Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 11:13
Static task
static1
Behavioral task
behavioral1
Sample
754b2b833864b44e2fbe0f094c7e881a_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
754b2b833864b44e2fbe0f094c7e881a_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
754b2b833864b44e2fbe0f094c7e881a_JaffaCakes118.html
-
Size
4KB
-
MD5
754b2b833864b44e2fbe0f094c7e881a
-
SHA1
23a8f569771469007dea07de6948d8dfabc2a348
-
SHA256
366950fedd3e828bd82cb1919de688bdcb4e4f4157c4de1bd4984f17fe0d75da
-
SHA512
50574b307efc531585edc159c8684802c504de5c0c8a89c782b8a096ee6c0f1430ed9059fdd6400b236f13c08a77cdfd931ca583771504a9adb92e330df15ef0
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oH1B9aSd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pD8
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FDE9C3C1-1B50-11EF-8840-6600925E2846} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000492cd16b36869849990416e5337f67da000000000200000000001066000000010000200000001cad3e4a79b962f48c2443be5c966551306ac0f6f3c2b3d5b8cfe5fd049023f4000000000e8000000002000020000000ec98a492a93828a69a599d47b98c7db6a78de6f7c7c9c6b4e5d8e6849ab635ba20000000b4efb501997897729025ff0eccfa28e654f824b406da7c26b16dd06ead8914d940000000ad2f755122c456fb2f76b9abbc090607776d046c9d8884c3d446acaff93983e583670d731c284c88c79f23ed3ba32b1136b472688348137c63db68d7d8ebd818 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 906265d25dafda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422883882" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2800 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2800 iexplore.exe 2800 iexplore.exe 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2800 wrote to memory of 2892 2800 iexplore.exe 28 PID 2800 wrote to memory of 2892 2800 iexplore.exe 28 PID 2800 wrote to memory of 2892 2800 iexplore.exe 28 PID 2800 wrote to memory of 2892 2800 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\754b2b833864b44e2fbe0f094c7e881a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2800 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0341397646312df58e2f00c2d06d7dc
SHA153a46754912206883943785c18b7aa4e78cd23a2
SHA256cb4a4a1a09f08469fb3f21d95244e805b32d5ec46c2e8b8bcd8b04a92635b28b
SHA512700166e0a5dfe05cdea92ce45a77719c8b4fd517922804e70839321a7d9c93b1938f853d9d043f9c638d2e3c6ba3483b7672d99f0b1620b8e5235a200a112cf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5750c23b341c29dadf550e0d7e68f93e2
SHA1981ee37cd9114e725c75929ddefdeac6cfa53ed9
SHA25687e851a0fe434626f6ec36cbbd5e24b71da652481089aded8e1d387c3baa07e6
SHA5126d0e485cbdeae759c094920e176375a1e88d32767efb28747c9f5f225bb65da52a250096d0135cfcba77d93fddb71885fd98d291260750fb9d57102d006eaaaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2ca6f97f0e7b9890c2bc9dd4c7bfd7a
SHA13649d735466165767e8a4c9d1c6716852c384600
SHA256ebaf0f7bf2b9328646abcb2b8638d2e971a86032a62b6f31c6d85d668e86b819
SHA512b79b44ba63444d482eaa3be9f12c165b2b5eae5b9eb54167b74e1b70a818d29bccf148207db1bb49b32323ee15979b36afa03ebbf8aa9cc71a9c21d53afb175d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a98c0e1bad36cb16445021c5c351fb0
SHA1bdb679538762587430ada604ca77d15cf142c7b7
SHA256db159741e85448b3d2e63a2984b1e417ba44fd93b762d6a73ded7e51355748c6
SHA512a105c9a885a20dc9825f42dce2a6325b00e736c9e85b14d1717019250704467293b1bef16da5f25b4a205b26849e465f1c943e927b2b7cab5611579f1324d765
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dda7fff04a913ec41971172da5c14045
SHA1a8a6816402ea81f9bf173f06b4095a2cebe71632
SHA256960899ad969dfede9d83434b943a63c45475b6357cfbbf82f0a08a5798cfac48
SHA5123206771279ddc2ef196d02d5e404bfdbf51e298d299914d71bf2cd76632fffb6bf2ee66f074fabdb822ff9f56b501e4d4d04c66d336e7fb1c1dc8debd7dbfd62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516d121d562cfe7e3beabe5c1aacb485e
SHA1081df3784acecc125fbebc684128e98a67950e9f
SHA2560ef9a94afbb5db427198beeacba19deb54914d20b9eee831aac379dbdc61a485
SHA512a5e20995b4d1526217bc0a4f3cf851aadc09845b551ea349a05631996a2b59e967e335327d733339070899ba37f8179f894c1612372175059616a239303add38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9ca776bc351c62d8a5205adac715c1d
SHA12ea98e2a3bdf3f759b79430c42536d9793219907
SHA25649aa8db02f3021de912081b905dcf552608e5e2f71a04502d73302ab9a2ac115
SHA512b056a0db93e5baf8b456cfc00072e9fed855bf74c72c26a5f839876be00a077e8633e487b148e152f1df953e1dde24a237683bc0f3d4d692d105e70424ddf247
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569b11d6aeac0f45039b90f9734f37e4e
SHA199cd85ecc51aeb8656717ec7335df01fbee4a0ef
SHA25644298bb3eacb77a96cf3024d904d7ad84b278ccad8d23820386f429f8cc94fb0
SHA512ab276b44d5085c2a4e30197c747fb4a0abc4235fce7b1457b358a086a9755389f7cc22a5f0acebc1c73f3677cfecdd124da95103a64c6e88f3134e4d46749b0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf4ca63e6fc505f66dd14af931645036
SHA17091517122f3413108c601a09da55ccb5f464bba
SHA256992527e9e968a7500ef5121f15d6612e38eee5c04ebabe77815ac95617d54460
SHA512973ce83c0a2d7a5520463ae0f1067077731e90be21cf435d90ee44c35084783aa02ea9080d110018681de0f50f41e9009bd9f64fefa8a5b3032e8193702a53bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2eeb95290c4e774e6f3ff35bb59d5af
SHA181c21a26a1eedbc17102b9694336d49f20fa25b1
SHA2566757b937caeaecc779efcaa059ae879934ff029a7cc51e3d817637feb0e802a5
SHA51205f4cafc440a401d27fb653b05b44dcb3bc29e654f74a67a08db9823c243696701168ddc60c17ac800975a12bcc167805217905ae1904437ee8bd0bfc5d20474
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56963380845d59e9c36d34d498aec7430
SHA17f5013d08caa64874b9ad84e9334bd6dc5b459c3
SHA256d7620bde81db78b66c8433d989f6e8de40c452ea3a496a713a19599ed3868b6b
SHA51232d05b3186474aab9be344e61277559a9768dbcbdf43c077f189d0e2a0c69dbca8c7d22bd5e4c827137a248c904404aee4117722d14ffe82b2625ad32252a21e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598342006b3d00ca622836045390f2271
SHA106bf9e831d50fd94ca3a6a83b707e76854746bf3
SHA25683b81125e7b69b2d4a03e832cb581e4cf82ccaf50f86e7feeff0a92768ed1483
SHA512deb893b7f9b15fd6b5b728b3583ccbb74bf560d60df1e41b9b8abcfd7e63526761132925578034c4f1f1c5051bb5553a05597605888c83a73ea3c1148988fa59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c80be895381cf1fbfff170d6b32e11f
SHA1e03e4f0058684da7e6c3d38ab849927fc89e6ba0
SHA2562391a1cf415720706b9967ca150740ec00e9b82ff1d78fe3fcf579eb068c2434
SHA512ab846b1171c807b8872ff5cd3a29841284e9c4c8ed367c58461ddadd8538a9a585138c277b747dc696a770de7eb4fef56c1a505173191394cf76b9330d1a059a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8c9d67abe1ea63b047ade740dafcbb2
SHA1bc940520d45e6c2f6898d06ff48a73ae110d6ae1
SHA25634c17f5fc97b2e8681c8ad87917231d94c23b97bbf496f162cf3cc2488e951c3
SHA51287192a9b0371514c79a45d049c691996041d7c34aa9b3b68521522f4ab8c0ef650df085a293ab0811d8803855c12f927de55aa943396bffc924b924e40db2f42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56820ce9f93964ef263a0ed975122bc10
SHA1b2a56c71c1cb3bfe908d895132dbbc8b5be9e146
SHA256b8fd7e267c7493c5bc0555616d70e5271aa50e1613bc8fa96b945c92ba085465
SHA51224f1e6e7cda716221a3d93af51f7e9e02df4cb2338c6eb0f2c55989e45082ad60473a9843a7d3088b1c84a2d96fdec912e422b5495d6f3f2b0a07416dfc4e283
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ba52cb9ccbb3e23bab9bb9965c79216
SHA140ddffce15d4de63b91556e1d6910da81662f66e
SHA256cdbe3cf379b658eecdc6a8308e9bbb6286d08b39867b619b0753641e9b8c492e
SHA512a61835ea5b1a0d04fe9d3be59e49515db896ca1ededfdb40b06c96607413b0872d2c9c6a30b05f0251f8bf43766823aee24f6a76acc64de750d03f38d58b5e17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505037215f81abd1ed299f4d7d7a64d98
SHA1b196a247e934d683eaad3deca821bdfb667e4c0c
SHA256ce97b8d1837761dbb19bbb6d72b25c938431e816d283ce6b5b6b89f955131283
SHA512fa8b80a14c8041f4315a1d0317d553e33a0e48d05da9231bd0ba5f0fbec59acb6f6451fcdc79859ffe87f7d4ae83885b8710587ac37e72d527d0d4067914f268
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586b50f29248fe62935be7fdb380efc9e
SHA14add85974ec5279fc9f7865565ede9db32bbed55
SHA256ff75abe13d2517ca5a1279bb6233c2a03f0e158b3373b82675e94b216cffe9f9
SHA512b119d65bbcaec29d2b79d0d20380a61ba8fa2a6ad31849fa217d62d8781fed2aa4b8ca690c1e75902ab2c0930bfd19ba0c50b06bae4213aa70f04a8f4d495f36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5156fa93bd758674bdb40c0273d8ea54e
SHA1c91acea13d6124caf17749cf482b0a69007f5dd4
SHA256b7e2d86114e7568550608dbe070f9c56ac37f64ac229c316317450389d3cfe7a
SHA512610f6fc88700dba00815852f4179ea42eced7d6bc865512f1761e8c57be6fc1712c852f4294718d9e302109c627975869c5c970844eec390862f9e043d9b3e9e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a