Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 00:52
Static task
static1
Behavioral task
behavioral1
Sample
857f4715d8768e5f2d0f085039838db1_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
857f4715d8768e5f2d0f085039838db1_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
857f4715d8768e5f2d0f085039838db1_JaffaCakes118.html
-
Size
15KB
-
MD5
857f4715d8768e5f2d0f085039838db1
-
SHA1
f2844f5b2a27747b092d384624e9d4362cd1cb6d
-
SHA256
42a20a389f1c92f537491f70d44791863873bd7f88b6a96fb12c27d1acea5ce7
-
SHA512
fb44d7c8220033d7787f2a84d747691c1b3bf5c9786475765c5a02dd30f4f368fc329e538c6b0f5aa3dc1657972661ea6a25869a71f4e079aeae60dedb982043
-
SSDEEP
192:SIzxx08KWcWmbvycGJ/24xfvvzuSHAOM4TcfEmfQDh2DmzsEds/YhNjOfsBNkwqY:SIc89JvC/QBGo
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007882679ac4cc224b9850eb7600122a5000000000020000000000106600000001000020000000324a62b3304c27bc8cba97240f917fedd97bef1a699142c5e35bd3bfcd45901f000000000e8000000002000020000000054f739c837b4edff40f867d8962fa212075fd5686f0ccae3418b6bce87df32b2000000006d49bebcfba8a06f323051c08af0d6d72a327dcdd2a13b1ec080007f628902940000000fb419d24d8c8ca2c60bfdd2da9f7e4fbc82540b59e4f123081ee2482ed4be66df735f04a8a9b81522d53f2c93a2972269d220a35c561a3c1616d746515a8133a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2089d1d3f4b2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423278591" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FED83E71-1EE7-11EF-BD10-4A4F109F65B0} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1948 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1948 iexplore.exe 1948 iexplore.exe 2876 IEXPLORE.EXE 2876 IEXPLORE.EXE 2876 IEXPLORE.EXE 2876 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1948 wrote to memory of 2876 1948 iexplore.exe 28 PID 1948 wrote to memory of 2876 1948 iexplore.exe 28 PID 1948 wrote to memory of 2876 1948 iexplore.exe 28 PID 1948 wrote to memory of 2876 1948 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\857f4715d8768e5f2d0f085039838db1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1948 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2876
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec037d8ae8b7fee791b7014b8bd9e892
SHA11ddc28d30a1c54b5bf9e094ecb1385b74b484fcb
SHA25600e64e774a029b96006642f4193c53f6172cd85615b227a90062155683c7422b
SHA5121c2484ff336f76122ff8333ba53437135dfb431d210dab6e8b72816940b5b0b9b2f73932e754fd14e5ad91a14cfed845fa866574e6c5ab465a664fc3367aa489
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581de3b0dd57543d0e4fbfd842b377a9b
SHA17f12b38bdf8a7d35008959521231ffda494b00d9
SHA256fdc8e766e4d5c917da9d30d695eabfb827f2bae88d10df2b26e35d46a9795543
SHA512fc7d5974cfd31717d5197b86fbad02b24d266cf2b267239acf292b8fcd74849c16dc7a8a42ce3097816257d5a3a5f7f15702879ffb8a24ca9464528f2e5d40d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7ad7c6469ad111c22fd236d4b64d2f4
SHA1bc81e74b84c77b0604348da88da10ba6a37223b4
SHA256cafd18581d285da9b8c7b27ddce1ef2646fdcde3f00e31d2ed5598ba8e041c85
SHA5121de2205fb087a6a9c9888c3ca3b48c97da0d4fdcdbfd2cddb13df23815e874044289bbf6aceafa5e8185cdde3fb11c45deedab06630afa973c5ce0d2762ebbc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a0d26c7320f13aad65c52e6547c9a5c
SHA1d6708267b4c1dbd195ead84c95eb391a3d7629ab
SHA256764018e0d5a0e3b818941183bbe73494e832a239d5b038b540761c2b7cd9c971
SHA512543035850aed28024b828cc019821bc1cc4914f9f8e2beca5839d6a1ccddfe5d7d173ffb2e64b75bbda081b9e27278366e9fc7cd643b34f1fc9c324a88cb56d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1aec4d721a8b4f9f73c2df2359e80e3
SHA10454919d30052213a5558b9e81e4851d58e13645
SHA256fbeb45ea77197d7669255d3cb65b1c9e0e703784a963904129c0dfbde526c76e
SHA512e5f54498c4c929279a597599211cb8b17d01323835cf26d88cf87a2e10f257259d3d21929e4072bc33a36a737efe026fa9f12e529a17a87301bab3511a461945
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5585d3d0a53587e37e271d68daac80ce6
SHA1fe83261bba849c3ecd0e7cc06b8ce641e551c1bd
SHA256a45338fabe031d01cc7906ac1d7133f6b773d5ed64bdb446341c05b09f157986
SHA512abce5a22a3be7d07488b4ee21f953784d4e141fc90108972fd34a51eff34cab08fdbbc2130453b2069b892b21a4acbff80fcef40a5fe7b6b41dae6d428c5a25a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583d9f051d54cabb0b022170c52f2e502
SHA1d196290aeca6f1ca16e5716fd4245f6558bc3d31
SHA25644cf354334535b7ca2f6cd2d0526d3610a7076c033a530b7615ca8c010bd46c2
SHA5129cef88af36bb9ab4589a564a75b1a11858bd5a3ff02356a505d0453eeceb6686570a335ecd7a0c0868d18423fc797f4dfe5f7892a98bccb79198693766b72a88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2c1c00ba2ccd8f2b775a2bedacf5f11
SHA134c0bf6854c2e5646868e56f9300d043141db298
SHA2565ac6bc7e21bc95543965bd91eb96ee00076d79a258c84d55ef9aac3f4553dc3f
SHA51223f8da2b6778c36e4b8cb146311b1db64f3d84a1bd945f6e5b5d8344ca007447c09d816b2786f33a05af7bb4cdec6b5681d1bedcd52f9037034eead2789b39e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f181bc31cb1bd8b162eb6b2acdaea864
SHA1c4085222e880849d90c21bdd600b27dd7141b268
SHA256f13863f6612b1b79f2631909f042e3c477ac27c7373d36b99a9602daab01a76b
SHA512f4bcd47b165e1feb34b4af80f562e3da17d2bb873f0f165224318d4a39e33920a80d2e94ce588656fdf08e417575a9697f357c36941f6ba7ad986619bbdbf807
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503f29303b6d5d81c929ebc8e4aaf7fba
SHA15b2f22b8eb4610dc8afa5a560bb934ce7eb36703
SHA2562dd5c379d286703d67fa5e39c0a1c0430741b09cc84340dc48c0b1b067dbdf00
SHA51284ee94ca2d3902fd4c9db6e0efda083d5e22e837230cf6f14282ad3107aa07c72dc28834860adcefd63954f396e9705b53577b982cd3b3d0a0e8ddfc5e9831f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f89a25ce79879f9ca6a79abf26f4b9c
SHA17667aa8be1c7ff343b63a92bc16b1ae86b1a1362
SHA2562c352153e83f3fb261b2344a858c73b83b3e048d3e34e5a05b2071ce14428e32
SHA512ca975444d350a0673d52fde22a8d4a2160ae075ee70345dfacc75c78cd13385ca64553f8f6bfc8e09dcc6fe04e31efbc6f703bfd0dfbdbeea0cefe2e737d89bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e01991a25849788c68fe062ee25e4c0
SHA110882754ead4efd9e38da19a479a17b9c99e8ec2
SHA2563f366ed0115cc3e6e249fd4945742256fa1cd9fbc5277730e8b69eda11ed2b7c
SHA5121b11a19311130a263ccdc34cbf5f48acf11d1c4a6ca278da2fc1872dc544d13b62db0b58715b26cdff0f193484c9f64010dd744201ac4fec655cd96b39a4476d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550f9c057eaca19eefd604fef9f43c7a4
SHA1b20419a03d3d8cdac30de88e770d5f1c04eb2880
SHA256b4a8cc03c732168b2facb63a6b3951778daff9821a7c714df0f09a4cf2edcc34
SHA51246d71c20a6221118f2243d7f5afd794ed2062109d94fba83a708d448b23468e0ce4c4acef72f3e2a590f617a0863aca90d1019a2c0eb9fca244aa0b02708e62c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b0c1bae836d0e19aeb81fd0c490424b
SHA1c34e42d00cc1d65f58a0bdef20ef100ab5638060
SHA256a5e3d0e047e4643f3554079315323a50802b00a674e169036dda6ddc1ba34b37
SHA5127d2e4d34e08b59ff4639e84b864a433f6b8c861075a6dbb4fae8d321745a81d6039b0a08dbb9f7ff03e1883c846049230957fe00e2cfffc8f56126e6992877d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5322acc12197983eb2ae1eb3f09dabd13
SHA1c0b0207efad5e8975d87064a7a2025cc095ef2d0
SHA25693841cb6bea36c5e8009bf7091ac754e9508db83474ec3eb0c867e5fee9f0d02
SHA512bac85c772a0cca17bbd812e489f4b9199cc94a879148197a94e45ff3741558186f3a6d63dcd9745e1878f347dda4617cf19993df16246073e2ff11210bae287a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db1ff1a8d084b0ff27cb31ef9df283d7
SHA1f40a915bf398604d0c540ad6d9c77dfd5054dcc0
SHA256202dd1cf80ad3881dd5cc802be0021ebe5a23d91f8fbb67640b0d9ab8247e9ce
SHA5129155fb1e608bf6e7d9aba7334418b1724a3f8f20abab42b249499268ff17c0cde97ac1b90687d99a39002e5a16ecde047211ba1778f875e3a35a2e73016e2237
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f5dc72e86a244bc74232d6fc1505c1a
SHA1610d49d9018f7368a0d5fe0ba9bd2ec6121a5267
SHA25682199cf6470fb986b957773b066f877a8b0b28c21063ffef7e26e09a2c521358
SHA512161b725bb70187d09825df2101c0d13a4c692c485f2114055c5af6053f7999aafd406ccfb7a26f224af77dc8021a3c9b4186a81137a3c0c1fdc38df5b81881c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e76aa3efca717cc3a1c5dc44a3b7177
SHA1a75f5b565a6a3cc620e76fd40be1ced4e6c78561
SHA2564c01ac67ce9115d28980c18a594403d6f6b96244df50644e0115d99d321e2cd3
SHA5129cab5eca78527cfd88bf1a5880415e6885eb63f9694fee0993d61d303dd8c85b778e8648bd6bc68786c221533e89968f540931588f4a2c3ea02b591c3d00fc9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56af8254f887c2528d287a4c23e2fc33e
SHA185c0a92d0e7011d77b54369d4167fee3c106117a
SHA2563e79e1486bdea3dadfddadb2aee8787f7d13adee41ffd8f90cecb256d9a898f7
SHA512d5d6837eab1173ea7ef6eb58130a530bd032576601206566056bda63a3ef167cf6433117ee0997e7332835bf764764ae85af0e03575f0dd27cfbb230d7e9777e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b