Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15-05-2024 16:07
Static task
static1
Behavioral task
behavioral1
Sample
46f2b0b157d67f0ff049fc1fc037096d_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
46f2b0b157d67f0ff049fc1fc037096d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
46f2b0b157d67f0ff049fc1fc037096d_JaffaCakes118.html
-
Size
462KB
-
MD5
46f2b0b157d67f0ff049fc1fc037096d
-
SHA1
c86a0b0395d06e4bfc9ced75b012be332c8e1c52
-
SHA256
023ae28d840e4fceed80eed119457884cb540958c2f6a6fbf55413cc5d059a18
-
SHA512
8e75930063f6db55bc1ba9c9071b7250ab796c4e768fae76652d61bab945dd977f70c551790d2da385fed831d5a2ab2461e7e9000701224341a21fb2d85da064
-
SSDEEP
6144:SgsMYod+X3oI+Yh+sMYod+X3oI+YJsMYod+X3oI+YLsMYod+X3oI+YQ:f5d+X3j85d+X3v5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{341B5051-12D5-11EF-87C3-6E6327E9C5D7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b03aad0ce2a6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000f02155cffadf4b476eb85633dfcc1661e86329e061e30cd8039ef8f5fa5eeaa5000000000e80000000020000200000006e9142dee8ece1687620be7742b7cdffcf218a494fa40e1542acd476176dc59720000000148fadb3b2f18a4442b6c7eb2adf8ab3e6f8bf8a044ecd41dd657319bfb38e2b400000002ed2cf5872bceccc6f2b833811d15ba059b110e8c71fe66886d89bf49dc5c9caf9cc8f746ad9ab1cb590aa7f1bf416c7d3b10659c9ba9704c8985e4a37bc2d0d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421951106" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2512 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2512 iexplore.exe 2512 iexplore.exe 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2512 wrote to memory of 2180 2512 iexplore.exe 28 PID 2512 wrote to memory of 2180 2512 iexplore.exe 28 PID 2512 wrote to memory of 2180 2512 iexplore.exe 28 PID 2512 wrote to memory of 2180 2512 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\46f2b0b157d67f0ff049fc1fc037096d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2512 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2180
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595485c989beae5d6a1e90333d81e50fd
SHA14b0d417d5a66b20d6a6aac94c60fa83f977277be
SHA256779dda5013bc06ae8b21c932ad6508935b2920d86615a68cc57f27c7c0c5ee1a
SHA512477a034f282c53ae36c90bd7cfa957a9d46d852c28118ebb9628a47c6c2d4a30b2202abc645f1497a049fd4e6ec5aca74c5ea0ce3d412392794763e8bc47ab77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577dde8731c64b0a7bb7d42ce9bda909f
SHA125c1108ac63f07c5469b7239009964f24fd240ba
SHA256c936c6f3ea7664ede77a82d2b7d2ec8e96c86db6706522b3c52e75c6b0859164
SHA5127016d21eb89c335b10a2d59717ce6321cdcbbf292fc08d13b555660148b1a983f59d2935aebfb11193cee97ac25bb81ffefd86c3d71ecb24bbffb7447ed4c32c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9982a28eef69592c52163745bb08503
SHA1d8e8c936b25c8b439f0468152de7a2bfdd881ae6
SHA2561c54a168823469ea0c42516b3dcfa7d9ceefad639a0a6271d90573ef0332120a
SHA5126040a2cb8176adaf14ede924c16734644731ba4e4078476f70a92e848108758c95a17063a1622dbe5d62d348c1c5d5c5a06120c10bcc9fddb2ebf46d0f51efce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5281e8e944f6562587bb1584fe7706a00
SHA1415a13b8e3b57c0f90b84c027d612b11373ba0b6
SHA25667aeab95b8075702e027aaee145c3a9c17b4803ad5cc0f66630a286b76f2a5e3
SHA5126ab62a7788ff1150f4d9fee841a696039abe1d6d9bdaa62dffb282f4caa1fcb3dfeefb33cc9f39e5501c73a13912050fcfedee132c701a41ad05af75afdd47e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cbe67c5ba30d7ab998315509988a032d
SHA130479e9b803b5a305271e51f3035476a5e458a4b
SHA256cf5e7130d82ae9ef386660dab76af2977ab5a38ee923e8e893e21060df13f9e2
SHA51291f9f89233b54d4cdeadc352de164c4ccae4b336c59e708df5368c66ec11a8f30ec36eb129ab58be7d331c4f445e52e683f45c02799dd8bf8607df184606dd6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3f9819ccce46e67b38f9814b13bb46f
SHA1d43c8ec7cccf29a181c0f40fe40dcaa612382ea3
SHA2561d58af6905da5bdf6033f5169888849f865ae5976c00214c7f6ce6b92da6d8ab
SHA5127c242b45090a13f776d22f8d993f479dd835e2fb14ac5fe40b5a4fbe0d8659d6824b7186eb05ba5780f65700db9ba87b7364883320f0a884106aca2e6b372c58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5647ef3edd755a8852d6760de62d39e82
SHA1293a96e17435183f80696005975706f5663d6511
SHA25609e7a064fe412c33c5dacc5ea97bae5ed283375e31fa6d6c7431bf86295f0f7b
SHA512f36558341af82e61aafa1d55dc8380792d08fd0787142be0b791cf67b6dca8bac7aa480ef420ac68bec1ae5657684bdae6539e733a6e0fad0b2946f50c04531b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c36e96369c12704bd65d890dc318d8b6
SHA17f34202d3bb50c765d2596aaa7d648dd91fa9e23
SHA256baf5dc917b49d22642ebb06e1e8e2736dfe6cf3604ccad8b4ce1d84b81c6aae3
SHA5124b139ca09f33eefdd63ab320e0e76f2ece0b53a28387dca680c4c521a591ea2e254784e9af4bc842ebb2fe65e92afc7122bd12186543f8cdb0dcbce9b7f16915
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c90ea9f6b6b4f9a765dc0d2c529b3b32
SHA1804369b2948bd79408fa77960a0ab3bf12e4366d
SHA2566928a56bcbba0d409ef7339b65d40690c3ffe7b0f77344061dbc762416ea6dd8
SHA5127317e18ed8e71db10f76a43e321a19109d5619e901cbc5076f5286fab5ddb3b1c3679765c1b36164a62f64cbc11355b9751490e14901ddee282e86b1b0100e68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59320c0ba9a6cf1e59f83fb74e5e0acd8
SHA11a55ec2523b1e206c22a9c7ac99a131b0fe6fe3d
SHA256751824e44b9150fce88a3c8388aa1532d67b52f95c4781f72ffde5d32b402a56
SHA5126433cbb87620a72bd1c41f6b8b99ad37bd7820aff60cc48f3f2e787e2f96f04bcf5d5cf6603b3b478adc575e7c68d7edbf2a797af8389de00601e1d8ac11cdd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa464ea55007bf8c21322a7e106dec2e
SHA1dfcd1b771aaadaf94958bdf2499e6aa56c8c9d9c
SHA2568fee870922da080c2c335fefe6f7ab6b4b64510220d891408fad32bf9c2a1ed3
SHA5120add7a2433ed64081f35fec49fe5682f7294b6f3bd5741f31efbc8969ebe64d3eb48abc1dfd29ded05e7eceec694d763cc9c5e16f170bba87ddc802dda188d63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1f52e560ab7d76edcee113fb87012c5
SHA1e8a80fe5eaadc044e813b9daf2177c46669b72a4
SHA256c9546050dc7c17640906ee09b485c81671e222536b8d7722fdbbb3db482ddf5b
SHA5123372c8d1312976f45423609799d1f2f19550ab98ef2f862962de6197a611da5fe8e50a1793b0079445810bbae9f25de19bf98a50ef2bf6c0349ac9021fe8d2c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501c6247a9da1a18a64b8da4bf1dd449e
SHA1340523a71a3d78dc4c66f64c498cf1ed13cf2d03
SHA2566c873df25d53ce31a0af833347be18ad96452470460ac98bf0b86bb896c3a23a
SHA51242f59ac8e45fbd664c747378e95bd8affeff1c38aeb4e980cca3ac9a7cde1f1cd7a54a9656065b4fda103c7fb3f66101669f2a9777132104873c127209871d80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9a20fc43fbc69ec5baf7b5cd27456cf
SHA15abd1b493ac0babebcf20b9c8eda595d98b65282
SHA256885c60a92ae61bd27a9de6b73eebee4c1dda8696435bf71131521025e23b4401
SHA512383e8cd393ce87d266bd84a6a1df9823c4334cd723e07c843f29285bcd2acdda9948b1e7f8bf2057c03f2ed6645e7e2e66ee15b321174a79bd1baf1308807275
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b425dd1b88b31d631660c823aa7f7465
SHA1c9e33ce7f8d1da83a6afaf7f73f6bf50335f5a7e
SHA2563d5646d233a2913b443a017073361d35b0e26169143a68bb20ee02c709b2c485
SHA512399bcca7e059641414140abb945cf06a4afdd0d87983b29600ac0f7e0a59b0f9fd2dbf03e69909a045621f03cf29dc993df0372e0fb891c01705d4adab972bf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e84c86179851858a301a0c099ac2fa69
SHA11e11d0a0bf1397a709f7175df0bbfcd35bf5f460
SHA25662169eda872cdfa28758be4b1dbdc2940cbfc9e21f5c97f2b895647931dde56f
SHA512957bb9ff896e024bd242bdf011c8963b76409e5c84264dcd176513c4645f07630a951f6b3596e2058ee05a1be04ac69d5433864a8afe6d3176d60e970846da3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc9d0f43dcce976b87482d9f50a113f0
SHA108ada445f86385680b712f0542bfa8fc90bd2e88
SHA2562766bcedf4a091864a44b4f5e1179335585c5618ca7ad7eefbbc48aad9890dc5
SHA5124fb252ed93455733dd4cc5912d402b13e803913ca69d93c0d197de1771a944e3738fb2c223eaf5f38b76ee6ca3d3b801cdfa88f44db8e35f72008be032d7b935
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555faaa0ba3939ddff9f11e002ad77f17
SHA1fd749d5dec6b843e8f3194d80b42589aef2e2e30
SHA25658fb08d7cb14ba23faf6f436e761d6c18cf910fe6397fed222f1c8a76227780a
SHA512e866989b11eac6c8baa755720745c3dfc6fc1a3db3f5fc0594712f064a28c65f60540e95dd83063a5996368bed5288e50b9bfae08af80485fcbe2df07a172ced
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a