Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03/06/2024, 08:49
Static task
static1
Behavioral task
behavioral1
Sample
912de0421770d67a88982b8fe703eb93_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
912de0421770d67a88982b8fe703eb93_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
912de0421770d67a88982b8fe703eb93_JaffaCakes118.html
-
Size
460KB
-
MD5
912de0421770d67a88982b8fe703eb93
-
SHA1
3bc295fc07e5f34e06626f5effef2e2b54722e85
-
SHA256
7ec86f5d834831f568724fd3293a22995f93cbc921e09453382326dc726d7d3e
-
SHA512
415c29b1dcf23da0f6e435c5ac8b8fb1db3836313b2e3016ba0c6ffa386bff355bafb4409ba6276d224ce935f67448b307a0e8a186ebdcb7d2b2298e9ba92cf3
-
SSDEEP
6144:SgsMYod+X3oI+YssMYod+X3oI+YesMYod+X3oI+YLsMYod+X3oI+YQ:t5d+X3k5d+X3W5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f087e31a93b5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{424E6171-2186-11EF-83FC-5267BFD3BAD1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ec489e43473a244b9ee1c1a82d0118100000000002000000000010660000000100002000000001335be279337073b4c8e93e85137a688a7665bf78a0a7a0bc50c820a4634191000000000e8000000002000020000000dafa5cd221b685fb7d229861b39293047ac21e25f83635a067142255ed4280fe2000000045ed46d33f906aa94f1ca7ade9ecfd79059a113922f9b456a5831f0c38fa8f9a40000000b26032689ddb5c4a10d2512f93929d4ff451e821138d40dbfd6c6937e1a1cb67725f46cd4d415e956955d24e9f857042a7b9df1cf63435939569b574885711e0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423566467" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2320 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2320 iexplore.exe 2320 iexplore.exe 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2320 wrote to memory of 2828 2320 iexplore.exe 28 PID 2320 wrote to memory of 2828 2320 iexplore.exe 28 PID 2320 wrote to memory of 2828 2320 iexplore.exe 28 PID 2320 wrote to memory of 2828 2320 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\912de0421770d67a88982b8fe703eb93_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2320 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ab2b9b7304203f7e97f6e735acca842
SHA11db959ad1ccf1e1e26fc5bd866e65f5ce1063eb5
SHA25620654ab5e013c2d0c6cb4424d15641201917b831f31d124682cabed9885ddd85
SHA512409f38f04a46ce1527b0e11cf2a3313bd8d815121e930bd67a98e966946dc99104e9d71083b2437335ed60da225c2dd96f2ebeef9dc3b63c460087ac3aa479d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d9d5d03e42224de82bd33b029ec9434
SHA10a7b461dd620e4674622cd5d3632edb27edcfc55
SHA2565b8e1837f1d54b392b898acdcb29a6e06060de1b11d5c82cdda4ec046cd72357
SHA512d4a4e4edb58d7479ced68de2fc3a8cfce43c1c1729c817bb875ecaf1b3e91e23c6c337000df16a52e59d9f1e2518fa5af5c7569c38df8ed685ee9b368da02691
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afae9217125f69e72dd4f1a2a598425b
SHA1f1c0922f13bf5d74bd021faacb51f5934becd22e
SHA256d425c4c04ffecafc3b38a239606c23715e4d35af8f2dccf047b3243298ffaa48
SHA512317d3cdf7f319658a2599d070536a907fcfdfe3959b4492209aea12e22ab50e0b291fd296c9639c12154a63e50efe0ca02d7fef2946053af887a2e939dd62c2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54af44870752f4f801ce2a6a7b726cc8c
SHA18f2015110c7bc02da40a99f40e452928a4a3e3b7
SHA256523260227a40b8040da320fc7e5dcf0816f06a9802d856ef5d64349c3b54d333
SHA512d5cb89f31f1db6d7abbf2511b924f6e064b5ec533fd1775e380c2d10a08215bb927e1ffe489b751fff5523e1e80dd17624a0e5dfac1378698052d3806ec1fa24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533b313de0b550bb43b753810d443ddb5
SHA1409ce695ec77488c0fa32750766c19d4823d907c
SHA25608b8622865193dddceb8e7f386df97efd872644679327a68bf19a6f482f64160
SHA512728cdb0b0ff7e47e68bf6612634e00ada860cd49bd5c83a197fbad980cf097af0e381580cdd60a25e8c0684a5633912fa1c7d88fca9143d675f536ccb08313ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e70253b8736606862ceb584b826f3871
SHA17aaa69f27a2d6ab869dcc379bf3ecf5ab627f974
SHA25670ccc019b7041692e966e50306f01d0c513b47fd26e80eeb25ec104683db2438
SHA512387f09e2af7797392ed2ff50264cc58d1e3256871ea7d3044c40176a1d2f5404b698684c5e6396a7ecab4075b6af8637ea93e56b39ada11131cbfdd2be33ca1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce121ddd47589e27c6b112774944110d
SHA1656d0cb613ec0078ff7ee834611342720e6f114d
SHA256cc9ebc27564744aa903e11b9f7221e96d17d3d1648ad5ff053e82d6e0283f945
SHA51239c84ff33fb5ed83ae687e7f00a31ded7deaf78d9b57e1932a50964afdab8f909fe9f22a8549bf4a7c40cc85c3f75ee4e476c91b26710954ed271a5f5c6cd78e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2ff813fc854646217c7e79a41d2c892
SHA1bc89cd977a7ed19f3ca939a41122f45a8f436e5c
SHA256308360a02a93f5922e453ae87ce1179502a44451f787d86089d23f273caf055d
SHA5120a648a1dcddb849ca6f4d0722ed6377a4441cf4817a33accd0f5bf26ba261d128a5db3a3e075cf7ace0e1062adfcc710111681b8d54c63b2dd29bc088a978ecf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cdd18812d1ab2c6e2b091745c1a87de
SHA184253a3df1a3de89b8ba9a0a8e811345bebcb7b0
SHA256f85796e8a64675bac294b62fc68bf966aac8c3f840e73c998fa7eab2e3434cb5
SHA51295e6ee15f00508fa648924738a93616d9288a0753e877595b7f7445f8b1097442c1feea0ef47fa6c4d90625312fb91b1d122b8a5d2c58aeb3f1182283beee2ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571c1bc4fb5d3cea0e4f9efdee35dcf7c
SHA1e3208460ce175b17c91413254817ea7f0e3dce45
SHA2561134e81ded0df9b40226541353766b8b8e7dfc35f7d97092b4fcd1380cd233e8
SHA51206abbf14346b53b1a441138aa801177912df0cab55464e9606564304619a070688680d9d1161746bfc81086a35194d5dc46ed9400a6d2eeff1790de91039dec6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565fa50089885c0263b67899063a70a9c
SHA1f3b2422220aa6075c1881ac4042031509754a5ad
SHA256c950cb4aa032c901c557087cbe51c1120c31691f2b267762815980f46ab58063
SHA512224a8c26bdff432c53ee4657317a0511804fd572bb0a8d42cb248315a5dfe1e720f07d590ceeea4cab662779c68cadc51d1123cb893e1f128e9955a1d9f3d7aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c53a235b33dcf529eed1665a3fc79155
SHA17bdbbfd526296313ca0ce094b57af7d6eb925d77
SHA256f9eee2bb84287b779eb064eb2e99bd978e52a4096e52dd6cf85813893c5ebd7d
SHA5121ec0388ad11b6eb0d8b29dfc9d3b1c59fafe4afbc29687191c196a125fe5e52f496b605bad23f5a943311f0caafb861160541ad02aa71e5b07f55bde680b8624
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b44c65dd7ef0f8db02d5f4f11605b17
SHA1a3274045736d869a10197b4b627bbe22fc3892ae
SHA256f4eacad28253f901b822ad8ca05b81c41d1f5ab523e7181fc8e322683571ffad
SHA512a45ee804f3e99a95752bb14f2d50636445f0945b4f704cc6fe4f41d0afed24a2e9e6dd82c692aa3b33aeb1192704dd160228fbd28a5e29874f772db31b42bbaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5537d649a813161ae2136c77de5e43685
SHA1deaeb62270546dc4e7f40689835d996c0e210f15
SHA2567b7c7e44d0f4dcdf15db713382a6b833d5a4d0d8d5afb9f893cc443e39822e6d
SHA512d46949710aeeeb25267535e898b654018ce5a2785991b8321b61466019d1f5f56ec62da2fd4932de200e039260804a1573c30b82224faf94d42f27103aeac2cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b67bfe7dec33e00463fdb9b66bdfc2b3
SHA1046fbe650784606072d39d117fe1fbc67011d865
SHA25649c98d14d2f11a58a001e150c7d11bd723638320268bdb006084d30886f18af6
SHA5120ea60d721d5f23a7c2937247fdeefba4f976ebe8ac1b5733ff451d1f1a8a5f2ce071ed6cd789a6e30487e87492a0fe5a3d66dd079b223a3bb4e4e501009b460c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5578c55d81987430f935bd91dc3a21818
SHA13b689c02a0df775f821a54028e0669c39fa011d5
SHA256523639dc28a9af126431d560756d2f1f3b91f32a7f329b70d4e5a86f1bfe4bad
SHA512b37fd7b3de2ef5551ac122478fcdc1f7935d8cf9baa27d48eb53895c0ec18d14fa7eecc116868086420ff113f5a006c1c40bae5bc999fe0c1374a5a7adbf4d79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599a7d1ad3e7e8848382c600310febb80
SHA1e371ba21b54d786076b17caa64e8084acffd2504
SHA256d029685217f098ca2a740046206b597f5b3f465bb9008c7eb233a292725bfd21
SHA512d355db03a33feed412ff170300ac07041f5904fe2e3b7e92ce98536c2c31d4ea894d58bb4cb13618928c96dcbb2861306d601e76e686e5e1ed1c2082c8c35e24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac1c31f17395eb823f89661bd4a4c1a4
SHA1b002ad71c8ab4a67487c219161f17afdd3eda58c
SHA256df669fc3de6359624848099099b54ed6bc21c9bb83142f17767cfb37f83e3ca8
SHA512885831c8863a807accc1eafdb3bc9df8ea5bbabff2514056df076ba4b61cfcdd920c8eefe7ab7059109036cc3e8c411c6dfeae2ace3d2be9d2b893cc4da2a3d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e865e2b4aca528c28a1d92489b06184d
SHA1d52e45d237af6bc05a3f88a8091de7a676092f3f
SHA256a8aafcebbb1e3889d8bd3537e830617c97635c5b962bef8f197dacb518de914c
SHA5129339897592cacb97f29fedb47536b0fde6300b0905f202411e3c1769616acd49d73ee9e9df42ac3c2b4afc566e436afac88da55c8486990ff35ea254502cce70
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b