Analysis
-
max time kernel
149s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
03/06/2024, 22:06
Static task
static1
Behavioral task
behavioral1
Sample
92c3152e224b7608460de6c663b11239_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
92c3152e224b7608460de6c663b11239_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
92c3152e224b7608460de6c663b11239_JaffaCakes118.html
-
Size
18KB
-
MD5
92c3152e224b7608460de6c663b11239
-
SHA1
eceb3491c740d1d0af1da0815517ef894adb3cd2
-
SHA256
274bfb62d29f6f27cbb19b4bd38ed10fb05bba3784c37d24e9593ab18498ff47
-
SHA512
293438606885f760506e39890e6853119d6c28a1a6935fa2bd155ba1c82844f8ea50518073cb10ccd62b48641abcd56db2047f2fe4bb179bbbbec180f6d42451
-
SSDEEP
384:SIMd0I5nvHP1xhHdTDDpLaRAPsv9vlixDB8:SEC1xhHdTDDpLaRAP89iA
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e03acb7a02b6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{80C6D851-21F5-11EF-B6F2-56A5B28DE56C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423614246" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004f4a601d99f77e4eb298e9fd4ac4b1fa00000000020000000000106600000001000020000000cd45b3da7db255ea2204805577d3df2eaa719e1a0376c94ac6630ade35cf75e3000000000e8000000002000020000000c4ddd26c274284af7d14391c4c9c4f16d6ff4ee9bd0a0f8c082affe2b90792362000000048d8ba7b90cef0e272856367932bdf07d63e9a265ca77e8fcd54c5f217d4a52d4000000011e235434df6efca66b8de49caa6bb45abd70b35bce048428437077ab171572847eb48b02259285d63bc22bf712f1133f81e41d608d50533fb5fcdec7a771d8e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1288 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1288 iexplore.exe 1288 iexplore.exe 2624 IEXPLORE.EXE 2624 IEXPLORE.EXE 2624 IEXPLORE.EXE 2624 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1288 wrote to memory of 2624 1288 iexplore.exe 28 PID 1288 wrote to memory of 2624 1288 iexplore.exe 28 PID 1288 wrote to memory of 2624 1288 iexplore.exe 28 PID 1288 wrote to memory of 2624 1288 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\92c3152e224b7608460de6c663b11239_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1288 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4171e13f6641f83636e5ca603c1397f
SHA1b59292bda82ef3649291affb1c7446acc3f7803a
SHA25627714ad2ea64359fe84d954387783141d57a9840415b629200f185515b0c5ab5
SHA512558ff043fd4a6c5ca0d1cc590edca90afe973bfc44a8bfcf90cd70ad08d2ab9ab38eeb3ff242252bf4d21a7d3d756893a97c724a28afbf55b7c543958baac411
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e10aa4188f062fcc720a9e82c01cdc10
SHA156a547383a5e1da3e435e9a9c7e824d6d8263b69
SHA256535ab6f01e135d547d79a7d56fa52c1d70ed368aefc4ee92e43e39fc7c52dc27
SHA5122c6d96f3bf8cf4789b4d9695b9a2556408fdd9e36967968fcde87766c3957358eba3a2f9ea08426985e54871cfc5c3b58b887744d28dfe8b09c0f8b9d3e2af5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516d2d1c8e3f677949340d2d47a6c6ff9
SHA11b5046d4a362676f90f95aec9f8d83f9c614880c
SHA2562b6a0d70dcdcfe0db9647da940f8e19fd2c83ba19e0d88f2a410b4a75961d99e
SHA5121535f938b375289890e6bb760685f4b0bf5a0cfc661c90a63b4d177b830c568f3a5a29e047afe6596894d3365f368585cf2ff5e62039fdd3b28fde573de11b67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5a4bf1767bdd06921e8708891aabbfc
SHA13b8e3a9e5037d225de09b4ac10c72c8f7df5c461
SHA256bd25f818deace278e2c61aeb9eac5964a8434eb81df2a75d0d77605d5ae4d966
SHA51283d825cfce172c818ecb3b872ae996d9b4d2b5a48cfcabf84eaecc3452502422ef7eacd1cbf1922094a3c8f9222657ecb0ddd09a1496f7e92d9306670bd02bc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f48b64719ae8b72a10e8ff4fd9bd0ea
SHA1bb748bc02ef6ae28328349b1bde2e6aa819e8b81
SHA25672971574d6ba9e0d14a0c09dab09d71724acaf6eeeecadbab577b742d943f166
SHA512eec24f79f8a515217dbd0a7d9f31aee44b383e4f80e44b1d723018bd10b995c55500f483b19973e263fca21adc6b8fc44cc350501ec3cf82d4048b15339f1924
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586f631b8d11d9b755588864379fb2e07
SHA14eae3903393b3306f2c2d6935c9ec01cf1e70f09
SHA2566497f74a5be45573566eb037279eda444b706fb4362039830c2c217a298e15eb
SHA512a1f01c869a8c0b6cae7cb31db64390dc012592ef0effaec729d5013a8dd6dfc23dcea6b18a858c0a501e2392227cd3be5f6ae073bd0fbefd4fa8de986ef1b2d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51684bef957574da87b5a27babeced9d9
SHA1f682d9ea79f9bd82ddce70156cc4cf324fa655bb
SHA256a9e3f06a5986769c4de5de054fddf2e957e43aacbb5c5280363549d92d25a96d
SHA512e618acf100b5dc67587c8ddcf31dc667de694bb2247e06bce2c9aea8d08c9b44500111f98aa2aa76b4047e8de46f40a7f30cb3fd6b50d6d277105a61bf06315d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534671a90bfccf3b3ae86cd100915b2f8
SHA18e8f7b854fdd2943682e0f47c95f3d359129fa94
SHA256a8ef711b05f49681e60da7b59f81f6093b32d7bf13c346d90849db2d29c47e5a
SHA512941ce4e45ccfb90e93043ef5bd98f214f9e9d858c3106ff577fc68507740e8759ff32b783e491f56ff4b85e726cbafe52fc1fef6b40fd7b3fdaa3d21fd1ab98d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ced925f671320644bda9d30d19d74ea
SHA1619ff362e34bc820f54987d9e72cee89c62177ed
SHA256e115f2648978cd5e396483fff90ca9c417ce9cd2b7c7fde190d6c05bf2ac823b
SHA51248234d27cb081923f7c11c41973277c0eedfe51b3378e0e526fcbd264a499df0f40eba651fd7e4d750dbf08b8f02fd4ed6d805bd1ce8b5fe5f0b21a7ee95ae00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cca8d3f55921a94aa370d50fcaa7b958
SHA19685addfb6249b758438e7d86609e559ea2b31d7
SHA256c066ea6980c55f929b6bc8956233180031f0a3b25007c53bb032b22d9f02372b
SHA512113dbdd1db5b803ba7a6e47ad03ad007653de509038fb5c1133f587c5d24aa3db97fa463ad7a1a0e6c5643ef766d54b06a0886644a1fac5ab4fdefc5e9b13013
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524581b9c237a11c01260480eb2cfda9e
SHA1c65b56068603c4f25ea428f9548e1cd31d29fdb4
SHA256fef50c7878e427932705bd8d9a5c02d42698c6c8a994a9063aefe3023dd8d737
SHA512cc84e27bc083e51d46f770cfd61ac02a2dff2931fda094f8296757e49e666077793bcbea1b0186f07f62343bae8cc5cea3c5d680607f1fbb2c270a3edaee7d75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea9bb9608d6167f68ea672380acb5fed
SHA12b81575808ea30ab020eab59c01146355c9e66ee
SHA256d58f8d584ce1c5533505ba373a6e5560c6dfc684756dd7867543059a3a286f53
SHA5129913bbdab3ea239b73689082c888d00dfa9e3bbf89006f8309709177745d539ed73837cd45503809bc41820b28860126401b5e69324036d7cc88df0cdccacffb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599048d248823d1eb65016251bae5b9eb
SHA1d751ac425b2c5636afb308dfe6f9c960ce493e59
SHA25674fda40ffea4796fa8f05b7c3a4906c747e7e651420726113ce07b4dd37d7a41
SHA512c40616012da68a734e6e1ac5159bbc2ad0559da8457e6d9bf938750f6f4ce02b291c7f08c6c4ddb6597d791fd8c8b76ac86444226a4f9edb25f139a8a9299c0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9ce533a04824744d56258b278b0f9f8
SHA177d27b6a88ef8914a19640ce436604719fd4ee1f
SHA2560fe45d6563c86b2647da9e5057bddb43bd2b1f465583e62b3da6785e0daa6685
SHA5125eb9f1bc1e6d5a7150fc6c5ce993577258adb8401d2e7a0e53ab04e571ec7be11fc37bb525a3f747a5b9dd52fe10780da2eb3d1fea2f3115d60322a6afdc3e55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554646528dad4fadaad24d7bab13a78aa
SHA102dc06ee81932d773541f6e0dc4ec0b29153b9d7
SHA256d1fbd96367ee95bac697d2ed808751272476316a5e132d1805e115c33f4c4a50
SHA5121b9df648e56f5c17f6b3f37828b6ed5e4cea121b30a552d6a1d8400f6e2b2a525e719b7bfd85742181dc1ada0344685e51b1911a6e18e1d676a1444f35b13899
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f2062a6ecf9b11c6d8605401dfdb5e2
SHA1f3fda24699b99cbf97cf7d5e7e2da62b367bbe87
SHA25690b2e3a8ad12dfa250ca08594ebd048ddd61597197e7ace558c8f42fd25e58d3
SHA512286b00496e81b3cddadd139579c0a1ca3e606d6130700ae2db098d89cc220a39509bddad66f50fbcbb14515a177cedd379b7b29ad1f3c5fba4b5afe70c32558a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5442b7e632c7759a2a93bc7940d737110
SHA1ed2d90156e39063ce8ce693af9d473dde876b3d3
SHA2568e55ccffccd374c6e8d8692400345377724fbca93acf7a6d4f7b9eee36cd203c
SHA512041057c29ad25968624867b59624f8831ba0539980468003bb912a6180fa0a0abeeb8666f76f64673f5d6e98fddb49a85931582640f2239cb8e094bdd9c01df0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f60c1cd82652994213a8ef3b7f49f50f
SHA15ab98e2155f89c57a770c7cd4278467fcc5da54c
SHA2561e840ac0c22498d98b6bb8bbce06decd2c237efa048be8fc00e96b64e738a462
SHA5124d8667a89cfac95b5b1a861971a7ec6108f978c31ad8299f18bb8bd40b2df39d4812b8bea14210e5a7cf8f58ab710cbeca45561251aedcd6aa843effae1fd5fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d07e789ba6ce621fee15caf56f39ca0
SHA11061e493d5e215502111d94def44ec77ee793e9c
SHA256682cd1c8965775f8c3bcd949fdcd18a486865579cd75696df35c58e22f043115
SHA51266d2e9fa205ed35f2778e23ff490353e85a78c4d59f8eb3086e7a1c6267da4a3bf8b498887deac1835939dd871ca013f8f9515cb7d9fb714c42e5f2aa885d523
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b