Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 19:07
Static task
static1
Behavioral task
behavioral1
Sample
7a325369295a7ffd4645c154690c32d4_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
7a325369295a7ffd4645c154690c32d4_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7a325369295a7ffd4645c154690c32d4_JaffaCakes118.html
-
Size
68KB
-
MD5
7a325369295a7ffd4645c154690c32d4
-
SHA1
33e97faad019e2060d7fc36a608630a60a3185d1
-
SHA256
f631a86b4d9300e43afff21e01d88402826f56cb25dc3da4ce1a85753696bbe4
-
SHA512
f008ebaf81aba5a595f841531c8af8f1efcc6fab6483210a357ec5d92a6db3687d6026eb6195c96c80f6ca20fd420009559296123afe585980a2cb75a9a0579b
-
SSDEEP
768:Ji1fgcMiR3sI2PDDnX0g6wY7zpkFeh0woTyv1wCZkofyMdtbBnfBgN8/lboi2hcc:JooTBTcNeD0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008be8e4915a214d42a8059123ca810b480000000002000000000010660000000100002000000098e5da417e7ac4a8c7306196f0eebe7ec18d1ff3af1e9f0b38193086cff4bbca000000000e8000000002000020000000ab16b8ebd77884b4ec04d884296119370fc10568548bfdbff1d4c33a2bcefcf520000000bc0bacc74c307277159cf0cca623e9abeb20ab0f64c7e306d634bc0fadce738540000000dacb372859070c604d8c61906339176207282e33bde7f23c30d44b8937da365369cfc663c364a337056ae95809ebe17e794e0495cbeec67ff95410b051ddda59 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422998698" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{51956181-1C5C-11EF-8A5C-CE787CD1CA6F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2030342669b0da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2084 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2084 iexplore.exe 2084 iexplore.exe 2036 IEXPLORE.EXE 2036 IEXPLORE.EXE 2036 IEXPLORE.EXE 2036 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2036 2084 iexplore.exe 28 PID 2084 wrote to memory of 2036 2084 iexplore.exe 28 PID 2084 wrote to memory of 2036 2084 iexplore.exe 28 PID 2084 wrote to memory of 2036 2084 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7a325369295a7ffd4645c154690c32d4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2084 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef4a201025082d76688a440bccbc7f88
SHA13af0a1f6d18a1d2f1170d10c70a29a506372aa05
SHA25666c881d172b3f43d16a59083173ede2225e5b768856b0480cf05fc9f21e4ba01
SHA512f81276231114d97fd886eff4490b5a27b1e09de236bf988a66ba755f4f81c01b96a866f8f8fdb25879e8636bfd4faa93b94d163b940659ae646d4360b131741e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583496a9a8ee38516ce11143357b48782
SHA17c8974b03d5f373266e3ecf0cecd495c36883b7b
SHA25681baa2791f72320fb0d75319862696706f1e9c7843d680b967d1cb682609bdc3
SHA51243db66d7a5fae0f1df7f00e619e25cfa5bc8ceaf62eafe36cb2c63f36abc1468160c710725abda4ebddc701d69fd783d8d85ca5c062736e4b01700700f688a39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513d0e08b7d5b3d150cb8c41daec0f9c0
SHA12a534e89f44b3e600cd9cb1affca8c171e0d44a0
SHA256343fb9741ce0c77241d684b075cea292706463534283d4dc4332b43e77804738
SHA512241c09e5d439f4ffd60deb48c8ca85d0aad22deb63221d535e8fb774099c528d776905a45246c9c376c10a55401cd22fe540ccba9e831de763f8f7f1deb3831d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7e5499e8e38895cca4d07df086995e4
SHA1ac9ced51fc3aa88548bc069604e1326612002cda
SHA2569137d1045c75fcc6ba916e3821e8d23b67a5de72aa62c0a9d2440e474798dbf9
SHA51214eb080967fa70e8536ce628c26f975b50e192a681fc4627b6ddbf733bfff3e172f1226b12ecfbe0622f30fd7a2b7acf65e137006acee5cc53353ab254361844
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e067b22c4d07fcca951748ad386173af
SHA18f589579e01ead4e40ac68f101c1b3a4a4c62784
SHA2561ef1217d6efd094072337a61c4bb614199549cc69666153868f26f776459a964
SHA51276293a2f8ae597a84aec8d6ec57f3651584b84e47ae81f8eb6189cf68aa897c856a589aaa09d30f867fcefbd1788b751536d17295892d5c2b0f1a9db5617af87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b04e78d2922ffce16c96b37eef956d5c
SHA1033db5023b4a0ae75ee0bd2839c5e66295094830
SHA25634f8fe4357fbb4e4917a63df2f8b7bb53869727c39de12de5d5e5083f25915ad
SHA5127f9c9404758eb47cc91bcfceb5fbae5e48cfe395c1f602050c02aa9d08804ff03e59492d0f26854a1ca22915ad70cee092f7505b7d5f078d158b3ad3d158a953
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53299b510ff3dcd529480ecec0b419583
SHA130d3d48ce08ef4c5632c94b2bd9ab4aaffa6f8b9
SHA256647ac52f66430328bd58e40e06e26261277beb67242f4ffbd3b9eb82349c9dd3
SHA512cd800be9039788a172d4be2cc4a8f7438e82e58122e1fc23ab1c14b7863d894d5b0daadbebcd74753360f505a4f3bf062a3db9f56b912b577fdf93e01a84e8c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d626b80876bcb89057aedf7b3de8f876
SHA169f81190e1beeb41259744f138dde5833ca7094a
SHA2563a6c82d80e2b6a15bbae1bb1a7172f2caf74423cd5b37e2f39c5e34dc89e55b4
SHA5124300ca0659135d6e2467ca4afa1431f9d3f8dd84daded2ac3a35c0e40338c000d5dcd2ed228ee0cc85bea6c688d391509bf3af164cec35c9c57e154648aac492
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1ec65dc927ad421cf235311dea212c5
SHA139bbfdb0c1d447e7a9bea01f3c2905cd9b1f2fbf
SHA2568dad36e6691a9d1e154cf62f411690b7574c75471749ae884e3058cbc5accf53
SHA512d16237521444e375f80435012493f25f2eb399716500b14106d1ca91f123e492ab367c7a40656aff2cc53d1a98c19acde45f2f3bf869d3cbcc7b924143dbf58b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb30b9f181858827a732b9b5bcd78912
SHA1167ff516ed2179b3162607c117085188abe31887
SHA256baf516e56effe116e014c75ff9d28496a952ee9d9053881ae68a6d40f1ee7843
SHA512589a16147009ca08f4f8e87ae05d7e133db7928506945339b67bbfdbee76f2de5a2550bc966cfa1ebe6d7d43ca34fc1d6bcb2643b1989a1a84dea14434673b21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5acc602b589a9089d258aa3281e803057
SHA1f8a34278a5c8084d4c79ea2d30483991d5290f5d
SHA25625881b62990d649f865dfda29d57f266a3df5c5376153785aa5303144fa95b62
SHA512c655e15ef8d404f97374f4283793b70eabf972c6484d460dfa5c4c9bc9e7fe1a7cc4acc5b8a774ebb8418cdcbfeb44181d868946e3ee0ba06fd30360ac273eb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4e867dbd481ce3c937b2af613657b40
SHA192dabe8f45744b900a49ce17e2c68b8c66bc01b0
SHA25693c64971e332e53bab827c713b4908a2743e914a88618649e535da109bc71496
SHA512e85cfe78d9bd20221f5dc3981a2397199a91d48e0512493ad762076c3068e3694e528477f02ec8200553a074618d3136d8849c4ccde47dfe255748838f593e14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b42b12d05a60841c45957be56e09361b
SHA1bf31d7bba1a001bb994e9012390b9de8008acad1
SHA256087e21023cbd96179e8b5b62bac3c240f0676ca77bcf24f241d1e0dfa59f532a
SHA512ec8cab2b10fbf2287ba9e1f771af8b9a0f245e3ea31500a8b560dbb8a2b16293f63da57e65b58bb6e46213edde2ca9f5ac6cf947f4996cfc19d213235a9f5b77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f71c525ca4981d32f4c3fa37a37a1516
SHA10874455732b879ba956e925451d0141d94b790ab
SHA2564b6b054c29fb36fd0519cc55958d1c689dc56110e85d08a52462956b02bc1f05
SHA5122122c36e33e0adb380c2ba4ee102e02246ec0e0b7737d38c710455af5cda488bbcd4b27726772596a2bd498cb1a18487118c1405569187fb5bfc8c6c8caf9e19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b08b082e693546e01c89bcf477434d9
SHA1fd4cec92b7ce25a1489f79eeba39297c83e23311
SHA256cce6aa4875c9fccc6533315278c8af7f53b5ca4820fc43ac02898df73ad89381
SHA512a1509f451d21e8285781c82ca91ea314ff6cb4bf83ee02bc25115438cfd404a5bd442e7ac0aecade42b1c1b8c019b018bc6e4339a9ea6e1f5e5c3eef6e539942
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5590a81f6e80e82b67b85d884306be486
SHA1c98fa679ee9fc4156195bc2e8123d43ef5db2483
SHA256d04a0be082ab7caf0bb18c661db3bbc1cdf0a659b16b0f22449560cfab50fd21
SHA5128efcf7e76a04003a6e975e573bf9322fa6104cf707e24cb2bb7418a3f66e2f97add68c92e80c79854d6058d56410f882f68b4b960e1c9876a851c2a3d352cf81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544d61e6891e67d6faef382080457cd16
SHA1405a822127e5f4b94e32e5c56b394ef3456cd77f
SHA256df81c60f42c6ecf6bb2c8dd55ec181f7af1f9a450ab3781ac1264be14b76ba72
SHA512441974236ae75f4ae3b3eac0ea2b08eea84f4763841b36c75b60b31c5551757461850b3dd560d4bb6be88880d35f12c9ba6c51bb4845dccc5c0c86a178d0dbcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5956b7e5b8937d2d296319cf1833675ea
SHA17bdb0ea4683e6fbb351a687ff2f4f7e6088042ed
SHA25602016cf313e3d02f111f6b49a18594872675386acc535e5fddde4bca5345cfa1
SHA512714386f9613f8ddd29f9a05b755080e0ea23161030ac0a46fba66bdbb3ba874ee0668ee2b570df45e63b3840bf1cd788f4768f35bcb11e7d1c814f2f86bcfaa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e02884067f0c70689ce271a26162e6e
SHA1c75f79f3bfa96e3e87c6768c8b444dfdc4818719
SHA256aa166fba1c31e23cf61883ee6bf9dc51aa87ac3abc7abe139006700d9dec8c6e
SHA512e6d481bdf89a19a8941107b9cf8befad3102b836d20446737133f56bb666900511e1055533dcfd21e4513a070fb53e80f15334a245e05fd9097a8a0c7172f8c8
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a