Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
28-05-2024 18:33
Static task
static1
Behavioral task
behavioral1
Sample
7df551692fe7823ca5bac022b12adb9c_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
7df551692fe7823ca5bac022b12adb9c_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7df551692fe7823ca5bac022b12adb9c_JaffaCakes118.html
-
Size
139KB
-
MD5
7df551692fe7823ca5bac022b12adb9c
-
SHA1
5c98be37ce375ac8d58610fae15723de5ef1a6ba
-
SHA256
e7fc967fcb23239922fa435d6eb1e7395313178e654e8209e2773eaf5056fd43
-
SHA512
18e2674689fcc82cebb3ea8a1394a533016600ba8c34df5002556581641b98ceaff613eb22d79aad0b23b6ba4bce72b66a62ae54ea47f449f65aa1fc3fccb6ce
-
SSDEEP
1536:SW5iJvy6egs4Uz45dMIlIyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09wd:SWONdAyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BF0C2591-1D20-11EF-BE0C-E2E647A5CFB6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c6ea723f63f1ca4aa01ca1d6a3203c3a00000000020000000000106600000001000020000000b3e2599774593dc370a9634aa7987d75d8a476a020b0b2e3c8b5557e8aa05776000000000e80000000020000200000001362488fb44fe1a1a39bb37c459d349f7c5a175f574398e7a941cca8a0945e7d20000000abed4c4845fe45c3ed909cb1426073d37bbd3b3ac428b784e718161738de270d4000000098eafd1339bc7ecec104830706da8555c6cd4f396a6514fab5eef8406ce639590cce17476335c01b7edaba5f54718c8c61613e26fcd4c300686811d09c9001dc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423083066" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0ceffd42db1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2132 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2132 iexplore.exe 2132 iexplore.exe 2980 IEXPLORE.EXE 2980 IEXPLORE.EXE 2980 IEXPLORE.EXE 2980 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2980 2132 iexplore.exe 28 PID 2132 wrote to memory of 2980 2132 iexplore.exe 28 PID 2132 wrote to memory of 2980 2132 iexplore.exe 28 PID 2132 wrote to memory of 2980 2132 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7df551692fe7823ca5bac022b12adb9c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2132 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2980
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558b8f01f85414a4faa7bcb634602cca5
SHA147e111b9932571b141f6729585ddffb8d5d596df
SHA25674642b7193797ef608a6709e6c635388a7bacaac136d10ec387efcb4c80537e0
SHA512a7e99a0734efa4db6c98b85926d4b93cd54dbdf3313f251c8c6ca23f94b554efcbd42689781bb9c0b5dc7dea51a76831bfd512f7c6c2349c8e688878b6998150
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b20e8be66f0c71ec8fa4ef828d7b845b
SHA196ff0140c7cf7b10fff54747ca76d720bfd6bd4e
SHA2564b18432ae31314dae93373e5deed22fabc0a5e7e8861ca060108efd3e1d43c36
SHA512f251b22de5cb8e9982f7789373c4b21481e1af5813084e2a19be4153cabd99f84ad691c1796318201615db12cd932c8eb63fa2e9a001f866a2cdb9e82261633f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5089d9f6d711dfdd22d779869c8647f9f
SHA16de5ce827286bd1f71a8aae66f67516523d129a6
SHA2567fe26cfe0f01d60840f5b1e6986d1a5c2a9ecce73879d4b29fce28534cefea80
SHA51267e04ce2b273af7c74d2d60bb670e1282221d99f0f60a75acd78b25105962c033dbdabff6ea42739d39728ac97bad952cc21ed0c164557aaf1d48cbd959e7292
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa247ea834c1a4631430877bff5239ed
SHA135bee0582b1da29cd0c531b986d6bdffee26ea6d
SHA256b8d5f7300081b6108eb66d76a93f7815c65a8dd49faed3d37d07f259117a26e9
SHA512be9d7a6b75c3b6c4e09cfa60e6698988c610cafda3ca286385ffaca976d7baf881cb5c8f0b44b8a9f07f857d233c1dc2f2f6cc2c7d959f2abb3d9901c4ce786a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3c764d5b2eb1f33812f65774e6d12e3
SHA131804afe0fb80e3a51cb12730f8c78c11eb9447b
SHA256b23684fcee9fca76e25311ff6424a8c4b9ed975b7c115f08d30e3d6c551bb78b
SHA512083fd15b87037d660f866274e1b531aec71f44a5f165eda9c0e8efd98dbe3649adf516fa33f2507c6a15f6cf8bbd81bf2c4cd05144b12b280f890c3e4713e212
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532297d0a3e1c9911b312e9878fbe4459
SHA17fc636d1e8d0f47818dd11538796b4cf82905fa7
SHA25672223daecc832878c62898c8ee262755fabce5ee57f96c201b888bc9c2dcdb8e
SHA512f05ec126e82c81567c4f901f360dde9d1bfd81767739701895a9d1341022154e8d1a78be7c7791a2086edaeffa9e4308e55d7e4a50de14ba380516354a55dfc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f170ac516c813b8a767e5546731ac3cb
SHA1160259ffe86230c70e5a3881d8ac769d4c4ad0cb
SHA25684785dacbc07c79d5bd9828b4aa6068396a3472c1302d4511f472a57ea6907df
SHA5125992b1c87f02b79648771de81413d9de3782914b5ab7f00691427d9d59152478f40c825eb9244a86777efd6bd3f9ddcfe0b4f538933aaabc9628800e408fb9bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b4f1c592ca7e8c1a6a108b459ea55ff
SHA1a95dff1c6b517ef6793314fda8f927b1e192e7af
SHA256047def483fe1795690501a6b53e19705a3ea6e1e506e5e7e9d0e3ec89567ccd2
SHA512961473e55d453dc467c4e40f284bc5f23a00b5c54045d7db90e9b24a147a5e7b8469ce91d70649baecc7957eaa5393cb97e64420339e861209a20be781ae2c84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b9686aff3ee2f33cd27afb76f636832
SHA194fe04ff08a64a6afb4c646e40403a48be2c3b8b
SHA256842c20a2d14abbff3cbbe412dc0b7d164c734439601a00e699117e6dc3315475
SHA5120f510fc9f847d23fc035d5f59833e65ebe1e608073b1aa49ad9f14000f4d1db985da38660539ce2660d74ee5ce9ccd3ed43b5d38305402b8e4aa95c6f4b5ea7d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a