Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-05-2024 02:10
Static task
static1
Behavioral task
behavioral1
Sample
7790a53607909bc5d39607f6e2dc498d_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7790a53607909bc5d39607f6e2dc498d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7790a53607909bc5d39607f6e2dc498d_JaffaCakes118.html
-
Size
45KB
-
MD5
7790a53607909bc5d39607f6e2dc498d
-
SHA1
ef71c3c04ee490b576d1a99079e45b5413a679b1
-
SHA256
b24aa09ac1722e09c5d994286d4f8d290f710227a3fbcd5f3e882afa98d48fb3
-
SHA512
2a1f1e0cd62977335ea0b61d8161617d9d3ba9c1e05430b77714f5b50a8936489c85a9cc45c3dd7a2c67661d36327cba53a944060c2ba1337c70a0aabc3ed96c
-
SSDEEP
768:S8iK7J0F3p002+6wfWAViwUDbSseJ/J2xuNWhMAIywiIwiIwiIwiIwiIwiIwiIwW:S81Oe0J6iV5+Xva
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{54E57ED1-1BCE-11EF-A7F1-FA5112F1BCBF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0e1342ddbafda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422937715" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007f8b240bed77ed4bad80d5211f3edf270000000002000000000010660000000100002000000006a44443d13a769de026a3bf65a31ce3585aac804b0952184662c7c14eb595f8000000000e800000000200002000000094053a8a158cbecc2cc749b4797e3aa2227716df101c040f9f50d7dc700a524520000000469faad64d038d71d62bdced3facdde23fe6fa0084c24b40e463cf5d30b9029d40000000ca47fc813d2ece7717a2edcb3f80df07ea922e94bddafc0a2c46f34e0d46b747c7fe4808fb9ef3ece6c418a3aca6ef26a8f392131e9fae568a6bf134bfc0c9da iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2372 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2372 iexplore.exe 2372 iexplore.exe 1092 IEXPLORE.EXE 1092 IEXPLORE.EXE 1092 IEXPLORE.EXE 1092 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2372 wrote to memory of 1092 2372 iexplore.exe 28 PID 2372 wrote to memory of 1092 2372 iexplore.exe 28 PID 2372 wrote to memory of 1092 2372 iexplore.exe 28 PID 2372 wrote to memory of 1092 2372 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7790a53607909bc5d39607f6e2dc498d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize2KB
MD550e87a36bc36b8810234847b96877987
SHA1e83d8374ec8dfd9f8fc9f024a70c22e9d73fb2b7
SHA2561c7119af97839182b79e03a732481f9d2f5d67c3e332fb3eb56537b610bc6ed1
SHA51296201d0321310ac21ce79e58cbff2aa368defea068f1b8004cc8929ca3b791dd91a2f5659e24efccdd9329d39a5e00f28c4d3d21f92f2141d3d6af5e867e0d25
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5cdd57f22d765a8b925584314141bc6ca
SHA117d3886a5bce390e7a8c1e901c6b068f4fa6412b
SHA256e9a7b9982862fcb9f26b308691a30670ef542aa9df165ccb63e51e7e870aa2d8
SHA512f7c9b520c4a73bb1c93d03ac0330495b7c3bbdb1ead665dcc7d84b1029f0458d0931f1346f0aac93b65133c7d4036b2bb85d1280a35d7495064ed00151ff8314
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba213610772a91a3d5e0730c38146e0f
SHA10914405e0a1bd74b1b731fa93b20804a27f3162f
SHA256eed27748bfe3144b1339bffe2e87a92a120ddb54d9f2f8435540f7b0e526abb9
SHA512feedf3d6a57331361439c80885a80b8ccfa5aa57feb1a773ea23f90438bccac5c72a5d97ee2e584eaf18f863f09fc528e4c41994730b93f99956c8b971ef43bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d9f37f8868d24e02b1040121361a913
SHA1ff72255eb375585740eab552b2a5efb7ca42c415
SHA256ec2f0b0ad721e56875d9de3218bce00501cc4f29648e5809c19e0e0c2664173c
SHA5123402e0cd568840b6bef974b2bce05600146b64b07d31dabbe606682eb818c6ac09b09c03a177e1f6d6986dcec4411fa0524bcaa8a2d694af62d993d8636b87dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ecc8a9a23a9d04b3b4997271b0fe48d
SHA1372a7e2a3f84267ae54be789e6d9725046b43a75
SHA25610d109bbafdeb67f0b169878f02c3dee823dedffa2e2761da483a91fa34a6587
SHA512d6455a9fc42ab417a8b9109ad8669906ba6b1d2005ba6c851d4249f84cac297148b8b9588e21bdca9736ee2a44e15d34eaf3d322dacb245b1457b1cb2d29abde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527b0e86d939aad7c464eb251904a5a5f
SHA1db727d3fc06cc7fa4db4a5db1a1d6ec726431aeb
SHA25606877ab0e5aeed909757c5f95bbb61d5c14858e606fd63e469af1cc8d16cc1dc
SHA5125d145969a51ea7e109d1ea5fd78037fd30212cb4039c12abb2eec5816af4726873d6c5fdcf12a37a173a125b53db15538f5115645d1579843bf20150f24e0482
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b18444d81a0400ab087eafa0b8d1f57e
SHA1b412ad3911af36a1f4f13b1f922c0832844a7c6c
SHA256e7f7819ca1ecc40c124d5f0c857e176dc97e09e57cace2e1ee3bada5286f1638
SHA512e11769b88c64e404ad5508c71cc63d37873d8f4f53fddf5ff9c763b1b00daa72a344644c9370ffb46dbaa40f1dcd11e4ace3f0a505815e5d6984b0fcd698b9d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5345d207bcc781d99847240f24fc33b08
SHA1570337cb03b94e359091a48641bbd61c795a325c
SHA256c99b3e8d5bc9d90f6ad39f3410421f4e61338f18d7d35a0c4f4216fd8c880a8f
SHA5123a65baceaf7a5ba052ed3c3c899680a574f6d85328f27d92abd07ce8eee47677b1edc735b4e78a2fb4acc4241e18ed6403cdbcb7e187c3fd5b861c158d67abfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc85fe5dbf014c7123bd95cd8228d488
SHA1eb14da721c22dbd1378f1910ccb56b88586891d3
SHA2565f88309447fe51f8843dcc23c04be0dd5b361ad673426be938ca90b93f5d2e22
SHA512cbdc64dd492b12c3e625e72ef12ab5476afec4f4e11633577fcf53f6a7c3bf7ec52de95d3be37d185bb83e0f41dbb66a008be1af16f0c24fb02df900299cb7aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54058f7b2268ebaccacbcbdfa7e2384bd
SHA134be9a0b7757bc4ed369484a1c6e0cb6adfa92c8
SHA2562d0b2f13c9595c25b227602c0caa980e5b35bde469af32231d2e074a4b5cfe8f
SHA5126624c17046594079a838626371b8b0f94a6a9de44321d072698355c0a0456673cd6af0a12bac5090ab171373efde8b0060c2e67d3c4d94bde9b52b4d3684ffde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51cfc53a52472c198ba4b98068cbed54b
SHA1962f42827dc2ad0275b459123cc194247af43a14
SHA2564a17a22a73f041fa1047fac31417d81b95827f2525cf01a62e872b97622d0fa3
SHA512822a1534b4806a3dff36d5bf6ca7222b5b50e7db1690f4551d363dc62efbe3ab5c1ef0be443f9ee2816e3529c6e52811a903ac9acb64a6a49ec5e63f518fedf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a5069c3ef8e420783d885105f2d1567
SHA1627bc49eef70009a0c4b9f5c024952733c4add53
SHA256f8386dbfbb066c807acff80a3f9e3ca21ddee355b4778b51a339a817565bc725
SHA51225397219241f84965f6ad802ed56eb7c5301ef5d778ad921e921a54a15cefadbfa7fb5f7cda6e6949f0f406063b54376e164f07da2e44be024fd7d1481fa464f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50daaa163b1ba2a7019a11e9644b1ac1f
SHA17d0acbe003f832db9586b1c64c41d3d36adaf9cc
SHA256ddecd50ebcd93b639f0d2c25ae73e430f71bf74080e1ed5a7b0b55b772cf302c
SHA512275a81b93a5db81abee69a82679daeec609ad74f018ae1b22cff481db083df1be42d3befb3fd453de56ee36dcac2875c44efcae04257be07320c10790e5df505
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519055d9aedd85453c4a8de084c8aa390
SHA150db66058f7caf5c886c02e0ab6cb1d3bddc7438
SHA256648968c8615d48cb4b30c15faec26857283f3aa9252abb3b1f8da7cc496631cf
SHA512661774e1c7cb77d3be705651f138fa4235877c8d958101514795e102b3184866a43fdc8a1e68d44c32f7882f1b53d50c929bd42a881b721e61e2c4c8fd52dbd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569d48c2366917cfa1fe58b1a4f015a54
SHA1f5db2ad47051b735fc28fb7df8f6279843669987
SHA256e4042a30b6ef41c03ec59c233b91b036856670e2386e4da97f03311da1bcf9b3
SHA512b64ee7ec41e543cd3363cede9519157c6288cbf4b1f4228080f29eb39a20358f74656ed9f8eb0df47e6e2b0e7c6ceb29864db0ed2d48b05029b86198126d46ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5dd16a9f7267ac8b9f1b28936cd039613
SHA150287a44dda3174b929d03a548ac8556ae2dcb41
SHA2564be05cfafce1b4bde0e1753659a00f7ecb07eb9ad2f79bd43d9b535d710d7dc8
SHA512d47e816fe2a904488477c96d9cbaa5282aa8386cdd5a0d1ab7c73c5a3472d75fec3f0757c348c05281f9b0422f33646b5e0f65bbdd09bdd46c0d6ab2f18a7b87
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a