Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
28-05-2024 13:31
Static task
static1
Behavioral task
behavioral1
Sample
7d213891b0f80a500cf2bdc131a61434_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7d213891b0f80a500cf2bdc131a61434_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7d213891b0f80a500cf2bdc131a61434_JaffaCakes118.html
-
Size
41KB
-
MD5
7d213891b0f80a500cf2bdc131a61434
-
SHA1
33b942f84772d80ddad32be79fc803fa52f4947a
-
SHA256
25fb2c24575dd7b75b780980e2c5e26e75e7af10a713c12be3025625eea9c19d
-
SHA512
34a79b47dd4d1d3e7ae557ba6a48c56d20f2239e96db7997fd7e7d0c9a3754d21cf9dae40348e5ad08af2e2f8e099390a238ac4ad580d4bab7cd12b6068047b6
-
SSDEEP
768:S0vjIGmjVEHpuNEBKJ07v6oNJBWg4Im60v:S0vjI1jVEHpuCBKJevNNJBWg4Iov
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007452926f38d4064e8902bbb7b8c25bb400000000020000000000106600000001000020000000f5474af8973fa3aa8da291a757d7e4ba414b8b3437a350d5129163c2df8c4b61000000000e800000000200002000000055d6bdc3d638e4d43506b9430f6d7fdff361e66462ee81229fa875a385fba82220000000ca5c54401fabf6f336f02930e65cfefc607e0f8b7576298e9c358f725542ca32400000000e9f157fd394b5f9e1396b3d9f4ca1388357e0adbb59d4150327b5aac9107c4aa33a2b098259d2c077034e1636ea1234d37f714e0b28f4c8c670e8280079c897 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423065038" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80f5788003b1da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A689A5D1-1CF6-11EF-8A74-66F723737CE2} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2372 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2372 iexplore.exe 2372 iexplore.exe 2980 IEXPLORE.EXE 2980 IEXPLORE.EXE 2980 IEXPLORE.EXE 2980 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2980 2372 iexplore.exe 28 PID 2372 wrote to memory of 2980 2372 iexplore.exe 28 PID 2372 wrote to memory of 2980 2372 iexplore.exe 28 PID 2372 wrote to memory of 2980 2372 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7d213891b0f80a500cf2bdc131a61434_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2980
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
717B
MD5822467b728b7a66b081c91795373789a
SHA1d8f2f02e1eef62485a9feffd59ce837511749865
SHA256af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9
SHA512bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD592a1d2afbdbad4ba8cf61334c28dd972
SHA16bd951bf8f42bd3ff76b01606b66b3b2b15f1636
SHA256925d5011c75f3023355f7eda8db197e111083c2fe9b78ecf2ee3cfb2b49ba838
SHA51253ea8c23949ccfc10d66f9a582e6f9f3f463533ceb13a39b16f58395485e759b9a076d3553398164758bcbdef9d17d62ba6adb781ad7be365de41aeb7c88830b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575728f0c1baba92db4813f81f3414945
SHA15441646e8ab0568cc77b90663ec1943e06c5fdd0
SHA2569eb904de07efb11dd1e3102e95b5728d8636e33fc8342f69910e86687b0ff986
SHA512a103e26dc8db78dc9dbf67ea004d40fb3cec92af45aa8fe78df655358b0f9a5c9edd24504ce3bfb3022c732a36e2a16cc7b1388a42cd15b0f781b9c3bdaea99c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd70f1fcb606b93d3ea1c4901a20c32f
SHA1b9dde218fd610dea48d4bcfc32da9fe10bb0ab82
SHA256e5b2fb9cb9409686fd6caa198b6d04313b43dddc2fee6256e254c78ccbd8e2ae
SHA512cedf19a741702ecc88bb7453da7025326a1a51ce27fb7f2c174ddc4760ab46777d0a6ca223fe4c5ab933d75a52697362fc373b36640b179492bfb4fe196ec8a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9086d84d36f4fb2007d3f36deed6172
SHA18348574edc0ea99f038f6556a66f6b14148c01a0
SHA2561397f245571a63024e05b6fb2975809ba362c81515a4c9fa8830fc08935d67e4
SHA5126539d175a343072488f410e65017ecfe1e4f16d0f0bb0e623e302b24c348718c4652e2ef8d5ce70dc1f1797a8308a7c3cedcc60387aac14cae5576bb85c7ad17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f643250ed7404fa5001568a5f0450c2a
SHA1a627afbdab90932efa307bfc54b97959058c2556
SHA25663380b20db1ad17f9141a773a77636423b1cc9d396e4db8beca008c456d5a212
SHA51221446386ec917313ec5e3d24f9a6d4a6e63c97986ebff09c6c03c8dec4788e5c166b9ae91263ccc6c9ca0be5c0c1ef569c1ec95a0e738c0bd34963de6f3ea894
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5f5585977ac5cbb032e79c77a2224a1
SHA1a9531a8ce82836b560f9ae9d48772e2e6e08cd69
SHA256ce973ccf4fcd74e1660d74805b59fa4fb28c230f2543041145b5f0b7f1720010
SHA5126a0b67531d125c421027f5e35d1099cd217095b512fd03d6dca139330f1e1325f4ba9a15091a7f5e505eebdf271b56807fd1da4c321e9215b05f759090a9bb49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD572c08d12f396b42959502969b86845d5
SHA1a51291974aa94c80080bad4f35f885ac91ad3c06
SHA256e281d68cb2fb076a94ef1fcbfbacdb4ae34fa9cb3fcaf40a86a0d908c2570c24
SHA5125445be6beac212528a7bcdac4b63276dc52e8c949b750308d96acb16134d92c7834b9af481cadc3e492047eb89a79ae700623ff9696ecb2780d302c48bebb6e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a