Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03/06/2024, 04:12
Static task
static1
Behavioral task
behavioral1
Sample
907ecf09d8c2a62d96f6fa1017875add_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
907ecf09d8c2a62d96f6fa1017875add_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
907ecf09d8c2a62d96f6fa1017875add_JaffaCakes118.html
-
Size
14KB
-
MD5
907ecf09d8c2a62d96f6fa1017875add
-
SHA1
9de3c599dcafb62612770e86cb198c7f2cef41b1
-
SHA256
1fc08bf35a47a7fd150564ff433fa8d6cef8d7a868918eb6cd56119cf1bb1746
-
SHA512
85e353bbd57c3d351cf05473a08b5af481d1afe3185e2507a2629cb36d4def692d3373897ab7917a88a9f0fc3a51a287ea8cd1a4d2ae9dea9359aa05b8e2c6d8
-
SSDEEP
384:CyizHxU3H/humFAi7zy1wXM/2jW2mwYimm:CyizHC3fUOAi7zIKM6lnYiV
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6E0D7C51-215F-11EF-822E-56D57A935C49} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 508232436cb5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000eb24cbd78683094ea4e71077c4a0e581000000000200000000001066000000010000200000008543bcd89bf2b450b3e24357f5a22907401436ae1e27ffd137ba40805f69100a000000000e800000000200002000000057df6ceef6472a47ac21c9b29dd86c83ac09e11d975602d885e926c0363ee7ac20000000d899b64d13ae4f45c7c94b3f86805ab8497fd9ff6e3d067a391aabb14d7866934000000088501e8f988a2504dda0cae215daa017f44296b89f4995c04a3d00bd357b60bf45fc970a0c7a0b4b25fa54db4137506b188cfdcb105c8e8d9932faa0c5715cee iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423549790" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1736 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1736 iexplore.exe 1736 iexplore.exe 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1736 wrote to memory of 2176 1736 iexplore.exe 28 PID 1736 wrote to memory of 2176 1736 iexplore.exe 28 PID 1736 wrote to memory of 2176 1736 iexplore.exe 28 PID 1736 wrote to memory of 2176 1736 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\907ecf09d8c2a62d96f6fa1017875add_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1736 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587575ccddaeb6502a1c93b4a115ac452
SHA1bcfe1c3e24627f1d75d53f9944a5a1d4bb493788
SHA25643b2cd904f68027b1af59fd586f9111fb476c3eb325ee894ec9464381f15db05
SHA5123571c7a44c55746f313d4791e74e541eda2948581248c9419e74ebeb28f915a5f0d6cc5a2b5c3e0bd0a92647e3fd0b29084585a4702674f9a20c8c9602cc84ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57eb44d922999a138f583f50004f34a41
SHA16778d094971c29e496a51b99c8b31e9825fa0d32
SHA256c637a411f3aa5248901d4851205225b33185eee98ba850a4b532f130a853bd80
SHA512efe1604f4a9e8489d4cad75162acfd5a7c27e1b106efaaa75ec5178d7435bc35c3b6f4e645d3ffc6b03fd4b19ae0a2ac05c229f1d6f92800677b11dabde901ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8f21ac53a4dcb934947961088206a04
SHA1382f1cbfff6387494386df78dd243ebc5b35575b
SHA256faf33764f0a804c1c5ac0c87a141074b75b6f7f7d2f8c4a0ebbad7fbd6200d18
SHA5122e0beb30f6728c39d2d100991e76d3c02bd6ae794ceccc26257805750052ddd0a08ff89722a974270495c4740052ed25aa133ff3a4910a4967cd8c680f40cd02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5319a44fb03ab833d533bf772de701c78
SHA1e19717b5e2fbb01bcd1e0718c53141c61bf0e334
SHA256f7887c1d1726c1fb7650b7034ed0eef5ff981309f097b62791fc4db6c8d351fc
SHA512b01f38c3322b2a1920a297ecd8a8b254358f87c52dd3613d5862c144620b5faa02da93d486e7ac3bde19a128622446e299fd629883b03886eac3a95d601ab89e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4e81db6df657a1b09bbfe3b0bf6cd29
SHA1f13f3c68307c2422ddf467a06c9b5f51c513598c
SHA2564a382f43b8d272d7f5f02c482998a7c6d63efe54b51f80f7f9e4001fe0af226c
SHA512afdfaa5ca55bc6e75fae241936a97bf738a95b9ffecffb19ed549997bad8bcf078d87292cf0a2535e41efaf72e5f259d6bcefd24b8cb52f691c21478f3ecd2ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5985e5f5d7bc8441506f0073a9c2cf24b
SHA1f5451517bc3aaf2b3205c359bdd377d96dfb96b1
SHA2562ec3c13ae0b41083907ac10e1f2267cf523e81ae5020c0d801a9f0fbfb3f6966
SHA512e1e173033169992dee5c9619e11d9566942ed62909d0ef5ee51aeef7889841178fa54326aec1a73a3bbc71b69e6a621f4e0f41bf2cc8b0aa275865ec3438dcf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dcf5ae18ff62fbe46827888b196d4ea
SHA173cda6d7312365a708bae2ce55a620cace1f4de8
SHA2567d7f83559d255966102661c161656f76d12ac18d4261b6178847c21dbcc9ba81
SHA512f18c677a1192a435e2d9ce5233fdccefaae4e17ec1ea29c6080e57ff3140e3116f1040a23ef8bf5b41c05c7b9f2f49a22bc76d4fc050a2c84f99efdb531f0b75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535df30c1365247b07d31c234028cbb81
SHA128489aaf8ac733a9b33683f4ce62d9239ef90457
SHA2565c99afce9a4ee2bf1870a91c875a79aeecf59f92fb64b6ad11a002caa3a9f378
SHA512f491030be37fc0071d276618aec4c7c5f288f069bc8415e98bd9c8a6310f60eee79bac26dc4264e7ea320a78455720a56c0f00ceda80d844ac38e56e6f88d20f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ea767e4412db985b3a26dd41814cb8b
SHA13dec52a067bf929592a92883d63d10113256f6ee
SHA25679e05687987800b4de226286ddd708605414c31e462a7b2a08eb00fe1ea3767e
SHA512e65ed1200f2df3ce9584d73fd895b3eb6d42e82d3d946bfac41facc7e07c19032256c4ca49984c21fecca548e555dea293be6e5898406d378b5ffb0f99b7eedc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3980be28f77e2af7a89738ce762d5b3
SHA18212e870c2ca66e133a2d0d7d34a80db15ffbe6f
SHA25687923f3a535df3cba89c33c9e83a07e1b552e20ace553c2e4b67609ccf8feeaf
SHA51293f1fcf4ec25f0fa299ad96ace08fe41905981b66287e195eabc05e63ef028e3451416b9f314f9d5b0fca12b6addf68227ada1dca1d7d064e08ea27301cf96bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56361f2b6061608620e72e91acb36b6e8
SHA17ee17e19aafdc63a1b3bef33f26aef8cbded9566
SHA256c63a00a0eb2da31fed61b796f946ffef709b2bd3287d842135851c1acfd03da0
SHA5123cbbdc4c3a7f453f396b7ef5e96efa706af413f4799131af09f2b48dbbce8b5fc9a50ca2737ad6d9513e1f2f73098a6fb057351bf84ba17481dc76e5d05a6ec1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e303dc21e45ab64a06e7395b414826aa
SHA19f5e3137d9176578859169bb6889e23cb875686e
SHA25687513dc7a59fa2174673e3fc697b1a9b279aa6ac2b0520f17b60fb16e36d13b1
SHA5128d55c549c5de698eae1834b1fa49ff4072f1273e42b11297fcfe421e5b84aca2cb90f82029d80396c22b401a8efa3849c88ad83281914ad49b49b9b90dc8de28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563a798fd0616ec793b99ebb3b1079d57
SHA13dc866d3e5d3bddaab3da2a3b5cc6f2284bd46ed
SHA256b3037be3c6ff81baf88bab29fe228d5b007695eb008f7561f8f97bdaa6c25967
SHA512cf21e144326fe1742ad8e8e417909dd75b50b34cffb155cfc9bb20ae4fe8c7ac9ecd137ad53f3fc0de5112bcb345df30b2bac0c258d2f380693eef23907df76c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca35618ead0e79168bac3e0a077797ea
SHA166cebb4bd1ab78e57807e3b0860015149bd1d326
SHA256d185601aac9c6c9678f9f8ad428266fe3d90a4be7eb01fbba729ae7764e3847e
SHA5126ac0fd0b4b2cf669c288f6ff4405a001812e11b50fa926f687c1bba5a94443aef0ca4b96e384ec1bb1a5a28577046fbd0b4a263f32a87adfc3947a14c8a59598
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574e44fe729a84266da397f6362b5f073
SHA1d37b723bf2533e9218657bca22c9a3f5f63297e0
SHA256b92833a86c3a290ab27374bd5c19e0dfb27646b80686442b59f69a58da9ac81e
SHA51237bbbdbe25260916f55bbc02d7e8bac1dbc9623670a0faceaae0c2520a1e44049a81c848af81df27aae49f04068b2c671e2fa3b73acc645dfc646869a88f527a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57aa64aa626dddb818986b9352c1ce79e
SHA1641c0673bf80c956b529b1b6adb840929c694192
SHA25641888e27f85c3a12a587d37093a62cb2f87b6ccb2586d84b3d61dd35ec86cad2
SHA5121ca9a3c9b8bc5fd8f62fe9480135d720951f597fb6670e265a9c1b251d678d93f9cde9658176e73b8c7ca44cf180d10a33d528d2f71949afe5ff9fba1b3a5ab6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac48735e48e885f59486e4194fec61c5
SHA1fd161f62dd88b3977ba64ec41c0883f69c2b2f07
SHA25653667f107b9b09914b1e915ffbaa13993bdfa483d4b7bb1f037d3be6883e4aa5
SHA51233e036f25ccde1b99a5241b1afdce39ab5c9c40edcee519dde7255f735139b9559ead8b98ffcbeedf77bb2869e41458715c5fb00b9943abfbb94ec6aeaa9b8e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5369e3f5fdaf5b1a76af0a2f53b5ab239
SHA10d5a13d66fbf6272a31819cd92e961e402f43256
SHA256d01defc57b70ac7aaaf38f85d2d4754c155e9ab478ef6ff721318afb5bf5dc97
SHA512603316e997f6abc36b7999dee25f0354736aa7933f3eb872033e5ef2b1ba5d566ec430508d20a6bc1b06e33b85bf8121a92f23f3e501ddd056481976eb55d757
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5d1ca6b8fc0bb6a4244472dc46d4ca7
SHA174b7e9a501967b615211093d875e495b881f0616
SHA256be61c56641ee6effd2de685404dfe01ad2528885c0de329feaf09389a6925c94
SHA5126bff4ac0244186f4f3af970d189c6c1b41cc6c61004b3e1f46562b31eb49fe5b8e6c0862596230892d016ca1b89bba4538f651ff5a3c29c8d0cd02934ffa9dbd
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b