Analysis
-
max time kernel
140s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
16-05-2024 04:39
Static task
static1
Behavioral task
behavioral1
Sample
4972bfebee703636431edbdb782b7c47_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
4972bfebee703636431edbdb782b7c47_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4972bfebee703636431edbdb782b7c47_JaffaCakes118.html
-
Size
14KB
-
MD5
4972bfebee703636431edbdb782b7c47
-
SHA1
4fa2ac4c996326525185ee6494632861f83aa0e4
-
SHA256
e56bba5bbe2ed2511bf3a1660100e88c4006c6d48dbe752c8c3ab8dcd52b14aa
-
SHA512
a6f11634794d483a2c0e49badbdb7c375860b79545cdc574db31419cf338e9ec8ecd56d72658b63e3003951716dff565e04ca3c1457a888f3712a872bfcd594f
-
SSDEEP
192:SIkjwvWtWPfk3iumbzObf6Gbf6OH10vkTbzDOkjRNElJEIk65vzjQUL13vTKBTpo:SIkETsNbOs/EleB65vttEt/AN
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000826a2809c110224e8c676e0fd80c557400000000020000000000106600000001000020000000482da3444118fcdc8e0d9f2e1332ce9beddadc00ad704731b67db531f56ac95a000000000e800000000200002000000003d25ae070de49c0529e3e81a0da7e6b1284e4c94304bbb9a79f2292711a55a4200000005fb78e5a90829fd7710de47d6dd82f1762d4d5ebf4b6b8414e7ea65d544359ae40000000037c758e3fcda59d2c16cdf284ffd22d6149d65e9d7fd8aa40a5e365ad20ddc19490565831349db4fe36a43c61182c3f55c58318eb0b92a030f59e1fc6e28e7e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5B5B2231-133E-11EF-A2CF-6EE901CCE9B5} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30304f314ba7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421996269" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2328 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2328 iexplore.exe 2328 iexplore.exe 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2328 wrote to memory of 2312 2328 iexplore.exe 28 PID 2328 wrote to memory of 2312 2328 iexplore.exe 28 PID 2328 wrote to memory of 2312 2328 iexplore.exe 28 PID 2328 wrote to memory of 2312 2328 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4972bfebee703636431edbdb782b7c47_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2328 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2312
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c71e6711bb23c72a4d4e00a17c18b8f
SHA168e70a846a44322741f8e6f63ad1aaf3ac31b469
SHA2560475cacf8001f7250db0aaf83a572943667c5dbecfbcb51feb95d10a0de8833a
SHA51298ce9af4d7d11ef99a3d8ac030883727e3949394dde590b2415b2bdb4a0d4ba486ca71dcbe3d9215779889296f7e87d9ddedeb2fbfb14acdc08670ddf9a0b629
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556794f30ccc17e0685d32b8d75f0fd81
SHA1d7439f8511498c92fc5d2f4eb1a284063ff79755
SHA256262789d49b30198cd6b427e0fd21ec0fdebbdf3f5462eed0eb174cc7372b2e2d
SHA512c4adefdb068f611fbcc68a9cd461bd88279e35a4fc23518d23c115516bb08b1523c89ac8250acffb60f6f772b1decb0ddc5dd102a444e308433294490b4830ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58fc6b4a6ade60450a8ad56dcc2d48e63
SHA1cd9bb5d26371426876eeeacc8105f135ea18b288
SHA2568b569e2cc559caaf72f2ad6d3a1993782fcd14fda4c5cbc8cd800ed844d5f497
SHA512b72d01ee39cb35ab2b1d9103be653b38cc71426618eb25c5c17148fdcadcdbd66026fa6ef81f384c27479ea60e6d7a976021418f3085764068974e4f68fb4146
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512c68011c3a3a530f394a0e2d1ba7374
SHA1a93e4add5b2919b2c317b43f9b6b2a58d1bc4c6c
SHA2560e55d05a69b76f274e814d0680ae694973046cdce2a1d5168fa946f6af012d08
SHA512f95d28b53e3c63bc81d06ab958ddb319701058e44ba15572e131b25587485c11aa18a038e304320fbc217a2e0c2fad9470d2f71d0cf3a60979ed49cb7d419c03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e48382cb93b2b24e81c06a2506e728eb
SHA11c3fe20d6e0045d4a54003e1b31cce1673342e25
SHA2562297830ba99efac7868a2eaffba7e775a6e02f4466372413e778bf6b190d4151
SHA512446a89fa1e382f8c3b731eb48f9344788a834bbd31cb2d1babea1f0b9d4c76b40d9c3bc00ed3fbcb98fd4bddc2e9df64e5a038464c92d778fbd4b6e125deaf3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bdadb10bd96d753aa9311224e3f80980
SHA185500bf8e011b28a8c3bf26405f621fd5c53ff64
SHA256d94b32c6c9254bacb0866e82f1f85ce1cb94ea5bbff4aadd31cfb347a8c1bc53
SHA5120f01b518a0fad5a63692191b6574aa17c33eb293ffe0d4792f619adcda2e374ee0d882fdabefb58956ca21e07de8a04ce7b3845f16b4df4df9fb18ea7b03aeff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cafdc164a041c8a886d2655d0179f5f1
SHA1b60778c2c4fb6fe3f79c9f81d3c9c33d10181d36
SHA25667fcc38ef16403fb144253900d2f1662b36a0eb477582964153b13da22695e37
SHA512e1460486b120287d24df98f4713fa2871baf6ec601c8df77c2064efa072f3b0a92fd02906ccecc198bfd9c4f807c08811e1c6b51287271537253ca967915dcf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5904f1fea6e0d85ddb09c7fcf501d8de8
SHA1ab6a6b533b5253ec04245fa1cb38024c0e2198e3
SHA2561257ef64053f330aa3f16c71e81ef5ba15db60dd9bb065e9f1d31f69f132b811
SHA5124625be3caa4238b761fa1e6ed5281f1e4851c80b0f7114b9d03d0cd702d478296784161b4319208763ef3898056c10c253378b440358e6b0deee70ab5142c3e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f52df13d37ea9b2601acfd5815229258
SHA1dbad8fc623d2446a5d2e7d010b4540612fcab3e8
SHA25610dffad968ecb15b890962b151f22888cc968bc40037105eaaac85c742748e01
SHA512ed74ed0e963183aa4b55f25637940691066ad8f751848d99ec1c528554e1c8141563e38f5bcff7a1b6d693309c930a5c8551f2b4c4348bd5e83aedff7cfa8bdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f58260af1e4f8b29f873ed0941ef41b
SHA1cfe846e4f160e1e94fd14d9988ee7157c7d3266e
SHA256861d9f843d09e382289ddf4a1b2f7523005b4258e5d70f967fed9fcd7768379b
SHA5124f3a26e09fd312c908ab6ad516c495b8ad07e90d581d9ab2baf278d3b9f35b12d6188c2fc91f721d38513a52279e3dd6ea54a1d8eebf38fe36ed009ce8e228b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4fde6836d9a03fe6aa0f93f7cdb89f0
SHA19cefab04cac9a99b84df7732e86dfb444b46440e
SHA256e9f43ccb538edf7e41e89b24227829abe0162385ca01a09b2eb2695ab66ac65e
SHA512b44c4ab493abde8ab2c2b222fccbdfaeb82dae8db549922b469992145e69418e46bfefad975da0b5c1461a0792980e08046b6f034fbc8adbd317d10fad763f09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58cbcda44dd0abe3ac508384fb208f983
SHA1721869c101f9f41aae92ea96267f53b64d1b3a1d
SHA256975479745cbde77897328f28244c0098323adcf9fa8e2c91b8433836fa9bc55d
SHA5121b49d424eb6262034c6bdfcb6f4ee3f7f96e7ce4531a3422b12192c7b14ce04c2495910c6c3fdc4463e78ff690bedd88c28a828622c5b58c4098a20439ee5ce0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545f6c6db3e945c1aeae7e5dc20198f0e
SHA10f8077b03d9309438484c4fc8acb3f3517102932
SHA256a7b2941cffa12c288e639f29a7d940b5d8b0395a500341900120085a6d3eae65
SHA512f70397bb7daa9e5a1f2e2f5a47b54d12e0795c0121c6df2f768d1a0160d36790b3eb2fedcb382b56533dc75dcf5718704c95ab24b35994116ec856f832afb9d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba2a5b60f30dc03fae92e71f94db430f
SHA18f3246fc8fb6b53bebaac1646ded9c3545ab97a4
SHA256f6ade3a5cee4efaaf54fc3c45461c9569ba4a0d92686de84312d00ef7c95d1c1
SHA512fbd7c56b7835736545d0fdecd83a2d612569ddcabc18e37a9067b5a032a1507e5270bace64de2f83c10cae9e02500989c100ed0dd9ddf56d5458121895538aff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554fbb7d1b27b27739ee24da67ef2d114
SHA1334305ceaad3a40355216ed9f2f71ff57bb88791
SHA2566e5f9e51c197bd6508522c4b29fd1996b8603859e409ff08756c4da3f198725a
SHA5126aa79c7a2157404b098e3c3d6512730cfb988755906302bad013a7501fa0fdefcdf7df2ce99c2d721a567fba95ab29a03454585df4502c990bc0265f6d5a829e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57afba279923ec86da9626e6e5aab4cf2
SHA1658ccae9c36133964997d27e6d32c2e7b63b6bbc
SHA256c9e20c7a38a0331909614cad9e3a7f4be61e1d25873f161830689965848cafb1
SHA512c265d3eba8fdbbbb81af2bca1f46e235346ec01c4674e89a9af517a4f9971e01985f91723fd92466aba783f1d5c63e01a85f31f7b490c7cdcc69bfed2551258c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f720fbb5c0b459b9a368457d936f33d
SHA12943b1d25a0fb1e9a24b0cd1e2d8c341340e7025
SHA2563ec900807acadf398942f9abdc99e1731b9d599fc2f5e13301cf574547fafba6
SHA512b195765163062732a40fbea1c47cf16173481b2841329208afc7ae57a7e9d1a5dea8b15634a16e9a80be2672ba57eb03d6194e21b9f982998533dde1e23cd5d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50fe51fd3ae03597b54af3318f842d3c3
SHA157cb4a77396de267d6022308b0bdfb9a1799777d
SHA2565992cef074333d326b018e591eaac462386276176d5846f405e1bb0198d6f265
SHA512143fda8752c782d3ff9faa93f3fcfed09914c2acc924564a483088d82ee9f0af84b5834f9c004095de0dc8cbf1f80079f863ac51f401494fed974ad2e539f741
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb052c164c398d1c2a962b8de7ace031
SHA16430df778bd0a9e1710be3f340c914cf39bd33ec
SHA256fadba0fbc27754999e039f2cb91d45117d248ea8bd19d818518485742001ed30
SHA512a483ac15ab44bf7137c745fd3d56d8642ae15ddf8b878bf02f6407c592862505aeec14be11ac72938e8b3afae4fb68a51acd8b596eea1f50dc7b3a570a3bab17
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a