Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 20:02
Static task
static1
Behavioral task
behavioral1
Sample
7e390f1e734048751074ea4978484869_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7e390f1e734048751074ea4978484869_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7e390f1e734048751074ea4978484869_JaffaCakes118.html
-
Size
100KB
-
MD5
7e390f1e734048751074ea4978484869
-
SHA1
7b903c2fcb58239d68cbc74cd0e856890c76c989
-
SHA256
6fa737fcd7e364533cc1478c2dc784fd64ae7e136691e62155547f94fbdfb873
-
SHA512
a45bd36ba817470fda9bdaba8c08c346fcc34fd6ca2f8b7a73311ab670d406436558805c76d54294b9b7877fb4c59dc020f67fdbbaebf37a046fc2af5b929a25
-
SSDEEP
1536:oEspD3CBeQbh3zOTxxOOFeod8hvoKYxRgY961Nt+HM:oEspD3CBDbhSFeod8hvtSRgm61Nt+s
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423088402" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2CBA9D41-1D2D-11EF-BECC-D2EFD46A7D0E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2928 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2928 iexplore.exe 2928 iexplore.exe 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2928 wrote to memory of 2148 2928 iexplore.exe 28 PID 2928 wrote to memory of 2148 2928 iexplore.exe 28 PID 2928 wrote to memory of 2148 2928 iexplore.exe 28 PID 2928 wrote to memory of 2148 2928 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7e390f1e734048751074ea4978484869_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2928 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD591d1a9d489736610d91ba0c783745e5d
SHA1d7effa412880636c17e6e5f86f1978835980694f
SHA25651fdce859b53035fa4c5b5c1e0a2b76ad9090d23da467387f3c1fc5b9c10e897
SHA5123bbca7affbc3e2e33db7e9d7ac3675006a9f2e34de258ed493f0d12d42bd3d0916cb47296da9e7efe3f8848253495b093f790c0c2ca72cf7f3a59daf1cf1ffdf
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5ac89a852c2aaa3d389b2d2dd312ad367
SHA18f421dd6493c61dbda6b839e2debb7b50a20c930
SHA2560b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45
SHA512c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_02C4C6ED250727F9B08935C0A9565568
Filesize472B
MD535d4177787b05c412c2bf77cd5b7837a
SHA1fbd658dff11171fb18b3761554ce1bcab136d263
SHA25628c838a440a325da201e3a5f0c89510a5f4e2e176e04a8569a5f9f65c0dc1e3c
SHA512b6eb06e7f9e8c68ef93a3a18de81e0a05a716d7c3ec66f94cdec5f0d42c15822a87a46a942d6f8457c5da95d9fa38b4a1cbe8d1e43b84381f0522e28c97a09ca
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD57e17e86e27bcdfeb3c642dfdad71e394
SHA1a4fdb4b0f4849ce29b602c74dfd39ef9b737596e
SHA2561332cab6f5b4263e2f022158415bb9fba7bf784064dd6ae335877f70409fe29a
SHA512a956af17ed52ba3645f6130deafc7d8566cc37043846517ee671690038468fd792d326f0b931168bc109371cdb08d0d73f66d30b124ea4582ee292b61a358a0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5fadeeef2da8076dc699b7f4d060d5beb
SHA138cf88befbf144d17e531e8cf5b06b2c6bef871a
SHA2564adb36ce2aa16b8b989da0a10eded0952d0f40ae3bd4210c7cf3147d532e44f4
SHA51262623566a8174b30b4a2264e7004e62b07390f501b412688f0634722465884088dc1cfd89c017f4d62b633023717dcef52b6cbcaf6c0b2c707b708e034cdd5f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf6283a0ab48c08feaab3046acb4df1a
SHA1ee01864a761f546c84e10fbb144c847b47f7b4b3
SHA25625c44b26a6e71fbbf4f42bdd129735869f7d217d996d8f1667cb87a8ea977584
SHA51245ce93c3e88e1788d493f604882966a4bbf87f144e59182b447df52d89512725364b7576ec514a2d0ada34228e5ff1c6bc735275d004860ef098639f9cb9f0ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de47b5c8d2dfd2f14ed92414017b74d2
SHA150e9126324956fe5a16a4a03ea74a07890eb9bdc
SHA256eb4c70ca27ed36ebf6db377c7a90adef74c1609e18af124d67a234c5dde38b84
SHA5124a8749bb89351f1ff5533ef1b0039474d9d1a396250d5aad29b01d3425ebcd7cd929a1d054692f233822e93264ac8ca26078ac888ac84235f840f6bf08acb892
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e841339bd5b56110041d81871c65d05c
SHA129bb452328519b6fc46fd64b550f5738acd81954
SHA2562b46d477683b815507fe3fab3a13c0c6879e97e02f36925400c0fa695dd30e5d
SHA512896ecadb384e321e3acca210d96f983175d8c1fccf18c71869794cb6d4213f4e8f015f9087e01a99e37d79e058e594230dee4af23ae4fcb6324d833509a272f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562830dd26d9b7633bd1393b12de234c9
SHA1c237c3e1f85fcde15ba97c1c78c4acec91c220f5
SHA2564075befb5b836091c44ffec175fca0016995d04a7a674580e5efd332a9d6fd31
SHA5126cbad24b4fc6ecc8886d011028640a99ff6d718b8e6118c9e5966a66d6c88eee8099e569919968eab7e4f690f6548f303b11e3c8dde59cb91908052319cf68b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e240790658eadba57929dd4de95e8a69
SHA112550b05fe3e5405eafca8903311652dc1e0397f
SHA2564b44322734d80f66086497f1ee01f980cc063412c3b12aadf9f4f13be713848b
SHA512209840efe5cca4ae13a3aeb55cecab4ddffaced386ea827d15e27dcf154b3a39b0cb93bf37f4c2f78668c066279353f6a34616a5a520006fd8242427c7e3f4fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b5e1e8d12c2248faf9cc8e97598bccb
SHA13169cd0d58f4d0e3f0b300ee5928edd76977845f
SHA2563df313015f820dc2e1f355846e367cc98285399fe83f0b20d05aca5c091784eb
SHA512f8b463c48b78f19ac8056cd73e9c30b17689093386c9f464d086c78dc13dc78b62e16d5d24560a38a51be2e6ce1c34a9f17a6e59b011c5ff143798022062cfc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8428c6ffd65778640f6a87dd2e14b0d
SHA1838b8c4c67cc335b33cce657c772d42462dd7c07
SHA2562b51f56ec64b4e05e99de0eef9c86a5ed8f5d58179a1543328bd5418811f2f9f
SHA512bbd3b472c2bb3a6ccddd404691ce4b550a7e372ae0609fc16554445d76697fe8795c1eab81667aa5bae3465118f7e2528a748b2787e64405e8d2de80c0a58bc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD57ae958590e8b7388c575dcd86bdcc9a8
SHA11c7a4ae7e36a5e78d4b1ce9648ef486fbecfb7d9
SHA256aa5fa36bf93920fb13ba4faf9d6ac8b99f86d319f6f6840146e47c9a5da71a3c
SHA512e985d8c1a583d4e1d8b17d90a34cac56f029782a1dd97e965c35578d97a0149457e7a10387cd59f8a105ec551b31dcc4deaea8e5f5668561a49dadc004476d01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_02C4C6ED250727F9B08935C0A9565568
Filesize406B
MD5d65b3dd711f32249e529cc5b074b4898
SHA1d658e20cdab5540938c827bf2cd6131488d3a492
SHA256ef1f3d359a875c9d6f975ebb6846fd6acc40f62e84aa7730519450e1febd5aca
SHA5128233ccf777cadb82909b1f07bda2a5976fbeaffec4b44bc3d1f5bbbdb53f925fb96ad5a5555c3b241bc43bd3b536258b69c2c8a488dab7445bb06ea99a67441a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5b28654c92e6c9acbc179208b4e369be7
SHA1885a4f2a6fd047ed58c062a19d8c5a1b1e5918df
SHA2566cdbdde44bf068ed9133211a3b408c26c7452fc17bcf20052bd2d13886675298
SHA5124e4c4611c542b01944f1237c38a47b66728c4f106bee8c14a7dd9ce1e7d1ecb29b5cfe66ae0f66a0f7cb00528fd7e00bd56b6d4a86c6ba1a832ba0fc2663b449
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3NPBB818\platform_gapi.iframes.style.common[1].js
Filesize54KB
MD57ef4bc18139bcdbdd14c5b58b0955a67
SHA1afe44fd9a877f81a3c36f571c0fc934324c6cbd7
SHA256192bc707852c5986f930528442d88a79e5bcf4513aacc2b722a3c5e964501838
SHA5126c2920e80e4d5059588a32f75bc2b5dcc19f8d68224c0935d74f9fbf49476ca5b1ce43c279768f3d36871dfcec39f36db3fcad559c2f93cc540154cdbb04dec2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5OCCPTL4\rpc_shindig_random[1].js
Filesize14KB
MD523a7ab8d8ba33d255e61be9fc36b1d16
SHA1042d8431d552c81f4e504644ac88adce7bf2b76f
SHA256127ffe5850ed564a98f7ac65c81f0d71c163ea45df74f130841f78d4ac5afad5
SHA512e7c5314731e0b8a54ab1459d7199b36fc25cd0367bc146f5287d3850bd9fe67ba60017d79c97ea8d9a91cd639f2bc2253096ce826277e7088f8abfe6f0534b63
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B1014REI\cb=gapi[1].js
Filesize133KB
MD54d1bd282f5a3799d4e2880cf69af9269
SHA12ede61be138a7beaa7d6214aa278479dce258adb
SHA2565e075152b65966c0c6fcd3ee7d9f62550981a7bb4ed47611f4286c16e0d79693
SHA512615556b06959aae4229b228cd023f15526256311b5e06dc3c1b122dcbe1ff2f01863e09f5b86f600bcee885f180b5148e7813fde76d877b3e4a114a73169c349
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EDQW9R5V\3604799710-postmessagerelay[1].js
Filesize11KB
MD540aaadf2a7451d276b940cddefb2d0ed
SHA1b2fc8129a4f5e5a0c8cb631218f40a4230444d9e
SHA2564b515a19e688085b55f51f1eda7bc3e51404e8f59b64652e094994baf7be28f2
SHA5126f66544481257ff36cda85da81960a848ebcf86c2eb7bbe685c9b6a0e91bca9fc9879c4844315c90afd9158f1d54398f0f1d650d50204e77692e48b39a038d50
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a