Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
28-05-2024 05:06
Static task
static1
Behavioral task
behavioral1
Sample
7bcd1bf7473a6a36122b8a567f9f2042_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
7bcd1bf7473a6a36122b8a567f9f2042_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7bcd1bf7473a6a36122b8a567f9f2042_JaffaCakes118.html
-
Size
14KB
-
MD5
7bcd1bf7473a6a36122b8a567f9f2042
-
SHA1
d41cdd93da3ae334bacd877a2cb466d727bde93b
-
SHA256
0cbb9cd6ad3632ae119b83421352a539c523588f3b057f8866d4888c2d42528d
-
SHA512
56a93c1f5112c38a40fad0efbcb3fad67818458db0cd22b6f768ff2afb8fea7f96e1785e5a7c0cbe522016a120159a271c1ec96a42a78dd21342b95c0095fae4
-
SSDEEP
384:CyizFB5HR/ilQFAi79y1woMZTV6W7mXu/C2gw:CyizFfHROQFAi79IvMdVUoC6
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423034677" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001843bce4db34ce4289e0706e1e492ebb00000000020000000000106600000001000020000000c9851a7e1192c1614bf3e67b2fd14d819aa8cfaada5e85ad6e8581e62e352afd000000000e80000000020000200000005fac54be17bdf85449046e695748b0c8230dfae6bc57fa75d7d13b5c2e45990a2000000080c7cae7978e5928dcb860ba9303cbb45c9c2e60db4ac5e37c20685b45e6957e400000006ab5f03d819debe1bd54f3a1f87a0d3936c52d4fe953f54ae8a3e6710a9bae4b6015fd9213da23023fa8decfdd916056c754108a4c27e57bd6cd65ad5e10fb8f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50698eebbcb0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{16C2ED31-1CB0-11EF-8A04-E6AC171B5DA5} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2364 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2364 iexplore.exe 2364 iexplore.exe 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2112 2364 iexplore.exe 28 PID 2364 wrote to memory of 2112 2364 iexplore.exe 28 PID 2364 wrote to memory of 2112 2364 iexplore.exe 28 PID 2364 wrote to memory of 2112 2364 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7bcd1bf7473a6a36122b8a567f9f2042_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2364 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5109c76572c2782db88a35154c9b598a9
SHA1c418f37b56abb67a8ce0428c179720dbf6100236
SHA256049783c2d10432a7e92964735b8765228da4170f49909729f3154fe60fe85e05
SHA51243bbcded1050477f9e498480afd76876baaa47d1d51c07c3c808b78f18ff47fbef8828080ed660d28319312436b8b6407d867dd452125ceec765deede15ecbc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55f1bb382c8a03032de0223f27882a330
SHA1c23c7ce674b0c8f92dc7698faa8813f5e02cb0d2
SHA2567cfc9d967cd13e1894d732e2fdf4f526149281311f1739994b2d012ec15c55f9
SHA512932734dc28aecbe1a331d9da4f6e09e064b0e3e339b266d5d08cad731a98da7b35496ec49e96eeacb8acc2cc87671e8775883c3db7b032ca82f7595a2c42420a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD577efde3473266d310a7779e35e1e3848
SHA1ee36aa5abcab24c2f8841824b746183f704069ee
SHA2563076635b87650fcce9b0bb84ab598c3d75e8031f0b414b5a6f8f262218b5ae93
SHA512e65bead9109797cd1a8ae07be9cfad1baa9435a15674d8947c006bf66884b25c1c1360ca4e9918560e6337aa7c0d45dc98c3eb975e1a56c40506e24f1fedb9f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5225a23a81a7fe97087024a5248849b5e
SHA18a8e6c6566b1b899f9e763e18623a2469e77dcb9
SHA256123facdb11d8fdd463203a643c9855763e59063a11d906d219448cb01a78e665
SHA51280afbadea88975d55dda48951fd440d184581f297b75f90395085f2a32e6da9d5ec55a0da3838318b65e1bc6d8da07d524e7def9ca8afcba914f679ae54bc932
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD580b1d1981548bbfa9117a2e7b9a41966
SHA1a3aa412ef38fa6896576fbf3cf3e7975eb6f603a
SHA256c630db0ef63bd9825a820110ab33a4d88833e434b3275f7112bdf40b3f61de32
SHA512f19287c0eb8893669660720a4a273be0aa4d27ee89c04db4251f8b3dcdb19fbcdbe4aa78dd98e6af25a17e04457d07bef86c855bf29067608a8bcd1c1d59561d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD558cd3aad0503c3c589c35dab1f121eaf
SHA113f3efcd0647d2a3df0219b7d5581f6c1726c7a6
SHA25629461eda1346287a99a88a4a3066212cea10382ef959cf06f67a4d3e4514e41c
SHA5121b87753ce91c366a4fc10fce449ff1c5da40739a280c12cb63e92a49bbfb72ef4ec57bb7441a015c0c4f20691d3db3303cd2f075d27947c63d91057e72e71f0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52e7b579b9d1cd9fe68c915a065da5da5
SHA1ecb54cb43c13d29c7ec43f24ccd3974c8322a08a
SHA25626ed3ddd5f230b4c1660b977a3af9fbdfaa5f8c1f252caeabb9c929ecfdc4c14
SHA512bce0624c0451d0871e8d7eeabfdbab2c262bc38eee2e28ca9f3379ef68630530e9391025276b66993b3ec0e8beaed3d2027a40a2df69bbc39caa69ad389313c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5abe4920083e29a4e816cf45fe8e2e15f
SHA1ef71824faa31c63ea7d8687abd1100e99b08bdff
SHA256c5b53408f3fce830de3bec02d49540a1b60611fa86761e2345a1314a1dc7d5ee
SHA5126761c9dd96f750c090d8f76a8ed5a0686db7501620032cf6f14a2744697f284475ec32278c5207e5d23ad2a73984bd1310131771be698a9b821631289e5bb14d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d710026908ee22fd4458b315af2c7ace
SHA1b3eeff1a9579a22c82e325a915ceafb33765f87d
SHA256e6f236cdf40e86e15e0112328decde51c983a7692ac99681e4dec6cbc7cdf005
SHA5122015dab39c0d7b0822343efccf1145796ff69ac24183b5922245deffbdf925778c7723db91bb53913f9ba421a6a98d264186caced12e753ed7a831d0511e5115
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD531c742285c19c5b15f14d778c8d79364
SHA1b803da2738d0769c54abccffff0798185301cf18
SHA256b013681fb70354d4c1b71aa3347f9b2aa31c222d3fc4770560787d7234a9ea82
SHA512aa2c1e9116f2fa870431881e739df8def784062fea76b5d4547431a22c11dc9933d22a7b97531e97919a61377d1dd34ed7deb44b22141a7035cc56eb186a7089
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5dfb717cbd152789312d3da7f2ff6794c
SHA1e6c99da37bf4248896aecc0b83785c1920c88319
SHA256b50151b0720cec1d4deb82f0ba628615c6a2844b518b29be48d6a4fc8618f80e
SHA51254a8ef305d652ca3fc0424a626e41bcea4ef1b8d4c9b049f9d9c8e6046161a4606611cf1ea9419f8de21d41cb43311e34c0d63cd2eb5f79cddc947c3bef81d50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56e71ba1b2428447e95729c89736cb1a2
SHA11dc102605ff86f360a89e8189135ec3788685991
SHA256407e2f63c8cf4f2fdd651dcb29b531e465be7ba87deaaff093df2842c1cff2dd
SHA5123d09c6ca451d3ad2aff0b778d3aaa0f18bd10ae176842d97ec2a84258ffe943b33a13c71e2b32d8615dd5e3ccbe298c9a1179a6d96f56ccf89acac9ede2e0bcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52bcf03e5b47e62d53197080ba90cd1f7
SHA11e461bf8f654e382ac1d93a9b22dfcc0316be424
SHA256dfd84bfbb1d1c19bbe2f25f695e6d3c6c750cddd91181eb49f9909491aa88d70
SHA512e4edf78139e2f794a3a2911240912aa073631418d272f0d3799abfbf93084dfbc7777ca4c116a5ac04804a43079e1a1f1d9c421badd893bf92ceb764ccc8298e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a95b4a6cb79114060472e3a9ffccd6ba
SHA1f085290894bdaf59e554257844c601438398ee34
SHA25601b04da091c424cf162a141b6f110d98a2363ee17bf7d445a248fcc170014b18
SHA5129c6848e235d7b50ecfc5fb6f3a98d525aafdcb7d48d69f5321083f732675216ce8961c7adfeb7564fce2222ef193fed84693cd953df29b84072a6b3de6aa404f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52e589ffea5820c9fd30c7d0edf2daf07
SHA1c6d35aca67e53d630c9d16acc5380394ac7dac89
SHA2561a62b767ea6be8970f308b9b201f5fdb9c723472b43c6adeb031039ff890a271
SHA51264c05e10e84822a4b748ec82c77e33284c53bcb2dbd6b9a80c817115a3dfa6d45da5bc0515797f0fe83de28eb7882ce520e5adbb3995c0518d39f0f3fcef9033
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53ff3a98feaf97a72325bcaab399c0e00
SHA183d56aae339bbc9a12f4b9f1cc4dc6a3b4bb3657
SHA2560be87139c955158ecd4c2b3125f324f72949ec451aeeb954deb92e77ccada11c
SHA512430808e4017325a412adea0d75bba3c64d8d04a68cb5c570485c8dab9207ee88af166ae2dca691263be848ae3f11b6db407ca311ce41013ba2d70c8ede1592e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cfbce40c040e9a89d9a354048ffd4560
SHA1c5dbf141f2c926f617cf8c638cc86cc1875d18ad
SHA256e589627fe029e9d1bec80d7f8305b9142fb6e82e71a6acbc2381518df7296234
SHA512ce56a9d9f70d9ef77aaeee5d75a6a533515a7078eacdca10a9c9c2b72a94fe5080c8bf4c40b873c6c6e07ae1812515cb25515e5a8b0e1c1d758357fe6ae3470a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a