Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03-06-2024 15:02
Static task
static1
Behavioral task
behavioral1
Sample
923392e8c4384d347b3b09021a7cc608_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
923392e8c4384d347b3b09021a7cc608_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
923392e8c4384d347b3b09021a7cc608_JaffaCakes118.html
-
Size
4KB
-
MD5
923392e8c4384d347b3b09021a7cc608
-
SHA1
b85bdb69218311532937ceaf587b79021e0d3c4e
-
SHA256
273b1fe1f2ffe28c23ea52303a68d67c3daa7ce17ab7e75b975be47ea5cbccfd
-
SHA512
cb729e9b72fab9c664cbca5cc39571c461f94bd6f3a1540c7db4a30001a6fcc2f6aa8802d88a7bd787cbdc6b72a34252037e33e3dcdf3234a8484e930fa127a6
-
SSDEEP
96:ziELIb+CmV4MSEPBDvV0n47ej/hgOKiljTR1QnynePhJ3sxllT:zi3idV4GD8/h/KiZ7Qn/PfyllT
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b3eaa3f6850b74490ce5e1cff24194300000000020000000000106600000001000020000000af6628b461b1071a3c24531693c9be6c040ea4b40d1c04d93041a70750f5af6b000000000e800000000200002000000095b34c566fc78ec4ed82d357ad2fac7ef810ad8003d7b9d3c0d89bd20d6e582c20000000a69a366c00a821fdecdeb12f845472e690f5d3a9d79fb06c7514908a27f6fc6c40000000949acffd447292658bf28c8177afcd427f5f756bab4541abbd21099a1608fd241b7ebd4b03154dc7bdbd4f239e397cd7fb4a3aa4a17cef4d9fc4ddc0aa8d7c06 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5873DAA1-21BA-11EF-A7F1-FA5112F1BCBF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e009331bc7b5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423588838" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2364 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2364 iexplore.exe 2364 iexplore.exe 1256 IEXPLORE.EXE 1256 IEXPLORE.EXE 1256 IEXPLORE.EXE 1256 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 1256 2364 iexplore.exe 28 PID 2364 wrote to memory of 1256 2364 iexplore.exe 28 PID 2364 wrote to memory of 1256 2364 iexplore.exe 28 PID 2364 wrote to memory of 1256 2364 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\923392e8c4384d347b3b09021a7cc608_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2364 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1256
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57af4d70e683ba3754becf2087092111c
SHA1de599b309af0b342c7f82705f3479728dfcd104a
SHA2563b54f69fe79ad31e1cf016783cf09f4fc2c398dc54035c4d834e1aaba0b248a5
SHA512207e136ad82f0d869eff60d3c3a761dbaf1ea5a95aaa7fd378d708e274cc23b8aded58f2bce9d426fd115dd1b719d237c141a2f32d18c0981d74d58682ab8589
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ed7bc7ed20062aaf88a49ca1167d0ba
SHA1709c23efa843ceba1f6589dc1bdc786569eee308
SHA256b5cbd3012fcd929ddf2c80b5cd582fef4867bf454296c1e26e3bf7f6556ec700
SHA5121f039c8d557a5e06e8861d339f8890b60a6f6d7836323ddba5a075e701a70593a9d58bc1aeff56cab3a49b80398033ac4886ae4e97bffb22963a7fa131ff6eff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba33b83cc1e76974510fe211e4e09035
SHA16fe4c47408cf47d361fc586065816be837ec7fea
SHA25628d99cf315522913fa3117f623ea381521d12529d7709ec6f01f199feb6fbd42
SHA5128ae4dc995747ff44bc1117e38949496f4bb7a0140bd8aaff8213bac90df7ec4fb3b1ff40fd1c33c83bd1a0c0d6469a77f0bc43d86b63dce68e3685c33fc7f81c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a3b3dcde758f4431804a6de06ac5ec8
SHA135ce8e7599bd9ee56cc114ea5df1cd2a4c0030de
SHA256c721ed0fa408265e4b0bd4b0fe1aeb802d0ef168b08d6482f321db14763320e0
SHA51205ae5670ae6f534a89227f193602c45b3397e6bef341b2917d71c53d38c7fbb4014239be82962d055b9b37c54db6deb1ce971ef844ab9525a2978fa5574b8b3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549f1c16aadf59f64668ec91acc5af6e7
SHA1276cfd203e926f7df5d41f1b0e1b474312e46527
SHA25656660f4294e82cccf0608e0e13e166a653ffd50953dd4a4e6b5cb66c3924df0d
SHA51287e851d403b1e3ce73bf2bb36fdf84b0cfb004278dd6b74819af89f637db6f9dc18e5510782a25fc317e03cd021faa7f5faa1b9f68b149f1b16a41057827025e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4fc45cac68cc65c26539970bf702e85
SHA13a9f45b0e90044becdbb64cce889142ac3f67694
SHA256f33458d651e6787457e44bfdc3b5415661ab4a537d63a849e4234ee8a8b41556
SHA512cdb540d90aecc81cfd005c6d5874e5265b480e33d47a4bb784b5111bb49c73e2e90d75c76292c5d3b34e404d4bc796c3726a8eeabc0bf5471532d83945f3c282
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1cc45bc93ba3382b3065d0e2b268905
SHA13b3e92cb1a0695689060eb8d99310f939cd9a538
SHA2567f89432cac8b8ad459f65a820470903d39ca8324a6bda0c0c681fa5fdda66b80
SHA512ca9d98cfdf57aec4d3c11f0fa88dcd2be2c894599fc6a4136989f88a617923c2faf1f2fd8b7264a1903cd966fc087dc43593a323e5dc4c12c87cda35e493c2f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a96dfa3f72cdec10b548354355a0fa2a
SHA197914e93a303e5d0c6a4b3d0b0921653f3bda720
SHA25697b8368df815080da92063a3006fb1b02a6d94c4a2efe683023d64c461ddc19a
SHA51249ce79a85a1d0fe7aa506429f6b1b3ce9d03baf37ddf6b946db402acfbfcb3e60ae37e936c779858963b554f4edd91eb8f81e30989bf55c950ad11af575af42d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563d03330a09c9c910aa28d585662f269
SHA1ed62a05f57746e3b0b763f2736840c9d7386013a
SHA2566a0e74cc9c95568fa036ad2b1c04ab695bd42f2d3b22ca2ec64122aa3e85bbef
SHA51267494fdf85441101631c375792ec5e98d8b425176a9f1187f4012de21233adaf8e091fca0294f4b1a1716ee06860b6ac0e0c4c1242c316f0b646ab7eb7a260f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56de418fb84a3715bb47a2727c8b103a3
SHA11f83068afc051e90c399194f8dce9f1bd64ecf72
SHA256599e3d86e88fb5ec32f2827c3da7689067d81729a9e84e1d119342691182b368
SHA512d10bbc6c893f9c21035669cb0fb4a79940a3d65c7ddafbc779ba5fc4c57433946287f29cd0b260a0df85c06639df4e1aede171b917f0e069062983f289b032c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3f8a698e653637bb5ad6306face90be
SHA1c18ee02cef21f8553710d327187c9b8eeda01ffc
SHA256f412ab36e7895aff4ace733cf4d515bd3ed832b149b6695dd3949c3562f5f214
SHA51271890fd492e0d45bb6687c2541fb84656e3a2cecc0f7aaeb5ac97ca8453daf89e3814bf0010278671687d18c46843a085d3b81d158a4135373738e0bbb8e4d6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e822be75e05f792ddb99cfb8b311d591
SHA1810a5d60edaf0997b70580abfdea5fef7ad6e083
SHA256027d895f3af08d8fc1aacf3da33f908fdc5c35f711f3266e762a533e7c6db14b
SHA5129ebc708a5cdd3b87ede44e65def4cad9a1cfb872155b920e95d56acba8321057756f9baaf854e58908c0580d468b5c4c83ed4a126c3a8f8a950169f361288107
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a16c9c34d39372162deb92eb5e38a142
SHA13e8a2889b699a011777d9823d61abdf43b88cfda
SHA25692ee2d977fd109e952acaba2918870020054bf26ffe295c49a2812ce2c280cd8
SHA51276a20b2a0a3c6816651ade8f53b0f268b182722d6102e3ff8e617debc250c7b1d61419ecf35605cbbc6be976e93474f7f7fdae5be3d61f28a5c0299a9986c75c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2e526ec5f28c638ccebb6adbdb453b7
SHA14121e45ef39d9eb47cb6bb79f6a9cc1820d72743
SHA256d7b3ff159454105bdb53d1ec2a07128c81abe012219504f47d03106fb53902e5
SHA5121154f2a1142010ccb6740fe14a53dcd7c993b02fe251bc61f5fca3c0ceaf4dfafb3a9345f6feeaec79534d85a1a2bdd86978a0dfbe768a640486a1093928577a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51633457b0be9f3f7959cebbf8846636a
SHA167011d8002cc348328d3c0987e9da9d02c1bc307
SHA25659383cdc934e46d8b1bf5d36cb1d6ffe9b3c2a77d07c4e0fcf28eb5d5ce11392
SHA512766865e5f591f7636d588141191fb92b7941f45a760e11e8b55a06253b014392e765df295bb993189b1021da97b62aa17d99e3b6f0c49972009533c2a4f06c27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fb0d125522c62be6cb28c935aea5e60
SHA1fb50e77b2b3f0842313b1726cb34ee2d8be1fb67
SHA256571385cfc67f3a63f859ec4e87a9efd3677c4b0ec33ca0b6067ab8d63abc398c
SHA5120441c0ae3580675046ba941dccf24d8b9c8af1cfebadc32ab1c4564dd9211bf1d109223c4b25258d2fa06446240d560b1132e00b18e6eb0c96cba1f2a4b8504d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5211c99008fa5935a494bfb95eecec416
SHA16078d3ddfc6e98bbb1a8b9bd6771022d4bbb0890
SHA256e1628c87e0d5bfe7ea9c8462de22d5625587d2035e3c931239b6308bda771ce9
SHA512fd01cf02cff89dffddeda7a16f931db1f9980390be5a7e1ddab2504dd643b611dece1b9212c16ba4e8756851921e4ae8f8b127e58a189f34eb406d62109b0c13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5252d7b3e90212bf0889edb165616d833
SHA12536cb1b331d28a1da336b61e5d6de9bd7a593ef
SHA2560ce0b086c3b145ac6b3ecb114329835fe2de828e99854197bd516ece5bce37b8
SHA512f0ac2c6c5c6ae250ac4f9fe0cc524874c930c3d1111708c0e5f20f76d22c20bf4956ef70c75ad24f2119b16bb849f8e322f9824907124cf1b2d2ee414caa7311
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d012ec17384e5436c6b44eb1868a5f39
SHA1734aa090571040fd63b296496d32484f3a975e95
SHA25652e1a65806912f96033bc246ae6678e522b67253b84c350b0ea6743a637667da
SHA512e99445e342bbc0830155881f76ad95f436e6fa84bb706268004b8b4881368fb68f256335219805b90a45342ac0c115939925a61d8007ece522036dcf44462cec
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b