Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
16-05-2024 08:35
Static task
static1
Behavioral task
behavioral1
Sample
4a3b6a18184dbda4422bb6644c6dac77_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4a3b6a18184dbda4422bb6644c6dac77_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4a3b6a18184dbda4422bb6644c6dac77_JaffaCakes118.html
-
Size
222KB
-
MD5
4a3b6a18184dbda4422bb6644c6dac77
-
SHA1
30566a596f3b0d5a30133f70ffad00a7359e9a9a
-
SHA256
bff94d186514e48db5aa7e0cd789d60c1058d00475b788da8481cbb85260e961
-
SHA512
498a0691dcf691aa318eff46bc4a20ad0ab44ca75ee99c5a3c96523fd6dfe8e594981911b551c26fd138ab6a5d28c2368c1f7570335c066bb4e5658c94aff122
-
SSDEEP
3072:S1jrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJJ:Spz9VxLY7iAVLTBQJlJ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{33CB6FB1-135F-11EF-AA6D-D62CE60191A1} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000322a12a6ed7bef6430434b65503542b4daea199c2ead890872252df44797d1e3000000000e80000000020000200000003bca5a7d57ad38d44a89de417afea00d75fe4c68f718b98fb0a5011d2ef462d7200000003b11e2804541cf7c95ca9230d9783f77481cf0c3f21e32d90b0345e01ae8a24a400000007dbec5496455db23a77636ada5415e365fcfd513f9373948e09d4cd18d3e1e2fb3bc4b170e62bce5a9d53a2f38a060eaf1415a3154a5468516731d9d27356552 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0d85c086ca7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422010375" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3016 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3016 iexplore.exe 3016 iexplore.exe 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2852 3016 iexplore.exe 28 PID 3016 wrote to memory of 2852 3016 iexplore.exe 28 PID 3016 wrote to memory of 2852 3016 iexplore.exe 28 PID 3016 wrote to memory of 2852 3016 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4a3b6a18184dbda4422bb6644c6dac77_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3016 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5750f7c3362ad2f2644e871b16313e838
SHA13cbc4740e4df192f629d16c402ff3fe04c0f754c
SHA2561b7a52a8f66bd7f93074d5457de81e512dc2cb73b5f9d03195b05b8f5e744998
SHA512ed1ddea61c6cf7519ab93c8060aeddc4dfa7cc2fcba877be89f19abf7b109b784b91b7aefe38183b78b4abff832573910df065f19eb437fb2562e1378e78e490
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501cc56159fb1340fc575f506de7602bf
SHA158caa51f7e35173f6d70a37dc334bec1e0eb4b11
SHA256899276853011234f20357e4db8f6492d475cdc2fbc1190ed1a857cbdfd783b4e
SHA5120b12cdc3a36c9005e7ddb754e677c95b3238e38e08e16061794d029116bcb1d5a114c32bb1fda4605aacccfcd24bc163058e366479cd58e21fee4f3b915cb544
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55685ebfbad258bb552316292a1665067
SHA19df93411e99ace13e31521595ce4e161ac437ad8
SHA25694ed273f10546513e168c8d8610b806f06115b3454e74d0bd6d4ca915b9301f4
SHA512715d8a8ee6811094e373c748b70e19fe07505b19e1d58a65c7425e627a592c44c91f56de27d06689ec4d4a8c27b5308b9862f121b8eeaeeb821d1ffe1a4c1bb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4d480e137d23d01486e1e70977a00be
SHA15983bb1419f4e702b12fb9a6b7bd5f40131a9235
SHA256e1e98964f65ed437726aa8cad52db34bb180ec2a86a997d2b6c9295e9b5ee179
SHA5122fc1c6301852477331e98078ef1f316fd6696d766914d64fdb30d768ccab0b6ae618f6068856267a1cc8639bdb6989342aa3cfe24011ae26ae80aaa535b5eed8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56720673cce2a66890bba04a0f3f75cce
SHA1575d984f6b06f4365c46acb5503ee5b2ab67dc49
SHA256283aa802c0803af83ab4a67354476cb9700bfffe6cb258e24532be5c3be0b9b0
SHA512b6986f1f1f29097d105b5342695cce7f1420b6ea2aa0659b86b90dc00c80f0087ca078082e741b8aabd858bd20f43b99bd6984de164ec161e843571e49897aa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d99bbe37fc37150758921dc4fb179923
SHA14d12a40734e19964de134b68fabc0f41a855da10
SHA256b4eb33b8acef290674ff553aba61d6ea2d37c59434da2bf5405d351281881ecd
SHA512cc17257396164c0daa3fe8912dc293926c1daab1187ef7a09afa6de401422c309c18b8d47b2e472ed66c77a903d9958c4725d8dc6ea1e9e4198a63c185d052b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c433feb933ddfca5db66ba2a11ad8117
SHA10192791c105cd95292838edf55f7e4f96dddd3b6
SHA256c9f509444146154c565106a54e90b083ddcb9325052dc0db7be6f64961bd10df
SHA5126c543b49db093a58513899ab3d0915f885ebc0b07a1413ac673ad7610838bf2ce74bd9ebdb23fac1f58fe3161e28451c89358ac379f95f48911b8a35f617e1ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb4afcc09376673ba17a5d4840399584
SHA15144a0cfb07da18f7eef1f84f2413e6934a904aa
SHA256824d3d78959802de27c20c483c9e1bba74815312a757653738a3024dc7dc73ed
SHA512d7d356584b4782ca203c5d6372b6d25f13a5f7aa7a8aad985eb06a81a6181cdee3e6f973d6c58c659501d6a74e35246bc07a9cd9697659a2005cc46702a977a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518bb60c0c82cb14c3004358e3d28ce56
SHA150709d8453e83b7a85394d693722f8cfa7c13c6f
SHA256e3a6b06659bf23720cd79aed1c6aa8410b74017df688f96f6fe08dc7a27ea81a
SHA5129b210943f67461650198a640675d71e2ac7eb65a1dfad54774605c96a970d22a6a645a02d3c0ab17ae96050493a7ab2b6032bc3f3bbdfe8eafa6faf7dce11220
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4daaa4000884205b170a012156ae195
SHA13913aa0261a57ce32c431c56a072ece277f1f8c8
SHA256a84e4146cc9e9f1d73e0c52084c3b20dcc86983543cd721a633166ac70ea9c2b
SHA5127a245dd374934cf7a6be04f9e508161635251fdae2583c8a57539599460543ab90164e64ae8defeba0e37f464314cc48588f2032cefb3538bd5cbab156d0d186
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba382f6153caa5b34231bbc8fd0f137f
SHA1d034209acd2b5c684a6175be844829b1cf94c5c0
SHA2566abc771ef7088e8c4e0baf402cf0b752a31a57964830db949dbe96797972fa9f
SHA5121f33e6bc85eb33f3fa68e9702616d341747883e193f8aa102ede8a5ef472c014d0ad6e3cf7a7eb80c6d1fe84f01e89ddf1022eafaf5081fdebdc4214413899b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526c42b07c2c6bb18c254e82332d3034d
SHA1b36a221c2d00b80bca0a12512117b46a65d32c49
SHA256c548171187f70b4ce06da25caf69c881b2eacc6c36bee15a719ec0fbcd781d0d
SHA512751e569f63cfadb3698f000552da88d295d294f23843b3a09491b67864d0f4ed3d7f3e4fdfaa13d87c3c7779965f4e67b94d6d472feba16da1c7aa326d5076e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c74677709aa1da8f2718c945cf20f7c
SHA1d8eead14f5995f8ebab43a5a67c292340624b8a2
SHA2563b287e83d6dbab49a10c9c28c52bbeafe9a854fa2988f51355d9a43105c11b42
SHA512e74244f113dc38f75cfdb707ce756231b965943a44c9ccf59f8f058b75d207570afd62998e88ac957a5039b738bca754ab760343f5b98a11e4f87ccdad6d8e00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b0cb9567c39673b48b261e5f64d6895
SHA16fa16f5f7b9a729bcb94de5b122b19168ce7e989
SHA256cd5c22d7f44f73aeabfee5a9d96dce29057942bc709bc11030ab4ff6edfbbc6a
SHA51231150231236e856e8dd4952c2f6a66879ae7f29be7abccb46aa6ccb41f27967bf6afa9065bcab95db4da52eb0535367eaa1b31fda746722e66b5270ea0578bcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509cc601ecc0f05513e34130857799412
SHA15f87717adc0a87f5bf166258f6417dc3899d4a23
SHA2560807c50e32ec11dded792724ae969d69ac5013185ab575de8c4b4c6040e686da
SHA512b9ac6a78533ea30d52877b9c294a0f8843a287bc564111d4e01c0a1a50511f3fb82fc5eaebd07a6ceeb472ba3d3d17e9c3eb707a179ee8af74fe3b6ac25a8eb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a14687b745e712c8e83c6ae835707cc
SHA12c48145c1a42488610c8c8db6d268426881db43b
SHA2566986dfba508a85af81832fe4d2df178c301e0d21c4abdf54d6fc291045df6bc8
SHA512441c347edcfe88710b472c7e8484b571c2b4f7c46703b7c46c2f0b58b6d3ca231faa4feccc847b59264576a57fd127509e045512008b3582f64c1164758f9977
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e72e46ac9bade7c05a7e9c3238dbb9b
SHA122812ae15b7f375c721c00a02aa72b03bccd4128
SHA2560e9adff040966b4836f953fd52d2abf192755b594bb70ec7591fc35090d9f31c
SHA512dd1328acd5e469560ab4af1e2f9e0b332afcfcb42d8fc92ee395bdf9e58735b96d35a85851b8485afb6417e92c3d008a40dee5016931fbb87a74f1f534436597
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f4a62e0ac87e633b063ffab2ccd9b71
SHA118485015b268edcfa1a9e5baefd954b3ca7ab12d
SHA256af60aac5ed32715a286ee9f49314de56f30b65ef565f77f01fbfe9a3d5ea1eac
SHA512e76bd24dd58825d235ba4b771df5adc2afca91c1b60f34f1f626a08c99b6df6bf4921047ee71af6bfa26839e23427cb771af07d088fcbad4dedc51c8a5f6365f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e685e786cb04266f85bb0ca60dbc8e8b
SHA1b5809108119a71c494a34d0ed64ae280c9e93261
SHA256f47eed2f6abf6815bc4eaf0e7691b6588998de0a1730a8b0d98bec587d9db90a
SHA51255dc5c0ed9a6295a35cb5991f3f3e7814731adb21c8ca6894458031fa1e188a440225ff5394941b1cffd5697c2601723a11edc293a245be2803c1be52f176f4a
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a