Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
01/06/2024, 04:53
Static task
static1
Behavioral task
behavioral1
Sample
89692a6ca32ea3f195568f3720e98990_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
89692a6ca32ea3f195568f3720e98990_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
89692a6ca32ea3f195568f3720e98990_JaffaCakes118.html
-
Size
32KB
-
MD5
89692a6ca32ea3f195568f3720e98990
-
SHA1
5c68eb6def16327ecf1dde78d94a8751d5829f41
-
SHA256
6ed4633d766a5a35da49b04561dd445410c8100025dc4f60fd06cb2c4900cf88
-
SHA512
5b1012735c2dc9f2cb5112c9feac61c047e843fad208606568e8dd2d6eb1d552c69d69cacd3800b9724a9c289bbc5a2e351d09d0a5cd5e6a84574dfea81834d1
-
SSDEEP
768:NOO02FWlkq1MFQyFQoFQyFQJhK8Z2oI6hTsZ3QTmmn:NL0cWUFQyFQoFQyFQJhK8ZThTsZ3Qamn
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EF7D6361-1FD2-11EF-A296-4A24C526E2E4} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70bf32c4dfb3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423379497" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ef76602af8b1dc459c2ac305ac9cb3ec000000000200000000001066000000010000200000007f8df036e6cd6d195dd90c53f255059db238c883024977173f3c0ac3d46c6804000000000e8000000002000020000000207a66beafed11ca02012d08236458bf6194aaa92872f84631cbffa957a63df820000000d97fb8e840cfaa900c6bbfbdae8dbebb81898a972207af170645f2d5bf63fab840000000b2af4101a4d44da058ccbdf0699d08aa642b1b774c74fcb86ec098fc21ead1a2f4d1022cc6f669d885f435329f3361c2de34e48bc7c9aba0c24ce981c025e8bc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2372 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2372 iexplore.exe 2372 iexplore.exe 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2100 2372 iexplore.exe 28 PID 2372 wrote to memory of 2100 2372 iexplore.exe 28 PID 2372 wrote to memory of 2100 2372 iexplore.exe 28 PID 2372 wrote to memory of 2100 2372 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\89692a6ca32ea3f195568f3720e98990_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c5ac97a0b027e5adaab342c45c54470
SHA14d7a3e3552388a788a562856b74885bce9bce7f0
SHA2563ddc5dc14948cc8565ffc29b2d592ca42b7811aef8c0ff92069f4ab57e692588
SHA5127ad7c360875edbc49742829613dfc77e56c63e1248c3a3dc3be1e20eb03b010a71aec620e67076f2e82401af8b237052cc3f46a6583716974b1821c6835e41c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583f579b5a5f79fb55f64f31526d3cac8
SHA13c10df6547464ba38267551444f9dd9fbd92b94f
SHA256f2c73647122039105cefa10b170a3bf3f27158e2fe09393fb8d13a5f99ce95c9
SHA512218a3a098f1b11191f4c57b139bf043eae3d5837c1c8fddaebec5f75afa3dca0fdd9a331cac83a1b6085c9ef2b7bde085a8185571934e013a7a6004227a6953b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539eb43cde8fb8dc2eee7c3d8d31d1952
SHA10ac575dcf598fbb0f4eb699cb7a7f8a29f345cbc
SHA25621c707f9b6241eadb20e7594987714ace9da6b23066c28fd0060ad84c395489e
SHA512fea9a07fe48d30a3cf42cb74b15caea6d711f01f474398d30564714626f067f3a9db98e3a36b6282d550460ccc17decca481467e41652dbb1b7eb215273da217
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a554aab9f63b42bb0ab9215248a1b08e
SHA13b4453f13a94b9a9554d63398b78546d88bd6eee
SHA256c288d3094fff6bfed923212319b0fa6cf525aa7bd9961e723887488d2ce38a23
SHA512cb6344aedf3bb36b55376de7eeb40042119a088af1079ee3deb196fc023ae8f2d69d7a021c70c44343b85ae5a0922e1c4bfffa2fd7462d1984a8ba17ab7cfa3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585371700a669e20991f750f3add10b6e
SHA16637ef48f480ba4ca72ad8922cdd97a354de3cdc
SHA256759f45f96fddb4dccb747f6a58c69997c9bc9745a24a23d9cad31b3e310be432
SHA5126f55a538ea6b0e119f53e3372013c95d54623939d624ae01b05138e94a4cbcb43a8cfbec5060286348c3956ba4be437e8a0f21c3122fdfe194f8e299ecb7a427
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fc5b28958a1ec252a6dff228a69ba95
SHA1083e91f1c9e9269353c617cb8023b021fc7ff18b
SHA2564ce1d708fff43ccd01e9934a2029b123a9cc42ef58d3785a439e482571503919
SHA51265928e666177c22ab75cdb6b5a32dff589b08483090f026472ea2fee8754ef47ae78678fe32f30d5b8c3eb9d682f1be64fc808951154cf26bd157e692e7028db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e17330bd2b8618f1e059d99b0ba6870d
SHA11a1adb09d3f9c2db4ebd579b1b9a9bbe69eb6bc8
SHA256fdc301260a98a7bf8777db31871efc0f70f361af6fecf37a5694d2ba0457404e
SHA512e0dd8e99e64d1484c78a282859ba86c8f0fda800c1a1243cfc43d0067008f5d493bea57a9f4ad0b1f9c6163befebf1faf46eeef63a16eeab6bcde584060f5ea8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5579c5aafe353093bbe91ec7a0f05783c
SHA1b3db05efd6ffa895a7f5ad2ce1a79f2fba01ac5f
SHA25673813210a66e0e84227b728572fa24650062f6c23b7fac5eb6f0f2dafdf389e5
SHA512a6671a1c67716cb8c1acf60d08543493c16e3070ab4198b074fe41abb99345bdfd80bb2191b9d821f589f4ef13b0c1452a15c38b6c9bdc2838d46868fa3f5dae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d55c7656c96550173965363e169cc3e0
SHA106220f774a47e89a915b3015622ad44dd39d9bf4
SHA2563e1a378a694d4fccfae5a98e3c2fc137c9bb8d304805a00bfae6b302094b5b4a
SHA512b47fadd51943ce9b9343dfab83aab1dbb0e40533efe24c78261355d413fb0c638245c135e2a0664f19a69372c8d7304049318f30a2209083893164e1b8575f45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569381b055327a89804c2c272dbcfcd21
SHA10b0a713353c15b373ffff10cc06040f081ab4e1c
SHA25643bc76019d81f76373975abcca4409c594ad495fbc3a813f42b435509bdca144
SHA5126387e5fe168ac78fe206223a448aad31cb19ccbb20e2831c73ffff1a0c0eec9263070d6b8403424ff7da71b2cb492d9ade907886a5717393c3c12fae11a38a2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5598eca8addca3df03fb03f21a2a5d320
SHA1b0ffb9366545d0322d19f2f79aae66684ab675a8
SHA256b3b33bcddf1c4db9627d36aabb530eefd3687142e5da975d4acfa158d984dfcb
SHA512944a64c6408ab580333614bc36cc77c2db22582a95a74f710c8e4ec717983431fb0ce172d375667f1cf2aa896772fdff83bff6244a40c3df336f6ebd800f5497
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fffcc439a015e5f29deddc0fc3640b3d
SHA17f6f753632dc891133b2e81d66f908454c16c6b7
SHA25624c947bebd8c9ea14c77ecc2b00652bb089dd86ecaf2633397a79180ac81b050
SHA512bcdce3be8ab66028085a1ca446d260127b0c50f5f1c7a56de610286b2321bf7d37e63e74f4a02824806366b61195b8385fdd2edca61bddcc84bce9d0492cb77d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f39840b1f3bb2c2905bffe00ef8f421f
SHA1f6c69062dc6d95269825d06822e2e0fac233ead1
SHA2561035de26f2c183cb6bfe7fab5bb175b588e7298b29ba821b4869df2f0c810508
SHA512704dae45d48ed8377bc40c8df710df454a3d6c0ee40333b6db8d371461c810bb16759352de9245671f78a2e08ba38fcbde30b0526ee5b952ca7ed690132b3a8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c9c7aee3d3ef15e273a0f86d0d71be6
SHA1d06165c0c00adbc0aab7cbcf358341c69e32b154
SHA25608f025be004000ce29dc24f01355ed322b85cc0070268d09dec43849d4ec744d
SHA51246e4e2bb6892938aec7fe66939b95620986e8313a0a1b6d34026a43d52e2061acf44e1678322d527c99e6a26d11133b9f36130ab9bccd9655aac8f19eca5f5d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb43a7a0e2b34d6259da34ca3fe0f15f
SHA11fb37021318caea9971c9fc84b2a5ab472568139
SHA256ead19c7a1cc859c6d7772f7e83fb4d4d385dd2d1e4d4be42702fd04af43b3eba
SHA512f3e0e84efc2a40375c92e9646898232a718300ed648d135ad20c42ea01d05c154169eee2ae506b4fd4533cf4b047b88c4cbb4f3edaecbc201e90464623d0992f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb2fe5cd9296156db166c217220d951a
SHA18d886810a987c612431f8fa14349141285566b4d
SHA256eb52273159b1a2f96183dcb93f914f9d99a9b17df6284ff7a530320d8e3312da
SHA5125cd3cb6784f62feb82d8a3dbe25ca0794ae42f2428f1feb243a841b7486cab6d7fdb50da966a555829ed43410d001be8d9bd788a3f615a7de2be4bd62ad1fb0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e55b7edf738f302529d2d9cc0c8834e8
SHA172cf128197001ab96756d956f835f7744d1b4ffc
SHA2565401786a7b0799d56ebb3fda33ea947d31972a5dd36f3948e6e090643d501206
SHA512c70cb0774338cb3f1c12bb0047df178a3053c082ef39dd3de8fbb624ed60ab3725f43c7ea59497fce0ece6581980849b190dd364fe930ca206644298c4e1e703
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e91d8c7c0721fcb9b2198d023f72a16d
SHA18342d5319e1da50cd8f40a0dec6d582349d174f9
SHA25665d0d36edb757e06bfc570e11fdb59a9acba1e0c8b604877e9ade2b3d38367fe
SHA512f060836aa4091e315175fb842bd4131600c793e70a47199d82ab8d4f06335bb854148e9688c20990a54b3267bf22059bd5114ae97784d2f1a80837c1cea9ba7c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RSAB58HZ\style[1].htm
Filesize114B
MD5e89f75f918dbdcee28604d4e09dd71d7
SHA1f9d9055e9878723a12063b47d4a1a5f58c3eb1e9
SHA2566dc9c7fc93bb488bb0520a6c780a8d3c0fb5486a4711aca49b4c53fac7393023
SHA5128df0ab2e3679b64a6174deff4259ae5680f88e3ae307e0ea2dfff88ec4ba14f3477c9fe3a5aa5da3a8e857601170a5108ed75f6d6975958ac7a314e4a336aed0
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b