Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 23:15
Static task
static1
Behavioral task
behavioral1
Sample
73920ff21c8b67e2f0dd8fc4f70a2e3c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
73920ff21c8b67e2f0dd8fc4f70a2e3c_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
73920ff21c8b67e2f0dd8fc4f70a2e3c_JaffaCakes118.html
-
Size
19KB
-
MD5
73920ff21c8b67e2f0dd8fc4f70a2e3c
-
SHA1
823221ae35fa19cb01beca80a71e1a8ecbb3aca0
-
SHA256
a7a3554f926c8da6ebaaa7d2bbb926fcc16d02aa63ebcdf766f3c1488608399e
-
SHA512
bfba2f0940d22c7f31afc25b5a9846b7147c7afda42d069b47f7a4c80feb3d07747067f6c688ad2f832380799d1302e7acba6d50251c7b385939a1f461e1b5f4
-
SSDEEP
384:SIGJBgkbZhleGvDm/e9nq3KWNUKebIlCdXiJxi3Hw/p2AteBCddORec5Ke/fZ0+4:SPJBgOSeqeYCW2zWIeafGQE+I
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7005ea84f9aeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422840770" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9D2D0C91-1AEC-11EF-B937-729E5AF85804} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001fa8b7c26aac424391c4da8417af806300000000020000000000106600000001000020000000fe5db12d7a75fef297a13408436239fa2017ff7b49f82512a12a5023a71685cf000000000e80000000020000200000002421ab1ab76e11ab5e9cafb3447db3e7a0ace787cfd0997fb655880d915c6ec620000000cff2669f8b9eed621e6bb2ef1f8409ec44d6bbca0b5e7d3f2c45f37aefefac6c40000000b5b8d13776f2572cfdaa67647fd889297565b4c42dc2cb622edeb9d65c18c6c84279ad5d7a6194d5be96725fadd363cfe5f62eb837f788fe79563101c32c6db6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1720 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1720 iexplore.exe 1720 iexplore.exe 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2780 1720 iexplore.exe 28 PID 1720 wrote to memory of 2780 1720 iexplore.exe 28 PID 1720 wrote to memory of 2780 1720 iexplore.exe 28 PID 1720 wrote to memory of 2780 1720 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\73920ff21c8b67e2f0dd8fc4f70a2e3c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1720 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ccd1aae4e9cc55c18eb27f1f25040c3e
SHA133d72f77f16aee8d352f83cf8af0e9ba5fec22ab
SHA256287b254858ed8937b9956e79657061dc547fa1a8af5ffe1113586ff0e44445d4
SHA5121b761e66c37dd33fb5fdd2d5e59345b2799923cfbe63e33e230a8c62ad9a307d108481689c66b1b4191f4c9b17b15539d3cd6a84df06f6fdbf6a1fd4e7be1c70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a863c36f303c201f6cdb7b2ad69d857
SHA148542cd4c89bfb5159f8f20bcff9c9e9040b5de2
SHA2560cdd6b8a995d1f6f403d7cc27cd8afcbfd0bc4117202410aa2b521dab6354ce2
SHA5129ccf1c4f133260bd88ed303d5508b7d224f01afd5c61a8de8fa9a0e72af8d69e884551083a5911491fa6018a2f9b97bed552ea6c3a8e7e3c16f7c051286413ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507ad25751f0f2ab7513b4721ed121caf
SHA19b11ea1eefd8daf579216aece61bcb50f3845e00
SHA256705d5c55ffe95d2561416b9b48798d6f1e47be8060b0fbc4d9a46b2af9bba763
SHA5126f6545450312eceb758c358b9a2368dd53855912734048e059646f17ce95266e3eeca1524cfb8bc0d1dc777b9e9025230980acf2a00d6162d50717d407652351
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ba1531d28c52d0e92bab92910c822ca
SHA19c77696716cb560c8f76fee0e88a138efafb9574
SHA256c06574cb730014fc7139bff240e1bddbfeb2321c0b18f647a05b417b96361f70
SHA51217478bc3aef77b6bde009f32c4d91e8da3675b7c0adfb2e60c45b071604e005c9038574f56b394218cbb4835c3f39f1fca2f03398edbbd54191d11ddff1d88e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599fd870a9958632fc399fd5bb32c6bd8
SHA1fcabc40b5fa4efaf95bc5b1561691893ddf5e75f
SHA256cb1c81b3ec1e74f65b15044209010998e0b3e7d221f3a6bf1f327a1109baf2ef
SHA512cd52f5c8216201598f9034c2f96c13a6f50ea03f9ba65028f1424f2164c955553cb8510e6cec2b018c5966ec02ca7b395aee734a60e8a496df66fb8caa2ac387
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556187b16f8fa16dbd33379ab1664d24e
SHA163171be5e7c5c439ab5d2b25761ad276f8d0b865
SHA25633f8aa094d1f8a3850d83fa84b6975ce8bb536ebcb205a0f04f2727223afdef9
SHA5120ab1a0faf437022225cf01b1d6af0f8d90beff24bd9a41d80b37bc348ea54b1dfb6cfe4b6a619170e7486a2867d5d6dacc23f0032b13ff15090d63193b982397
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a99096b11738981e993e88e362bcffb6
SHA1c971915deaf76710e1b95c003df8e31c91628769
SHA2565175da6a9692c98e76163bdc5366705a83a873a43a854761124aab0e9c0eb72d
SHA512e5cf9784629a0d93b1a3b965b9a43ccb693bbf67436263181534c61e6443a74286a36144ac1a68f534531952139bcdd2ad665bac8dda4a206932a715e993bf0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53fc9b0c6e5344f51c5b33833d783493f
SHA1721571721b76f896acdb58b83ee6cf5fb4d0e225
SHA256694ab0cb3226e8c74b56881686c4c1405e5b11646f85d803d66014c6dd94a757
SHA512116e5d0ca590ec7798531c8181ee95dfd8b067d8ce848593eda240483e2b82a41cd6ee03e366976e91edff799da280d482840dc42c968abf1022359c27691d17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50fe0487757016c961ded27478046c993
SHA1ad8fdb9ef672eebe3f7c5975f98dfa7e292dd174
SHA2564ea58f931ea1c1652d32d92d9d26842c3c21c34e351c67477f2bf1afc236368f
SHA51200eb404785c4e2334401c9e3e1547ea0a4c2ed83f8115265e4596dde72a4badd7b56946a89939844c6c51207fedd4306ed21208eaed060e41c7bcbb5b49d7abc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a68a28dbaaffa8ebf132d5885392c7e0
SHA1b69a086244201a4019712b2221275740557d43ec
SHA256edcdf68e61930e71f47fcd83b7aebedc22a4e0e1997f9f6d253bb38e8e2a6d20
SHA51257387c2ce71137b876037a635a0183e68cacda88975ab5e76bfb49d30f7330578012ab0ab129ae1ac118f03e4192d94eee8cd5edd5d494ba391b21fd5d80ac7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2a5303caa4f9448abee7801a41e50ce
SHA1e8a17004f205bde6f738d213adc5ae04875d2e08
SHA2562da0b85ffbdd6e57a6ceccd9ef602ac573ffc0c027fedca16158c6dc6b1bd042
SHA51201467f3ca1c54ae5c9cbb1315ebdf1b389d1525e6b7558f4c2b9d65d1b1f352505bafab1d9fb9d84a7a880e8ae34a3b46baa414c891115dd25f6195100313bef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5ac4d292d481e3058fb52757989d7eb
SHA10c41a97a043594420b246cb8f7e832810327a15c
SHA256fa7e214a5a2f388273ada621301d5587be1f733fd6545e13a9e7fa6154ed5284
SHA5121fee087d3b4dcbeebc6b4f184b2a0fa853da5fe9ba670aec393107c3b49cada938daf4c1d22a8b36e98603bbe670d735701f82288c08728ff0737b7a4b8f6d28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d58f45a3570ea6204ad5c7e510e821d5
SHA1560b18f0c338d99721cc8f4c0dddad845c749658
SHA25688b8c13e9494ef598643088346cab085023b70ce6bec5edcdb44ea5429712f4d
SHA512753ae0ff07d8657e55f386784c041cd05a3948b65933eb7d24c857c476b65a984213275631810c194e9781ad714644245676391d9a1c28d7b06521a60c66f463
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b1df63875935d2b6591a89b0d5012ae
SHA1d6b8fd2a67a7cfc8d0d050a9cc99f789130ffe35
SHA256f87f25cb594e53710e351e64a8692dd4e1141a1fb29f035a2611606ce8a89679
SHA512a883cbfc53bef321dae4b2d288d3f6714b4c8015670554ff60d5dc13f3322e1b7392479bcf2fe7dff7a2b9b6a2a84e1eca0cf1caba7b4608b033d626807e83e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a95f31b996fb5546d3701d2630a0cc7
SHA16630d84a7f3841e65d12bde1cd67ef727f7d1171
SHA256c883845f9e61b4984ded5c078fc42f9c7ce7727d5b315ef4c7b201012dd82afb
SHA51253b4639eff009a4be848ccf75726984095567b8a14119fc830c4a649ce88ae78b2f9d5a848a99a2a0e9740cc0e009b7defa1b29cb7e467e31fda9e40f02226d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50167c29c563779acd191963e0d26dea0
SHA1d3623b38f650b54a97bf2730ca9549fca2fa8253
SHA256ae50583c45594b0dc179ecc9db53076115c454c4e5844b2546ed7c127ceeb773
SHA512c8f14ad24d2638fb8552316777bee79eff4d6e82d7c3916211ab0a686493a33970f6a70eb3b539be7046a9221af0daa2d3e970056001f5d863134943dd1333df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca1e070bfaafa898aac9cfef4bd066d7
SHA1b3d7ecf427dfed1168cf96d796ae3d05541c228d
SHA2569db647a930897acbbd82af8e3337f924b1234bf8f87aa008b80c9edb548262b6
SHA51208bff3dcab73a59ed20ece7ca329fd6db7c0d3c9dfbb159a86d4eb0fdad09ea1f548602b8bb7a4d85321b59715423ad20d5e39fe04c1a5c5a0d597fc39e3b3e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c24a5c4cc5ac3f9ba147b741c16af69
SHA10c31ab36cfb2e018dcf6d32bdb64e675b11d805c
SHA2568bad937eb31dce5823104cc5e3fcece435ca7f86d423bd4c03fe15135441413c
SHA5128268667728f74bec6931937e892ddd405b58cf4ed63563ae26cb96e983b7e78ee783518dc2ab9949a61cbdb523a4694cf6da7d94eb2e2f423bf1ce3a73811399
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a