Analysis
-
max time kernel
133s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 09:42
Static task
static1
Behavioral task
behavioral1
Sample
719214fc74582017d42b89412e2b1c8a_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
719214fc74582017d42b89412e2b1c8a_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
719214fc74582017d42b89412e2b1c8a_JaffaCakes118.html
-
Size
4KB
-
MD5
719214fc74582017d42b89412e2b1c8a
-
SHA1
351155208c24c87d20390575f5d5fe09d3e3a943
-
SHA256
c9bfb59aece442bf7e76533801bb90e46d477cb2f7b3fd4dfd778a72238c71cd
-
SHA512
f32e5ac810ef399dece43bfd4aa0171d16d88d989e59a3d3e9485b2bb7a2a32490ea53800fc1b62a10e4930d998ad766e31cdbea2cd8897773f43d177db87a55
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oAX3Qd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDo
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0a898e087aeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0BDA6381-1A7B-11EF-B781-461900256DFE} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000eac7c64f907cdc46300fc99fec27b083e5d3d638e340fa7e7c2c5f9767ea2ea2000000000e8000000002000020000000755ec232237b4659540d7c36bdb09ecbe5328ef98c718a4b2ee6008e0089099b200000002836709f0e987e101b7eb5ef3728aa030b19b48b4f74e827dd91b90fe1bb53a440000000a94339eeb0e43c1a0eb9be51350eff1b6470db43f73b09284da7ed241dd07c75255fd49143abf60dc9fc4f2c1dc9041bdc71f8807d3beca35e79e7efeaf89276 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422791993" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3012 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3012 iexplore.exe 3012 iexplore.exe 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2080 3012 iexplore.exe 28 PID 3012 wrote to memory of 2080 3012 iexplore.exe 28 PID 3012 wrote to memory of 2080 3012 iexplore.exe 28 PID 3012 wrote to memory of 2080 3012 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\719214fc74582017d42b89412e2b1c8a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3012 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d276ac2ce32670782f6952daa1f404c
SHA1c9879b3c3173104c0ed49717dd5841e49183fd76
SHA256f0efea9507e9d45c379dfbc64acc74ac9fdb3055f4f387fe6637a2190a993b3e
SHA5125a0853a6f566419ee1f61509f2882f7746adbf87bcbe94454ea798fe0ece03323a2c82e0ddd4ab5ab557ab76cbf08a6785e4f8b3f8a5cf862b5eb87a32a526a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9b8abb13c59c3d5f3150e0ed9e952ed
SHA11589116fbbe7c953440a0ea2bfac595fefd89bd2
SHA256c059adf49bb42338998286973707763c6db28947f462174b1ed569f7bda13946
SHA512966d735a1bb734fbfa8d8b3f234a6c4372b17873e23362c1e2064b3988f75e68769049a1390fc4417b34cfb64b4258390fbd146423bc7e221c78487c95eb4b8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525c934930d84ebb6aad19f592291daae
SHA1676c71393013187013bf8d06217ddbd1c6691937
SHA2567f70b28d3f08575b2530a0614d276b73884ee1fbd5ebe3cca4a88833b03d5477
SHA512838ae066f16135138764ad7d2aea04967d2757c875341f534de61d4246bf91c42af152d6d4b936614dbc37d499856a8256405cb6128ab6951b66ec56ef176a0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8809c8b9e78d0ba3ef8649e5278934e
SHA102e00ae729e1a246fb2e9f2f7568d4ed21a805e2
SHA2563a05394ae64009623f4c7939e0b6364a4bac82de873f2afae6dea0468aed4872
SHA5120091bea07faff1ec700446cc7c5f06e72236dd3b0aca80fcac96c15acee9d89b9f24e7ba01e27645e5c470ad9f522670aa5cd9c529bf85b51675879aa31a732e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511d1027ec4c8ff98019b4278544752d8
SHA18e953dc2dfdb66b232337b7beaa0bebf8f747238
SHA2569917e566de54c09a6615ec1d406cc00c7bdf6570916299cd2674855c00e5f6f8
SHA5126d41a820883b10c222b8b499d7f1cc1dddbb1d787da04d5a4feb4a19b4059760a456f43a2c5fa1811c2980d5e0c032dff8cfab87494bfad238196d7ce3e85dfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3a4ec832f51785ad63e737a4641b475
SHA1c2fcdf89dbb4ccf0e4f339cc8388c8dce635868c
SHA256979948067adf821089c94451a3f5bf1c10853588751dc616748fdad5125eb37d
SHA5127c5b5cc5995175789a0fc93194da9ae6c866928f92343271f546e613b01571d444e1779f82a028efae4429989c00631436aadc32c540ac26d232b205d66315ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5352431fb10366800c2af03a43eb1e649
SHA1f7f06d3c7fb35be4b485222107974c7d5b94e868
SHA25644fc49a9a9d3f79a1333a3023a6ed0d2a449912fde3edbac6dcc6c585cfd33ff
SHA512c105727acf5f020dbeb493ce13cbb2b70ea07a7a9a67e6edd41690900cd3721f099f90c7d05128ccdd2c6d1cf7b940abd3e7537edf75d34526c084b422b1d792
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563ed3e0b8bda33caf2f4fc96680c4bc4
SHA179f1bf7a3da23f2022f70b64db1a32fb6e4877b0
SHA25645a5847a7d24d4e2b8043bd55543c7a9feeb2b9f2325f6e279aebc3afa788076
SHA5127e08fb2c4313072afe9547941cf1307c0499a2215760d401a4698899cc2a8cb94c70083bf6acb2534d4743ddd2ef42c5479c20e82d4c8aeb756f7fb8773f126e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de38df7c8e487040f29e399e3c810815
SHA1c90e546930246a9586078305171a0515d2d444c1
SHA256a56940bd1e5739d42eafd9449ca42328ece82ee55d2e8c99f33e55c17174f6df
SHA512cbcb21ce4f56160363d057f31e1d4558041e0e45cb92db1abf5609037a3d7c0b5ad6660dbac0c0157baff3bd91198a0f87c87455693a3d7cfcad6f3a9ea3bc38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556ed6b2bc1d05384b1b697e924350e6b
SHA16fff1a70570a3b83ac093244908be667b092fc2b
SHA256bfc8e6e7e840d502d92530888c09aa3e49afebc5408d033afdc621143e02fe52
SHA5126a57cfa8867c8068078b01a7b9c00cc011bb34d1affc14aef80025a00d3d9723e318565d66b33d88ea8b59b2112d2053165e87eec46bc45652a78002b61b956c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0b9bbb6fe6aa4c5c5d9919ef6886d77
SHA1981560c07a872318e68bc819fb5618d06430b44b
SHA256a46c532e7f282a924a01a705f1c4aecdea6b4d729454a6334f1b38bd3d200389
SHA5129278f1f0747133050b27fbe0798bcabfa94aa5ce83ca6658de1b84d05403353596db4947a1e2c014215e25748db0ce29ce5827b17ef2d5cd8839c1ca0fe62567
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5def6f0159ebee1246ec9d01745af6e0a
SHA1f0ca9426ed40819df2646e92c610a98d9073c29e
SHA256c63cf2ae55511f0bba991e3f577e1a4d09d8d83e0f02410154832acee4718bfe
SHA5128d65a65b004ddb18b5ab9ae5ea8db5734e959c9f23f18af5ebfcd5375703f1ca9ebb8cdd620bd8c4a2572d47f58f22ec2fd6c1f929c0194a77dda6b33925c2e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591d680f611e1fb020c775f10387be350
SHA107c7c96d11f811366efffdbca4c6424ddcf79b88
SHA256e41f7e52b247d703cfc61a148614eca70b56e3be91574dd0e33f416d50eab88d
SHA5121a191c6d54c78856207d40070a58f3f8238204d97d1a325b22792e3e5fddf289c9be16029d9e4ced3538e0e26aaadc37acb16b284c38c5d9d77943f6e52f5fdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55904b3f72723a954518c1cf306b358bb
SHA1a65d3752b034dfa51958f2339fd6cf6b79d86998
SHA256defd305af73700e3c0f70b8e409a24073fbd5fdd7bdae551b2f8e73ff7c25bcf
SHA512e79a9bc0224f72a6daceda234ae766473b0e19f10660230bd03b92f3b162277223ae6e38190b3a322989a9706dcf1ce13ccc7a06e9a98a824c3f8e78f54659cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56aba9bc44d8711d1edb8c8f09fe077fb
SHA103a55f1a477ffad239cf6805ecb971c82a6258b5
SHA256a6a28714f5a1416c7f7e72807b7a80e47bc9a5334085db6a1393867ff0fc9e94
SHA512616fecf2995c4ee402f8b7790aee427559bb81d8fd46af765406b15cb6c10341d1ab2cfb1de89476aba772ff5978a6c6ee7803edba44883adf36891de7b671fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba99c3cdecbea5db5a8bed038bc6a5ff
SHA1d660059e7bffdf7a0cf760df1821734a559b8d06
SHA2562cb077356a7efabdc22fa97500621348425ef34b5cf62f9fc021dd1a5a625526
SHA512941c5aae6854488ed8809b65a0b7fae99f33cefe3f2e53903e4ae43d2ec943b4c11552e6f934d7ffb7659ffb352f930b6ff4627477dd6b37faa74ae22b07d5e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4bc0c9bf28998ac8e28147039e6b77b
SHA120aea243116702e073ca055708e48134389a28fe
SHA2567f48f7d2ec0bd206e935db6ffea89e94d98db23de5c494f9ddd03c7db07f0947
SHA51228c8978325636c3d4359849d7c515e5fcc35bfd8f6ba56c57b8f57b785e994c403bae60b378d99b672142f9e20a204899bbe6ad429765bc543a006d025b62c81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa596724744e179d3e8c60c8cfdddac0
SHA1713d1ca10972e06a5e9c688ff7af134961a68eb0
SHA256b6f2ead1d7b6c6bae663e29ea4a6398f997a1d3ce3d301a9b7d70d437e6eb9ce
SHA512948375430501fdaa7d7269be097644bd2250eccf07bbe76b973d01027c76fe8446fa7ad9762b1a28309a946886b2bcd085bb723ac47a446e76af7121e205c293
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599d040dd6bce56c6d62798d9e485ca39
SHA134581c08258d6849337f4faa87490efcd1024cb1
SHA256ddf9f79f80ae61e3b717c08baa513d261e3ab2b784dcdb84e633b3b4140d146e
SHA5126ffb4ab40fb9e38daa48c8e42a884841163db5aa83dfd3ed35bf73c2625fb40091aad371da2c6087f7340fd3b200725aa628c06332aeb29541d8772f213a616b
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a