Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
03/06/2024, 01:31 UTC
Static task
static1
Behavioral task
behavioral1
Sample
901e515904ab8c4b0904379534be3e4b_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
901e515904ab8c4b0904379534be3e4b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
901e515904ab8c4b0904379534be3e4b_JaffaCakes118.html
-
Size
19KB
-
MD5
901e515904ab8c4b0904379534be3e4b
-
SHA1
6d002c361fcdfafa97ad2f74b198c4497c26c2e1
-
SHA256
3007d42acf4a551679182b399f8aaf1ce069d601f5cbf7d6ddcb051f447d774f
-
SHA512
7d991d1ac28d527baa1986cf9b1f5b9d4e65b898fd58871a76c41abc4b6a62e4a075c474862033fa5f20e899cbd8ce044bed59965580631494a9524b06592c73
-
SSDEEP
384:34RRXXVcPwEpwlS05LLqlLhPFNmqQOawFW2rVpbHwh2fXSM9l0PT8OqcFbYXnIjB:I7k1pwln5LLqlVNNmqQujrVpbwh2V0P1
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0E061E91-2149-11EF-ADBF-FA30248A334C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0e769e255b5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423540180" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ffe016c260ae7345ba1719555ab7a9e2000000000200000000001066000000010000200000001ce6dd6d1accfb00c4f6ca903f73f2adb06da3eec320b31c863c4e5d51b1b21e000000000e8000000002000020000000c4fb60fc6ff4e61c9b8281c1d4a25fa6a9793a2602a26bb7a8fa467068a08a8120000000e22bd94bc9aa24810562b45baec3204cc4151160640b7c06ef4e0905e895cf2140000000fe1ecea56ef3850f2b1a8e59eb4de55f476ee9f28aad8f301a2bcabe920fce7f9faa07529ca86c5075fcf9a0224b95d32c34deb7511f25099b5554e76179a202 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2228 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2228 iexplore.exe 2228 iexplore.exe 1160 IEXPLORE.EXE 1160 IEXPLORE.EXE 1160 IEXPLORE.EXE 1160 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2228 wrote to memory of 1160 2228 iexplore.exe 28 PID 2228 wrote to memory of 1160 2228 iexplore.exe 28 PID 2228 wrote to memory of 1160 2228 iexplore.exe 28 PID 2228 wrote to memory of 1160 2228 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\901e515904ab8c4b0904379534be3e4b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2228 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1160
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4f078898dcf1143ba0177831e7baa8d
SHA19688986b85b4b0ee08a332312730788df64b687e
SHA256d2d91821cf1b92dda6d2371addf70f5e8ecf92cca7e47f42b48c5f690c75cc28
SHA51256e318262dedca59f3b1c35db715493af07192bad68c4e130f371eb135a11f8d9f84ba4681f9e87e58a43a18e8c82e68558e470d162150f255c5b92f595aec19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536f7523107c57aafa9152b5836f2c279
SHA1cd1e7fb9c79a3b4e329231b5e90f73ff6a4a455c
SHA256d4ef8b08cec2c459b708b21ed4479ae911d0b207215901b95e84e5fbcc2f2a3a
SHA512c3f9acd7335bb5ef2406b5126eff2757ff7ef208847668da1b94c7bb4287e9d7057c69b5a86fa0ed81027e7dd4934170c6dd1335db39fab3bdf8313843131c8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b409cac64a94003281f4afc45ccd40e
SHA172aecb068b240b546daf5a54309807f393b44bec
SHA25624376ecf224e05ae92df04f0958c8190f77f1fe1ee293e999d60714747772c6a
SHA512726126655a66a93a0907d64285269b7508fd14bf9cb7725cb831e0aac675a65bd42521c98f9b681e8ad9dd6d884a6ed26235824792928f6db8f2b315c39e247a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7c567b402a0a67a6a2b6136a25c3ebd
SHA1aa283347af6cb86df1622e06e0c83ad4f6f15614
SHA256c80f47c6c59b2b31cbcb45bdf045d9aad077d4111c5a12a244eeed0af4405943
SHA512f5aa22b0641d06a7917a0a50ab3d8808c4c6ab6b8a26c815444cd231061688d125b3403907a33ab3c342611afe881997e6bf542abed4f3d2cecdee0cf18b00be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5730d5655def098aaa8059cf98f852074
SHA1a756cc2b6a08a5dbcc014543ca0f10d12ccf5f16
SHA256b57a824651e327613257e1bf4217fc2d10c94ce3436b19eec09e8335cd351ebc
SHA512f07adaf30741565ffd8824fe40d92c81faf9933a1db54809874cdc914a5f10593765b8b6cdaea5f5f65465f54edce68f056da90e372acd2b5af75e5a0706e0f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc6c734a80db1d89bbb33cba9d840b6d
SHA15b0e757225e86082389b2815b84b30f8bd1e3f0f
SHA256ee967e82e7f27395be695a1809298bb839623ddb677fba9cbc194753863d9831
SHA512af3382bae52e9225d84093b1699a3513c1ad4f64bffdf140a2e3716cacd6001c1b8de7e70695c6959fe04ff2887bd9aa8373ddcef14bd9febef42ac6b6c0b68a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b06a0f3ed24a45d969d364b95ac1e679
SHA115b796d935771d3fd3548f20ab76c05c61a15cc9
SHA25610e99f595b4b69c7f43f93ee5c015596a671125062e4ab4cc52f233e97b7e4f6
SHA512fc49f6d42f579bfa93cf45e4e3953777bf55953d4955577f7ce5897abff3ea2f428f911a2c9f62ee23bf2233d8d0c40a2a2615da02f758b6506ef334ffb7524a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2f3103b84332b69ca0a416c74211f5f
SHA112a9afd51c56b75322984bef96fa86c0242e6168
SHA2564904868e4f1f4e66d3089b696a00d7cc1337f060e8be5ff474df7ceb852c8dcd
SHA5126128f105c8f2d11140fb618e8567285f384efc5434e593887f158a9556e3dde7dc33be5d8da5f3d85c424ab7c90b16b0e2ea8eac7b6dcbc23d845a949fb48dce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3b36b115e937be38b168accfc93ea28
SHA12a7f56285bbc845aabcf5ddc642a171131561fd9
SHA256c10993d0ae53d1ba495251364bbbd1abac028a69f4baa0858516a5b66420c366
SHA5122ddf5b326ca016284972aa753dcc5ee44bd37261db44e4a51543fdcc6bce8e0e344706f1a2e0187531fb9508fa4ac7292bc9f613ede465fbf68c59d575537117
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef837cf569cd6e52e8bb25616dbe5e86
SHA121d80d5e619d547edd104320bc5644bbe224a50a
SHA256736767436b096c38ab7461fce877fafd6c201d3d5f38f5e7c61d0c5fbb3bc19a
SHA512add74372a61798a10a73e09937d995586293627d9a6de65d2ed72c7e5fcf8f25f62949e40bcd6fafb199fe79bc9fab466a873760982657ab26e38b3b51feedfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf514222131c2dbb4fe9d73c5599f16c
SHA1c55b296f9d38f546d3786ccb102275d2c256c6f0
SHA256fd8ec5f67f7f5d0a9890b54397acf98cd8a25e003d1cdd7163f46c89e81dd418
SHA5121069be48a742ad8c78e72ce4ccac662916ddfdc17f1da647c220557d097986e2352fa23c39921798494a636748c349f04248293806219c4b3203141231a24d09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5647084c73dabb45f3784f52200cfaf95
SHA1f4ae3d7c6c40f701ab180e13b00b4f5aa01a770d
SHA256a85a7a15c1749b7aa828e1fb456e13b5c8c084e0f01b7e2ac6c126b64bfd80e4
SHA5123408905b86e3f1b4405ca080555bc65dc4784cac0a2123d47d525a56b7a8c8fceef9aacd27ca37d819a6f1a7db61a189d29d1405ca899077deb2a80f47937890
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53896b86154b52327f71f74909cb3924a
SHA14f768066332abcecd7aa49e10184f4f2c625e69c
SHA2564416399a0ecae88bb43fba09c2dba38c01057c54242a5f1b2da90d5856a15368
SHA5125aff77e76b14a14b8345b1dea0d470a836ef8700969a1e1ccef5c00cb08182fbf86adacf472b04bcdf6b6e334db8fb8d968f5a57b9dda4c0d9df1fe22964adfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4211d502b6062e3c03d9c33037a204d
SHA13694063f911439d5cb5fb3d6450c5b30768a3afd
SHA2565c5d4d7f8467b8241be176d91bdd797fdefe174d52571377486d7207b9192e0c
SHA51266a21a031402856793ba82f529e47431c90541398cf724e42a21472434698b76ba5f694c65f83c220e1d457b1f7ed504f238f2e64d96527a2b2de8316fb0b87e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526d18f311dc2581fdaf90b892a940359
SHA1c344270233be29bda273bffa791bfb35cc4d9810
SHA2569cc8a588441675b8b22e7c230c73173a7edbb9f154a9d8f5fd82646a08f8f2af
SHA512ec8e8bcf8c12f02699b9fe261f652aa93a7c0f3a81f65febdc58abebbe4c94f4d68ae103b5ca1937b30a44e3d22b33314c9f5fe3419bc8252ce539af599df02f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560ae3fc984ee62cb3f518e080100c92d
SHA16c374a4c5bb955e53e6f73b1077039733c618cdc
SHA256c06d4e775a6740ddd73c1dd48e93ced29c048b52213665bddd816f4880264b10
SHA512624d6f85f4e10a0a12c952b7d6ae8099e06199e6edfc0e9416c79a6f0d9e16f92abc71d16d04ac19d3c0fc1fd5dc0ed9dead3b14a8275c84aeb5a3f60b9d820b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54783ed9624171ac3500fe7c77ec4c944
SHA1d61e56d2813af7c6e5c375a1333bd8e7f525ae8b
SHA256b40ab3e3731708175d7bb2508915a2e3f9581b21b060af90e50bacfdf8505055
SHA5128cfde627c4b3b263d854e5fdfd6a669d4e69bacd3743336da0b65f58a3c0d588f083508360aaeb5b33b7e2233b2ee24618bc927e1c9884608b565266df801ac7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57941b4350d2eda3d0735a324333366a8
SHA1a247398bedee663b206788302def4879d1ec7495
SHA256ff171a072dfff1e820cc0bedecd1160edf88d478c4309e8f5057190bcb8bb2a6
SHA512b49e126652bd0b31f2347a8256ae69beb23a158305bbf078f3d6454934b37a430e5d6fd82c10403db47dfa48b49059b7a586cab9453a2a7a6fd4b6cb96b5c580
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584a985e721246c44a2bad8eceb47aa9c
SHA18888d2a39a1a3ddeb52939fb15c3d27cab81bef9
SHA25603d8153c1bf24d6bbee0281b5257e855af3957e4f470d819b348fddf6d2fb47a
SHA512238863ea3b4cf5e222362fb292e68c19821fe357f8f5d971b23df5679a5b569c996187d424df7c3cbed224a2af786a0aee322f49136ef835a6086befedfe8ebc
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b