Analysis
-
max time kernel
136s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01-06-2024 06:47
Static task
static1
Behavioral task
behavioral1
Sample
89a861a44e822cb3aeb9503a0427ca54_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
89a861a44e822cb3aeb9503a0427ca54_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
89a861a44e822cb3aeb9503a0427ca54_JaffaCakes118.html
-
Size
185KB
-
MD5
89a861a44e822cb3aeb9503a0427ca54
-
SHA1
2d7b06fe2485e1c3e8cc4da52bef8300add816c6
-
SHA256
65fa359b39daf35deaa4c5be212f3bfe675360f9749b08e00172dd5fff288144
-
SHA512
dfe9c7728c216d966c9da46f55be883bfb45393d95b84891140541cd6008af22d1e2e9b5549b25098edda5252739863f46912c94e1ef5803162bee6eda6a1589
-
SSDEEP
3072:S8NyevLoRyfkMY+BES09JXAnyrZalI+Y5N86QwUdedbFilfO5YFiM:S8NyevLoUsMYod+X3oI+Yn86/U9jFiM
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DF6E4331-1FE2-11EF-8303-EAAAC4CFEF2E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80cf32f3efb3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423386342" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000cc7f3f0df4b70a40b24737ac653c390c000000000200000000001066000000010000200000003db095d1f1621f0449735bcb1e9f552beb92adb3184b3c7a0b7b6cee453b9037000000000e8000000002000020000000a22a0cc665adc005e4a4bfc0d28c75233c4c5d7c06ed5fec63af8e46a33ebca420000000d343f39904770fbf84a2d77572bcc8aa299cf6948a99809f56e26503f48cb34b40000000e26e8faebeafc20868f5497a5b596629bcddda91f52537f36687fa181e2821dc00bfbca2124a69be66adf1af43eb4d45831c2741d2763513acc97891f7bffbbd iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1948 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1948 iexplore.exe 1948 iexplore.exe 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1948 wrote to memory of 2340 1948 iexplore.exe 28 PID 1948 wrote to memory of 2340 1948 iexplore.exe 28 PID 1948 wrote to memory of 2340 1948 iexplore.exe 28 PID 1948 wrote to memory of 2340 1948 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\89a861a44e822cb3aeb9503a0427ca54_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1948 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1a8bbba5a0950618a6b0084323e93b7
SHA1780e716a4e247af52581e987fe8f1e35f651539e
SHA25663b14a5f0dc61638b0591d8cf58b53cb0f0c0f5e37ab7194407c458bb33a72fe
SHA512a3f6c11748e75f745dc0c2a70b5f7995e1870353d0e0afbd3a57b338a355aef859c397a44e768a205ef333328cc498960498da27f49fa204b5f3809303d3b525
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c77b421f57cb8226ed11863bb5b4a60
SHA1edca131df355da3fee13e5c46785f3b34fe93796
SHA25661e2418ede2a51b75afacb8d43660fcba9667ee2eb430be127b0096d30752e13
SHA5120614406a70812b52140a063ec7d7e49204f3ea89bcf209d5af93effd1cf0d6e6c40c66e585e38a541cef54782a4d17678c5bd85e6a229f08d4d0f408db9ca717
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd05e95df96a2566b2b247ff460ae49f
SHA11524dc750fa0f842618fb3785b83af1546992433
SHA2564b0850fd285dada071193c5eb88aaecec4201211213567545dc14d554b24132a
SHA512430d5c28a7164e2030b12ecf59393757823383bc166acbf76577ae7c06e5196d99b161d2d0a2a04db5e79dff815c7cf79b44026c6ad48358032f3b4053e25def
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f14c185ec5f25e445de5fb34d12cd312
SHA10b230cf79ac39599f1faa87662d23082e6439c2a
SHA25624a5a06bffd423a4c93d68d6a451dfa8b646a7ba260e4dd401545caef8ebc401
SHA5128f0e5b83f252445582a11ec93ed349dcb579f9325ebd87c34e1fb9c09cc5230c58f009ad610746e2ab5696ebb639747ae3c83192e86d0c95139831aea632f054
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a4d4c78566a8f1d57fd492ee0e85dd9
SHA17fbc3ca5cfeb4db3ac376a1c00e212ea7ecae52d
SHA256c8229f4409b65ed0f3fd110e23d7963cf57b2e348372c79fecb928fd8cd20a77
SHA5120c65d720f04f8e614ffb371a012ad2888ab9f99ef47da16e02b90c0aa06ae3c3f80d9f804c629d22f2b6b8e773cb1f5de260f7ad9b5c7209df1c3c8d5905f6cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5412924e0b9a51e01372e38fef6131aeb
SHA182393abf880813533a3d9631676a0bfd75bb6bcc
SHA2569dde6dfcab277dd925311341a06cbfaa9f563f1c79b84bf25b16bcec88d4462a
SHA512bf61139f9705f7ec336576d3db14346f19ec0d76f01c8b5181553c2d3eb8ae1f85bb9f4f1594a8d36c5729738156bef36241bb3ac309c7f89827b655b10e0a78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c984141cadad107ca71ebe6f1bcc7683
SHA15a2120d83381fc3f8eb5c7ec0d29e12570b84db4
SHA256cff0a1a63f061caf87001391513720878d0fcba6765450627da45ef546f73334
SHA512f32f32764f1e947490de6600a0d37ed0ce79189fde9e53470c729196f412956f4799de35f8d491d4804bced7b47579be664dd66c979cdcef120792f370db1d30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560b65f5b42813335ba1f47f8946aaca9
SHA128c596717e810a8c4e02194ff130f7c440fb2304
SHA256314ecde052647090ad74685dc009a07959f3a6e815100a632689bd55d52a5f06
SHA51239067a116b43dd2568c2ef3355b624eeaa52c25213a72d75180f47deac7f9a94c5572e24ab12f4f1119b347fbc5816f12406f25bdac2dbb65c963f0ef5a0a720
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c37961ed6f3e3fb66bb4aa9b1d89322
SHA1fb2f8fe711ce4909858fc945d0258bc3cd9c69d5
SHA2569b19ed4f9b8bb5c81b604bd3de8c0299806e5c61518201560836745df8e4ee53
SHA512732b253f23e99c013b62ddb675a15a2d4c07145fa19a9e71db6ef3502372ce857286bd4282d4c687a6f92be3a18e4c4c6b300cb78422668980c5b0a119529abe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51866616b212b61554e05d399bef19a19
SHA10c8a26ab9fa8f96acb9df29aa9522f477a8d7f1f
SHA256896b55bf81485a58b8ea640ac07b42c0f0e787b40d6f1a7963b516f44d173f3e
SHA5129dabc5c8a8207f7c053cb6e3de747598004543fc75bd739f185a1b7004a83b09880941717abb0eaf90ce2a1a97c57843187da245cb1a0db12f925f46f28bc015
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9f74bae3445e7832c77ba778508f87b
SHA18160cadb6d181ae9f283ddeeacc3a61fd424ec5d
SHA25643b9236a2c2523dbd40c59cc35d639b5b2e21193f3427e5d5b300c852ad6dea0
SHA512306adc0b7bc3e470001133b6be61912c31d3fcc2ea856ec2f0ee846938f6a739d86ffdc70d763b2e3333056422dbe771d6d75315937dd66f04847d83ce5fbc4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508032883ced72c201b9953c85f947ef7
SHA1540a55ecefc944e17a6ec57601230374dd2cfc82
SHA2563a487a3f34a93e2ade65f92d8f70b53860d25f7bb0f2cf56529e14cc994b016d
SHA5126fa6fbca055638a024368b8f068fb9c564172d8f19e309c5a7b06a7556c2d98e7fa94e41a7ca34b623e3d5aa5357fdd31f4658b89e5ced7ada2e4b110e6732ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544db2692c5ba7566601b418f7f24f7f6
SHA1f4def60751aef7a9d84f93e06c8e67b72ead9ce0
SHA25665551240601fd51c731005ec8b8553133ce539aebebaf21d74e84ed3dd99a90d
SHA512b3770814a7629684a4d5157700f2dae1b6d7b8aded594d23285c4a20a086241000a7c43eb345aab48e87a6ac9e8e31feac898de5b136e08768b53fdb00d86d1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9c37e2af31b78172edeaef09919444e
SHA15b740844c4e68731fa15409ef8063a9bd4c114d2
SHA25659b1ffa3a88f5ea9370b1f4a88d228048aa9ce2d6f4585291bfbee420ae724d6
SHA512123eb5c23180023700a9e20646f6bd7b25aa355752739c416112d076494ab8ea8ce954b2e66b3d20135a3046411253507a11a27078804e9a400738129f071284
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5122769b8e97777c3b82e1edd54cbf8d5
SHA1f5c818b8b8626ced58d86ed569755b7382a53e1c
SHA2565344ecab1a54b495df874d47098a1f8ea0e7ac9aace6fdf60d2aef754864f17e
SHA512328cf7503c7d2bff60460919a998f1e1aee9c18136c8059f8ab56d184f0fd756830c14a65ab53e9eede6d5c21e9641854d3d8ca384d083aa6f4b2c183cfb4f95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fcea452e4a3656423a8f8e5684dca53
SHA1658fe4dbba12f2858d7036c500a742d85545e4d7
SHA256389dc45d623a42a5a3a28a1cd2a7ba663745584734f73a33f5f18fd9136718f9
SHA5124ac92b6a1465b7c2dae8e4936105ebdc46bf085e64457be28de7063cff61999611c044b0c522335f626e50d617017eaf74fa3b093e9bf281a3b681faf85831ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fae13bc01a108870ee8276df9ca8746
SHA10f57ddf432b5128ca26a92dbce876fe659f6ada9
SHA25650a74e0d012049d5545d52e380149526ac43889ab404bf3499a72e5f5caef0df
SHA51290179696e1623d798bff232d910f79757ca39fdd2ba53448876911399aa9ac66f3bc19bcdce12d813308ab7d7f3870a087aa20aa7a9608d9dd668a0b017cf072
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5766474d9ba5c14fed78e07b176246104
SHA116277a5ea464b94bf42af3c42aa3646edd7690a7
SHA2563014e815d83ab9fcd04245d2d93f5b413ad16aa1df7ba15f843d42ea33f5e9a8
SHA512d603413fc211ec77fcb6bb6f651c92eced69b545b5fad79a30aca25cb0291cf71878f131f8b2758e225c57163f43e41c433eee8b65ce20b1a2c0c532e3a0c13b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d62ffcdc13f889a13e543badaa10d70
SHA1effa9b706d23c1844ab9b5b8ef3cb23ce6316670
SHA25693e840dba3434fba011dc95b9bf05a4cc4bde158b95f61402d2b889a4f23449b
SHA512e137d6febe749570827ad555d3f65f20a6177d4e117d53d02159d91bc949d11a7eff6857c10134d49ad3e69546d53cfed326ec351198bab5b736cdf726d5c219
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b