Analysis
-
max time kernel
139s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
16-05-2024 12:49
Static task
static1
Behavioral task
behavioral1
Sample
4b274c8f48f890298d34835805258ed4_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
4b274c8f48f890298d34835805258ed4_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4b274c8f48f890298d34835805258ed4_JaffaCakes118.html
-
Size
144KB
-
MD5
4b274c8f48f890298d34835805258ed4
-
SHA1
024af10c20041dd268410058dc2787f72bfce6f2
-
SHA256
9134c323c07338eb499ce83748f19d87cfcc6be9e61ab8574df6cb15d8e19344
-
SHA512
2b2ac86c5af49beedbda22b7ed7b943714f8b1fb2d17b76aef649d6ba0a4004a64779d53cbcd32a39f4453b1fcad36e8e670e9a14dc43de41d6f263ef616e1e6
-
SSDEEP
3072:Szeyvat9jyfkMY+BES09JXAnyrZalI+YQ:S9vat9GsMYod+X3oI+YQ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C4F53841-1382-11EF-9CF3-F62AD7DF13FC} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000b2edc58f454e9efbb6f0dacac2bef6b1385c8cc114b35874c891d2ffbf454c60000000000e800000000200002000000044a5502db7a54732e85eb76cd6cbd1d2fb6af09f44f87c8202ae1d15e6dda1d0200000003fc5609645a1555e8b9e756844d68197ee176a0a0a2229a7b81e912c5ca1b70b40000000e4fb41c5324251cab9399c6c62892c6fc8dcce240cbdd60e90712822fc7c06174172cb7348e3218253c6a6bd44aadde8843cb065ca52af6125f1bc2d595a4394 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422025651" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3095059a8fa7da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1028 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1028 iexplore.exe 1028 iexplore.exe 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1028 wrote to memory of 2132 1028 iexplore.exe 28 PID 1028 wrote to memory of 2132 1028 iexplore.exe 28 PID 1028 wrote to memory of 2132 1028 iexplore.exe 28 PID 1028 wrote to memory of 2132 1028 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4b274c8f48f890298d34835805258ed4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1028 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2132
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547c62707cd9b5389be7ce25d40094081
SHA1ffd910aaa414e49b3fb4e318bfd8b26f834af01e
SHA256a3e295b96f6da01fdb70eda78b8f111906d12421bee35403f60ad96a0c264e1f
SHA51245c4e8ef4c40dd2c6344ff2897d4c83b0197e77aa4f488c0defe873e74548e9e6340048ba97cb4d21a3825693ca0a55d7740ed0ba2e024e515c3cb0c592ee8e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b04fe01834aee3bf6b68168eb03f6fc2
SHA11331db5bddb9e141eb1e851bf186b0dd018b378b
SHA2566f9b7bb7fa81a15fae7bcd2dbe3156934c17d3a9f26ee59566c2a4caa55d884b
SHA512aec5818e5492f45d623e0ce9e6cad367959e261ae44ec4a783b4b2d2d2d465e8f40f9f0079c9a1d47224ee73d665a073286c63f9dc86f03e4262b4df6b944d39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547470439be11bdb918bf3277f2c1c9e1
SHA1564127f8282a274c3072a140eb5eb0f18607e371
SHA25600737488204849628a712dd48a88d95441e3353a82296aa3a323176a6b657483
SHA51203f804d7f64fb38c3e4fd30494c9d174b57a23814e080e548be4f2d18066b18134c90a296520c3df5daa1864ae0dd8d2f43041c7851efb8a677c533f5cca0b07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f7adc02f376b3f52acfda923dea66ad
SHA15f5ce476ace3c7da897bc178141e5447f57c3c98
SHA25680dc03c88a86748d539fc54ff2edff4382a9fc6ffc57da89ef08e54e43784bf3
SHA51272f16cfde0a583e3871b4cc2a984959a547a22a965180ab79688a5161fe9ccd27a2290dc8d764573f7a6386181530b4e1dc6d8a0f58468d4718ee4004eb282b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57349a84333f21a1c692bccc1e8010344
SHA1ad5c7619f777674ec78ce44ff984b5da5a9be709
SHA25696bd646635b7e7f60d1ef4f64ca0c90688fddf159ec1108e7f0946fa3fb7b205
SHA51230599d7f0c1f7e499cfd447715569e2e8a7e288b0ca038f898c52f49d90984051a1b4bc86fa52e4c3d1ec3dcc032bab64826ee0edaf6e70a4ba668e2d9b78a63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b23556fa0336968fba94bbf974a77bb
SHA174c0df7ea53dcdaad4646a331730d01b3adb0cd4
SHA256571fd2a9314843080369cbfc64a2de66fc0b770e07b678cdec02e5f0269f453e
SHA5126962d1d05bf2fcfb358822d0f7747ff44780ca01008ca21c772a347bd8e1fcaffed038e58761dfaba960684db280f2b2f5dbb0e6ad5cfc1d92618b9440ab55c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fec8d5094f39e83dbe60486cf29dded4
SHA1d7cc3331621a03fb3c27e1c1caa6a4b8ef7a1b49
SHA2566216dbae894549e36bc46e87036370f7544b65c318403ff3e9f70a23e2be11a6
SHA5120780d1be078fbe64cda96b2c0eeaa153ab442720caa5db115cbe03bcd4d1b34d7a3a0ab11942674c5860cc3a3989ae08cbfb3333bc97daeab06afea9c50611e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539830b33a234650467f1cfc6369931cb
SHA13603a8b72116ca7dd40818c2bb244a83f7224604
SHA256fd4778781915121d5dd996875831611b9fba97084841f3f4ad35112643279e6e
SHA512f761434cb47fcead70940217b5747445145530ab2d91104edbca3ee91d69f6a3e56ef40e87c492c9e6cf9d602dc60c75cdd1ed60ea44e5f65a9f6bd364cc9b9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c36675750da7790c380e386914218386
SHA180e54d5bb1957eb90ffc02b546d97f6e8f951947
SHA256fb03a51d6ace76c70a37b969796b1def223c0ce8bd5264e80bf28dd2049a70c0
SHA5123bbdc390f42e492aa4f833ec687cc14a7f8f3466f5ccc006205f69cf70aeea100b752d96adb06e6b10bdb0dc27ead7d0119f1c1d256ef5fb3f7678ff5b6f4e36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a6347c9787edcbfcaefbed3380f2234
SHA107bd9e3e7fe8c6877cea07732d182d921349b4c3
SHA256631f2acda33b86e02499addafa0f9358bbababd7ca70a3f799ff38e408a579ce
SHA5127fe8bb59c5d573d820646dcf86da2574b3962b7e51e0ce74948e0e412c821dd2f398d16f7234976c618aaae137e567e89a6df1052496d20337756cd634c1c44c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a8b93fc828704e0b4d27f95f013e283
SHA1da56f0ffe6940970a43afbc2806abe8eb204b40a
SHA256b9709595db5e70c1663797f25f8189533950545b0b8ef7be9a29a827779d59b5
SHA512cbbaaf40d3f123fef234a8cde6f3b16545fa21f9f5ab99c01b6eeb5e4ae6c2047460ef8b202bd249f8e93f901b19d5dabb2a5b1066bb3742d028bfb92396e8cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520b322c96c73702a5a65a9ad18e61d96
SHA1a0a4e6dbc6c1d19db058756d9da9751de99f9fac
SHA2563f19d1715199b424f5fc1d6f6be2038e57ba3a5a8a06bdafdd755134675f0be9
SHA5127d9d243d4c2fb61434bbe3468ff887c63233eb509697f6eb8ab753d347278cb7047ef67d0f6332bdc3c50670772a9dfab5b48c8540ab43979f99c556f828af42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b11ffb0be82231f58d77c24825f6f655
SHA1bd33aab53bb1a145ff6b88cae6b7c1298ea043e6
SHA2560c85bfea002cefa3a64fa6a527346f1d25ad0657113397c4e3a80489b30368e7
SHA512b49251dee70775c52b4c34eebc72f2d27f82d6e0234524343734e906a5371ed9cb3518d33036bef270b2d4f8996a0af74a451b5e652886ec9e90c4c9c0e40cdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e5970f514de2ade5cbc6d760077bfd7
SHA10573770485d11d76269de1a189db43aefb3f44a5
SHA256b72a5905e95f546049e7285e73669b4beeebb284e3ba7fcf3bc0050cbc83259d
SHA512b618f26d2ddf4a15261902c929e6c2e7e8616d548e7be991b6c4d7ad908d157f1216a906eeca947a1239be44044de60542d886ac08d7bf371764551c3680ed64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5006bd3b517307cd436695c6581466288
SHA17a55f6aaf062a9e6a4755224b912220dd078d0d8
SHA2567ad0599d84456c44277ebd7748d8c4b6185dd138509592681d9adb0f6a7bcf38
SHA51282b69a4d3e18c6b22d427056437dbfb45edffe98cf9233b7972ecd5cefea0077de4cdc783e292e6980fe8acb1e8335c678c57ae14da452ca84058dbf6680efa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55cf8ea52f51e450770d6eaa1668c0866
SHA1f47d81d54be5ac92df145759c29155170cb84b76
SHA256ca589a4cc2fdb7cd2b7bbeacecdbf13be59df31300849b74c94eb3d16dc95e20
SHA51285075fba7f61e7db9788283fcd3ce4698553aab96d2e4a09aee761ee35c4f291f3891bfc75f1d9dddd4e58dec5ba7a2c4d5d9019b1a8b8b4f064ea8a7c6ed7dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51253ff3254c579519ec949e9bb7c06b7
SHA18b0a870ad70c8a380625e882f6ad5fe5b20bf8db
SHA256d78535d9f80536519b8b0fc53177d445579140d999a31168427dd32a4b3f5e5a
SHA512fad1d6b07eb77bae78ebd80d6fba66fa9514cbd852714582b606b9b85b70d19845572393f6feb12329efdcd7db67647bc96c14da03097862c29109a872ad93b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d5da1f44cc823ff4f4195c5cedd88a4
SHA1b1973e77fcaf3438eebabcf72a12d28891de7604
SHA25621967aba767fbe506c8a4fc013b3bbf753360697f645ebf04a885d2b0171fa6b
SHA5120628adb594ace6569dcb0b2b974d94e36fe76d0ec65ca64a2c327789dca01ea83bd6bb968b274d103fb3f3bf71e441c988b50e2aa19c5c96b49b04e9aacc69b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e702ba77eacf88e66dc1e34e0fca5015
SHA12d8b7ffc36b550fa8d47faf48698df8cbdfe7f6b
SHA256951c439dcb5464eb4733f5ce9db159a54ab41e0d10af0c855edc97fac00dd305
SHA512f47ef716eff5b66bb5398e28093a2b626e1857e42a0b7ceb2f85cd5dfd8d1cf63f9d580627b5ef068cd77c6337ae14d58b3c0c725b9ab9fd4a561de04da98fee
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a