Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-05-2024 19:02
Static task
static1
Behavioral task
behavioral1
Sample
4c97af40873012190ec0f6c98e5f699d_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4c97af40873012190ec0f6c98e5f699d_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4c97af40873012190ec0f6c98e5f699d_JaffaCakes118.html
-
Size
55KB
-
MD5
4c97af40873012190ec0f6c98e5f699d
-
SHA1
bd3385ac8e9ac269f7ba639e302f0113753969bf
-
SHA256
16cd7c6a8d6131257d6310b0e09717d849575a4f675bfffc18b241386aed4d20
-
SHA512
8e19607e2ca314f91b0522b3710a2ee510d501a1f406fffea7a851b45a4da1eeefb94ba120414b0f9a3c76577f10f47086b28f55c740fe9edba2a4960738179e
-
SSDEEP
1536:gyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09q:gyfkMY+BES09q
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00da29b9c3a7da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422048039" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E4AD8F51-13B6-11EF-9CEF-E299A69EE862} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000498da081daa6ad2731b80d1388823c8e8ba09d0bc7391273cca598055fc11055000000000e8000000002000020000000abc89a3d83f4363523b7c4523e3e9a9590d53e37f91d0b1bd78accff067450d820000000c60515b06403e8d9055d00912f73333de11169c6f648ab5634129f84f0050b704000000034f68a9d9bb59610942bfe28840e36990caded8ce3fde2d2b2e6fe5ba12965dc59e43669350b08577a5e12da19c253830e7708650379f4b58be32e13d8337a17 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1096 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1096 iexplore.exe 1096 iexplore.exe 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1096 wrote to memory of 2212 1096 iexplore.exe 28 PID 1096 wrote to memory of 2212 1096 iexplore.exe 28 PID 1096 wrote to memory of 2212 1096 iexplore.exe 28 PID 1096 wrote to memory of 2212 1096 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4c97af40873012190ec0f6c98e5f699d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1096 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58415b770ad921e75fb64c398353145e6
SHA12cdbb9342479d5c6466f9c0e4146f4ef2a675675
SHA256a0770d6c2ca9bf223aeed5c2f706eab59821af12259c4bc6023a0ce689046dec
SHA51292f541cb0f97b051c728e3995b080f5cbaec810c12f6af4ab99fb307e10ad0635e4add3651ec47dacae16e3d399f995f560742c6a567f5a067ddceb439bdbbe9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567f70cf95eb2704fbaf13ff891f82b72
SHA18296b90c5459cf919471480234cb184db948e2ba
SHA2560ca6e46a684c619d001769bf515cb43163a7286dc5e56ac35af2f9b5305aa600
SHA51211953677a6f1f212a4a2fd231f50888a83ea2918d51416e7e4293863428bcdc8e0f455f5f0812b4812569b36a9be5a0cd8a1683136fbc3d087b6a4bb22bf517d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf7747c5366eb0dd0bcfa1271ce4e8c2
SHA1e3ce7e32b55745e78aa70b733bf632536911c98f
SHA2565a6a3d276b3a8d92d2d9ee077334c17cfc07d04049b496237c33868e7273efd2
SHA512bbb3a5357f003b3015e0f893085e9313aca8ca261f6d83f6aeb6485ae059c93fa2dd61862ac116f1985e4e4d38bf55e00e484aeaebff3988de467f0c232102e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563214e1eaacd3fd9d17e042768e28c5a
SHA1ccde37767798662459d639b59590914cf4f31450
SHA2561dde397be0fdc16993a713a05e0aa6e9b5c69dd31546f06371489f4fe6882287
SHA512359a37bc6ccb816961feccf812029eab9ea45c68250c84a9e67360f2f257543bbd939dc65695e59a3259b46a2d50912cc3059dd877f5f8bcd87cb753792c0241
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d068f9800b814f053f579bc90fa7bcbd
SHA12d220272526f2dffb126273a331ef6c68171bc90
SHA256585c95128c178d0db1eec1f06388fc498ed5629ab73805d2476c295ea19061fe
SHA51260c07c65ee33587a996c3878e3d263595fa3d7ddee530c0d68dc446d60d31ea7a828c831518998d01f2b2ed9369e2226b63bd6fe6a8ccb56ee21e438efcf5a87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5753ea62fad3afc5e1a05a1b3ab35024a
SHA159a9ffbcebc106de625baed48e50256eccfd7708
SHA25688ac46b9c849a103b50d4623df7cbf255792830df526fa4e4fc70cd41878f25c
SHA512ca963f9d7b0d63a2fed6f410981a029f844a48ffc9eceab8cdea27323375d64c862d65af741de5381ef6921c0d7aa761e39ed62ce29d32b8fbaac46361b09170
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e949ee2384c06db27e95d875278361d5
SHA1c82ead653e41f94eaf61e88105da77f0dc01cce7
SHA25659adffd9a832269398c7410122dfbf58a52005a891918ff2b5c5dff4a5f580dc
SHA51205ea4e684a422279ad6aed72aa617d36689ad28a5f09b8b1ea80de3fce5ce6019cde7244eb1e7ba25ba88f2d880c755bc7a0a80f51b5ad2e53782c32c455689e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca9488447544b027b0f994e49733fc88
SHA1dc6d83e15354d111d022ce1fa287fff92ed810a6
SHA25659341a3e03105fd3e023116eff93a883a5dd3a15cd822ff65fc602f217faf4de
SHA512d7be7397d9b6b5bca8afbb23dfa2081505c7b983936a2057c11462b2d3a7c497a2f1bddae6996aa842a0d3b7a42db8bf6fcc036270f8307012e4814417067bce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59eb078b54513cc8c2d3e062bca4dfb48
SHA1a5df7b81124404e9fdfba4deb01fba541ac6fc3b
SHA25647d2b55e0ff1dc3fe7dfa9f09e556ff87c99a4090a207c4bf90df3ffb23fac1c
SHA512f68d06c15dc6b917d46189fdf5d8b4a8171e6cfb0e6593a42d904d39868d49a0689c4cc59dc6c36cde4b5ee34079f2862745a176d499d73e50eb0dbc935662d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582ac0ea4e8ca5f16682965b039923364
SHA1443ae25fc53c368c1fb06e4cb4ce53a084f710b3
SHA256f2f7a1936f47fc2266db51d8a6fd737598016d004c5aca5240cb4967109ef22a
SHA512f705140bb236c1f06dca52fbae0726135af3540dc32ee16ef39f1c7b83bde1028ef1ef6307b8c1343fd8dc2cf760f136a6456730c28f6b4885e6db0de89ad576
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53cb8535ee04646f180dcf4181f49abe0
SHA17633f156122e416264812adeb01de487d4381bf4
SHA256e33de8a3786072bbf461d204590e28ce1e34d86e18381bad5e47b4594adeed80
SHA512cc6f08d1abab75feced46c84f027f41eb95c452fb69bb70251a60d744950ce66bfc74ed0e34867e4bec51fb813ff58e17c45da84902202b8935b71b8c0760e04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de76a9c12aeee184239fd21f2f83a7b5
SHA1b3b1f1dd04c6ad652de8f910202b5913a1c014ae
SHA256f9b792289911bedc67e47e20fbeacb0db8c80c36a1af78608fbc3ac1bf5aea7b
SHA51219d555d7bf4817e65912d2ec403a55be14170868da276a7588f183ee207e9dc16143a1ce816d304d45dfd3f59389aea1224cb3c500cb9ee438e2936c2e193c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5885585f8bcfae67bc8b04a05e37db277
SHA1ce9ecb4e306f7ad2cc257b6f17c29d7cd08c0b4a
SHA2563f6881eeed52a254d3433659b40014aa8909e73319509c8309ac25075f5ce26e
SHA512751f370fe3067f0c559d4568ef2f96f4e3d60c58805f195e867d09e4139fd65fb60f2f7646ccb83cb17d7d1b619cd52e03c864ed2b314bdbf33a8701e12fdf4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9bb184db0ca0075afc0af794c08a365
SHA19dacf277ed18a3148135372c3c18284ef930c1e1
SHA256db1f4fbfbadd373ad1297e143a618f44f9b4dee3499e9cd69f372b8238d0c1e1
SHA512d366ffc4870ba123041ef2cc28c44a3386dd7eefa837e2594e319f13dc8f2c4ce183b323e5107366a784665395dd5d62aed37ffe4fdd54751da3bb86c2e7f404
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efa5af741114f2ac25ab708a3cf3afe3
SHA1789732d4b9932303ff66bc2f8774e6334ebb69db
SHA25609fae5257a1621f9a46b298181ca391d7b6e865cd2df31c8c0647648236c8f02
SHA512ac3845276ef2430b2b81e6b47033866ce66d32fc590eb06ed04fcbfdb52472ff70b30b008b8233014f65242e75e483cb0f484f338767e4203d898bf4b8711d24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d33044a8a9082ea468daf86b66319c8b
SHA15b6028f8c701c8e52243ad096a1c58dfc8f8e1c1
SHA2569a161282f3e3b32cf11a2fcc092a8d047205436bfcfe7aecde674ee35b3a054a
SHA5122db2bb62b7283f532268b55144e3b4c21868d64852eeef8516b055759fa4c4f864ebd1ebf7d6b8e10ccdf4da6a9bf585ab7721b3b2a82a6de184ee3d473a79d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e09a3d5a6c2f7100d4283b71c21055ef
SHA1cab06f46494be073ad3b6516a5c68bae432561ee
SHA256c3ac9143d0fead795b49655f6e76554baf475216744018ab6ead914d501c7849
SHA512fdd7f0a9e2888531038275bf62b8561fdcdec54eeb6dac18652aebb18c7d251dbe486a2c57320f6bd3a03d5563c898cee8e36790a8d650513cfda5321c9d8f2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5099f643e4b2b3bae7c53fb3baca16630
SHA1407190367815d9eb18c0e9f68dd9f7d343fdf2b3
SHA2560bf390488a25f07722e5f276288b9a4dc2ba6b457233037c0a75948c4a839abe
SHA512386976d08785434070a3f8c463255f97c77b70eaac911fd54ff21ab8961ae95873e76ad60651ebc43d78c10f2dab3e8d79a2b4792aa8cffbf76901aff39a74f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596c5fabbadef663e262b9cdc18f2ac2b
SHA1b65c4160735bfcd17d76850c7667222287eb729f
SHA25641b43be56ed18a6183fcfb551aabb096f18ccf3486a610bc67699743813b2d43
SHA512fef8b652a1f667213e683a1c0102356f25aa8b31e249d22bc1a2029f155c4a6558d5cf03044ecf32fd303183f47f354399e947ca68c481337a35656cf0de63a9
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a