Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
27-05-2024 20:10
Static task
static1
Behavioral task
behavioral1
Sample
7a5ea7d327ce083d694f3c4589a95b90_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7a5ea7d327ce083d694f3c4589a95b90_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7a5ea7d327ce083d694f3c4589a95b90_JaffaCakes118.html
-
Size
139KB
-
MD5
7a5ea7d327ce083d694f3c4589a95b90
-
SHA1
efe0e39a25c06f54f719a08f4a645cb0601f3089
-
SHA256
9c5a09ce690bfa057c29df229d5ec9cb8ce16978f0606312fd31a7f50d36b880
-
SHA512
242f5823d45d35b3095cde4d46128d053406f199dc67f5c5421e0cb2bf2626ff4fd0860d10701a2de06ad53d8c075543ea89fb234cb5404b85157dff4466ec2d
-
SSDEEP
1536:SzTFZrlhLyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOZ:Sz3LyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30b8653572b0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1C46C791-1C65-11EF-8857-46361BFF2467} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000006183b0cb8e0de4db016398a93f27f280000000002000000000010660000000100002000000049a16c0c44c104a7c94698bd66222eaddcf2c7a13c1793a46036e6a0ef97e1eb000000000e8000000002000020000000be1052536ce49eb472ed91dd6735ec98fd34bad04c1542559fc0d88da999c94f2000000086a7baaf5a20c7481071bb740df73ff4cc93414f7b35f0fc288185d91e49f8b64000000022786039e452326a232d59d7ba9d408c6550a646771a4a013e5e5fd2b0dcb014452a1527f6a0ca074486a11a3aea01636b64cfa4da119113a08da8ef1f4e183b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423002491" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2884 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2884 iexplore.exe 2884 iexplore.exe 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2884 wrote to memory of 2964 2884 iexplore.exe 28 PID 2884 wrote to memory of 2964 2884 iexplore.exe 28 PID 2884 wrote to memory of 2964 2884 iexplore.exe 28 PID 2884 wrote to memory of 2964 2884 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7a5ea7d327ce083d694f3c4589a95b90_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2884 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5cf4c3eba7a93a26aab9a032c41ee55d3
SHA15de71d01eb18bafd8ce8467f74847b8df45c19b8
SHA256ac6223fb5f5e8119b85cc2d649cb4fee8c308c48995e065c5b2ba13a57e9d91b
SHA512a94dc8ef69690b9d1cd9a1c6b0aa53619ac9ce83f6afa178657f9a327cfe63b4999d92ad71b2f0ff5f1990b8d995366cc0faed1f2aeb3c1908d2c6bf0c6736af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5f9435a6bd91e7a4193db59162aad0c68
SHA1a1553356fef7cbfdb2d7483fc23806c5d0c8d865
SHA2567df5314ee2806c656f92583e3735666b40ce24314d9950dc322282f16b0599f5
SHA512eac6dd17980db9b73a30749c2335e5dd68d377f692ba78fd78e1637b2a57eb67af5f5c1c1e944a742db0d3f09f6f13ac346df18cff62936dd555c857913ddfd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f4c22fcef2028da1ad8c21e4c9913fa
SHA11843d33299d5890fcb9b57c79723c50f8162d277
SHA256009df303ff582fe0327052032ecad741f86a3372ab4aee69da8d33ce703a4f20
SHA512765ec2e9a5def7d12c03e799c837af49438a0f436e40a6f54cff50ad9a45e779e8093e4d5985bc0a7bf0f08339d2cb394596f6996772faee87881c8aadc7f08d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51980f7e3cf9f566fa523ff7e442213c4
SHA10e1d50188fa19372889441afdf3fd50a288bef0c
SHA256ea505fb1b907c8336b76bfab0914cd1260827078ae212922eaab527e55cae712
SHA5127d555adc4f3f9d516b0fa0050c07b22b764618b6e5f39c7b161e3001eed164af881d852cb3c36219bbaec8d47a9546a8a9dc8201ee41569f63562f92748d9b7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507bc28a880d860916893a4da68ebf009
SHA134dac1fd40071e1e73f96a3b80ee32a6b31eedd9
SHA2564642927d3d7a6d889032d6f0dad209c3623ec017c33562996286d54ae3b7005e
SHA512c536cfd584d0ddaae731ddb726c255fcecbcf4f96672810e1cfdd84528b5d08aa18367bd81580011e3bc2310e81a08b7bf8813529fae2c6b7bab39d4a0b6966e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc2b4388cd80740284d9ea85c277c16a
SHA17ce1596f2d6a2880069bf1dc3fe865ff1ad1c2aa
SHA2564477f126a6e6b1e1668f21b7dd7dcaa8845eec477702fc6635d79f3952f792bf
SHA512c927d8ee3d88cce508e687e0be4c8acf5b2fd6b61e8ffb25da1de07c1f9f389fd38a48dd27effced316d77e0f0d57a449586376f829973b6e030306b2809ca10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b8fdc8c44d5051859867b24c2693677
SHA1a1272a069d9761be0715a5b720aa592db447f422
SHA2561500e3fadd1f2573861387ce211b3740ed79c54ad57d5e518b3ba9c852dd4004
SHA512fc6b59e32cdc95fd2b2f780c92a83d0192d35b24336d06d292035249e33d1fde9767a4014b8dd6556448c0ab23a878152e2e707899276eda9925f1109d43cdf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dac63566281b9c5e90ebc68cc4b7cc6e
SHA1b72936d69bd629e757f2d9d71ae368a8c0070d07
SHA256314a40990ab2cc9d71dd8eda7a53ee13419c3eabc065efa485caca26fbd27c2b
SHA512a3ce9468a2c66fe9df520ebd6ca845808e6f204970d7f9022b09ed4d6b02f6b836835e2cd06fddfe8b23c6ac1591052065c6f68c6666393ef136069d19c77a01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD515a4b525f03891e1aa8f8901f27b9fe2
SHA15e8ede880ff5c7d3f012e27fcb7d121acc232c65
SHA25659e58b1c6a542e037182e0fb76807d945d2045c62daf3cc4ec2d8288a73c0e46
SHA5123d186c926773061bc190e0f402cbcfeaf9a42762745509f5e3315fab24412f855789d1ca88b073c824d83586dc2b40bfb9ec5aa4fb54de6584809245b9e91ea8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a