Analysis
-
max time kernel
139s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
03/06/2024, 23:19
Static task
static1
Behavioral task
behavioral1
Sample
92f4210f912e150fb6f06a2daa8337dc_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
92f4210f912e150fb6f06a2daa8337dc_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
92f4210f912e150fb6f06a2daa8337dc_JaffaCakes118.html
-
Size
69KB
-
MD5
92f4210f912e150fb6f06a2daa8337dc
-
SHA1
4d4ca51df623113599c90231274d9de503bb8464
-
SHA256
06fded51171b1bd633c181a0ca84f39301db89591a9aff9e6e65e71cf16fda5f
-
SHA512
098c2ab045b0f2f6b2356e1190de88ccc59430c821eea066c4435d18b6e0d73a9eb051aa3a9f001e498edeb226881d8f4158b3e47387a4b8d94784d20a5e3166
-
SSDEEP
768:SLCeEeEiMMMP8a5Vm4ft2+Iscqfnz50PD2QpAlFVC6R:SOeEeEi68+3tNjcqr50PDNKlLC6R
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B675C7E1-21FF-11EF-8F92-565622222C98} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423618631" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ac086a4878c79045b62d51562df2c5e600000000020000000000106600000001000020000000c566c599e8cb184dbf3ca1bac4ef9554d88ee62332dd634c2337253f889bd363000000000e80000000020000200000001c069b4011a2a64864e08bb2a7bed1453e4c39f32845da16d1d1ce96734032e4200000000808f395619e9f0c02a523cee9a39c734187c0335f253034744d942f1cfc9b2c40000000de8d8af5f47e2d72f3ae8b6fb73815daf218e2056700ad3c9bdf079b0c571d9460da3ed5b1052d41dc2a0f37b1c80a7e918564a3660453d8441a7ccb17bd9417 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 401721ca0cb6da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2868 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2868 iexplore.exe 2868 iexplore.exe 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2956 2868 iexplore.exe 28 PID 2868 wrote to memory of 2956 2868 iexplore.exe 28 PID 2868 wrote to memory of 2956 2868 iexplore.exe 28 PID 2868 wrote to memory of 2956 2868 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\92f4210f912e150fb6f06a2daa8337dc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2868 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bef98adc4928b744f5811cd626b2cfc
SHA13d067930d69415c40c5579a1d24496996a5b703b
SHA256c698c5e795b80460579b3d881c4d25a8174c6734ec91b089caf1c72835d0064a
SHA5124d32ebe42a47acaa06ceaa00a806f30a2d43570736e781942703f925543af508c098ec83b24ca3234f4b15bcff74cc23ee9ef33f5a9cccb6e6d1a01880b18df1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e650af2f7830f9868a41db7bf831de7
SHA1cfa93d012c57c2eea8f8dd193e42c6b0ddb77b24
SHA256e8bf4f0f9f5ef69360039670e3ed119c71f4db484e2565c8147ee19d684af498
SHA512b9ae03450f1da5494c61cef80dfba6345d1e057aae697648473b62d2ab9dc2e519b314d5c6ebfb18305e5005ad48433fe4bf807e72c048153761fd7df2e94a00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b053b00351a6a3dd8c39fb998baa429
SHA1fe8bf457a833330b245256d3e7840b361b3d57d4
SHA256cb0e5677a8a6d7ee7f8c2be294dcbd5383d88e737ef9795d53a953f439a6b036
SHA512cf6c0c11978daa5e294f9ed0c0c8da942d19db312f8292c94f9e6de81cf4af231ff676b58d1c7fc6d246ac3d3894407c42bc07454a9ad8b4d5542cfda5100672
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f44ea0f8c4e17ff6c4d127cc642d94d5
SHA14ebebdc8b4aaf0270e1600b47309bb382a19ff5d
SHA256fb1e04cfc86e35ccb343d09231ede94ac759bc38321d921a4126f8b1dea28651
SHA512008d5978b662559df96ce2422fc632e62e4334dedbaf9cd562b6de6440fe977327401a2592a8831609ead30c683d224e5767c6e56bea7ea51bf7daad5f7d4a87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b73939786a5f2f5e6e9d392e1b503824
SHA15d8a4a5f0b25180baf97c1c843c965698a1bc85c
SHA25679b8f60152654171dd6c36375793ec719c96b84c4bf082c68e1453d396f97bd7
SHA512bba7f035c6526da68adfc2027f0326a4124f18b72a0688752609bacedf274c437c5de41eda259599027bc1d2bc4e45a76365217e818dbcfa627c077dce8f1d90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59da1cad0edefd9fda8c74439bf0b3467
SHA147a6943ad676b9c380e5f93179be743c234006fb
SHA256ad64f304adab10885289885bd4b2e5e405dba532f5717ceb0100fbdc48031250
SHA51214f435d758c984453e09f714a49c505c29d3eeb72cf3fcc846b0ef62338473a2e7a1481b3dc059f3f75d79207c988e187c3d5ad0bf830591e484a3a8ac4f486f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c171fc02e6f582546a4517c20ddf9401
SHA1ed2fa362f5c021798999b51175a6e17d0b7f7330
SHA25624bb7303aee28f801ca25b9210ab539774a7d2d09bd55887608c7119491285ea
SHA512b2c0d8b120879f9777017e1fb3f1fe82fca363d84087f97f6d01ab4fb26e87a7314b079df5f9508758938d01a6f25d9b459da08520489163ebaee755c2b13ff4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5a1ec341dd391e767c057b0812f6cb7
SHA1b54352de6eb017ef50c5567a0731ec9d5bf07263
SHA25621c9e4af109896dace310871a65e47d2c14bd87e130cfc4458dfe2e1967b32f6
SHA51218524aa829c5aff66e86c471d10108dcb69783dc47084f0e4dd4a00fca86e9fdb539a08893bf62a11407b8fc1667f0a87bff6b05af09c895857a0cb61080849b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebed60c18e3d5d6ecb693c16b05de7c0
SHA11d1a7a6bfd2b10732569ddaf7e668a6470c52503
SHA256e6e763b136da1d61433d65d6d0005c79bb2afc88c6086de86161084553e3aeab
SHA512ae5ca6ccddb0271d1e3c648d1872bf6855df33dc47ab5418db5e4f33d8389efd27384dd1883d77e677340833b0423a24e8f496c76c7ec545a17a12680737b1f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe0a99aa128a9ab46e8080bb697b8153
SHA103e7b25ed57d2eaab2b1c7d22d2b9a7658383bbd
SHA2569ea4ca22aa7331a8c5e91ff98f9121e49784f674231dff690a3564507d863104
SHA512bdc282bfc39af72ab7488db15fb28b25290ee2f6630d50978ba0640f2411eee3ec5df5a426f9c51ea44d0560519a26dacf13704ef8f480202a91b75be69ecf15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5203047811827c6d61e561f4dcc2eee81
SHA189ec5d50762151903201035e67d2f71ec39f3475
SHA2561ed90ac0aa0f3dfd65da0f5c3869a3895117a37d8b5bd1f14bfffa4eb3de2795
SHA512f2e94b4571dd6116a9ee13079438f5d95b2ff756797bc7c681d4f2f31fb4e1a1a0323fc01beb0ddb9a11cfe54bbec1585093ed9c03175d1c7d4795d75063672a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6483872e2b0137be6e69b591a05138d
SHA1f5e1d74b0dbb227ce9a264bcf500b207427ec358
SHA2562e0bd852633bd76b49e082849db258e1afe82e45228fcbeaba264a953af1b09f
SHA512d17eb337a6cdb5a2c4e9f18c4c217fe1d7a19d1d89b4e617077bf8f1d80fee7879dc347ee609de8ad024cdeca4725b2f67a4fb3d28ef7183bf4d32632cc37542
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57176c3ed8c99053d51708700a56df18b
SHA10748ca2d391c64303bfd71a6bc33368668990eb6
SHA256797b69844bcad7d60e63e555528948e2f103e8a7165d6eeb74d29b3978657065
SHA5126448fcf00be6056ae6f8f6f13df54c59dd8caae16fa556394a8245e9971de0644854c329e93bbf03a1442b52235396709021e1bd18dca29e142d277476043c6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535e32e134bd833d20f278e75b1213a62
SHA1ad33e9673bdf9d5aca8111c6a808d4a7e586b5c6
SHA25611d90dd1a64dec1544ac31a7c385d1de37e281b136a696f7d49cf8605fc520b9
SHA5129649b704ffc8942040801bb492346aa1ef2362c840d0ec5df4a6a9f24ae6a299b6cf659ffe1c93232effb77b7216ad70cb7ee5f9ca799a152c39a006f5ad2792
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55de5fdfffd0dcc6679a165f395594ef7
SHA1c8b83415bb4a63087a0b6766377cbe5dcee0ab0c
SHA2563ba63b45de510b69b25c58c07ff092000f7b77bc75f5facc59340f0e39d9c1fe
SHA51226a2c3845230e838e45a17729e4ff0b3f38b2388deace480f54426fc75563486dcc1ef514a9e7164bc8a3c7cf4a5ae7aed34accc1df00f2d1452e4f61cc5717d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f321dc73212646b374b522fa6da06a3
SHA1bdf7f134e2dc6a74edd770ce5c51f59c0c6485f1
SHA256fe0b6a351479b465f96314120f94e017f483619c26fb1ed8ffb6f5e396e9e6f7
SHA512b9afbed38a4cdc6be8609a38392ec1b7f9364f4f1d26a98e9534d95b27f2857ad2ef6a0313d7afa5c16ec0c82f8c84b5d03a243e9aba305dfffcc7c794c34fb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5940ad52b9d2d6c20fc174e2dc3fe1644
SHA18d84ea8cbab77a6a4fe71636e7f0531ddc6b3375
SHA2560b10c1e64348a8b23eaea536b0e802f47d86c9322cdedf206dbacc8c20c2f677
SHA5122b870fc78513a0f74925d7392c8e35fc488e61e1b3576801ca895d6699f71dc3b4cbe58142bfbabc0d569a35485a7154059aca4d6376578619fbb59f7fc727af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57456716f08aba69b81e98d6d441fef2f
SHA17145f32814ba54abc7043c3b54c9bdf1cae3b986
SHA256441783257f6e1c65ca976cf840bab75de0fcce97ac6b64633e737e242fa77e76
SHA512f173feb6380c0250490de5423dc19d84037e8df1bff3f39c10e942eafab718ec9168794b176aa2a543d75a5b7aa6da061edf5e5dc2c81f31c2b99c0e9f11676c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aac1c8c63eb5e629ae4c12d75634cc46
SHA15439c6a8a955902ddec81bec67f804f38fc0df6f
SHA256e6159cdbda6014838aa4e52f81bbe3e3febe3138b902b519da34bd2d497165a6
SHA5126c092388cb820280755bf6324b30c730e3725d042dc10a062e33acc2596b4c7c3a86384bc37513569a71cb6025c6a23b036ae4b32abf3d87dc14426dccfb8481
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b