Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-05-2024 15:41
Static task
static1
Behavioral task
behavioral1
Sample
4bd1bafc4da04cbe974352b39b2acb6a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4bd1bafc4da04cbe974352b39b2acb6a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4bd1bafc4da04cbe974352b39b2acb6a_JaffaCakes118.html
-
Size
68KB
-
MD5
4bd1bafc4da04cbe974352b39b2acb6a
-
SHA1
76336e9735872448ab0fc827f9fa4a478011d9c9
-
SHA256
dbb3ddef6429c5c94b55d263b75f6f81af8f70f378cedd581942eb2f66bb72f0
-
SHA512
46db06c19506f3ed7d4179023d0513c8f22f3781116507999464379408ce9947f664aefe325b88917451849d9383daa5182d5866c3461d500cd4ffcc54e53b7f
-
SSDEEP
768:JimgcMiR3sI2PDDnX0g6XTwu69mfbKdoTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpq:JaBu6sfm6TcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d029c989a7a7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000893caf71573e52d9857934f167de379c92524c7cff8038682698247e936c2696000000000e8000000002000020000000cced2f8463aa6b2426aa56cf965b74a08aee159d38eb588cc02ad9887ddac02620000000d5e71c9d83a569482c7bd44b3ac484492924624046e824eabd721b3ac874ffc6400000008ebe59caddd06eb537fdb0f4d44617cb48ce3187290f9219f04e59372e92288cc6d55dd93115fc1c431cf95d97f47d3e9751a827cfb444b1883d71cf14635d48 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B4F43FA1-139A-11EF-9966-EA483E0BCDAF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422035933" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2164 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2164 iexplore.exe 2164 iexplore.exe 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2528 2164 iexplore.exe 28 PID 2164 wrote to memory of 2528 2164 iexplore.exe 28 PID 2164 wrote to memory of 2528 2164 iexplore.exe 28 PID 2164 wrote to memory of 2528 2164 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4bd1bafc4da04cbe974352b39b2acb6a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2164 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df2fa97865aa6204ee937aef4e00b4d2
SHA1f7ddceb548af39be172d8d3f0d9ce62ce3f710a2
SHA2561621b3b01f348344ba685ca2b8e47e2198814511c688d865e237f9598ce5fb72
SHA5129517c29aaabedeb3b5a87b87015b159f1de3eaadf2b6297cc6706803c2e2da0df929c80b4b05c1a3704978769aae57e4ee5dec44e4ee2ce8603488a6261c69c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ec73eea46af17d7eea5b4340437feb6
SHA159b877d1407548d5e312bde578e9d2859df7c978
SHA25610c674dc44488cdb56f9d72a873160d684900964a71fdc9d2bc9603a4c5a62da
SHA51232e554df01b6fab1851b62e5541f24a07d2376f5b5b1f545fca71a89ad503e61e49e40d5acc79ef1ce6e2dcc3b2035aea284a39a51a5fa07d2e38fe96666e079
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5caa05a3ef12e992612876b9bf7e3b317
SHA1016107588c906df994fea394fd1998f5ad8ca44c
SHA2567045366fd95e6433cb4e167d358da7a9d0641c6fa8b98056a0a75354ac18c38c
SHA512249653f58fbfa422f5649ff823a6ffa752b035fe9a28c70bde705b3e8205dd1d37a223ca45834bf86c7fda5e38a8823fc67c3a07a6452d9f897031d5d8e4962d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55636e5cd11dc0e52fea72e21448e2e0e
SHA1ca2d8ce3387abef23cbede6343f3181aacaf20ba
SHA2569e6127ce2f0471ec7499cb2f5c0093c81a6996f7b4293306012a261f8c6efb97
SHA5125ddf6cbdb1ee5faa89fa929d890addab34913bb9b540f2bac5783b18fd5ade785bf20edc18221b27311590cc0c11b28eed1c351fd98629b3d6b3758c481f06d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed7f92615068a664399c4c6f1afef734
SHA1b04d0d7f9b10cf9e03c2f2fa6e3ebc45be0f6b61
SHA256eb040355f7367ad97e7b61fabbc3a8c50828e50b31086f82da614f4a9126cc08
SHA512d135b62ee438d00f00c666b4ee71bbec87ac3b0199061fe39459a12651e7493f1427d8e1892265950856a0204b88d8d8b562b3e4759dfd36ca3092fa04cf06be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530523e682846c6849a52b39a531ea4a6
SHA117f0dd40d6ed32b67fbbad03c290b2bb44d77951
SHA256224ff0e206880d78fe74ba74bf8e23f4bc9bf48c04e0fc30058c6f9d1f802bb4
SHA51277ed861e056ec73c4ff837477f156daa18ad79d37544f06e0057b65935573c03280792294e77533112a76f1b5d04a340b3661c2ca3440b71b8f36adea17fb5fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8be9780cde6f5f7b53802ddcaac8e65
SHA190a2e5dcc3a468a03853d17c32cd667a6e099435
SHA25672aea1885f5c78526cc6dfb0a5d60f3955729a25bd824cdf27793c0b142e3953
SHA512dd234a0c5a9d13c63695df4e8a812b7487243748cd64ee9a18c0df675a39151e13cf97843265605fb59a3d08b3376833782ee061306b84f20cafa23a593a2fef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52fb6f306564ca393b5d9881044873b23
SHA1a922ee4c1a6a9059b4d7686e8cfea129a4ac2a8d
SHA2564c5ebea05474aa093bcf6b843c9e221fc2d9d42fbfde51bf9e162a1ff8edfc7c
SHA5124828eb5c0dc5b3cf09e99910dc139b46e9b851faf2c88f7078aeeead8872bac2120d8fa7c2bfe5dff8f098ad801be7d14ecb4af2fae63dde5bf11daec7ced978
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c4073ace488b2dccebb5cfa753b33f0
SHA10425dd958f387faa962f483adcc2f501413621af
SHA256c62d8ed240bb847be938bb62dc7bf8c5a7c3453878bc6911c9f5281ebbc08c46
SHA512ed1bfcfd040bcc4d150e339bd26d07028bb1842ef48d863ade31f3cd9b62394021a2019825e0d5abdd4f6ee1aec5d6608c4c60764ad1c4f74a68c5ea15a0dd6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d4167acb2de229a8b4bd8f3f9abc0e3
SHA1db3abbfa7652ca8eb84a12afa7bdb20afbb0119f
SHA2562380a8ac02e17eaf89daf1bdad2dec721ac812222d59277dc0ca260de064b070
SHA512bc8872fa08943691483398b7f610bab0900f7cc6715efeda87afc9683d0677c415f4e25cc95448356742347a7142bbb01e913c3ad6640e261e0950f900b58a0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c8ef83fea107e2cf870b12d21536c27
SHA17f2bc2c70d0dbbf80ff6619fe330baaa623990c7
SHA2567533772f00dcb698547448ecf6e1f68d4d27773227f62cfef676a5cce3c8b9ed
SHA51275afe2435201f9d56ff3d7676758af8af8521cb7ee666ef391bbc2a0913e58d3ba89d18a967c9f6e7314c2f1a9a2f6e88a46cc9eb360ea16e5ad4b082c2a6bce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5531523c9b283dceccd9e9083feba8ee8
SHA1af70aa3787067faa70d9482eb5bab297e2f5d8fc
SHA25616de08ad57d27d4dddba4c986fe25633e74ac1b9cd26d36a0fab5c027cd60b28
SHA5120e4c1365c171eaa11f263a7724d9eab9403b23760a326906b84246eeba88e097344142fafa8ee3713446a35cb1e7eabe4a1f71d9029e2170877347e1f7d2e927
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510af579d9057d3dd0c2505163c7967c5
SHA103570cffda71892bbe4630e3624e24675478354c
SHA256a707e28da8a6e1467ff4f43ce43318568079cf0128ee072a1495ae2169d1a3e0
SHA5125373d4d1c937a51553665fbe0c97ff9d8d12c157d6010be3c6a5738d7baeb4a099b7d539b0c31abc3bbc04a468a31158ec92318489bdf3f897049d1116a03199
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568a5ee2be62f6497bcc302cf26cf340a
SHA1478a7b082cd7c5dc7145716304ea084b016d3c6c
SHA256b2ce514bcd6ccf156bc879a406524bf407ce8d7b1898dbd13a3b27d9349f1a13
SHA5128dc6c9522e7127493e01a8db728755c5dea68963d92b1c9fdaf4c28a2ce51ca13c73d9e7a98a2c21fd00a041995fe431e69cbcb5fa688b7c04fbfe66e498b229
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1f51d9cb0e40c7fe19206de5f432c08
SHA1220488a4d91fdbc667e204fd221d6c1ae3f9bf03
SHA256d789aee62a6924ca678bfe3622f5407ac17eae54bfd29a95f9ad97e0f3107aee
SHA51217d4cefa94b2151bb191c77f9c02a6f6687cb6dee3b5791760420b4c335f1ee741e2c86e18d740f166d48b39e39196bc7358dd0e09eed84d6e80780fbaf3ad91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585726440436926b40b716a12ae8ebcd3
SHA1ca3253604b4ced0fb85ec675f82416a15130bc64
SHA25611bce866b4daeea0ee93bee68a3f1b0b49cf8075d2f16af92b068696bf046e0a
SHA5122edbdf334152d03688495e335c4c35fbc35e6b89680548b528e48f09e287c88b615a7617f75b1aec09936688fcc218a2a80bd7abeaf4b6cb39a6164660f80a88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57fa17a375e44499356509385b25c00c2
SHA11816fa2d1e47132ff43e5da45c9f4ec94c8e4692
SHA25680cc536c4c8b213ba734658382002210eaf8a9e7eea59db083f188992d64128a
SHA512953bbc297b4d29e5d9beabc8a88f1988377fb802bce00329b7491b41cfe4329544604c532390ce8de1ada59534adb1c1575b2846a9eeb5742d1d377fa4719ca1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5448ee8b5959474a650ddd7af5177d610
SHA11745efec713b26e9222962fc531eb3ffbed6f53c
SHA2569996e8d1193c266cd15f8e15beb7195a5ebb87a8f700cf4ece7032cea38de1d4
SHA5126371f48a3d965d75ea6209b985431f32df3e4e521340370168ec40e613a985267ad649d889854724ae6b32c3209c55e7b28e830c47a1a10827ff28652c73e91c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53be3548e12b49072cdee25636111bcbc
SHA18a7ade61e84e16bd54d884e02b1eea4f330454de
SHA2561ad6bb819d6a681dac0900ee6312376c4d7b4d684793448ca7f1a39346d9588d
SHA512f693e6864d568f93d1971b368cb3d7d55b680545ec9b5321ad249a68a59f32169e92dd1a30e3f3721e9e4e90bb5c30a9e29147796d3d40d25d9d4da5f1a3aedf
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a