Analysis
-
max time kernel
142s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 17:28
Static task
static1
Behavioral task
behavioral1
Sample
72b763e889dd7796e3cf77d35850cb2b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
72b763e889dd7796e3cf77d35850cb2b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
72b763e889dd7796e3cf77d35850cb2b_JaffaCakes118.html
-
Size
21KB
-
MD5
72b763e889dd7796e3cf77d35850cb2b
-
SHA1
2dce5db823d66df830dae5a85207f1ddc2bdc9db
-
SHA256
bfbeb78b56c8cca0b4854894a4f086c2f9d67c412786b63b6360a9cd97ba48fc
-
SHA512
75798393e258033dc66d88f967b41dbd475c24375892174c0c4cc1bdaf5450bd2852a32bfa8e15faeb7db2aa475e4766ffda5f9c5d9c9ede13463cc7a0e06c4e
-
SSDEEP
384:zi+KcRAa5r9DIiXbDVBD8cS3RzNmnFW/mEfP4ycbp57zVcraDJZTO4uFh:zi1a5r9DFPgcS30Y/mGP4y+dJZTO48h
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d0014f0deff6a84cbd46d1fe40024c9100000000020000000000106600000001000020000000277e0575bec92d3dd846c7270b1902d0ae9b75566881a0f79406bd1071714064000000000e8000000002000020000000a33d1fafca84139ed105f7076ecced16b1fe41310cc202bf2a939677a93d382f2000000000ea1d7ddb4fc99a2bb070761ac2faef9e03d161aee9fae859ac4b0871e8faef4000000026b12974f58a41769555911f835ddd143b8043e0f93c54a88466595bfe124b543bad777f8d6a2620ad6d905cb3754d20c079f369a9a0d8f12e666c2ec06a6099 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3985CA91-1ABC-11EF-93E2-EEF45767FDFF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a085400ec9aeda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422819987" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1972 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1972 iexplore.exe 1972 iexplore.exe 2444 IEXPLORE.EXE 2444 IEXPLORE.EXE 2444 IEXPLORE.EXE 2444 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1972 wrote to memory of 2444 1972 iexplore.exe 28 PID 1972 wrote to memory of 2444 1972 iexplore.exe 28 PID 1972 wrote to memory of 2444 1972 iexplore.exe 28 PID 1972 wrote to memory of 2444 1972 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\72b763e889dd7796e3cf77d35850cb2b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1972 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2444
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5508ac5085a5c065b93d9212a27863a1a
SHA184db7f8e91bc5bb2df990697f43fea4431b7b7f6
SHA256ea403c5e9792bb47b074ed23228060c34084fc757065bf7e5f27f8959e08eb47
SHA5123e65ac9f704623b9cb1d9f7282989fead6c84b246c7530f8b906b9dc3dd68c123a61c7db52dc39879f2d55de2c8c56a54bb870010157e8a099d2a9950166966b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544ee60875f16d56451d0b2823a50295e
SHA19ad85abb570a44e78801e873439789d3b4a02f16
SHA25643453f66253efef1f788adecaea71fc0521f77c9bce2b8995044f24030051a8a
SHA51217e20868912217f11c77e46a75a4a88623cb7bf975c80bb679bb44958969fed3981f6cd3807f627b511e0e9441911edf73dc46d3a9c1db436e25a0af081796e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e06cce35a3b294e9a623a94b47f7a4f7
SHA16f44733a0d8f32e60cafe1a4e043fca9c924e440
SHA2569aac30a8d28d126ef24d8af8cafd632eb809db395079f732522545939e6b1b3c
SHA51285cb9d2e42d509ee873ae4552e2a8cd888ea5b7e655db8b1ce98692b2411a65b79862f671840bae4e3fd7d59a515a8690eea9ef115fc87f7d7adc061719b8931
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522e524d553eb29d1b8f89891684374d1
SHA1185f41b1e960c3a234bf0e090c641639d3b28638
SHA25631996b1d1f67fe35a8aa45f28db73c5d04312fc8b64df5879a52458ce77d7b92
SHA5127cdbe0653539f5fc9d40d3d4d7618cb1165a70014b1b5375c63fc4e35e16fe98ab22d270206bf5dee3868fa9aac2ebdf86bd1db07ab3f0dc8ce6b9492f0f5a67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d120480fbcaad45cedf2485f82054494
SHA12596eab01b730f096e9884d672143566a1b86934
SHA2565b36a875bce87082366ff614c9f27459c9c48542feccd74f638eb0336d783d49
SHA51253cba612f3d07bf8ae8f639999d29bdd2dc3d6c6c9029545079267a3abd435da6b856b941bf4e752de1d7519e51e3531b1f64e56bd4a39f6fd3262497c2d36ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a22062f631790485127987dedb5fa0a4
SHA18f644b6b5e0df2aff7aa9712c24ae20b8ae84fef
SHA2563f121b3c6137d2d66ce4fe41fe6b86cad3a4580e90e2a20903e3134532c44420
SHA51227cb5d4dab0de0c962ca83b541c0c2eced304016d61daddddee360cafb23418f06e4090e8bfc04004af85151efcb31cf042363190fd2775925d5b58b205ab239
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9c046e6ba8fe6c1aeb51c8f5750147b
SHA1b74f73a1bf1eff03d4ac3f712013a34e776ddfb1
SHA2560df18338e29d39f806b18431831ebb29ac07b2cfd0e1af51059f11b4a56065ce
SHA512ba7f99f4ec9c3282923b66199ded838b90a07d6acbfaddfa24a2506561ddf151cdce354a145e233d5bd62d441f7bc23f6f1441a3abf4028bd707d357eea87356
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d54213273b9ff0253b5045fdf1060c59
SHA10d9b4d67ee1e1eed6d441cc2542f056005a0df04
SHA256edc07656469a4b2033e2f0120f6b23d752114d4306743e98365c95db3e0f2d40
SHA5127929d9af7dba0a1f6a865e9ed5ff65b851d2315f78c074e861e17c2488371d99ec2a301cf0cf3431ce5f005ab606564fd1982e9535b7651028549c51a8ecb8b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5707acf1291585bf411d855671b8f1531
SHA103d1d03691c3dd51c48487853b44a20474c5e27f
SHA256f6cb3a77ddf2c261b0cbcf9ce676bcecb1d495a15ff4bd3c1fc384c4f505019d
SHA5126e826e8faa7d0ec9da367b17bc379c9b317e71bff2c5cc01d100ed0bfadc887821d9ed2e7ff5473b0b9985602300599b3643dbac2c9321f703ff95ac1c82c778
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565996bb999ecf7ade62f814d4d9ea2dc
SHA1e913de5c3aadd329e8d1157e5559cca898e77334
SHA2568cab252614c66c277271ab57802f66e9b2d37681fb9515ae09bdd9e33a542174
SHA512a06cb6b7d97cdc18c50718d662c3c03084d82fa7276b8301567157e8f7c67e6aa6a9c4c9f5b5d9592f642bacb64dcd4c8d4d3e3a17d550a5378849bedc1d6bfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f8e1d9b8617adee071bc60a9cad3f40
SHA19943b158e311a37e1b451071a43037b1b5ce899a
SHA2561032e6581cd04a19f8477afd6d1d3c2539892f14190a83d74c96d0821dcb8bca
SHA512eaec1b09503366542b5f5f21d0e2203c54de33a8a3e91af82c66edc0bc3ba8ffcc86b6f4e1f7880725641f89b4742dee946e343fcf44ec264dd8afe8ee4ac3c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3935587af11223b8eadd266cf0efa0d
SHA1cd03cfd6f8e32a7ae6127ca3242beae4f8ab23b0
SHA256cf01f00626548fc5dba9fd7f2dd4fe7494745b7e57088a86e6aa0ba85751cf1d
SHA5120042e5de407bf63d99afcbef8b759612e2e824f6bfdef46b7c469567dc1f857fa6c318bd35d2bde46fd4b468f923bfe1380595d0917cff3052525c7e4b4e6287
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d895a308d4c10d27297dfaa79f20ea0
SHA13fab0f9aef2fab912871784afed40bc1fe03a7c8
SHA2562298f6c27c4f35eb9bbdbd7b48296842ff361a6b9788960076186d7ce598afdd
SHA5127e13c5343e54befc81a3bcb3989a9f1b18f92723afb8942d0946744df5b4a0a0f41ead71e26466a852ad8c517d0ef8074c879fd37721ac07268ce1b46380dbf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56117a21168f362b11cfda3caf3e1211c
SHA12a1636f26376b69b8eade115508f061469809317
SHA2561230be5faebca5490f5186536da30d3db3d9197090b8a3544563b5bb684b2b04
SHA5122fbdb5fa053971859aa679be4c9a9d8bdaee098ebd39b48f5093b110796ad1070a3bcb3604a52cacb1524b28ac2217e65ac5d46b268ba3c65c3105f9e147b6d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec8f6ba23bcd62e9326831b8bcc4c86f
SHA1e83cebbebcab6959c7586b852056fc53225fcdfe
SHA256e57a14374961c5e2db978075a2258d20b6f7c1981a711de2967ea07dc7812c8d
SHA5122fcdbbe912b3b7c3547c307b3c7e20e950636766ad0ed9ad82fb41a1b39df64a7f4564a4ada35c94267d1061167ae9d63f44ef91608f7763ca5634379cd6b4d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d967e9ae7384ce454334ed65c0f3422
SHA13f9617b0b1fa93a59ec46ee2d93698e1e8d42a3b
SHA2561fec2156c616528d25601b73591c7c0ee73b02aad1b883fa592f0f80ca903402
SHA512bfb841865caee8f599d9d80664d11d591ccf9eeb5d4501b52ee81f15214cc8ce77409088153d6892d6818a0825c1cc61aab95d5e09383b6b56a16b578ea67951
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5827dd90ba77638e8229a100466194a93
SHA10dd6612d28024e32042821a0116779cae85a1c40
SHA256955960472d17c4f4d1001607582af50312a1468045a274434d7841204e092c79
SHA512619f7c6ba38af9435d8740ab1822925f1324ebfc191c05ca0a908c14edb909e33cc446694a48e6d0f319565f9bf503fb095ff7d74a71bae5520dd71fc3df6b69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504f20e53e84abded7f86b0f5ea772d5e
SHA1f467329d003762d24a8582424aca4bdba228f126
SHA2568874eec9b3b2b309d53b6deacfbad02978902daf96f494a11452f288c0914d43
SHA5129b33111910862c1b17a3cc907d86f59bff03c0006a6ee899632c8aedae1854084963f97fc3567c0ab3dfda77bd7da6cbe90b662d82da2f9b500cb28c5df72338
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5551a8502b302f27aae573e3c655f65ea
SHA1816dc97beacf9e3e6045026e0408eac4207ea816
SHA256a30f321965567dc28ce1f08c0f7704821fdaa9e6b2e3d0c08070f063031c5d95
SHA51215674f60cfb67dac4a66d2dd0e726e1ea6fe849148501a6ffe4211e9c6b8d81046e917b0314ab77124578baeb802046fffd4e6df7ff6cab819a1cceb6be5219f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a