Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
01/06/2024, 02:41
Static task
static1
Behavioral task
behavioral1
Sample
89284d09587687d47e7ef3a9d3aed114_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
89284d09587687d47e7ef3a9d3aed114_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
89284d09587687d47e7ef3a9d3aed114_JaffaCakes118.html
-
Size
1KB
-
MD5
89284d09587687d47e7ef3a9d3aed114
-
SHA1
2621e54ff507e0448ac40e4f7d8f03da8bdebbd2
-
SHA256
0d5de7a189c024d1d3560360191712c690ea5b48003d25ccfa4888d997b44ef4
-
SHA512
58ab0f3e1bc1ee8b4c109ccfd6e88e7585fdd059f47e4f7a984db7486101bea34b983b12dbd45b08dc4d67251fb783f9de12b61a1de0f9a245ced09841c4a608
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{839395A1-1FC0-11EF-882F-5E44E0CFDD1C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423371585" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60da5558cdb3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004d5b7d95c05ed54589196868cf3011200000000002000000000010660000000100002000000025d3048c7150bb0fa3bb1c9c706327783fb6df1d831283c7df0c56162a2e9675000000000e800000000200002000000074707f4069a272730030eccedddcae6be931da0a7e34ab9234f01c37995542902000000061b7c836e037846d43ccbea0e98ea6dd832f35c4253bc779c29bee1e02ba24bf400000001d1b27ca4574e4e6fa074bda1fe547319c817542162f663f17da5f00053fc529aa4107cc1f2c483ca75f6a706af516f8b540ebef1112ad2294419e30a66d557f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2912 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2912 iexplore.exe 2912 iexplore.exe 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2912 wrote to memory of 2984 2912 iexplore.exe 28 PID 2912 wrote to memory of 2984 2912 iexplore.exe 28 PID 2912 wrote to memory of 2984 2912 iexplore.exe 28 PID 2912 wrote to memory of 2984 2912 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\89284d09587687d47e7ef3a9d3aed114_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2912 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD51180100e3b7588249c6debd16a84544b
SHA167ae4c2ace9ec7c81988443902626fe4053811ff
SHA256f149397191ffd5f7d10c28ab03481a24d0932da3cece7da1a98d72325e521b19
SHA5120816fcba9a36b306af61e9c27b8158571cf7fa614958999483aa8cb89eaa410fe7ea4877ae96523cb8693e71d320b17eef0170342565eeaedc1afcba3b713495
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50682e9700babb80002d326fc7feb445c
SHA141d1226d64d3cf093fff4e7c6ef6388368669a03
SHA2564b8709baf0530e6981c8ba00c509533f79d9947872993a0331728133fcb21bd3
SHA5129e7e0846c36b53de6b522a6b23747972bd31f99810a56845811af3875c8925b59e3af02d12a77c5252af3800a64bf936cd835a65da642ec188529fbeeacc74e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdf41562e965740b717b8710246e529e
SHA12a20da3d9bd9298095303245d5cec53f988af1c9
SHA2563994bf25f0c85a80a7470d3e91ff2920845b5635aa6350f94d2f9fd6b5839283
SHA5129ae3fcbdccb4f63019a27b7787ff29f622ac647f6488816446afb9aeb4ae99200ab12b4050ab8244f8b70d721f03599d937802a6ae683863524481baef8b0174
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6a9329526efdb9bd1df32d7e6695e9b
SHA15fd3ccb7fe1ec88933df7630f73a4076f7d00c55
SHA2560dc1f6bf621d03604fe8e1f712cd6de28ffb2c99194905b22c0223edf23d5a27
SHA51289817fe296d7716c1a592a7617171b016bcccefab7cfc687d6e1cb26e2a164188874ec7fb466cf04e860feec4ee7d7d75dd235e899f9bdead9e91aa102a57d19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bd2ff960eff99d87b2451a67d1da0dc
SHA16484d5d1ddc32c15ca7582e6d13f251e451506f4
SHA25605484d899a65b2b971bc46bb4945857fca5f4c263303bb05382f096fce9e9a98
SHA512cb0070d37b8ac2fcc8b8d6c2e60e2ecf56d05e323d577b5fa551900125a3cc54b938e7575344d8cd361b64fc6634fd7b11de314ebe32844158da18db272c63c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b755e5de9a4f9dddc1fd4381c8724ade
SHA101c188021b3fc9e21360bcb65737e211fd499636
SHA256202ef16e25b1f6893d3d32f4424d2ae430d18625b8e2f4e1a5493b902d5af97f
SHA51202def344fd23728656e21de3ea68a6f731581d1a732383bb99407f33acefa31535f205bfad467e1687dd0c518f03e1a10b380976d5347ca3cfeab85b6c13250c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514044c4a3d49b579894258673f1b5cd4
SHA197207856a630fcb708d694d3f70d3f6d1104f677
SHA256ab96615e687ed914c00e864c6960ec80d83809a19cdc6008974c625fc41bd008
SHA5125a901039f2042e934783d7e6e4f8a3439de32c6a12f93ad6b694089449db15068ddbad3c752693b2e49e26811b2ff254aafe89d38b6f2e238530887b962a5ce2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54581b8b35c5a6807c78e9d8419c78ad3
SHA1d701df8aa7fc45ab11673c521d31cf1d11605ed9
SHA256e9939b975bb38735f22eff4e3651cd4ff2615a3bac91a46f0b02f6073f207342
SHA5126f85cb76562429cd15ff76102adc1e3947b9ad262cfdf4b0dbb699bd5ad83b725d2f302685cbd7529bde6c6f6740a8c3c1d6f811b8823537ff09f2ec7760359b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5deab4016477d44ff6c4ea96c600b482a
SHA1fc5d924042c6bce4169f8eb4aa43d00c6f9b6397
SHA256b23be14244e15e8490a22487baf31bcb50fa2cc6ea2549e1c295f1a0bd3e85ef
SHA512ebc8ae7936b89ec78e1f11708d6d5ce738e408e646a0e3917f4a27de9c5dc44c2c8de85d7417f2af5b8e4ccd19ec8872fa755349ea24ac669ba216237dead3ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54eda2bbf4fe448cbe4df373e5774e79a
SHA1ea9bf6a28d8712098029cf8199d58bb7847209a8
SHA2565ce2444119945e2e7fad2bf2582589ce273a0b8243a2abac85af05103bdceefe
SHA5128a5792453044bb937752b90d43ed8ad659a39fe600bd87489f1ea07f320d3eabd10bbca0a7ff92bff8c096bba7dc59860865a493110ccc71bb249af151502e9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccbb08e1fe231aec6f3c8b35c0f6b3d5
SHA14226d15fa50801777fd6c1ce0b59e16e58e2c36d
SHA256970ac30fb07cf6cf6f3c76e9b2c7466c813e509ee30e69a6199feb9ac45be401
SHA5121fc70106501f756fb19b5ded923e245f17d95666707f05f47288ed61112d00adf0486621fd47bf3bf9d1bdef48cc146cec7c895382a92b1ae42e7d9b58f7146c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eccc7dd9d3314958f5814173243f5ef4
SHA1a987434db54c0c965c37309f0d97fe4b67cae9fe
SHA256a6cf7c3a5820ba0c00f560c84ddd53cdf1f6b27e35ad52951fb9f4a728de42c9
SHA512c8adeb6fff97afa26a0c0d5fd38d09ce7efb32e2a7381f5e734ca485767748f7adfe6c3e42480d7e00d2f095b116987763241cd6da9418855b59fff6a6b84843
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533971b5d88f2574ded3d6363261b70f0
SHA12c95bba56975f405f21b53dc43022366aff6fa36
SHA2566f067916f531e0a6b7c3098889b0aed686bcae31ce5a804710753c4b0a4b8735
SHA5120595299ae252786a3f5d39e8a711489a20bd2d2d804a7e55506b4dd8cc5c63b8c22c0e78501f9c9e08a39cc971d026283d5725d16c634fdee807d6f26d1f0f2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50617e4e6d16cb64905e8e260b9f44947
SHA14ffc190665389f4b154c3987683514554412ed5a
SHA256338f773ab99dcebc93b0e610875a660388b6c3d6dffb4e768358afcd54f642aa
SHA51248bf3bb1124ced2e9cc08f49de4c6cb58ab2b540e2cd35e3c33007dd3a86a84418b3b50af022d987f062baa196afaeea1c969a7a2f8b8553a147bb2e44e93f3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd59e68720351f8b4e57a219d2a451b6
SHA17d06ea340ee3f6097bb816eb9d88aa73a08a4e6d
SHA256ff0af37533b9973dd15fcce35c12a2f07156b733101725f305b24b293fdf26e8
SHA5122facf7f237fb8e69539fa5f41e6ffd623629322d501afec289905568e4c8af45ee7afcc39d31c1053edc5a42dfdea8435f2513f344c6bfaeb31f6bafa70ef1e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c4b71bc7988c83a73c013598d27a162
SHA1886e0bc70aa86c385aa74bfd0152e5274d9723db
SHA2561da9784238af66dfb311a49d44305bc9025bfae1e2668adcfa029fcbf6a55510
SHA51255e3eba4ff64c8a6125c9823e155d66d59520ee8a8375c1464c7e66f4945a7089477a18caa56cd99880a467bc47821df0c0b3ad95d12977148dea3ba0e0eecb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD50fc8ea1a3805a90dea0a7fe1b6e0cf4b
SHA1553b48555daeed6c1268f26c3158b6550bd80d22
SHA256f5754a7659fd7efaf6f253822c11b0ce7c154d748267c32982c3d92d6ae70e1c
SHA512f9b9e17518e50681509690f8a669c4bac17729fee3e534e7310f82808d6163e3dc416235a1a6e48916604c4a780cb7d9cbaa418499865bae6a1218ca4030e469
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b