Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
03-06-2024 10:20
Static task
static1
Behavioral task
behavioral1
Sample
916d2aa1795f8bb2e7e5078d179116e1_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
916d2aa1795f8bb2e7e5078d179116e1_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
916d2aa1795f8bb2e7e5078d179116e1_JaffaCakes118.html
-
Size
14KB
-
MD5
916d2aa1795f8bb2e7e5078d179116e1
-
SHA1
cb9848386d91b309128dcef942af9b8cb2eca1f4
-
SHA256
5ae42260e631aff63839339cac67a360b5ac930f357af336ae810b01b8877f3c
-
SHA512
8878f3f4993769a4635b52e54b7b1f0dd99eac6e549f10682b8aa08b470e49560214d17033b9177f6cd7266a1234d3e485d5cbf368b15698c8cb10592e12d3f1
-
SSDEEP
384:CyiUBD0UQhBQj1/RQa2QFAi79y1wDduMNg2H5HVS4L4NyyFLV:Cyifh+jteQFAi79Io0MTnzLOV
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000d46c15e12fe9a36e1e17cd74d88c2ab68123a75321c350eff467e818d6b5fa94000000000e8000000002000020000000e26aff88b41994b3e0cfb2962e36e77458c30a0b21481294761b750b4869c09e200000001e87620e97f0bdcf0b6d2739c230bd5713c33871486f6778e5255f4f04afa6c840000000191d8b9f84dec453929d799ba2cf427f8f810f8f872f255053464e51ea538d42222af92d0f1b081630e337d083e4bed5364eb0bef21f997b4221180b877c5694 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423571890" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E33F9ED1-2192-11EF-A233-7678A7DAE141} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60cfdcb79fb5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1116 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1116 iexplore.exe 1116 iexplore.exe 1676 IEXPLORE.EXE 1676 IEXPLORE.EXE 1676 IEXPLORE.EXE 1676 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1116 wrote to memory of 1676 1116 iexplore.exe 28 PID 1116 wrote to memory of 1676 1116 iexplore.exe 28 PID 1116 wrote to memory of 1676 1116 iexplore.exe 28 PID 1116 wrote to memory of 1676 1116 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\916d2aa1795f8bb2e7e5078d179116e1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1116 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5992d8156a996997e9295d6adab6c19
SHA1a7bb0058baef5617a8f9004c3e2e5297cb77bad5
SHA256e8e48b54a8d19491774dd8f28a930322df7bf350994bdc9d283df4632856ab47
SHA51238d9a20042659dbfce9f6a0702936baeaf5646dca2fccebb08932b9194cdfae8c683a07e508a9ac7b6976e2bb3c3dffbfc9d740f38b05917db5956c27a36a4d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af408192b770eb6fe54c2f6a98616f53
SHA1a34876ec06cd108bb9692a9eba086d6da2a316e4
SHA25601040ffab0e7d99db8d966cc072b4b64f51684702009302c7af6b10b68c77583
SHA5127960be9ed47d681d07f9a1d613756572f1e7275d5f9a14d2be5b34feae77fced65533bbe0d020aec7c2b8c7d17431cd412fdc4ee86f704f53dfaa3189e4af8cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bbdb49f6271d4dde750aa86faef7e6d
SHA15ede2d0352fa8999109814bbe923775b49145e39
SHA25638da2906277279822a112fa91de87e94b8b7663cd701cbf2d8124786b5139aae
SHA51242f1b8dfa8515b787da914b887e0cedc62231a466e686eafda13135b244bb6af4919ffa986d087788277b38a1366ef3a7ba7bef9e24c6e428cb8dd50991edf13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5827a0cd6305a2510fde0de74b6a46b51
SHA1a2b8317965be7b6a7f8148748baec5142b52ded7
SHA25618281cc0d1383645cd78c1fe8576fcaef72c102aab24fc086cf4ab454f50d8fc
SHA512f8cf6ceaccb3bdbd29c0b082b8285b6a2a919221bc6177280c05de9009314daf48a43b0892ad6889ce2dd31bd02660818999201dd56c99d693cacd1722e8740f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5313a7b4ce35411e520a7a05e31337aea
SHA1bde9de413a7f26c4a1151f5f31a83bbe2a8c5862
SHA25698d94a5282fa86cfda65c6f59f842017352210f0d298440383c40a14be93b9f8
SHA512792fa64c1e39772d2414aeaf833adcdb3b7b0d813a5e04fb8661f47575582aebcf42a03a41741b502520a3ae638882a6a5f74151ed50c063b7e4773d118e06e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dabfc8551eff3e4ccb226ae33c1cc0b
SHA1c09a3771295932e1bc7ac9235ba1488eb7bcaab5
SHA256332b5711ebb546bc00b022e862824c2a6b811f431d37ab6d976c9dbaa6ebd575
SHA512055660187aa1675f43dc9e29038345e6a5571448b1ac9302fe2f766ecf0847ecb02f1aa90369ace56e2d3f1463185c3eb1d04565139cf109837355bbcfc2bdac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7062d92a0da57a06bd8bca02ee113c1
SHA1552845592b2dc37f45de39de9a6d2423489c7385
SHA2563c69d074888e62fd6b63d8fb78c946fc37128b3e23a15f0cddb66d9013e1e269
SHA512ddcf5b237af2d01ace90c7d2b8aea9b1cf0f679beb5b03cdc7db63ec3d1d95f9b6c3bdf34907894506a31139867cc63b5b0ede34cebaaa498c4d89f35356b305
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f2e1333a10cce81e985e397aafdb978
SHA1877e30688418c5a0529475ee813eaa5ba6321547
SHA256ec4cb9b65b2a5c85de1a074543b0250280e2d059c930f52743f1ad5e246f7bb6
SHA512096344f35ebbdb657d4c29d2bad469a7e8c47a8f853989819c7b652d955cbedaea2937b63e1dc64e68297df9f7f419d3eadc3f9c0aaa724fdd2322d5f2da26b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548b5cd5d9ad901fff69efd14072968d0
SHA1fdfe98109b56b8b134059124323fe6ac39e0682b
SHA2569550add266e2278127cfd46c553193d82c2962c10d0d3dc0153be628214bac81
SHA512452b0300d9ff6ccccab80a1082d29f1b0832e38cf7d02115117d09c318c0efb5829a13a78e6f26bda6750f1671010a7ee9c1929077eebd7650aba40f975feec3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5711999c43c647bb6e3ecade39a594c9c
SHA1befc9b75e06e697dab322afd28c68ff4e10aef72
SHA256cc6db8e7d044c2097748f99431a7bc639300451c777e6830c447b54251a773fe
SHA51237466991ec62dec21a2d6f1e8f8556781486358968228eecd1726e70232c2e34bd66a40a6be29f41aad1d66f87aa69f9b621c5adca94337eac351fac058b6122
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5050ace2bda70d4d1df60678d89b4fd27
SHA146d658d8e5427cec02897f265b127af2cc7fb931
SHA2563658b1c3e24e2447131845426d639e88c510bb4dc2b1cbc4ea0e6a4888fb97c0
SHA5120a2ac0df37aed2fa8047e381c2eda1adee3563a522b87a1c57b2c38955f1bac60f6803d66c767b8ed7e7df2eda384f999c7a3632eacf4c68800babbcc9956527
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a53e63f2053d98775f74d649112b1ac5
SHA1fab9146be762aaa059fe864502d08b9337524c75
SHA25687e8204ac087e4e99f3a1a9ea1fcf0eca18bb5d04e9cc5a0e4ece60c8cbec7a5
SHA512350460fcfdb1eabdbf65fc57f1328d5f45a02aa3efd7249cdb5a00b2df8a5d666abcbfc69b8dc9bcbb37f84c4051f1e8fe499e5ae1fcd640faac59172229ac47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b18de54e525692a9afb4dad6e54a16e
SHA13c7d7ad13a15f674f376b7cb22a5be306aaeda01
SHA2561b4c6c8bb9f5bcf4452b52149a04459aea90cd0b232de6d9e49045189b055f61
SHA512c16835ab755e1696822f186e044c54235e1fd4a68948b4df719ae91e651601eb85d7f1749d893f649ef7c4a13555689dbc94a82ece9b10091b82c33dde9e09b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cc886aaa759849ccac454f037f6c52a
SHA12339d39c21ca079ae536dc23da63f7d501580f7a
SHA2567025447e7ba2ae2a001deb107be768c4e1fae7f4898319a5f9698c710d17afee
SHA512df1fd5cc0b855643781fd0d78a3b55c91d6619b99dd6f9c4b939e7c94166334b5cc95ab6a4ad875703b61f7987929d1ed922609f4957c78fe2c21f3fff9557e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c71c7991263754941d7271826c74adc
SHA12d46c0bd5c1629c4da097958cedd6241c448d698
SHA25640074a06d325e1b9c4ca71ebe0f4a8350fc7242cbde5d31f57575fa48df95bbb
SHA51278ad4e7e21cca97b8f166145ee3d8c0bd583f3a4602fb11b8e421fd47044aa7419d202089a449a5db1b7077334f4f9ec13dc10e50e7c0b3c8e32288e2955fb9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a16308353b792f9ee710c8b7629845c
SHA155fa77bc4be73751966f58f585f42101764a1660
SHA2568ff99a554fae61d32cc6b72de2256b6d283f7ffe66de563fefe0e48d15049a4b
SHA51245320e768324f07c11f096dd555e6361d15331d83a6eb59c99c4291e0352fe34c84bed67758990617931c1c00399449007202eb654dcad627b4678f0845b657c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55022ca099767c553381a0dcc01fb2cba
SHA15159a6262f6cbdf44f7935ea1cbf8ba60a37b5ac
SHA2567a38e4b67a8427a96d97c85a309b709985c903d942a3564708b504306f0f84be
SHA51249aab5e267bdc8f256760fe2acfb2d04dd4f7e96168db09286bcf16dfe7a253d30a3aa360e3a36be3e0257052919978e436da434cf10a1d18402e9072a31878c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cf9c2cd2878f1ef8856ab573e6b32dd
SHA1d49fa15168f5196ce9a91594ebbfa9bbd9458634
SHA2562c8c4eae70dffae4d473274eaf64da1b87b3c7f99511ac5e899ea80ebcdc2716
SHA512ffd963756f07d7f7bb95fe059b3b97c0b373d77c2e34220b633e34904c0dc0712a5a8bf618297b9f725f02dc5592792ce3c90d5444afe208b026d08f541afddf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f538bfbbcc3870339f3325ef0319483b
SHA19e1a56d39904d78d7a798974aa545c4724cc91ed
SHA256435b97786e2968f4c065d27a6aaa880dc2fc594c699e7c0aef4820d4ba9ed8ec
SHA5122db6895225786105c4fdfe2ccb798ec0b3fb6bcd504767bdbbe8ce619dd84fca76f66303fa7f03c240b6135d331cfd38236c319cd14e2ccd3806e37c133d0072
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b