Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 04:57
Static task
static1
Behavioral task
behavioral1
Sample
497fbf96b503cdac92f94265a14f6f8c_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
497fbf96b503cdac92f94265a14f6f8c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
497fbf96b503cdac92f94265a14f6f8c_JaffaCakes118.html
-
Size
96KB
-
MD5
497fbf96b503cdac92f94265a14f6f8c
-
SHA1
1a7caf470d90544d58bd4dd592dd986008d3cb35
-
SHA256
47d611cb6085ec8a01d0b789cc4eb53025cca2c56cd58eef776c66e1af0471d2
-
SHA512
b735f672a416eb76f3295860b63a4120bee492511c1b33b1c5faf413371c9789e3cec113f7bb68d59d5b7bffbf82f68b5c1114439a7e0d86417ca2997ef5cca1
-
SSDEEP
1536:GbM4f4ZjItd443tJmt6UNbeA+9Gvn7Jahch3hShFhQhWhzhLhFhnhxhdhXh9hhhZ:Gg4f4ZbPxsxGtWJ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc2330000000002000000000010660000000100002000000019d4519fec1d9a9bc93f883c28c571bb20668ade57d48125d5335db98f5fd3d4000000000e800000000200002000000032b90c8b580abc980efb811010ee5c2a7d647b1c0cd6150e365d0b8f7c2f548c20000000592356c303a0d40b9546a8ef11b21dbc67eebfbc9df0ef5d3f0c99ae062fdecd40000000ba3b64b4f421989dfad83e01a9ab2edce23a8e0aea18246fc4d61c7686797dc8fa1411e7d384c2702769d96192a9832510eb3fd1a64b0159e77dacd29be12b5d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000b96d6f446b3444b2fdfaf469577656762d358ceaa29bb812195d0da638fe5c5a000000000e80000000020000200000003757a2e9f7663b69a950fc1792e6e5c9793ddef9f06835aae076dca641a8493990000000f46e3b13f230d471f5b5e2378e7988bc5c9793336f76a309d19b558009bbf6699a7580a522bc99e716fc2aeb9549462468cf17ea4a2c1aa8d2e2a7d1a8be8fbffa2d6abc9fd3896d757c0bddba3a4b3709c93cf3eadf298521c9c1b7e9a51dd6361bf681ecd9489214e9177eddd38e195e8720f277ba03c5c253503c19a835ed6f38d5b5410e149e2ecb8f3d90c7fa16400000001bd8d7c274a7c85cbe50e3eb879f5cdafdd1d9998e65a97200044062f605c707d172da6038548bf43f801d554cab411c37dfe8dc02999fb2524013321400f431 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d029dbae4da7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421997339" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D91E21C1-1340-11EF-AD30-660F20EB2E2E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2088 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2088 iexplore.exe 2088 iexplore.exe 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2856 2088 iexplore.exe 28 PID 2088 wrote to memory of 2856 2088 iexplore.exe 28 PID 2088 wrote to memory of 2856 2088 iexplore.exe 28 PID 2088 wrote to memory of 2856 2088 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\497fbf96b503cdac92f94265a14f6f8c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2088 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
717B
MD5822467b728b7a66b081c91795373789a
SHA1d8f2f02e1eef62485a9feffd59ce837511749865
SHA256af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9
SHA512bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
503B
MD5e89fa99f207f426766f6a0c30c136f74
SHA1642bf7bb9ae65b3380d41f6f007b2217cb39aa6c
SHA256a441ce6f871637624ad52ae8a152b2a6de80195bb18e9a9326e875468be08a57
SHA5128d6e0dfb2c2703caa87ff4830f2bc2e530286b03eacb8e259857207476b0b24370798dbb117492ab08b4c47a99b37c18d6f3f7425587a55ce6ad2bb8e9860501
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5fbfb3be7a012cfbcf333286c78e601a1
SHA11b169b35545311d64036855f6c1a372efc5420c8
SHA256eb40ba7f9d6a5b05accaf3747d6f4ab6ab76bf5834994f4c0a0b2c8790f27764
SHA5121e6cb9a6c71ad103959eeccca3873c531c842df9ac559f3b45d8c7910b11b521197696cfc60f1e81ab118ce32c7ac7a585d4c1c29927702ff7615428e9dcdde4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f9c6c98ee95ec07aee4dc99f26265aec
SHA1e5be927ded5afb1f63e8686ccc9510574c41e885
SHA2560196e15b6c28b7f5329afef472586553b5804892153430f41859b5dd0c543fae
SHA512f7d9cd7ed98c1506e329e3c7d946d35727d25bc9f1e009909bc11408a3085865d94448eec2a0e6509ce6a786dffbb48efe5f78130ef75e2a7c204e343bbde9ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD511bcf904df4bb6e58012e44738e98613
SHA15337cd2ef3411a07a03715af3e7bcb772c7667d1
SHA2562ac2b825be531f3471d99dbbff7b56e9dba4fe662512810a5cbc4645ad60e5bb
SHA5123aa994f76f935d135b1eee667fd7f424c167483815e9fda0e8cbfc74865131496d9edb313e5a1fdc73d2599fae7123077b0cf0a7b247b0564b62df9e5a61f17e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50496c674d764a0c4c4b67fc6b7841aef
SHA1e86dfad844e9362fdd6d39b7e28ca891dd9fe3a2
SHA25697274adbe9eb91644ec0f2b1810bd64573ceb0b2437bd9654537c756ba3eb930
SHA512e0b9664a8413a0260d976db9e3e4f596fca90fae535c415d5260bf5d29ab45032b3cb16f453f4e6f6ec0938313496851add62dca1f59ed2d69c35c502dc3b4b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55c4a12732f081f65d3827cb3903b15d6
SHA155f4e6dbb326119614165b52c74b465ff117ed83
SHA25615c0e36bba37a277a8d13e5984d2a9f923b54feb0f75d0d902e738f4292c8a2b
SHA512eebac75e9621cfe8d3abb1d161fafd13bde2fedd350fc24a65efac94d36e40dfa4151d4d2caeb8db7afa0efd0869b30ff167e4946b6befe6c69783c6d166dd8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a5939615e2bac21855dde523738ad6f3
SHA164547a04d471f97912cba5aa072204378782163a
SHA2568e4abc1e442bc3a7be5e76c7b7529d92ad65f7c0f37fb067aceeab412a782c6d
SHA512c84518e466018f86ff9f72d26c4fe08bf660a5d0c55d7858f94b84ce769ae3ac3e0d3b117efd5c177a9b419725531158645e961cfa81f6f701069d7bc8d975ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50e872b3f382fa602c10db58dbb70088f
SHA14a0466400e8d6cc3574b1308223e01fac278e9da
SHA256e63e65bea1a17641b06e5f0cf0d145792559a2e44f668609f13041b1957c2d3a
SHA512a542818e96c5ae276b9cc37b1fd2921ce59cea58cf5d2b7ac88169017599a06d97c9a62b18cda60a2e90abb766290be05c05612da20373f6b42d4af96e7c9c3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cf074b91a1dad9d8b41998972af3fe42
SHA17b35e7e2dd9a27d70bf668e481910b8c219f9e81
SHA256b3e3c025e6700f8d883792fa0900b36dd1169739fe26fd26ffc05677a09f2b73
SHA512f65665be32df1b8f0467deaf72fae4021a256fa105251973fe2367e225aa1198c3c71cd7313e8e6ea5b14f7f367b6c98eb7f1794de165e9e3f9982ccb345d1f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b6d0c4d437fdb1fc984c40f6f85a2612
SHA1fc9426f5745e291f27846701e6f23d10b4bf81cb
SHA2568c65e0001ad42c5aadc028ccb245a6a575ac3722d4e1bbcaaae3753329972ef6
SHA51294752eca468325a6f1cc3d019849e15fae45ee9931b4c4db8c7b7d47bfa7cd2f56ca1e2aa2b90225f9791b42418b30189b0c4113c4e1798de321e07ecb205211
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD516d8d61fc23d8daf1ab2c8afce9e0aab
SHA124e58d7a4a743bae7bf68a430edbba0eebbe66d8
SHA2568eb6c3fc94421e9376c40d158a44602d625de553ac18a9bad5ec31697c4be55c
SHA512863b6641ed2ddf049a7ce5f7d45ca6bb86aebbf56e9272d5c30c425436d2d9100da7bdc208249137bcda0586cad2e7bcdeccba94efad6e837a3597dd3da9a2dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea5e5589601e1d3377574f35a0ddcdd0
SHA13f8ddbf4754232d68ecfa25f3f37fd8e56f18f61
SHA256d8654310e0be0806637c9b83e02360fc2e9175dbc94b7ad69b3a47078f747477
SHA5121a83a5320076bffe8295edbd09f9954c67b0742ac7d5b70d624bc1b6ffa5b996dd33885265f387061f2889c61ca8f8b0f6433984c4906dc7225c08caa085af5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DAD63457F33F0A9F9D6B272FC0020641
Filesize552B
MD543a86a8ad6046a31356ef85379a641e8
SHA11e18008d8a327abcdbc23eecbf510b84fcf2b012
SHA256b0127dac7ffd3c5846416838121ed937e9afc83fd0bd95479a1405f6998e4c86
SHA5121a14b456e8eea69d78b4dad4d6199cf9ee645b937a220679cd7bdddec7a756adc0dd0c945e251d8c5438458d06ae7668952e3168592c37238c45a15b48b69c30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD554deb98e7a4de9b63ec054ed47ea04ab
SHA19d090bb41a6eb0b0950cbe050b1f9b0abcc330b5
SHA2562b667f762521ff7c22f9338fc88fd7a3377c12aab612d0b4abe19d80acb86371
SHA512133c10185ad0901aaceedb41a6d0f6c2de3ded855c13456d93102fe8b39320fecfefafe542888e6e642fb1e30d3125033747306cfbfd383e31b9583ff7326454
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a