Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 09:58
Static task
static1
Behavioral task
behavioral1
Sample
751cb3bec0ea8643c4f1047156a1bf6c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
751cb3bec0ea8643c4f1047156a1bf6c_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
751cb3bec0ea8643c4f1047156a1bf6c_JaffaCakes118.html
-
Size
333KB
-
MD5
751cb3bec0ea8643c4f1047156a1bf6c
-
SHA1
ed6127c6bf2fc6d003f31b0b28415a66cdbc353d
-
SHA256
ba5999ee2f1cd42100125f33486cbedc8fa5680f79cec5556cdf2161fbcc666a
-
SHA512
b95bd38f6b185fe196e843ca380ed422f8c14abb5ceb3dc7c46a950d09294d0290fc63b10410e02c208d3702c66a2d6ad088e4f956c86a26e05389a5767fb1cd
-
SSDEEP
6144:TsMYod+X3oI+YLqajsMYod+X3oI+YLsMYod+X3oI+YQ:n5d+X3025d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002998d4b9863e93499de257a2799e3d9b00000000020000000000106600000001000020000000d2aa006bb31fbbd6c6ae25c890ceb60a72c21669fc23a8c278da2ddc95f391b3000000000e8000000002000020000000936efdef5205bc5634bee09bfa85f82b2a8d0a1b2b15824e97a58ea0cad03c9920000000e85d9fd7dc7043962105bd429e006b10209eff2d6871dcccb9dd8581ccd6b70040000000fb49463de5b59de0fcb62ba3012221a0517c0e3530fde7e402d738a1926500ba44d44a2a5e0705d6aba43d3b10ca16e0467abdfa39d23d91f4c2d083be6b3254 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422879388" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a053997553afda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{87DCE4A1-1B46-11EF-AB41-FA5112F1BCBF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2240 iexplore.exe 2240 iexplore.exe 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2472 2240 iexplore.exe 28 PID 2240 wrote to memory of 2472 2240 iexplore.exe 28 PID 2240 wrote to memory of 2472 2240 iexplore.exe 28 PID 2240 wrote to memory of 2472 2240 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\751cb3bec0ea8643c4f1047156a1bf6c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2472
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55498d967cb2e29b053e928b87ed76fea
SHA10b095cff1ba591ed1782ca5c09cf0e98b67f78bf
SHA256f3a16b3606593c0e4c64a743022e73b8613695c3f0e8ae504a9f187de5568a56
SHA51221f9325e43add33ca7d1a1fad1c1cef8bf7aa5847cc43e9ff36a22216000eec8f125e0521289bd5515943f1f8da10aea403c65cb12cb57ad1704707431bce3a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a4fefd639a5bbc0e48f6b86a70f314a
SHA1778f8ac83a7579155774fca1f0cf04dda92959a5
SHA25620f6572398617d1866555c6993f31c9825e361d6df1746dcd7e72cd80673e450
SHA51280358d46108e24e12130b41c38bd7bbec919e9f2d0499b97a91b4dda3b66634fafe9644fb202c30666f071e3a8d5b59d45b2d31a24b6748bda3584aa9c3016fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5390368cd5750e3c2363f68fab29acd1f
SHA1473fa1149bb7e16e9332879e2f71b820e86b4a22
SHA256dd8656c2ffce06d3a898d903252d0a2433d8bb977fd3c3354163d78f7f037627
SHA5125caf2a2013bcaae01d1a2b4cae232635f8010f47ccb418225b35c8c86c4ff16c7ec439653527b22ce71d1568e66c76879719fba14c5285fbedb6cedca843a8dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5481f1da07a3a7aa08aed94a67f49035b
SHA164726aa51f0462327128595b29e6dec35dda3098
SHA2561bd98a4ff14d6fdf162ba5f466f0b274aae2e56efda03eefaaf55591615afab3
SHA512338392300d5fd08ac11a52d29957467abcbe395688ce92ea5b1b29cff5e8821ea289ed79b421e363ee1465357a663d7680d8d04d99e0defa57f73a6f99a848a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f4218c89fb0d104118cbc3665b7a92a
SHA11fb6cd3c4ccc9edc967c7eb49d580901eed5a7bf
SHA256ce8d29c906dc9a81f32a22dd5708e367c770b4ba2d27216cfe6bcccc770f2c55
SHA512f413020167f249d172dedf380f31285567698158a9b5c9c57c2ebba69c38ea280b7ac02eb45385a001632a7b7c108922e30d6782d9ff7c1de0df8c21a69f4c88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5022fcb1035fb3b675d47b80ec4f61231
SHA1dc07b242700e4079eb1c886d48cf325820e5416c
SHA2561bc2c929a41b069acddbca9286e3783c1ff5faa9dfbb97e06ab6ef2c3945172c
SHA5124f07fdbf22df76e09104816b4d425e74b8512c5aa00e3c0087ce8d7cfa1d8f2a62d728963d90cd5687f15c817f79cc41ccc376e56204959320f6f30b3374852e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5becc9483319e2ad72e1e9144df021785
SHA15535d4d91d2136ba80c3fb8faa758751b4e15002
SHA256890f2c8944dd686417107f229e7a7210337d6e1db98e97ddbbb3eccad8410807
SHA512d2c449900c3205a2eda270996d209342463ed6a029d11d17002db6270774730c104a7c03bf87bb739157b23efeabb1a44057ea09d2a171e28a92cdd49b00220b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7d53b3e9691e0edfdd9a91438a93096
SHA1eee09ca39485a3ae3cc4fbb1a38bb35f39ca1360
SHA25698198f656132ef1ff38fa3696391e2224c556af287072b1bf226d9b7348a12cf
SHA51244b3af64d1a08e090031a06a0bc004781dc06ec55127dc32bffb2297127dd4a3459bb23fab14b30451c33f16af1185fe3f7b0a34e314fa414c60871d43fe482c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503bfb346bb89d6943d5ebfc4a3d3c2e6
SHA11918d88940c98676ffeb440f947a6ae542fcdfdc
SHA256f9acc1bdf01282accb656572b7e2e7d882576ec9713bc8ad92a1a468d7b53a0e
SHA512b6ae7f8d826da1e0f5539e88ddd68c9c72c4454efe13767a1b2676f639e5d340d37e372b391ca8d6ae7086866d5e36bf8bf103622177ee81cdc68873c79cfb73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c2520668f2bdebee36810168fe7b642
SHA19a742417e62c7e7af7ed2f2f751184d0e7540ab5
SHA256f18af63150903372dbe53a1b25d5dac32d0b10b752142492bb5af5dc78794f87
SHA512f55bedbebab2fe854ce84c8f152ff93ba04881dac3c7070b3c8ab5ddaac79606f41a08032b099eacd622d3fe9ec496d77834969afa89ca32933063c2f599836e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522101c19fb90dd99cb0ee38391a28ef9
SHA140b709911a0143eecc6d027690f0a96a1b938974
SHA256fe7eb0ffc42933b7672913a9fc374de1be97e56ccbc49ec72c77df81ccf7a6ba
SHA512882e5c29c6a67b49e7303669438b8bdd41bef6e77bb98ba234b84cdda9b8df45ded16d310912df038f8379b382cb2f4b8fb0f7700cc845c309e2342890653a88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57bbea8f63ad0b6d80941a1bf3e8a754c
SHA1498d83ce8343dd53e2bccae1605b11d91fbe57b3
SHA256bcc1e4cb562cbe342e0a417cb30d97336f4590b7daf203d1822a8a12245881e9
SHA512a28164a98e785b8e763a4e97ed89dc2955ff81172ab51a22601c91616a6ca445dc9a07e6cbf152c660d6c7664593b178a998d2b1c10304f7f18734f7265010e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578089c92889bb92d57c31a59c6daed58
SHA183d51569772ee79eef1ddf4d3385ff0d6306e51a
SHA256acb7ca9baf813f5bafb317f6c562bb7603505f8edebd302d65d013db3a429110
SHA5127d909931380d2719900623d6ff10961b6e3b159b47d39559f91a08a5118d7219652ff2622a7438af532bd8eb580a46cdfaa509ae32551bc37e89cac60f2e8c4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efa17c239549efb64303794b0bf60636
SHA1380dce2fbfe88473f0567a9e1655a19c253640d5
SHA2567284ac1cd84c28734a15b105eca1f9c48bfd5faee4917fe5f864f84b4f736ec4
SHA51296ad314b2cd96682aa1fbc650cad4134cb702814a1be5a6d04fd9e9bc83973f569f8d22ef17a928f33be06987e37961800d5bb399b28a4c601d6a2273053abbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575071086a518a5754096d95b9f3cf45e
SHA1cbde120b339dc4f4a64931fa1b8bff33f94ca3bd
SHA2563f985a9f3f4a9308e0a2d87b27314e54c027434c3726cc8dddd9fab670023fe5
SHA512dc234352e22e156c4b8a93d85ca7de1c75fcf66640c1aa659d9389608b513ddab9dff30c4520092cb468b1ade1ab5c8bf63a37b9084da1b17756ef8563e7b2b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5227907ec5720df59baf8ab6dfa3bfe12
SHA18f6c14ee78939e832552477d559215dc01ad85ad
SHA256577252ad74e13f1893033c7706b4b57345783e7b425b1a3f59178fc03f259262
SHA5124a3c2aeb2353e3838468a8de58f7ab2189fb0685035dc8be880d68fda00c41204116883bf7c58372743f7abcb631dcb657b50899e06beb768904f2de841949fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6752025f9c1b75992abcb4bba197773
SHA1455176753981dce78193399b36ae031a1e3d9d77
SHA256ccd5a9452ee14a2e8fc223afa32b168ece2ae8d9e8484746d3f39ed515e6f845
SHA51251a4ba4a8be99348d4246d389989c390c013d4216901f6de813ab85cc50151b27ef26c46a3775ecaffc9e1cb7e05ad7c3b676c843df28e6fe9fe6859f18087ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523de75308c749ec21f017ccacc69466b
SHA17bd4245e5100adfe17d62d2555d5676b48b6d6af
SHA256e826565ffc19c058bdec68f6f995a0e0185d82c7bc26113b7bfedbba89fc3657
SHA512c4854fb42af3a6601e91dc3440c1918f49bafec3e6a6356b413029f08428fefa2b7938c87f01c854ee72432f212a6f18290d5f0f9f6361676a22742f49a96d87
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a