Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15-05-2024 03:54
Static task
static1
Behavioral task
behavioral1
Sample
447160b7baa34ccb2b7da80182354d66_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
447160b7baa34ccb2b7da80182354d66_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
447160b7baa34ccb2b7da80182354d66_JaffaCakes118.html
-
Size
6KB
-
MD5
447160b7baa34ccb2b7da80182354d66
-
SHA1
e150b74e7b161979507439d911453e53061feda1
-
SHA256
90ff7c67d896de0b0a5a2061879d35bbec0afcdd6a7380efbdeddbeefda0fd11
-
SHA512
a7ca438756cd1bd667dc1f74f562b6d409565fe7498537e68b3ccf9abbb087892f10d967b11c2126d7c099237741fdfe3e68cbac7c952118d85670c6664d230e
-
SSDEEP
192:m9iqZOrjjUL4ogsI1Vgrc0ddZdRdhdudIdvdAdId3adXdCdVdGdLdmd6dndwdldt:KcUIWNy2
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e00689a57ba6da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D0F7D4A1-126E-11EF-B804-569FD5A164C1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a70000000000200000000001066000000010000200000000bebc9444411814424368853bc10d021706c0fa017b132e684e1404ff48a1a1f000000000e80000000020000200000004e22396cb34f4b0eeb0b73e0be2dc82bb77377172ce397f36f4ab366de37e94c20000000e331e51878532c4a81535fce59bcb8dd138015cea9e8627fb404859cb73f82f140000000beefcc6ba4071c510dc46be6a0273a5dd25322bb29e75a5bfa1798f531aa203fa9f85beb3be044998f3ec08db1c5e9028579e7c5c7f5ec727c55d442b27997fb iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421907131" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2348 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2348 iexplore.exe 2348 iexplore.exe 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2340 2348 iexplore.exe 28 PID 2348 wrote to memory of 2340 2348 iexplore.exe 28 PID 2348 wrote to memory of 2340 2348 iexplore.exe 28 PID 2348 wrote to memory of 2340 2348 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\447160b7baa34ccb2b7da80182354d66_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2348 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c79469fbc1bfb9176ed3895fcd383a6
SHA130873ffe9aa79dc96b6ba9b87f5768a1823097ff
SHA256e9f27643065d2ffc2004315c4a54b069e3a360c4f24878a944181daa7e4796d7
SHA5126834f28865ce36c33510601535446920f17f54b022361f42f46179df26e2696d8abfbf711fcb70c59ea74e93d52d391e83919c4b729cf7df8e1c6a3bad8f4dbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510149d769567ffc33f562abfd4474e42
SHA12a448e997990af7eaf6d4fbdb1aae7ce837ecc86
SHA256c49bcb5e5af68122133ae537ca45dfc97c4b217f58056754e3f64ae9e1aa762e
SHA5125e6b32e4afcefe1dfe5bba01926e4505faf3359c6881676565edca7db1e33c7899095dd7186453d73505c70394a931f181e67208382d4d98aaa996f69c4bbf85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55014db7d9343a8ddfae0a1b6a27ed033
SHA151b77911c3cb06f6bcb8a1fd50e78459907fb8af
SHA25689940fab2a6171989fc4f6103620fe37f7e969e8f6595570b1d898b1a73026fc
SHA512bc0efd09ee18d9060d1cacd40e762b14079b605472a8db96d436fd59b3052671fbe917bbe8e443e13440c1699d00f8ffbc0fff2ccd377718e60e24750d15caa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fbded343f17afb8f7a94617f6371a4c4
SHA1a438a2d03698781ac7c270153110632dd7bd1dea
SHA2563a7cfefbf2eda0d73ad499f7f854b7f10ff2acac4b15148f3256c04e9f2ac8c9
SHA512af2c94020b454e5b8af8b5f12fb19c95bf04a6db4006b381e84568b13a99074475c85f92210b8eb59cc25f029c9e33648b4bb6b6a3daf133580a3ebc476d2d17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560ef3a4009bce7c18215728e58989642
SHA129f049fbcade4a53b3d8867aa9105a1070d9f5bc
SHA256b764c55d84bcd6dd0a3c6f6caa738ef0b2a8f1af402eacb1fbce89ac08e13f48
SHA51271f4e7129c01e99b670fee228dd043dd0605d0554286449b8d2beffd94fb489f241f09e0000837393eb3fd7319a645d00ec942301de225aeac6c9811e3cacd26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aebe619a63473f89ee50cccb6ee2aeb0
SHA19c9e4c7dfa9de2d1c1d2036ad2be9b9fe5febbe2
SHA256d256cf1cbdd0860b5d92c764076ab0d7911cf83ab18ab63a47d993a37f1af3b0
SHA5123b1aab2579bd93a95c645fc6e13ba212ee87184cc65282eff04bf949dd6a70ad1b02327c0eb03b58e17f1f4715de35f3463d1a35d190648ac85209eed5cb3d02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e0343f8c60c745fb5d4840f89ab0ef4
SHA16d24be04ae132cf9484619a96c722b0596d6a2e7
SHA256ee3062ddfee74a3284391ded98933c5ad44e1f29a08453f31169dec9872d2d80
SHA5122de5b71f5b44b8c47e4cc31def3530af8ee205a98fd2f0efd4cd101fdb19681dba9a9de3badba504dd88622e55b168b936a8c26f0e5587ba1aeea8cf5fb8ed2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55356975df798051bb2b00386d1f3e4d7
SHA184f257d047abb8faff2f37f3ef826111e1ad0a25
SHA2568baf242c1d88a13d69bc0d22ff81a5a96b4ab7168e6b8ab0cfe646d90aec52bd
SHA5120fb167d5c5295ce323919e05aa4851ed1876b88b7e61a0a47a0bf927eed3b3ac9af86027d2bb3b235d986fb130a643e34dfc0f0287d53d1ccc3de63157fd2d09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c27a2e2760e958d7a18a55fda03aab7
SHA1d1809e0b7682016df7f5e6cb15efb5c5c8de2c58
SHA256ef1c8710ec18884a8d048fda86dc49176930f90865b06a9af62a4c2d1892065b
SHA512c5d1d957ac7620f19ea6554a54d4cd580618d6e97ed7800f191486d2c377c75fd67ec9022ce5164306de389ec53461e6038c432ace8956bfa1c101bfc7f52b9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578b0e8ccb2c333b3eea0d064663965a3
SHA14e6581e0cc8f57350b4b0c6e13b5128a67f1a9ca
SHA256a78333bce9ec69b66cd5bda42751075b189e2441f26c37d6bf0d14b715ffbb8e
SHA512e3fa48538774509daab7f1631d17ace2a2c98055c827926c4af34fe6722d7b89360514b579f0e4aefaa5baf1c7b6b15d6a4f622e4972768bd6d4ab3739643829
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8bbf9c2899fbab8a3f87e46dd7ba214
SHA18c051e96ac9760d2d40e790e0ceb42db0b7214e5
SHA2565d62d927596dbb0f949095efe5d641432d1c854fbc62913591d5a2fd79f3fbf2
SHA512614ff2b8c10922b8e62e4000aa63f13d6f92f5b6b02954464d89f9c3ba88eee5a409d029ed311eaac2940f745bee449f1ce0dba3e205f196e3eec8182690b907
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3fc6dfc90c7618539adbfa4388e2cc3
SHA17446028bd598a08075529ff7545ac9b865513260
SHA2566b5ae8ab9a233dd5ca163e0ac6772396374a6d6b11e6c22be0692e4dfdbade51
SHA5122d90b48782becfd228bc66f1a9ea978a44b1ea9ffdd506c1bb94a4687711b0adc57b9f415d13c79aed763dcae18029a90e5ee6e09ca83a9e5a7adcc654445e96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ab427504b0ea5861f7e9752607ef635
SHA179304914dd54b4eea394e3fbeaef32ffb2733298
SHA256cded96f2867aba845c47422bbbda54c61a0d2f2076f90f28b020e931d1fe2668
SHA512f80fbe2f8d9682abd217c4267f84a7d320ea6b38b6b092f4aed94de1bf4208df9985c5184f6d98f8ad38d456574c3311e04afbe615f16ee3368a7402a2f18734
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d74e394db91a47cc35520e639d4fd74
SHA109cd48c2b8ddccfc34850c486637cb4a250815c7
SHA2569f8cee50eac1e1e3176cb1d04342750d98f3e175457fc5ae6f6f141260e7e8dd
SHA512d50385a66e45350ac08844fdf2624c80943c713adcce36dcb6f6ccf281bda06d4bf628b8a99b4d1b99e9fe785520ca549b53ac6bf95332d6d5f4310f5a573820
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b996ad671217f0fb004f3d29d65b4c4b
SHA1f17791cefb15e863933d91b3c6f49bc752694b8c
SHA256260fc9f194154783f41cb10845b905d1da6f4fa55c27cd576d967f364b5a3768
SHA5120448f905f3ff7ff431b2ee857d607c89cc5db3ecead29ecf3dd98a0d45ae369345c59228cdd18ad9968b0a97153e9649dab91882f068c5b0ddd09598799cbddf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501343043d996ec127f1f061557946482
SHA14a2baded5004f322ee5acbd2fda08df6425b733a
SHA256dbae151c00637e9085b948da012a6cfaa945e36d0688cf5e518d7f59634d7516
SHA5120e4a0a6506804bc364f618777b841e0aef41422797f7f8b8b5f2411f2c8738d6a87d14a46dc226fdcedbd52ee4b57796a789a5d884d3cb9c6833e4fbb1fdf2e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb0046861383387968d27dc7f1337685
SHA1a945b811d2941f49ec8fe85ac18d0003ad1c19b3
SHA256a79b35eac777712b84086464a7a02c36183f7dde1c9c3b07909a9e6d171efac6
SHA51239ba4245f03acdb4b9ffa59b42e696a9058b20cb2d72e1bbd2940a52704dbd3f81a166633987b38a5c8d6dabc2c46c16cc3193e0a2972d11ddeb48bf88712212
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ed52b6563e1198617e29eb93d1c7607
SHA117734ec150eb809a8777c359c8910658e4816d34
SHA2569294c517c794df37df44c0d5ea8e16ece64285b63872c21840537465b847429d
SHA51219317db467a517fed02d3303c05dfd14dbebbf92ee03a544fb3c7b2f26137dd3b2917e6e932e888dd7af4162516aaed7b7d96a7fb16eb0f347548f2d10f1ea26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8229a8e7df00fbe21d8a0d26163dfbb
SHA15bec7acb410d3456865a1fc428d721fb21973ef0
SHA25682fa7c7ac9b7c3e97e30c5376b984f0b5ba4d5982307de8da4b1127e0b9da989
SHA51201ca1472d5e043059fc531a4db4d00487b49ac354c21c2f7940ba75316433fe61ef45b1c9f83899fafa4248f850fe22a812ce167edc9c4e27e3ffa27cfbd84ce
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a