Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 23:40
Static task
static1
Behavioral task
behavioral1
Sample
73a3fd20bed78e8fb847cd114ab1d428_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
73a3fd20bed78e8fb847cd114ab1d428_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
73a3fd20bed78e8fb847cd114ab1d428_JaffaCakes118.html
-
Size
4KB
-
MD5
73a3fd20bed78e8fb847cd114ab1d428
-
SHA1
c916872d169e9ea2d71de2c8ff1203bedda201bb
-
SHA256
e413dd88511105d34cd829871b9a1626286fa3e0857b95304b6df94a00abe6c8
-
SHA512
62ad0289f853cc39d1b9de9101a816952313e7d074d1e64ff4b76e6833b82ebaaa8bfe93a992bc0870f1d273647e40ea76594a238a7c09fda14b51b3bcd1e889
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oN7gd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDF
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422842284" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0cd13f8fcaeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{238F8C11-1AF0-11EF-917A-EA263619F6CB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000351c8d647eff043adf8ff7ef0a07dd300000000020000000000106600000001000020000000b9745a1c5fea9f16d801896693d092c40daaffcad7301b9f607f3ddbece2b847000000000e80000000020000200000003f6146a4f6fb9c902ca6105bac3cb96878d1bf4b473f68e98cc8ecd16fca260f2000000001cba1df79da07b2b1e2ca59b0bb7df0792dce2ca74b5574ec540b295c582d6740000000b334222f887d98f8a31c6957cc1adb209c2daffe264b36e3e9c1795c1e56907c6dca58516d557e67857970dd19b1878984e0cd6dbcdbe2bf5e01ee0e01f86187 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2528 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2528 iexplore.exe 2528 iexplore.exe 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2528 wrote to memory of 2772 2528 iexplore.exe 28 PID 2528 wrote to memory of 2772 2528 iexplore.exe 28 PID 2528 wrote to memory of 2772 2528 iexplore.exe 28 PID 2528 wrote to memory of 2772 2528 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\73a3fd20bed78e8fb847cd114ab1d428_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2528 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d3077609fe457dd34f972226c967030
SHA1519c5874d6b7e5eb0fb7c2570054c895689d6715
SHA2563ddd1d937e2891e3510b9640dff6fbef6e29ef450f4726e752082063942347a4
SHA51240b9b34c4b714bcbf2cabd6fd1bcd31b1597d4cf1393bace21301f1b87edcb07f733feeb2025e608cb619ed4bb03f92ac1059ffa44d8029ff4532edd6b0cc2a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af6df58ce7fcbbedd845b288e2db6f81
SHA1f173a5887d8aea7757b0d8be8b5fab13013a3291
SHA256f0916c3997a6da4ba0a6c250d31dee9e49bff9de4c3128b4b006bea85c3be292
SHA51240eb8035a4ee0b8b5ca49a8a7b02d38caf0f442f037e8ec38e1e6e9843218d50826b98c960601dfe6ca05340945434082b789410090d5f80c7e327044cb73b49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b5061019184bf91c643d78ef7360984
SHA1c0a4ce52b44c3f83762da1a10b73dfc9a7badde1
SHA2568f80daee4b46cfd4b735ee2264ee9a9ed6523937545e79a899bc8b19b710682e
SHA512b726e429deebbe85e0e4304d66a308e74652d90aa90401623cc51b9e4b04b90a051c42febe1c965ac60cb53c7b780f8bb7a50c70f13e79b9b2f652348c568929
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516ff8c99bf3a5b1f8626dd3a38423e09
SHA182911ac2e6bbfb958500534d6e66220e479edb9f
SHA256bb6f0ff20ff64753e4f2b3cab0db319a28209d3309cd357677f97941a6d373ef
SHA51228a7f1c17d93337058d05b23b526fbeb37fd23781b548f1fadef999d5b31fc93ce5848fff1d1a0de760bfac790637a07df9eb0a75dce18c284b3b7320b555eb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b556af69d613a91fb98de4e8bad9665
SHA16010223fc1c999b7303c01b13a1fabd753920e7f
SHA256246251eb108bc1a3fa1faa986bae950a6d35f11751bdfa5fccbdfffabbee68e9
SHA5123ff68912a1b548299f2224d34d64606a18cb2fa181483e72e7b81180c0dc6ed44efcf4b18ba07488cc47a300b26d9f02060f0a91d504d48aa2a6e98a08d4e9f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56806b647230a6fabf9e143e6a9ae9aa7
SHA14a2f822c43eca18e2f96f4f426f77b8b4299ef62
SHA2563ab244687724f619fba548b9efa24c2dd2a653eb7859a9b629bdfdf5ac053813
SHA512b9e718e4fa346c17b18f8a95b475482d24976c2b4b653bf15fe153c6f42845a47e660ee412352909a67458f35c4bf316d63f14cffa21dcee212e82cfa23dc8ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5316a151af23e6863afb8706281e7468a
SHA126a8fe950a778d615bea73c5ef6c14d48ec96a76
SHA25650f4e3d36371dd28cadfae5c525cbf6e50377563147eb530bd52f5e44b2e8080
SHA51247c84097262b86b830df6f7bb9fe885792197e8f949c2a0d04fc1e4e481a097a19af07d3efe8a25634a7e0162f6589e53b76fbc7b7f1511d973a90629b32dfd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aea62898908d0a3c1bb5cb115112f470
SHA1cb71d044456d1b2dad117d32b50d6de6530a7cc4
SHA2562de9a99d334f07cb66ba8a91b47f6f5c7dc210c8778ae04cd852caade7aadb84
SHA512b15618f7edf7b2b136038654ec5b87fdf0bb03f127342989a6a259ecd061af64206ab68871ea3be759662d8967a7a3db2818ad9b2ccb82d2dcc8acb1f91d447a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589b9155c4601152fa8593410235ea057
SHA122cf8a4d0f883c29a6c0604b42c1e1ed93d74cc0
SHA2560387bc051da9003453c9d750dbcb9d3b48f78d3826f04fd2c2f9bbafd69849d6
SHA51254540240db0a508d6e96a3a5033a96ed5a1b65ad92bd08a60de447ad3a6504ce4982e46d148a081cdaf58a7d0de5f499b30a0502278fba12e7e9c21a68268334
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548f248642575bc846e555d4430d891dc
SHA141f338d013753a043737a4fef104146f09b69630
SHA256548e2d4dbc90215b4584dcc1c1c10a29aa1b9149acf31dd69bef58238d9887d9
SHA5121e874aba02beebf4c7e4d47e11d3d2232d5450ec9262385aa32bfdf05dd95d1167af731ae662b5970299a258c0277274719a443f5bf52a8c2eec2f5cd5364bc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518d4ec1ec20eae5bd0d10376d50789b4
SHA15de320e0a144180c0978818cf5e2d0d74234b27e
SHA25696a140fe98d8a3d4c9ec92d66cc1945a9866806a2bece73ceef982af6fd32c13
SHA5122814aa277e19fc310b2d07037d48dce8d320fe08d60ae29506a6488ed69483533d23f406b42d9c9158df48df66becff7d2673a8b862575d429ae1b23b4955f90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558237965710ad82ecde8c7e4b14b9be0
SHA1104a19db352ff4262169731663af459f3beacdb6
SHA25646cd22395b385b02c1cccda57ae1df4d0ef742ead6da841b2bf5b611ab8c088b
SHA5121519ec7b60e74f03ed29d46ea79dda3ea7a83f348717fe23b18e84f6e2da2adcbb49b3922b62580156e0d659a6b168481b8892f151aa050337646041752c97a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5297a20798421fb857b75515ac557fedf
SHA18db644adc8233ccdb582dd4608cc15f2cc0e1a01
SHA256c7219af3a1a7ef94e44d9f34180f231c4603e867b5d5308daa7e31ac5651344e
SHA5129979d9b5a5cc914e19a4c6c2940302eecdb0118582d416809772fd1eaeea540efd154d757a61eb858ed5bd42449c6b169a862bdf0603fe60ac7b6c1282cbc308
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591646bd09f72774e017a71ec7a5817fa
SHA1dba909ce7a2ecba23587de86fae65cd2d32fec26
SHA2561f09d7cd7bcf2750d4c6d73909829a54fec60824cc230ab25666eb9785dc828e
SHA5128a529855a2dd4dd1953b6a93432c1e36a0f515d4346b0aede998de6019b388fcff7a6fba24a04862858d5345c7de22b8ae7d490b52e67653e79407f162016aac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0f882b9f6f5604202608e718603c442
SHA1bc92b159b09de08cf3c23cfa69fd6a0278a5d03a
SHA256895e9d0c5f54095cab9801a7c3ac0e08ddbffa25b6ef856e4512f02101c70000
SHA512866024c0c9e76600950e7f96d14c59f119f282e53a151e84de5053cabf0d4d3ad69caf753762aad627e4f0e134fcc96ae90b7db05bdc70a664eae380a328382b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5597205b33798088bbd615fa29724f9c9
SHA19580a599092301a342e48c3d535c3582b5a7cec5
SHA256ff309c89a558a1ba6a6a0ab054c655e90a6c77f8afe2f83a969e3371d526773b
SHA512c1d24dd9b87f92e2bbef81c6c43ee1330749a09a01641e2bd1a329ed043f8723bd246b675c5e931f11fa3d0186dd16fd672f31504c0414a5df1127969cb69987
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503e742628b8ef8e7a9fda8107da23ce1
SHA133d9e41ebcd5d46bff81eb11fa117a689da50181
SHA256d61af22f136e11c34a8f704914e256211c3c0292f245cf7aebf8ca43423ccac7
SHA512a653ee4ad1d7fda719a2c3ca4e9392bb798135306b1a8321ec426d103e6077883b79dddeb4c8efe1f0bc6e684bd5ac1717edfa4e383fadca9bff0a08237a7f9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da29356aaa0f5972b47abbb7706b675e
SHA17ba54e610a4d1d8916e4511aad0b1d506b300d95
SHA25665818692fddc4c25788860428fc5aee6210fe9863fe5d1be9f36a67c1610cb22
SHA5124665736ee43ae20d16d18e502a0c352c4fba29ad44215233012935c07c8c9b751b27e280fd6f983a9dcd2e340d1239dd1d409fa57a8c98cf5e813e60d81ba312
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51fe20a3641f977978cdafac2846f5176
SHA192765055ee99bdc4179a1b722dbc6893a362c6a8
SHA256578e6e881d36dad5539ba4dd306c9edf63b45576df9d5c5aa8803eeddec95464
SHA512aafe65dac31b23cb6d9375bedfc6538e3ec8b515707e4898b1e438a633dd7c7e62d263a3112159d9f43a816588a957bf6118ed6c40e1635b0513fbba0e931ecb
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a