Analysis
-
max time kernel
118s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 16:12
Static task
static1
Behavioral task
behavioral1
Sample
4bf0077a0bdbc8fb7a651068c0a497ac_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4bf0077a0bdbc8fb7a651068c0a497ac_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4bf0077a0bdbc8fb7a651068c0a497ac_JaffaCakes118.html
-
Size
8KB
-
MD5
4bf0077a0bdbc8fb7a651068c0a497ac
-
SHA1
a73fd06e63e9d783df0f2d4a73d5f03409efa070
-
SHA256
31e86b343990bd4c163bf507ae83937614aef232139049738b72af9dd547e20b
-
SHA512
dd99bedbdf20b54f72318df169cae18aff71134ed5eed82db8728fbb5aa9ef27591954cc9c3d8c8a709a6704c8d81c17c6522e87871a33f8face0939c3f665b3
-
SSDEEP
192:ysciJ1AO0GJo/ALfyTD5KZ3WCkTp7FMdkyrM/WWvZpX0X0jXcB:ysciJ19Jo/ALWgxkTAPrM7v/0WcB
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30f7cbebaba7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422037816" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{174A5551-139F-11EF-A8CB-6EAD7206CC74} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000678805734c24c15dd604b1621a29ca725e2b2baffb3c9cee0844479a233ad060000000000e80000000020000200000000889c4a2ed0a2e216e8a2598e70ae0d0571e55b92f3ff16580f74c15c8fd534020000000c6184b3d6a1dfae2aa47406b5ce645c892e6a2e60fcecec883a980d1ae4c1c7440000000d29d4fb70a4f601b48d37a9470dccfe5a8ee3ba09f5aed4742a95f89fa4d5d9b174270eda7f6bd65b3b2aa4a70ae5c47bc587877e179d4297d98cea7f923972d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2220 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2220 iexplore.exe 2220 iexplore.exe 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2092 2220 iexplore.exe 28 PID 2220 wrote to memory of 2092 2220 iexplore.exe 28 PID 2220 wrote to memory of 2092 2220 iexplore.exe 28 PID 2220 wrote to memory of 2092 2220 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4bf0077a0bdbc8fb7a651068c0a497ac_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ad3866621c2c376fe43e0d82143c86a
SHA11d1ca05d3140c7085cee0cd23b6ef3556c2e9bef
SHA25658e3d3b1811f954a81a3c390f949be5370088691fe4b2a09a76345ead733a3be
SHA512b2bf6af7bb30de49f7ad2645434a81b78e948e131c78a8d460df595528b707375f0cc7a9400263005412674a5a275d765d7604380b5e309838345750f498fa99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5d77e5546e67a44629bf529cc96a479
SHA11d72b516943a8656f1c75f8898bf3975040dbb2b
SHA256f016b5d6c8065680d9be357628b519a4123c8f15c2b12cc2076b99511482b5ad
SHA51235a8d05dc979ae9a4f9090125b08279a1da0f6cd44f11022f001a890fe7dd7439454c33aaad511a41bcf39b311ab04faedb1605ae00e34652bfb15dc82f0d35e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538978791a3258b9a27801a92c3ceab65
SHA10a3f236b7777a46885f11089079eaf5d5e63b65e
SHA2565e7d0202f048455daf3ea13f61294007688b98ad50b46bff6cf50bb4c1d16a16
SHA512b36ac0421d951529b485e2ea7c00ea4dc018ecf6ba4687f90f345be8a28c82cb503d9e008329de5907aea9739d392d4279bc8e27a0d1c5abf10a836b3907e4df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6b3e6eddf72f553edf4e73ebbeef4b0
SHA1f36e9d6d6d901d2032653423e553d18dd98d6f5e
SHA2562daa8178e69c0e9f89891247dcf833d2c75cad09831c12624348f554a20b965e
SHA512abfd1343e1c5d3f907ce26299a59633a48e74aaf4c6245f5ff7c3374de2c8c3d9f5bc13fe280ba0d4815646426bcb9aa584b66c03200ab8ae80bc36da2e1ed88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564f98b3bc5076bf3d245862f958f3c32
SHA151ba59183a306f7935ddb4dc8f073def71f2e069
SHA256196cb7dcec355c92dc2e73bd81ffc34925cab1cedccb9b57c9a17363c11a25a8
SHA512e72fbe4ede73c4c0901039d20ce1773217d8e0c99892b66676898207fb02d859472a7919266d200dae0308dfd5ae8eae6d02a2f636fe9e242af3ce78ddca37e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb01dd624470183ccd5a2a8dc1792354
SHA10972b1a1689c1655254c60c764ad17fd82da6ac3
SHA256dd7caff897c83dae94ef5c6a6fbd0c43562f1aee7a60af1e2c7050fb0e9a512c
SHA5128cc568e52510d71dd3c2ad12c7a76cdf6047dc4537a17088a6e442b29b37905331e4752cac8acde427a6d90489da0d893c5ef2c8632af9d9c4e93b2755e2f750
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5062868572188cb669c50f21a201f9ec5
SHA1c36059fc36a92f596734454001e824940d18fdc3
SHA256c060f7328d510b98d8e8708a52d65758b4b1d62b737f1d3cdacc475b56e3886e
SHA51297d503a9f4b65ba6d3d6cf9c1a1b062bc0c6c70943902a4d80d6a0fbe3bc837449aebde52c15f12a0b4e423f163ca1e65b90019cca6f2e677b957da3b8a3eaf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57852e9e6680c8ee8dc9fd4f1e270b1fe
SHA1fa54566eccc0c0e1047425c75f275965738881b7
SHA2562840e3d596cf08a4dd19e2d592db78da623ba8c0612f365970e9cdcf55bea8de
SHA512dd1ce18cfdab54619c8ec464cca822626883a65c448fcd74e7d49cb71a33dbc33018e6b303d5e2cacb572ddb5200d3c488485a9fcc30978a9a345e7210d14a7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a61a437016cd2316c2969b185075787c
SHA186f61d28643a2808aad9c4e88ab76d4b7d9cb238
SHA2562f576b8a1546bb06f47a82636a45e25ee52cbf945cf199980fdc8b7e8f066f78
SHA512e4959958b7c17557f9deb14d5bbe8cacf1d5d5cf98e42d74bc22a2c51880fdaded8f791e7a3bd5473652a514fca30d7b1263ffc28aa2dec8ea3cc6721084f46a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a79d00df4829acaa5a0cba0cfa6da84
SHA1e52508bd6d44ee7479d85fa4dbfa15522a580f41
SHA256bd2d1c9c155de1d5259cec48398436d2489974ccf9c11e8989753e77f8066523
SHA51248bfbe1cd6c7eebfb6190b9e564e7623b45918fed52c6b7dbc952ce93348a235a758a5d2a0aa65c500efefddc846c7b52b604ff3a43f4eeb02957796e706b9e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50849ece3132dc9c54c89e048035579ce
SHA18f26aad9a07af112883372725cf99991c9482b3c
SHA256033e78aa361a8b65ce46e4664ddf2702421b3a7883f4b4a2eb0f41a4ec728877
SHA512b6cb35e81de37666cc36afed442ed685de143d751584c7634f91f49b6996ef2a090099ba4c04620bef241eb0af76817b42607671bcb9acd40f76f36c9d29c875
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba3b850fdfcc076adcf5c9d90b0239d5
SHA100178d8446ab687ef882d6a3bec60b46d89b688d
SHA256a9c65035c2dc8375a7214f778fd56e04cfea64aa0bb8e76e8b296e6c435cd848
SHA51239743ca39d9a4ce8256140fb22b83350e0cf1ef63cc73909d4acf920087f3ce8711d3022477b89db6bbf90b6d1b6de92b314f336e182eee1f1ae01c9b0cf8aad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c401f0309fbfdd8aefac8e0c6492b36d
SHA139b601759860ddde80c9da3481a7ac22a2588380
SHA25666c79a4d939fe622eba78034b3940455676437fdc61b31d750118bd33cd92796
SHA512f91e19cfa55e08c937a1f13b45d973b6b6f8b54fbd88b6b49100bbd6d37f32dd93ffc73e8da062c22ea9146d6bc353b243c2a824bebeace4b0e5679c61b88a23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de8113978eeb6ef3e2df3a7a23b3efa0
SHA1ba1351aa4e2d50918e7b15cf454f37b86be997d6
SHA256a6ad112631c0c41871763166ee5497956b46dfdcc7c292fb0e959e0b8c8e6ef8
SHA5124277e01a65710bd5187b9b17b1e596687dd49d045e01dbfac0de6171f5ca2e8f34c0864c3cfcddd7440591d499829b047f587ba5e7190acbf6d6cdebf2a61b2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e97fc369ec57d3e260377673100cac59
SHA173d26dcf3823b32b298429ee22aa2c2e97d21a4e
SHA25697e5841f5b42b98b064ad787237bbc44d4586a96dcfa06e9deadcb16961fd139
SHA5121972e1ad035584ca0192744a9e9eb436043169cac05cadecec141df88576ae0020529a43592be7c4b7e06dd2148522a5ce6171a980a5073645239c604854f925
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58246a22f93103af05d7f238366c6e3c3
SHA18cb0a0f3a98d0afb6da18bfc0c46dd2f34d37386
SHA256c424474d0612e4853a65ab10793ab0437e024fd050ab757293428b49e2e30d05
SHA51276cdbbecef51d71e313658009b70d65cd92952d8f29e13135a6a9c43701af754536daa71111929629940b871a9ad6da4c8eb4b53bf005088decdc9f22d95b0fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5786ecf44bfc134384e08b24a0cdf0b83
SHA1f1df7656d26ea94d2f805b0b10503e3fb158575c
SHA2564e4a9aa32e2508b66e1d0bc17773e6fd4af01b42dc61a3202c2e53c297ab7f22
SHA512734bb41fa34b7faf5ac44adcbec9c8b6ef63b27e92b8ed905d3554b81de34f57de99807757892d291cc10daa5872d40f182fd285dbc1ae71afd82ce63421d7e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cae9d40f4f022f7d072e098f20eafc71
SHA1c376ec5c68b15dfa5dcbc7cbeda4d3bafd1e66c7
SHA2569bbb8f87036c6b29208b3e9f2414d0714424ab8c97fe2655aed20964501e2f1d
SHA5127bf7906951086559941c5d6e00f79e4062835111cd4204d35991ec99ee93bae4c00c108e7fa5310889424cd1f4b18e06bfea5cad8a0753666aab099decd3130f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a