Analysis
-
max time kernel
139s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
17-05-2024 00:11
Static task
static1
Behavioral task
behavioral1
Sample
4db4bfb9adb1cf36ac1491ebde0100ad_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
4db4bfb9adb1cf36ac1491ebde0100ad_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4db4bfb9adb1cf36ac1491ebde0100ad_JaffaCakes118.html
-
Size
19KB
-
MD5
4db4bfb9adb1cf36ac1491ebde0100ad
-
SHA1
a88b8625336b35acee719867d8e2931820cb515c
-
SHA256
b583993f7b4875827390fb316d66f53ea6217ba6335af3f064d2a83e1ae7347e
-
SHA512
468e6006094fd5913aea5fb018b815661eb01663f5b36f6c2c218cf3ac6f79ead114cd0411b256f660cab498cb7f67ec78a14d9d77a006163be21eeb39f5b091
-
SSDEEP
384:ziSKhgES4VBD8cyQ3R/MUJsvemLEXucfIk9xheszVc9I0t:zifS4gcV39MULmFOIk9eKqI0t
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422066563" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 908ff1daeea7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ea2ad82da54ce1408930470d1176b6e300000000020000000000106600000001000020000000200d391e2461cdcaacb36600f1c85e48ce8da49b758038042ab6ea1ae73a569a000000000e8000000002000020000000018d63abba166a694f0102c9bd4ea9033dce9a887b549d7fa6c2f27d060980b990000000eeefc2d2dc0169ee3785fceb76eb0d1ee55c312a25c746e005ffb3dba0fbf09fefb6d825f9f7451390899ef7931601267fdea633eb0ce234a8cb7a851d1aa4b6de9de5685c1670b58bb3bb27e305b6ef592af5b57c7a57b4ed0c7e65115d7af23266935d381fd2f9ef4227679a6e937145f96436f05b5c042d4273e2a1d1a792e2d7ad70dbceafe96eb12d16ee82c98d40000000947bc59665dd791158927439a750a0dc194ab36d7d45008d4b05ce9923426b6292d577a1b81d37d8c5358f37fce0376ab046ede50df7017e4ce8d0eb79630333 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ea2ad82da54ce1408930470d1176b6e300000000020000000000106600000001000020000000e99acaff97132a74828d14b729a816d674661fd8d7f93376b2e6794201375d59000000000e80000000020000200000005d6dab06853aa58ccf092340f50e93feb323c4b6e9c3b934bf673585760dd91b20000000ae100fc5af058623db224c8bda66ba607ed1686ba7c3e9f99bd380183d4fe7fc40000000197e0c15e8675a519c046b6d781e5c8eb747dafcb98f3c6b333b29e1846074ef3d93321437958ccad9133b28fe18931e76a0fd7ea819a48bf24aae3a4a5f9cb6 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{06693EC1-13E2-11EF-B0F7-6EC840ECE01E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2972 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2972 iexplore.exe 2972 iexplore.exe 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2972 wrote to memory of 2508 2972 iexplore.exe 28 PID 2972 wrote to memory of 2508 2972 iexplore.exe 28 PID 2972 wrote to memory of 2508 2972 iexplore.exe 28 PID 2972 wrote to memory of 2508 2972 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4db4bfb9adb1cf36ac1491ebde0100ad_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2972 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c326e9780e00bbf64c023d376193c742
SHA1fe2ecfa700601fbfd9699ec04bd10738868d8b0f
SHA256d786b37021cd815356f298b390e6e2ee2e30df8eef9b0dd91a06afcdb6e08b25
SHA512d0c59c159e85dae04a9ccf395d7dd69cf093a58a8d2082f8de48a7e4d00cf04e1d27e03ee2ce68b7a0787d0bccf05cca14671a0d1b019e8d423fa0462126dcc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cbd75ed2e852b486ed22d4613a1941e3
SHA115c7d8fa5466dcf86ee5573e707597009b103a79
SHA2567be493a869516aaeb423dbd6530ec642b4e81f0625d0b18e6a854ebf49ff29de
SHA512135b6c8134808ac48deb6d9d21066cbf0f000d6d470869073b0ca9bddbf045ef725e3af32d57db1bfe303c4b0cc0c2c537aae30ce43f9fd5cc123d834e445c90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0bb5fb98a0d47a45d3adef91a301e55
SHA16ca957c9cfef370c5cb9528db192a0fd06bbc308
SHA2566634b1f4a28e1f98fe782d6af1e61ad1b83cf6a249c23d99c013dc2a25b2c16d
SHA512d34ab6718537a4cc841ba13177afeb289086b8d4853ebe63bb0d23a03c437adfc103be50a58087358fcdad940c98f13bebf31e91f7b04c7a58ba821ae6fc2e72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f006c774cffe797b733b62174486ad40
SHA1aef3da25f77a373b3396422b62cab8780efa212b
SHA256863b17ed83f649d1fad40ce57580cca70df682395506b148fc63b0254f86b3a1
SHA512dbebb3a9aec6b632b0bd98bb1766493bed538da6a6154d5b1aa3e26fbbda288c14d94ce4fb8bb736d95c4aac26666deb2d4479f597361c2a03209eaff08c7c85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50086c75b471cef656b57c59a84ef44c0
SHA18863630e21e7744e43c6ec087ea33e000e69370f
SHA2567ff0b700fb187ee141b50615931a37ec3a72048b26bada72a3e5230475156795
SHA51223472b5b49cbd03fd299c340eceadbc64bd4f0c5724704a24179d20071f39690999f5cbf149ea6706178e4d372224ad58d010f5728912b68336803be3e739bb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7d70bda707e2b2c6039e729c9078972
SHA1a938e2f1f173b80136610f5b347e4e4fd04a9f95
SHA256cb4bd5a4d80df5f6052cb1444ba7137b8126a096cacbf5a73c2254b524fcd4c0
SHA51279827767b47fa528e5621ff3dd69ad8a8068cf9e25bd4072f160876d0d5a8a350e2b399aaf962b2babd77b25361f2ca763614155f9789f417daedd6e199a460b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5211ba20b0e78e72c1c1f265028d4e04d
SHA1ee90558e9365a809d78cb81c6a818fb1704ee597
SHA25613110dde0a8144a8399c017b9ead90276c86d2bc956945c40ad8b956441893e7
SHA5126dec0994f0d43bd19c98b371437bbc4e612ebd3bae061bce14d9c2ff662daf79e1f410e04b86290bc3a64572553a7115f14288e9c6e3efc3ddc44c3bfede22ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515a9efca6a8b3a6f8b15539f8ef4f041
SHA18e1f8fb2325626d3e3a6d71a59c502393d9003dd
SHA2562cb2e1805730ea72675f28385426a8bf543b2befd28f98df201d8e86e644b7b7
SHA5121bd00fa9fd5c845877d2c95b39482b196829971cc1a4dbe756c9124e4faee9ca2b5d773d7f40f79d35acce759275f410439ce128ad048cf1f85709fd0f6780df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59813b6021cb2f4f04bba7ba8051b5c47
SHA19ffcbc58966f25ab15332dd3815a36b1fb4c7ee0
SHA25622195553032d787f50ae7ff6b882df38c19c315eee2de95e0e2275da59777d57
SHA512a8c235bcab993adb124060f1161859dd9f572cd855700f61594a0c04216c80538f5ceaaf2c4d356db5eb44ddb2999f0743f2a587ab24a1c60e37f943a01e2566
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5d4e68a778f2a0f7d0ae62167e36ba3
SHA13946b635c480d2179e686a4d99a42055e79c7546
SHA2566d07160466c9a01d539b76ba934541bab8f76ad860869e7dbe1703c1e8ad39a2
SHA512d08f5dfce2e450d7c2059db57aea908fc60454615e05009298d3c548b3473282a65e0777aaa7c4583a25090554828e0ebd770736e60812626e9a93ffda03e5b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb2ec0ecf1d87915e188dec26c7fdf0b
SHA1b1478a2205fb42c306a4db8c89c786f2b19563c2
SHA25639462854d79a63f98b29eb19358fbd981fa1e7ab218b9553b573ada566fec348
SHA5121d45daadd15e0dd786f12a2ced1818b23f63faa1df6ec3b910c4dba1fce333d2b2a551bfb4b4644cb0de960b4584d8e642fdefbe1b4976410f99e8cb27daf6f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572675cf07bf19f55aaee02e4ccacda41
SHA1e342a54607d0f6b9e1c421b9f6aa690c04f08d3d
SHA256822056596304a2bc918c08193f5180dcb741d7852724fe1ed2eaa5430afbd7b7
SHA51254a0db56213d74c80701f30ab3b9fdacb12e35ca77fe8e3973cee91a7699fe33ec2edef14a554c6a28b5899a0c7d76dfcb08c135009c7f469a519b065833a4f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5337f3d964364b06a473e1e040a3f2725
SHA1cabee07c3535dbf4d2667de091cd2933e2129dca
SHA2565076249e3ebf0346b5a658c1b6f8c221e9fcba886ffebba9c949a35ca25152ff
SHA5127dbb7905533ea5259acdae99a56873557bf107933cc29ce28a2acb746efc171fb4e31d56499dda1604ce94c1b9d0fe53e361adb46550d7ee836ad7f944a90ce0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559580eab113f38fdcef57e92eefde12b
SHA166b2894824fa33fbd68d9a28df7f492d9576584e
SHA2566c985e13b0857a3de788459b538607279059df921c8ee86ed6b34dfffee8ad60
SHA512eb118cafcea76c815eb549b2ffc4472d1a772ae6ce38522e582eaed12fdd6ff56cfa9da69f0fda758f73feaf49b1d9c360df20c64fc34b26d24ec1e1d4641ef4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d49e2262fce60bf8ac2e8aaa4fbfefcc
SHA1117a7dea49eb9e17422480c9ef3ad3d8f8e0a52e
SHA256f7eb9196d7c52a61a176b62248c28d1dc76c7858ebadeff12ab8754b89ef9271
SHA5122af3990700a21ec0c99c1e8e4e586a4ada9435b37c8da181b72126a0b787cd77d4137404ecb9a882c21e2183852ad0fd57b9b332aae714eed4d946585b251f08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56576fc354b045aceb3d025c4453dabae
SHA138d7799795494b0bd9af5b9cd8a97107dda30bdd
SHA2569731e4aecaaea252bfa2a027953a67995a7153918a683495b06428a6c989e7af
SHA5121b4877986d0e586a779a5ecc7c7063c7dbb15792b72452073bb742c202f7dabfb1c827838966a45ebeb216ae7ea20c8fdd7227fdafa78873899505d92b75b046
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f7d99bd171041ec5c4200389054671c
SHA15903ebad6764c16a5dff29498103ead96f1c0bca
SHA256a7e0a9a7f15e3da5029e732d52015aabd7d1cd407aafb27ccf3d271c97fe666f
SHA51206bd6d527c213d125bcd3ad658480120e214077cd4b08315efd4b42fa4e569518316206f7af47cb13dfd9d7a2c3a8b9966d7d5e3a9aa8479303f7672a0de71a4
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a