Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15-05-2024 22:39
Static task
static1
Behavioral task
behavioral1
Sample
485da47c855274c6dc0e0447244663ac_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
485da47c855274c6dc0e0447244663ac_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
485da47c855274c6dc0e0447244663ac_JaffaCakes118.html
-
Size
461KB
-
MD5
485da47c855274c6dc0e0447244663ac
-
SHA1
722100bd49fc77669eb826243373f010ff8b82b3
-
SHA256
8c6bc43707a6516748d75c83e0f1b98a99f29029d617c7c437419a808b036422
-
SHA512
196f6751a6912cb5cf1ec4ed3944409640db791dd7190af598dbf42810a72b983d5233fd5904c4a2c8d25f3e9902400d40530453cd465213bf8ae989e5794665
-
SSDEEP
6144:SjosMYod+X3oI+YMYsMYod+X3oI+YgsMYod+X3oI+YLsMYod+X3oI+YQ:C25d+X3ym5d+X3A5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a700000000002000000000010660000000100002000000029215ae29263d848e82a89ec107d2b498522dbc83add89d919e1b010f713dcf7000000000e80000000020000200000004063c85584d101ce4b393cd75708016c5941e891b1fe2664debf3f78064957dc200000000d71a256de3f68507ff207b58d641b712ff26e0314d3e0a9aa1b244a28bf7e4140000000d213e4f7b42d9e910ac122afd7d69bf2e36ca6197d5d11b19075a8b752793c9751ee521a4e21cce2323b66ce486ebbcaa0f25bb9f7ea69a96538f3cb870b0700 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F715C5F1-130B-11EF-83FC-5267BFD3BAD1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421974625" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 501697cf18a7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3028 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3028 iexplore.exe 3028 iexplore.exe 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2216 3028 iexplore.exe 28 PID 3028 wrote to memory of 2216 3028 iexplore.exe 28 PID 3028 wrote to memory of 2216 3028 iexplore.exe 28 PID 3028 wrote to memory of 2216 3028 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\485da47c855274c6dc0e0447244663ac_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b417d25ac8214424b473212c2628ac3d
SHA1120e6d1680734b83a3e26a83fc67469bcab9620e
SHA256f5c1766b5310c169b6daca8326c69ef476f2d710ea274ee8abd323dd000b35c9
SHA5126faa1aedde57283959954f7e70bb365a4ddff830c21aa760e93a77ec7a26135468c80da73e96bfe3b4bd2c03972053ccd77761de472bac43fc28bcffe0bfc9ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d0b8c431b6dd8fcb723d48e8b1272da
SHA1ee9838631e565652664c1697aa38d37430f52e43
SHA25632502768524b3cc9a4f80250481d19cbb59856a061c91bfce8d9604c048f5504
SHA512aa959401869de8078301bd3593b2cd603e33780778bc31687e8d9622d4793d9b0bdc39f2c54cfd6d89ebbf69c00a77936693b079c8a23db64321502f0666c134
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c4bdbfc59ac7e5034da41bf204b86be
SHA163386fd735557c03faefc35ecb8edc77f4c375ea
SHA25668a6baa51b26ddb26c536bf679362d271cc850acafbd84b7d6ffa40d9b023946
SHA512124d848c8228043805b775468d189d38991737901ab1882fe83ab16104882e1f8b1102862acb2ba35b5e8ad95697e50c82be0947b70dd6b9bfa94422fb65a669
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5d5977a875006619f736a96307827fd
SHA1511eb72ecf4c08366940bd762609b1e58571849e
SHA2569652470bf60a5c1d475a8bcf2c57a7c98c6c9c7e8b1ff2026206f0ce86557fe5
SHA512ce182a4035d3166d81078f63c0cf29918543d155353ac1714ab19294d2d3bdbb88e9f320918172d6e9ec2fa78133e626788841fd4564bebe564ea9f5dc7e1cca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bfee62de93aa4edc7fe8588aedcc6834
SHA19da8d19af2b5163259677372f6b864ad4f96b57d
SHA256021db8048b57c255e2dc57152a129451b99325fcf842724577ba062743764d1c
SHA512a0a57aafd4b493e1c6d9134c613c62342277a738b792c6a94bcea4c54d995b4da9c2cd3adf4467f15ae8a6fe545ade2a78a89d233f71c6d0a1d69d7cd62d2fbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534ac0d7e70f4e361f5bd7e80416f9fe4
SHA13e77b0dc09be59a47da96f17759f442c79632e86
SHA25620f3035a032bd9cf6d8e87b7b413a5fe86a8d3fb987969ae07bf941e8ff57c4d
SHA51290072ded3a5b4edc6b14ba9da63591a1ae31dbb05ef2eaa290162b313d1bb250fb7dde28b1aeb73457a1dc21512b0190bb80416f0a031457d24eedd0332dbf65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b560a120382ec98022c1b64d3f2da34a
SHA1c98ba2841cd61c3694a544c8bf0a37fa44992bbf
SHA256c3fe843295a1f87f3309bab903223d75838750c25759559fdf82f104e773afd7
SHA512439cfe2c320317c80091a6dc25ee14711b1c1f4530e24ef59d1a91050517d6850f866cbfd33a883d2e5cab6efa22e9194a4ff1ee60703cda7553133d95499e50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c30b8a57c440297a25f40330e12d20e
SHA10e8e7f6a60986778f4414d5b6562ee921fe1eef4
SHA2564e20b909c5ae1a8e6f3d1102c2d6fed7d4ab793b5093efd3c2971d35ee631bbb
SHA5123cf99c3eb22205c18a1516fa38e6882ad757318c812cf2ea49012863886272ea04cc7542a89fcd5d4946d17e1a86c07c7abe9dfd98f56f57c0bad86f95ca53d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a4d33243f90cf50868b4152a45734fd
SHA1a9d8969e68e7936d93a0d054da3af6175392c7d6
SHA256274bf73c0f6c86e255b6a8f299b67fc1268cb1cebfb3724a7c3095453dfff4e4
SHA5123bb35935004a12e7610f0b092b43f7a018d7c61a4aff4a3d8be9ce22304a28d19d6cd274602461475f87dc5d5d9222d4d97f6cccfeaa4f6e70bffb79b231b1a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f94d160d40857db4898b864f6c591fd
SHA1500ede0e4f2756fac64d1b29320fba820f07fedf
SHA256e07254fb12e6afc5ca3d9f2e4c14229768a34a1388c10a024d94fe6f9f2a6a63
SHA512b28cda1cd6463e468f72b6617adfcb2067a2d74b7dbc9cceae03830254f15b5d7ba8396773df06b421a7db6075a7210069a99e300fcd2755f6db00e5e46cdf10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582b91d472dc9ed6f0cdfd89a7f8d2253
SHA11809bf27eb497031cc100029b6362424b8d66d0b
SHA256be70161b51b7db1fc93df8f17ebeebf6ed81350a7ab4ab9b0c99dddeb366ce5b
SHA512978d807d7e9060f10eec78dfdb34fe009905641eb0ea6b1beccd5ca77af5bdc5db39aee2a9c1ac77f9618406b7a9ffdc3ca1ba14adf87d9cd90f2bff6060898b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5645583013d3cd8ef7652b8438b19eae5
SHA1b11789b64a63d1f04c5808466823c01abf7ee6c6
SHA2564a6b9376706ea95088c9f70320f3393e20fa5df92d585120e84d47a091d180ca
SHA512db09c3aa021504391a64bb0b8c37693a5ca1c0ddcf4158ce09ad4c63eee5478cbfcfc9842ebb414eb2db51e702bebfe397760c75ce35e8ba620a9bf00c10dd0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1d714f35237dfef5693f323f0c1cb3c
SHA15a67236ce5104d58fe2f7043b7e8335901a020b4
SHA25680de6aa045eaa93c3b5a38830c63e7cc5048f4291a22f78641f52ecc0e915adc
SHA51290e0fb57d566571a3c9eb0460c6dbcf0a8ae1fc91b03cd74fa4050d6d2fd44c7d829c3878a90bb797a3e7680dc0ce621c6be75ab68884f99991563ebb93c887d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592a917040b534a961a6438042c46aefd
SHA1af5fee4c9cfdde444d7d4e88fe8bc2dc48ab1720
SHA256bba43e8ece437384c172903164f6c83827bbf17dd02532653111c1d719d60226
SHA5120eae88854d1845dae24d11e2ba7bfa9dbcf6d4ea5c889bc4433d1155336b1f5272ec46153094797b68bdf377759748881cff39d7725842c7abe12c65fbefc674
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0454e708a665ad3b22d9b15c12b40c9
SHA1991f34510a9683e5cfb1219e68b730909d3c4b6c
SHA2561d16f8a3c5e90133222cf18f680622a67c40f465112088b0baf3efb4376a3da2
SHA51228c88bde1660d13235209a5adc09f571ffd506c6c526e6662d4f1e0c39fb0abe67c453c4caf2e59af49c3e8c4d2415eab58110e76285fe804a29446a5f5d6410
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c56ff000e36fb84c97fc466b720c4d14
SHA1c1083bc7fb446312f61b71436f8bc470e2888591
SHA256e59ed0c13b7a2d838514b895a3f6050c81b069f0d37e3792d3cd6121a5cc45d1
SHA512d509a5eb55c0028456458a7c3067160aa6001cebe83d06c3910b15ad19b8688c4093ec9ed44c229aee21aae020f05a0b0b162e239eaae19881928c04e4a9ce0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e8a93f8c81f0eed278d570d26b9e00e
SHA1321937e78bf0077b29f5f3aca6c65aefac0f8f6f
SHA256adc5ca1f67676a7476e43a6797ad42ce211eb7da592a8cf3199801c5e0b19758
SHA512654be231f90d1b5ddfbbd8fd1f1dc60357a2745b8f0af2226a5983255d396a7cb8aed779601f5e19267aa57b906909b587b2e9ff2a27735886dd39e1a7f7e951
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599aa7d661ab01db9811b0aedf8748c82
SHA1c487f977cbd2fb6ddf974ff30f63f9fb0c3dfced
SHA256c0eaaadce0b2afca1579662d898d039041b5927fd00f43efe76807e0240300e8
SHA51283a4343133635fde0ac0477ab4125c4812307b3a0adc4916b1a70c4b5376751e16fa891a9ab216f55a78798761c2e4a1627be744bbcea216b120b6d098ae5d75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561b809c6dff2fd3fe45758c6aac4ef46
SHA1f3f8008d3146e3d76d14db3790258b7ff7b27517
SHA2567f980b0d9b5d9f5c05585e526462c935d7c7b836ea634e3db7b409dc4460b24a
SHA51244beab342866462f9d34b5c39677869d24543faa8aa7ac22457183e4016eb675320d8be0f41676edb1a3369e9a7ed24c3b8f2689cc2d312d9f980d61d25b1dc3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a