Analysis
-
max time kernel
135s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
03/06/2024, 09:29
Static task
static1
Behavioral task
behavioral1
Sample
91493b415b5b102ecf51801b0569ef41_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
91493b415b5b102ecf51801b0569ef41_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
91493b415b5b102ecf51801b0569ef41_JaffaCakes118.html
-
Size
14KB
-
MD5
91493b415b5b102ecf51801b0569ef41
-
SHA1
92f18ad60f0a9aef5ea6260d9ff01e455ccc5333
-
SHA256
4b8b0c4f10a5aa2a8af2ec964a85649e77a01e20a35922dd99d6d54b65c3a44f
-
SHA512
3f167be7d1e6a119444493f9140ad2855410513c3496c4fc954bf44b9fae666d368e7d7c603e203f48c5afcef97482436a664a9029d8d656c1c6c6e0978d56d2
-
SSDEEP
384:/IMKLXAtmyCJI3rt72tIHh3jlE58gwggsH:O4myCO3rt7bHdVPgDH
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423568847" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d10000000002000000000010660000000100002000000058525c2c8dc942b015ab2cf8b33a041cd63f22a4db15671f786a48e6354589c0000000000e800000000200002000000063c49bcd88824aeeeb394948ef727d54f4046aae6b00a4f01947833cc84a13d4200000005040a474c13c3f94e1a9f33f0c35a32bb99c0a3f2b754e0c13b890418f5f3efa400000004932345f8c0303b33a644b25cea0d2bd2b8b9e126112a85bf58ee46f0b6ce550fe677e38bd0333f9fc0c05deecf11d89371a6de0f45c73c7771ca91bca5e3cf3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CC4A68B1-218B-11EF-B781-461900256DFE} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00b1c9a098b5da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3012 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3012 iexplore.exe 3012 iexplore.exe 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2556 3012 iexplore.exe 28 PID 3012 wrote to memory of 2556 3012 iexplore.exe 28 PID 3012 wrote to memory of 2556 3012 iexplore.exe 28 PID 3012 wrote to memory of 2556 3012 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\91493b415b5b102ecf51801b0569ef41_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3012 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588688a150267fded7353635d6b0afe51
SHA13dfc97403f796154c57647eb64179f73d3ee0d06
SHA25623c6195f8b96259f0ac43d4feab1825e7eb97d5f869a64a109b7cad140d6c37d
SHA51268d8caa76d2f8fd1e9c28cf4ec68aa303b74327f2fc356153cec3bf84708f36159fcd4d88a35d4750fe63cf47c67934343ce62adcf372b346dc122eaa4ea23fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ff1678df6d3b132824affabbfade3d9
SHA19b687377c8b4947d05ef9c79e46e48745ee5b773
SHA25690dec11dcaef967a8810c0979a2fc10532402244c479e7aa07537c7db22c6c82
SHA51203b87dc0ff9f8ae9ce1b0c91ed63711ecd8b0bc9df9be4c98f90801cdd155a00f8ce1931c4206184a280e6ef1420ec4b0aca1510880f51034c7334526db8ad58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6c738c0b8590f6ae8f1628087a2e23e
SHA127c5c4504671e2a91a8f41fd350b4e0e8a170117
SHA256c3a0228f27897675dc6f1a88f0a382449f783be0199fdb6339dbe5fa378bfcb4
SHA512f47563cea1491c486982254f97a52358adb31f2aef59e1aa3b39ee2a82a5bd5d92dcd3a74ca70fbbbea7415349bb271f19267d86e9fb7a76bebddea8d13da252
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545a02dba710af0b583527c98ef553029
SHA1a5d89c78c958474c2e84640f9c32328d6368d58d
SHA2568470f40561431b8c58052201f6f50244969019285fc333dd672bb11b4c04d915
SHA512b474f046b75872bfb3deda964ac54d48c00b4c34de12c41120744fb607b6ad0232c5a3607bd39ced12cfc1d5e5b9521f42ab47b90a4c80a8b80b8b3128499e4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d41aeadfc1b6e322f97a1617a455a4f1
SHA1fbc349833cf429d05fdb12cd3c92026512029a38
SHA2563156e3d3281ded7f208bf2f86cf140784d6187007737e6b05626dc2c5a1f87d8
SHA5122a2cad2f1ba8f47d0f8f47e469d4d4b5765066d5b6cb7cbfc0dbb5fe2c69656135d00e6851f3872bf74765cd8f9bb9668d57a90fef69dd197c5d1116a931ea3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5194f31cf26061406eaed739179c2e382
SHA1593d11e31bdfafb5f420abde36b0b38686a851ff
SHA2562cbd97efaed673ce83f877658c148a7bb9914807b1628c03e6ebfd7a196b2871
SHA51223f34ae68977b62092f3b27e5c98d81a9389b40fc255de4d8c493bd541d245b67692b6fe4b9722f51d3aebf5b71cc7a8c7e8b5142167f138f668b01b5bf9e287
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558cc8189ea7d29dc5798a38c8ee4ccf4
SHA128fcebc842757198769f0308facbc519d1e9b9c5
SHA2562be44ec4407afc743f3d5fed55811ec03f8ab78e573f8a157a4a8e7195ca18e9
SHA512d71f589e64ff8f77c74caf3fad85830e7145767ad05ec0f377085e403ce86da5ba71a44bf63b41bfd2820ee53f33c4f7b4fb310841c88e10535eb6e838a68e80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53129e4f7237d2fe47f14723f56d4d042
SHA11ec26914ce73dfdd23cf3d2c69f0ce77cec379de
SHA256467f583869dd2d6db9c7f6296603f88eaa42bcbb0aefcdb7188c304ede62b85d
SHA5121e257b0cd3f087aab2de811dfe42aea642f0a96bcde51745a621f8359d181eeaad1851c964269e75d5670bb10dd3c76fc09e71f38a4b7fdd0fcfd1431efbe2c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a929ffcf303689c940560a9b3d1105f7
SHA1e30fb83f5e3b3bf4c94d42b6ed820d8141014362
SHA2567416f884956fc2d92aaf864733f97a67f02cc194611d2af44ad50758be55c0a9
SHA512be99978913479eda071037a5209bea83ba97afea988580d04c4755ddebb3a03ee5dbe6d90b300d57c565fa36433bd994ca3c72aaac04b441d7ad39d3e03ab828
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c951ad14a8ea7ed76cb49777489bc71
SHA150051d0f50683edfd997fd369c094f4db2e8e7fe
SHA256fa897c2c79274e931693334780c6f1a51bfb2e75ad9f0cd6b1e509ad985ff4e5
SHA512d4ee39f2293fc8937c0518b786395848cfd5e45fc1d9a6ba84f6bb061e21ce9648d8afac686acb1066635c06729aa8ffbb1e5e7c62e998212adda2c0a255c862
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d7ecaeeaa8ecaf8537792e5b955bf71
SHA1c611709735f7e3f1684ed9ea756339a5eb9338fc
SHA256c7fa2e059784485f61e45cb0e28a5eadf366602b9fcbf5b45e9ef855a4f44d43
SHA5123d1d984196a694240f78e601b9527ddc2cd9961ced3fd8bb713578e6f7828bf44f49a5b94a634fe4e4bc9e1179c804ac0da181345da5ab798e7ffd7e471c2958
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56674b1be5d88b902fe06b712fccad205
SHA1db6ed1b8577d5d83578088a5852a39ea7b67714a
SHA2561c3f091dd6fbf402d47d0cc7ee16b2ebbc4adb1a8558834b8fb7500cf1438369
SHA51205193eb4b90e94569f32425ed3e8d3bb2e6c92cf55b9fc828bc97a43c4494b9a118a6c6a609fca86267d88a795ddba2f45764fe97416962439a2019d467fe706
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ed3c90ac43fcc6cc1b6a7048d3c972e
SHA181e816fbc0666cac5e0873df8f334ecc1da09e21
SHA256088a304b7d95b189817ecca976ee7aad067c25b1d6df3b36b70b11bc1a80fcc0
SHA512d913ab641aafd514036a0b6919824b430144b60f1713443dd06e6789daa9873bdb500b2ba4a5926cde5ab376d3d80d1503129ab637b3e90c9c951f9bc3492e72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab2038881ca9ce69209a78adb9139f72
SHA11fda72bf1cee6a0d00ecfc9a0e1bd712ddc870d4
SHA256ffe47c2203c2424f9ce2557a05920374c5a2f03a3ad862bb10673eb8a114410d
SHA512b04215f837733e3b44458d78d87c95841ebdaf75dfee4a47270a7d91cec81182bcc4c4e850d693f0fbaa7e774978d7618c650eee199c0f26942bf6f9027b42bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c9bd7f1eaeb4aa39bf83b8951f195ac
SHA1d018f4cd674efecdf8a7d863437dc74f766f0bb6
SHA256ba164fa8ef43b45c3a267ba59061c9ef4f0178be7a0c59a4c6cb261df522d51e
SHA51297fd019d0c9c31959183a2f5c9a8486ddfc9e27c46e574ba2e7eae62e656b7c98863c376c5bbe1df1f2d505ca84ae14e636e40a61da65fcf46ad9033fea0d84c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52439606ab5dee92ae5dc6ee619dc7f21
SHA1bc63d854262238b899094748936590e14c7e5a38
SHA25612cd7ff900be6533e6a7dae35fc6d9b4a20b87da5fe3171a72a6f10667711fee
SHA512e9baffb99dfa68df76fbd5d470b0b2809f3bd4fc2b0b0b244b16077c0bdcd19f584b17a20b7bef67c188748a060de2a02097d89a8c52ed12b1f6fab58371be81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b18b67bf5ec9cab360d7e32c0bd1174a
SHA18bc56a7abe1703eb0d493fcb987d05aa764745a8
SHA256a96cac3503a438f1557160da171b54f5327d3cc3a6dd0000936e1fd16adbb517
SHA5123adcdc1ffb891aa36ac9ca3f9778320581c44213d5baa5ff054c6a1f011a3863493790a597af4c52bb0d16e314bb5f04fb7e12854e175cc246ffa365cda6bc0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba096a35ebe50ec5832adb417c84d432
SHA199c0b80e02fb060c6402ef0b85a8c11cbfcb521b
SHA25682b7bd2b296d94aa9af373d3ec1ead3ee318d0b1fee576591bf12931345a2745
SHA5127bbe9a2a866b10bfb880a1cc6ba31a5096c221ed34cb32a87af2364bb076c4df44d4a38c79c7401d4f6f22c6c5697d4aa2cf1022fe6e2785b1fca6549797fe19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ec2679e82750cf52071c7abaf20252e
SHA1d6e89d72c58158e61e616a25a95b0b6ef18108b4
SHA2564f45dbbd7e55ea0f429005644548e30418899b815a401221e2b5b3cec0ef2f4b
SHA5125626adb8cb7619ec1658c68ed39800856740d298ed89067caee1bd7b92a60c8373f2d8c69148962a0f37de4916ce5c7133ba1ef24e6691bec4b3d8fccb66e23d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b