Analysis
-
max time kernel
117s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03/06/2024, 08:51
Static task
static1
Behavioral task
behavioral1
Sample
912ee171c87d0237eb0b9404bf8956be_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
912ee171c87d0237eb0b9404bf8956be_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
912ee171c87d0237eb0b9404bf8956be_JaffaCakes118.html
-
Size
9KB
-
MD5
912ee171c87d0237eb0b9404bf8956be
-
SHA1
bb2991aa06637fd8d5ecb0699036c10c2e2b366f
-
SHA256
d8951a888b92c03e367ac968648b12a0fe3d7a0e40211fc2d17b8a4ed4b3da9d
-
SHA512
00e6fd7bca93d4c067b576ad7e56bcc2e6f4104f75187773fe68c93b227cb3114a069c3c122cd54f35a15d4598d3d5f665a2cd33a6daf824529afd5478a2a203
-
SSDEEP
192:aHst3Oefcfdma1C9cFL397NdcAGRoOQiP8G:3fclma1CCFL397TcAmoOnh
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423566546" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{716BC831-2186-11EF-822E-56D57A935C49} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6085094693b5da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001d24827b4dcd244ca3a6d74e0155657b000000000200000000001066000000010000200000009406d9c1e06d4a616886c7653b6d36bd82e7b100621ef86b789a2cbdf97bfa2d000000000e8000000002000020000000f8a7ff267d8503e5d9570312a36b901142efc7aca8fe610e3e4e3487f11638122000000019350622ba3cf1e81ce31db7e643d228815462a5777c657c8c95c601018d76e840000000cf6519952012c0b0aa1ca4f20aa03be3de73724669584ecbc677c38ada98513ab66ddea87a1d1c83e69c7ffe484bd363f066219861f56dbe5b58737709b00d10 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1504 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1504 iexplore.exe 1504 iexplore.exe 1060 IEXPLORE.EXE 1060 IEXPLORE.EXE 1060 IEXPLORE.EXE 1060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1504 wrote to memory of 1060 1504 iexplore.exe 28 PID 1504 wrote to memory of 1060 1504 iexplore.exe 28 PID 1504 wrote to memory of 1060 1504 iexplore.exe 28 PID 1504 wrote to memory of 1060 1504 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\912ee171c87d0237eb0b9404bf8956be_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1504 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9ab0490890c9e4ef16e93785c44e7a9
SHA157a1648d17172e47266587d60d9ea77e7dd26724
SHA25694c86fc3422c3da8bfd230b3cf543446b2dc25e959fabe8a6f9b4564fa53664a
SHA51225f36ef27c63d016cc6a3e25278a7fbbb8519116f5a933fb0b27a4f3a4a9feb9d3e530ca527587a097515f1b1a3fcced5777ec722399e39fff8e3b978bda8ddf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a5d3a8f284828f2e08d62417521b25f
SHA11f5d4ea612efe3bbb0d1eece2c92b30917de83f3
SHA2562bfafb303caed3555021be81947063bf3fa7f5d04c4cb9780c7ec47dc6467eed
SHA512218d50b880e846afaafcac966fab6701063f9e41e2ea42a228a85de104b96d5500368ce0189524d01386baf8b4de3d72516e7e6baf30d13579a26b62e4ecebb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c96e65968aa580339695588f9dd5b1bd
SHA1e2f2ec7b02ac7f6344ed849dd7c6c7ae35dab256
SHA2567caee24971809e79b7c25f844dbfdb1d3d7bfd7b6df8f91cd9b8b66b15866aa8
SHA512432e0489b2036a67b914682876f0c8fb24607175ef2789b84dec642cd2d9570d9ed8ce45d695c08b52a17dd85ba842d42ebbf37abb1915bef455cda7015738ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5470b3671c46481a1b1575d45fa778813
SHA1ec67604bbb4f9805a3660a8cf599effc8fd84216
SHA256668365ebf608aae5b323ed07ed39ea9aaa3d5196faf2ddd52c121b06b2091c10
SHA51231e1ab6a3a9428cc98163314aa40d02ad2c27c9ac33b4b6f28c27bc36a2ac67236ba472ac5abf65928e5670d6b137334e039c6e1913c81bf99d306a91b09c134
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508b23cc44999bf261c5213afacdedadf
SHA1cfcc35224228489fc57d81e4c77775a1aeb49891
SHA25634d7e695237532cc22ca88bce7a29fd92c2d5a1aa4100a505afc9951c7f1d1fa
SHA5125c5550e846d38f1d4b1797a8eb6e1cf8ec583d29b009f271fc2157aaefa914cef337fa98f136bb3382716b87da0086b84c759979937addcec9b97f3b3d17eb56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f163a1e439c82707a7f500b86cff49ff
SHA10646ba8b90a42b6de0bf21a7a7c41cbbc2459c93
SHA25678b64a6fb4dbe6e866c782dd19b382305e589f9ba978d182aa16110301fe905e
SHA51294aef113a2ab527e8ad5a40cbab2b50bce5f11a017aa77ff64a642f112d33d7fc498a9989ed3c4c91100a8d6866b7915a4c3b8a9eaf1442a6d9969a998a116c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568473a0f5fe06e64b49bb55e8c59489d
SHA1f35bd0d01e508ae488a9af6cacdf35988e56bdb1
SHA2567c22232bbaa62375e6655b30da0cac473fd39696d63961418a88e8091eb167af
SHA512e61be5f0abb6a0f9c257c94a5e8b48dafccfb34095efa7df2cc8a2a4973f85879b6958403712436b967429c857a713bb06782fea47961f949f64c494ba263467
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e15186f01fe178a8f34791972ea6e0b5
SHA1a82e403195e5754b15c35980da23843f426c3ecd
SHA25652cb68b5a7d542dab4a4c57be1e300dda1d45ac69d2a2c316f67f6335f179ffb
SHA512cfdc45a942937b43fff12c8964e980a046c7469d9f91d0fdc91a0bec820323de78555f3337b1e7d43347d9258aa4793b903da57b938badbdc623aae9cb13ef5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552f2556f216b44132407008f7594aeda
SHA17ebffd0fdfc71f7ee098e12ac249116c2c9122d0
SHA256c3fb05178b12b7814f922396b0800a8ad8c61826a17ff6b3347ab8df7be6e4ae
SHA5125ee2d0967e76b90519c9fe3a2dc082a162d76844ee1711af07365bcfa49f24ec0e62323814df87eeb4e6e567ac83e3876b9ff2b2b35969abccf3967236672643
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5181496165ec3678b11721d6bcf07b9a1
SHA1d1b9bd3ddf0bd77c0b69fc6fbace651b609d8585
SHA2562326fb44ccd77a4b70fbddbdbad4ffd6b2bc69755919bdebe059fe7d381b13f8
SHA512225d4fa653da117a69ce8d38613d81b499cdabaf19ea87f2232930c50c2410230a098ca0b5e746d16cf2aad5892b1bbcbe6d18f19630c99210bae4a911cddb76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bab7f28d3b4052a9859a15e45614a4f
SHA14492dc374422c77fae197212861ccef7f297cade
SHA2561adb31ece51d6c8f71f17465c14e55d896046558854b2c87970551995de5e3aa
SHA512f40641d4538d38dc830c466890e84d19e46e9d30523225557602561c76d38315abe0c2c524a9a7c12a87feb335994774771674b2c29d30df28e41e2e93f1d33d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e706fcc1d06cde55c341964ac6979161
SHA1b58cfb7634e38d6e72e122ff3b35f9ad35658ee3
SHA256ffc187e3e498cba18dff359c846c261ea099eb87d6f5523c7779086420b3d4a0
SHA512184c0427263c65b107664099cec144992baf8145496fa4867369297541345fb26771b55fb208e3b23b8ed20c49f464f559577779b217378eaa7e497c10473097
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d68d85f54d5548be6830f8d548aa443
SHA14aeaa65e0141c527b0808915ea32bf2070d1dde3
SHA2566ae20df9bc23127fcb4b510a8032ee4fed5c8270877a6b7cc55e09c7d2639ec2
SHA512b75ea04352fc4137b4bf5346c56deeee74110e2b3964d91e86caeef3ea8c8e99a946776dc283d82e59437768ec05d99989b165636669ea6c378ce0a437db3b41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b96f636cd8a9a8a1ba1c3074ea84196
SHA1f5e95295b61bd7f83d86cdc2624821bc41c1be56
SHA2561b6d7a374aa449af60b6acdcff6f3d03ba508aa8d7580415e47cf40e64a14f72
SHA512800aa2bc55685d48ae253158b380184aec2428bec97ac34b6ac16e2503d5c2e7a3268545de453a3f42c6dfa4865b73b9b45263fe53ddbfba1bd6762b1a26b7f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5408d1e804c685085c7d9aea361a88bf8
SHA1c4a60a5f337c98e3a911abd0ad2851b329ce9ad7
SHA256f7106131ad2fe5fd5fc27915ae56271c68adfd1e70c2a4cd7cc552a7833980ca
SHA5127b5d859e58a121fc27ce92404d1fdf1b129f906bfd321d667fa7899af7b977ab9603a694098487d1ae6536641bd4e5100f38eabb8a62d9d6305933ae31cc636d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b822c3b86f9a11c01d501480acbcda1
SHA162c25d31c35a16b7b8b5fe92304bc67498b30c4e
SHA256b87f5db55c183f9381d7b48fc9c724acabc4ea9ffd91282c08e2ebfae1fbabd2
SHA512db8ba7d3cdbe594afcb427767d5994b885eb1e0a957e8c3b825efbfa0e4af03ddcef1cdc436b513e3d0c22a2eaaf20cd29d8c727e8789dc2d781d48ac3c4547a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa49917119fcd5da738c6474f4ad68a1
SHA138a299bca93e5e92df8c53fb420f77273fbff3a8
SHA256dc585c0314490bab43ac3cccbf8f4de649bb9074a344cfee79abf92fb2b382df
SHA512c59b777a20027bb576f1a5084f8b2c415817ce7a87b1c7a7258a598d67b9da34a69a00cf69a26f0619877de955dd99e938c8b72494814e666ed0da56ffba920a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56be2099e0f59447c8603fe90bc353b8d
SHA1bc4c032e5c00bfaf3822d0d944880ae546982f38
SHA2560dfbf61c3aae856d37c821cf2e80b7d8f080be6a78c7eca515ecab5933d05f59
SHA51242e4e4b0bd312dd7e5c35a935eba16101cae5302cf3696dc609e8dd7a6cdd2b371e89dcae42b427a51c7fd1c6a8cd6223365d734444359fed1ddaaf65f747f60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5301027e9f365437de09f6bf5fa67c3f0
SHA1d59d8cc814d04eb4d9ba9d8877948325545f34c8
SHA25698d525cd7571b2b527b1f4d05f98d5887c7f1173c69aabc47103aaa63588b68d
SHA512841db073900ba412e28daf1329a3d28b7eca1003b220427a7c18cff0a241d60b6d0f684a4dd6fc415ab00aa986c1505b6401530f473080088fce84b163057168
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b