Analysis
-
max time kernel
122s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
03-06-2024 16:32
Static task
static1
Behavioral task
behavioral1
Sample
927482d9e179752debf1d1c7ac519579_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
927482d9e179752debf1d1c7ac519579_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
927482d9e179752debf1d1c7ac519579_JaffaCakes118.html
-
Size
17KB
-
MD5
927482d9e179752debf1d1c7ac519579
-
SHA1
c8e4700c01ebfa1012ed626e2e0e6c0052f37436
-
SHA256
29187df8f6471fc6cc2fcb8ecb6b56bd96210a77319dbd2c37967a8344f3de62
-
SHA512
4f5b2057c838212513070ebc96c1b03ebb0f4eb485feae44a99094d9ec628ee3c5f234ed23868b90395e24b0d729a495ffa333f9232f67dfa073891cff6744eb
-
SSDEEP
384:dSxhi/xzfg+oQKWfAWOXDkoXbiRBEvA1cv3nKY:Jt1dOTkoXbjAKnKY
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000055d8525336942845a1463bea47fbb7a200000000020000000000106600000001000020000000533d06685fcebb89045b8c2ccc54dff5a3ab9f700c7fa04e126ddde730a4b712000000000e80000000020000200000006d992fe845098edca825aa17a20345f4d2812fde17092dabc7d657bccc261f43200000001ecee0642398f08d6d721be1228911c5cc58154a9f622f9bc11e1617ad056b2640000000d6425f08313946271ccc2eacbc632a1a6b449628902b20f1eab9618de4e645ccde17e5870a0e4de938734b4d9a5a7359d26c36f84fc00b58299003961948f667 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 905e6baed3b5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423594207" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D6D24B51-21C6-11EF-8CD1-FA3492730900} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2200 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2200 iexplore.exe 2200 iexplore.exe 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2288 2200 iexplore.exe 28 PID 2200 wrote to memory of 2288 2200 iexplore.exe 28 PID 2200 wrote to memory of 2288 2200 iexplore.exe 28 PID 2200 wrote to memory of 2288 2200 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\927482d9e179752debf1d1c7ac519579_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2200 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2288
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD54a4825c2e4a517d6ce3b2d9199784a27
SHA1c3380d7a678d1dfa5e61fbdeecede0b919a8f415
SHA256a190d63af735ea3c331b8b0bdec93f57190d4af3320b1319b87603726f9a4f7d
SHA512d521083c577eecaf6bf65c0b194bf55cdc0837bdd406df7c13e3ce70f8e9118eaf03428c9f9b3cf6255e1527ae5db2f904d06ebc0d73211d9ff25c554e312a8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2c82cf0fd2f7c8231e5b3d614710bb2
SHA1cbfa06be54ef202fa2c242e88583e1263fe635d7
SHA256ff4cc70612d41da3782d309fd32184f3b6ad2c69870858db299382618d7d2756
SHA51296145db69d0d01fa4e633ced4bc213ca77a2ecd8f18d5fef103a35ae22bb08aff910602d9563aedf3fdf4a6c4f21066b2a1c225a584b852c846197eb2244340d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54da8e25c6fd4211a8e2f729ff293b8e7
SHA143c3de7ad45f4ea92c6767f4c1324536338467d5
SHA256d24935b2212e715c1e461876758ca4eb14e5cb5753ac0b3ff3101c8850328691
SHA512b9c739d696901930b0dcf431f4c1e0d354e3a0d2c0d32f3a1cc05fd92e6c8c5ecec1228232c04daf51fe17ae87dce90499be18d7362647140975271631d93103
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52772871e48cab6955e21da36f14dc80e
SHA19f1c94d7e9211c67e1db18c5b93916f2753a25a4
SHA256b5d8b72e9d878a44e3f159b1d63619145927b6fd598ef2096adcd11ee669f2a1
SHA512a8822660dd600c557f3ad38a23ac09676d1431c19588c814356c4b862620481fcbaf784e4b1c52a0633015701f28a01bc93d2b681693a82730ad542df117c993
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57df5af21f961150c75fb1f07f68fb364
SHA1b9f4f266f2b75db460829928326c6f28fe7957c9
SHA2563f3367de0161e40e914e891b30ac4f63bb27fc491fc939f6284ab21f98f768d8
SHA512bc7a7b8b299a0fcda359518d1ece544cbb0c2a4bd3d94dee486c8cfc11c459e15b9beba3a504a80ec0877c03c28868215682034577f7b2f8c427570298f65746
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5033a21453a81833357612648ea074217
SHA10b404de41155aed3a8e75ef28340fb22ae0e3de2
SHA2560078e46823073104f90d4fea938020e72df369da14109f9125b2b8bebdfea657
SHA512ca779eaf0d9a57dce774fd7c364959440e1cafc21a1c0f8022a74e56e57613cf033af4b32d6ac5db643479dcf02c64770e794ef14c0a9e695cfc7ac627ec6351
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508246835b57cf63fb1f331dbade16a8e
SHA16c5c0a124c1151af7091b9884555097989a22383
SHA256d123521d0ebb9eed51005199cd5b613b3325cec4f82b92cbe122139aa8571105
SHA51237ccdeb4e7feba9853a520a644ef0f9b0c15257c14c58b22e67b9a2bc8634c4d1115c7ce56f0deb6fa89828a621576e8254fc3391a711f0aff5ee9421bd79248
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5550718eb7d90b89020a1af70bc8c6e86
SHA1097e7b7d6dc2828790636510c3100e5698f0b2ff
SHA25674f9dc5fdc26596926bfcdb847e86ff410bae5c441a257a6f872af9c4aef8453
SHA512f752c9a4b37f6ddc68a849606060bd3d11d47669645fd70ca5cd40dda9584f4d36a1c9cc35c63b75845d31c2854c31878a7582f538290a27168d42e92b03470c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b169a59ac8b2251fdd2ae7afa103def
SHA10ec1f2b02d50e093c06c8450f1ea065798b0ccb9
SHA256a2b3b355f97ddc5ced7ed05b17bc2cc93c56be4eff1ee9f62db2c1319d6ce467
SHA51233f7eab462c7e5a7c2783b942286fb4dd760dc41c7b2eab7702c68fda64fae6050026fe2ef2d14f39e5bff6c47f9eec0b4f21f5dc6fe630ed17f7e3e58555875
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f22e53a9d989bf0aa3a542e54b3fdd32
SHA183f1f0475957c0d382d8258f304c3943710e8e2f
SHA25620010339739de53680b65d8783b93445b5e27e2e444864be455b792d8e2b6cd6
SHA5122646137ed091b73438214c9e424f41383e2d70f737cf105986675d64aa2f9d2a3ac087b29f130d612138d39db0ea7a979cfbafdbfe6f4730a46672e00d60b3c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aff5d60692c3e9094cb3b3a6aea6f504
SHA137c5a4188b6861aa4d0b71f17351c6eb72bd04da
SHA256533f50cebb6b026d4ac0e1955ee5d081d638512064a30d84888af6d97f022ef1
SHA51230750dcc5e6ffe9d6d7c0de8e35f77fd2e7dc7ec8fb6895308efb43aa0aaa1eac60ba3b6088bb7f79426b867dcde3b7cc0a5768334a69fc02106650cb992d3f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594b274c6154b8e636d0a4cb42391b609
SHA196ddcdae4543b67cb6d21403c0d95031589b7a1f
SHA2566ddc5992d2debb0f2ceaeb215fdd54eb32ff47792726196f17a905cd7cd51f7b
SHA512e635b8d9ada8ecc75ee524931c3d45d6d22ed64c807ac5496e3334c9f02fc4e2c2503fe67aa748dba59bd8e5ce3d8d55b0edc975f14ef317eef394c9363850a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9a40807eff047d24831ccfd3c608975
SHA1c5b3286ae90728606b6b15cf5565cb9db00bc027
SHA256707edd56e022f962627470c0bc25a59cee99ab84dbaf3407a52195d45c5f73c0
SHA5122deaea3365028d96e4ca529d5f0e4300b8aba3b0ec73c157053f28c6c4a994fd90bd1b40ed15bd08a83b3b23e1598a5668b3379fad07295ee1103c4793b628e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD58a849a629cc3f055cef6b427c29fca0c
SHA1cacea1fc82214413553b7ce01fe49e824959240b
SHA256438d874adda7a7c993239ae7da438ca5372811a5bc1bf3076c8b7d4be4f8ed14
SHA512e13e6d6399cd8fec93b828f75cfb46be4632d7268c5c5c5cb9d6ac1c871eb1fc386a4124a66deef6a1298af0f83c0ed0cc7358dc3f018aefa52d604aa0bd816e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5df4ec745b97d2a44f70e48de1b82e686
SHA12814becfeeac203caea6ac4721be8c163b6e213d
SHA25643d25dbd63f1270ccae3369ba99df39d56eca265b9e61f5d24414257decde93c
SHA512dd73a0812d0598ab4bc7d69204c880faef234d2b5d87c0cb9d3c003a2dc0ab721056d64ec087321b2aaecf3afbfdbfb3220f278d3aaf95e2e577909df01ba8ad
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b