JpcIETnTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000da035140b0f3ac29c700741ac2f944b0abb1c59ffb39c08c302d12e980bcad83000000000e8000000002000020000000c79f9f91e77e83197d0a4fc5b46e10d215fa87aa4080e278905d8788a7df507020000000c1f1bab733fb344f6128cf66d914110589acd7c06d3182ace1ca24bf4828c7a7400000006a83dd786417b73738031f569cf8b14499e5ab80a7a609031c5daeeb4b50d43a267676630b92c902e93257ffa60c62cd3ec278d5b549138fa50301332be4e4fa iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421973137" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4004385415a7da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7F9FF431-1308-11EF-8A46-EA263619F6CB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1652 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1652 iexplore.exe 1652 iexplore.exe 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1652 wrote to memory of 2184 1652 iexplore.exe IEXPLORE.EXE PID 1652 wrote to memory of 2184 1652 iexplore.exe IEXPLORE.EXE PID 1652 wrote to memory of 2184 1652 iexplore.exe IEXPLORE.EXE PID 1652 wrote to memory of 2184 1652 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\48470b795fdb3114aae0b869e3294f95_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1652 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD589a8e9b2cef16bc98780ed64fa132ea5
SHA1d4378c5bcca7d3ad329ef78bb89e8858afbc82ca
SHA25672df60817578e486e99fabc884abbfd23c697a0e96d7f189f98c0729077a1212
SHA512d45ba6f78662addf0a5fe8fe5d66e8410a94d7fd64cfcb3bb344f829fc95c2a19c1898190c2a40b159ee4bed0ee61309c7c357dbff93f05280bbe32f503abef5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD57aed56243979a9d73ab531481b147f56
SHA141866824366364bb7229e214a7eba6addf054f9f
SHA256bccc1f241d5ba323ff9fc70bc3aa6cba88fb55aa900cfa5469dc8203fdccc9f0
SHA512b6e2c9a61a0d7af09788a1c076f3bb2f917fa392e80d1cf2eb30d68e583d2231d547298e41c4ba1ea5df9c4fa5615380deaec8c89b53ef759b22b82e04d0fefd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5df17b4c3f9606fe1578b6478b6b10584
SHA13414b15656b698a7b49b5ae145ec789740fe052d
SHA256496d3b038bf8c15828e1931b1e777a693a53fd91e2b3791c3bda9c8246126007
SHA5127a676ba4990c06d3a85627179a5213fc92cfde318f5a60499bbee6c2aa5ad52f1d75bddda3196d83d1eb56d176f6c84904bc7622e5236eb1aa18ba49c33a33f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5a99227edc23cbb3cf503920eb6a07d63
SHA188105b2271c3e282f51c64b2b73a460e860d9726
SHA256b968d775227aebb9f2ecb3454ef594b264e56c2df71d510d742ee0ac86c90704
SHA512eec156cc86bf6a41b6e353dd944d6da705ba81ecbee57c031ad6edfa5be3127dd5d20f63a878dd258e10237e0b47b7d8e4603a59879709c126d06622f03690fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51c30e1e543d9cd653ac4bf7025a54809
SHA1279dcf92f281dc0e93f043bb4e2f376569fb28c8
SHA2563c87407ddda3ede0d522a708f42123295f614a3636fc40b93f4ad0b81a01d2db
SHA51296d496b1bac833aaafa274acb2f747d459ca80c27a04931e37188345e3c01cd2ca80de0040d37aa61bc122e17754cf444e4579b0b77e884aed30044c92b5a536
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5a85c73d90d7e0a06ae7e9b02f0b803f2
SHA183c7a0c0bad46e5b6a544a879d464e733e01658c
SHA2564c9bc7177bd1a42370c0b1f7694a8f8a4deb69cbf0657f0a4722758b03137e0f
SHA51297b478c8b6f2777dd7e0419b2f05924637365aa8e91ac5b3b52242df0a6d12e243b7761c74c58e1e056eb18c867fad11809664a20530a6ff05c104b6d529df00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD57e1f33132f41a37a4b53c24d724f2aa2
SHA1370e8c5d859799f48246fda9229c730dc5c6f830
SHA2567caee92d604c8959018e9550d073aad2edb5349316591ab885c2a739187408af
SHA512a9123ea46c5afdefe7c119ea08329c070cfa86d17894cc18c5ca177ffc88c84b059763f39ed5821ad7ed062e79d14b5dbebe98e5315133588280a3b1e7d6161c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD50f2d6c37a68855217d7718343ed4dbaf
SHA17b26ce4c94ea06b1b21fc06262a0be58a9781884
SHA2564217cef4081ef00ecbc8be287b2c0f5794990b00f4912a42d14baa00dfe6e4ca
SHA51251a3fbea1fd2b763d8639737041415f15f186e2b8e4510e17131024ab2dec5a0670285d27b2be9c00a6031326c07845ca36f0c4a8cb38ad7e57add92c1d5ae89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5b885e28f44d3a6152c45f4a972a62594
SHA106e1c1fef07797934f013676693ed6a3d3311e4b
SHA256895a1d5218c5f00290bda749955b6c2bf783b57497261ff33a9449a630836212
SHA51284fb8924ecb6a62b66111dde189a75f99419e822257c414d7022981900d2127a762503c03af956a8c4c9e33f81a201d34ef17a6abf5a6f676da20bf94b9ed801
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5f0c0a23d1adeaf5d7a756db0b6395c7b
SHA1758b591c5e459bf4b841bab72b7c03b3c4480ab9
SHA256b753f1e2f11500f29a6b7330ce3947b9c22d95ad3d405e1791b516779dd2109d
SHA51202a48260b322807171d2c869f99504d99099757652da0aa88d2f0c8b47424114ae8c70efc9d8eb878f20b512347787c2a7088556e9fb2fa4601f19ec46873bd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5cc270d9f3c6feb8135925996a5df72dd
SHA1f90d93eb5f1b6ab5b7e72954d96c0f81d76554a8
SHA2563b92e2a5f2195fe5cff47ad0a8d1ebf479f98c20d10bc331481aff568d896f77
SHA5121b61b5f7cdb68334127d5ce7fe9b52398f471a92b960a7f904aa25a9411b60ffee9fd388377e8721bb1948b75efb91e95beab478e5d949ddcca4d599d0fbae1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD58b62cbb75380f77884d960117f64351e
SHA1ffeebc525e55290ac960bc0499ef40f0b75325e1
SHA25661a408f31f2d1d8d47f2b88499d431f0a316d8754e7efd947d85ac2f29f3725f
SHA5121e3d506ea84455bd65c2306e3ab8b848e71115f55f98072bf9bce1c24dd21ff7eb58d5ca28701b644d9832dfb29b220562fddf0685166d534eecb6e8b264d414
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD541bb1835a0984db2775b562dd0e9abfb
SHA1aace0b18a6d380f2e6e9fb2194c7e8b9e1b89e0c
SHA256b5c9a2decf32bebde64c1610bbf2be680b164bd30b0489e24890e23f246361ee
SHA5128ac67538ea66c94b6bfed57aad1d55132e844ac008adcffc5573e51459f97706f4d77dc2a8b6a1b152aca383c3dfeccf0f2b523eece87de150e5d6c3b71c5e43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5db408c9fc1f6d85846811b702bf602f8
SHA1dccd077822f5f3b9857f278cbfb98308176ae1de
SHA256f478620141ff8fcb62890f67b279a57469efa4e3215f80cecc1891c870291e26
SHA512e9d7123ca060e966b5b73e2e21f5ff556c57c73cb9deb250d1246add59e2cfe9165709348f083e2ab01a6a3cf1fa5c56f45f3667e4ede4f07d92068e745b13b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD55773273e00e8166286a3fb4f493e234a
SHA10335d8d72986e06c7b260c8a66501ee8fea87549
SHA256cbf866f926df380f50418c4bef9b68f65f48f10f308ac12217d6521bb960cac7
SHA51249c00307755150df3b585d0701c13476756a0a424dd9b9cdef04cefdc29126ffc6fccfc1038edc9a7c56692133dbf55c3667e2b79ba5df92573ce301c01cce7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5eca3a74a1b81c4b9c3015607a0c9788c
SHA119f6b24052e66de8749ebd21c8a38bf8d6f76bbf
SHA2566139a5c184f866bbe9243ab45e35280495ae3d8239a32fab76f79aac7ef9efc0
SHA512ba714fe0ead01fa7490111ac0e6ca023c5e2c9042fa5843db70f14d84fb5eb5d977e8aad8f2c8be402be34fae39b4ee7a71437993345d364e3ace9ecce952b1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5874ecc9e9d9d64994f92a41c75ed9e70
SHA1da747a1de038baec3abc9c9a7477da1eff09551d
SHA25606a183a98a99dc0cce49f3ddeae6889bc5d51296b93d24ca29dae465e2fb12de
SHA512604a1b6769efe1468a97da4fc79e781bca69457fdd99276a4c9bb9f10e18ec00e45bf44bdf7861a5cd96b18410c9ef7fcced0bbdd51de85c6b5aec76110f9efa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD575d869d6c55df88fdc3f303db5247014
SHA11dbb0196ac368ee717c079a70efd10a7fd1d52be
SHA256821c907bbfff905ea1ae3395641a4899f7b590c6167e46976f5df3ab82349f37
SHA512907656e199235d24a5f5c572ec202bd6dfbe59e60ef5db3ba7a8e2da9ea89cb86c45f8da1c8a4c33fc3053d1475e9152fa2a3d1df804a3f377c7031a9d6f3ecc
-
C:\Users\Admin\AppData\Local\Temp\Cab367C.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\Tar3750.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a