Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
03/06/2024, 16:14
Static task
static1
Behavioral task
behavioral1
Sample
9267e969c20b9a313a92c782d6885c67_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
9267e969c20b9a313a92c782d6885c67_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9267e969c20b9a313a92c782d6885c67_JaffaCakes118.html
-
Size
36KB
-
MD5
9267e969c20b9a313a92c782d6885c67
-
SHA1
d1ca8cdea50c6c9c6ff29fbf4ac0d36bb004c046
-
SHA256
38f28d6cc6a80cf397385cb3636df5447136728534e3e6f91ab42b50b549088f
-
SHA512
d2a81a48bcdf2a640fba5cff3a1071e4ec88444c2bfdc7561dac63febc5ce479437a28b5e0f60a415d1adfc9c16ecab32f937946f0fb6661963bc76faafe0074
-
SSDEEP
768:zwx/MDTHOQ88hARtZPXsE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6ThZOg6f9U56lLRu:Q/jbJxNVNufSM/P8HK
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000298829bbcccb454098c86722bd5d58860000000002000000000010660000000100002000000029a87b954376b627fd335ceb73e27224fbb4f010c6519b20375b23644d334f91000000000e8000000002000020000000eea147ef0dc47dde56663c3ebbc562a27acda056e9bdf7b72d6dfa89992f080320000000237d8382660e8a57f3d92672c6f8c3105632966846c6468acc61dbeea731260a40000000a438d049d139859c493c88b6d32194aa82a087d2ec27c38a2cc6d4f4e72cef816e21fcab00ade3fe11360684617deb01c0ab3551060ee236ca2fc4f1566c178c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60bee62dd1b5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423593132" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{57DAA421-21C4-11EF-A296-4A24C526E2E4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2904 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2904 iexplore.exe 2904 iexplore.exe 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2100 2904 iexplore.exe 28 PID 2904 wrote to memory of 2100 2904 iexplore.exe 28 PID 2904 wrote to memory of 2100 2904 iexplore.exe 28 PID 2904 wrote to memory of 2100 2904 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9267e969c20b9a313a92c782d6885c67_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2904 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD513ed5e0369cedc64c8437eb9a493a981
SHA1880053c91809fef7b2a3d688143f554d5a05c0bd
SHA2563560614f2f62c19498d2ad6c3b9fa8f232883167479de05e924a5a3ab19a8454
SHA51218b3c940a3b722b58c476af4141ab987ed9f7557c1e52f3f20548b2c209abd67c943761d22e20ed59c36d69f8cd911285aff7efdf2d20f51c35cad62932aefa0
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize724B
MD58202a1cd02e7d69597995cabbe881a12
SHA18858d9d934b7aa9330ee73de6c476acf19929ff6
SHA25658f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5
SHA51297ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5fcbf915645a6f376dc6295c5d60bb103
SHA1d221f1c399b739f7a1ed26ad248345b82f46ecff
SHA25603c14655d58b2c991cfd1250d63f9d8a99de0563f8a5ada39b96facea856ccf1
SHA512a6db7f06c2af55a169c8fc16ac39f4415b8a95be992081d1bb2bec0019eb3ff74f291931399690191b88523d1673e24def72fc42e0b8e25ca0326dae0d51ff51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a4889e71b36e5f9c077a30e424e3e56
SHA1100bab368818841cffe0cd127ea9b5331eb2ac43
SHA256b1406b6b57a0b52235e8af9db0a1fbcfaf732f1b8961dcf85d3fe8db896c2a44
SHA5127236d3ea020a337c7661adcee9a2d3036aa88cfdad60e3d717ec7600db0a53d07d4d9b4772d3cdace13df3a1112fb58ff62380f19c98d1aa024e3b2973056da8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fad26f4db476cb4e748f4dad8cb3f55
SHA10133efdd735dc8df60f480e4c814a5ee8172fc29
SHA256537c9df35a5fc982451d5274c8bb67570b94331d7076bbd991c0c9db1892afa6
SHA5126bf92d2c1d5b7701e35d85048244fbca6b7e29da719badd1f4d75e51466d4c3a5a59b05b26b71c735447b12283cb1de43e2a6b4b90f2cd0af78bfc5aba97462b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540d36dc85a4dcc21f0902cded972a734
SHA18743ff71c3b6773bccebb545bd747f74322694cd
SHA2569d84194b004460a17cc3cd768c1ad0c26c17327106f4b3174bacd98638ec9846
SHA512a320397d314504fa2b7662d37588efc653b403e5de2d1348120a0c667c328b3d18db175ab610f132d64cc599ef9deebb3d12b49f62714945b7d7ac4536be3f0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2991e1325c20c90ad395201f391e3da
SHA17322f709f5c15f663c7fe58ce3ced09a1a6161c5
SHA2564c2a1ceb945b72be2296744ad220a492a71620d14c82f841128f8b52b285061c
SHA512f846a3ea6cf13e8e01f11b5f00937e75e9a71d2e1e8a2a86834773620b013b2d5827f9307653794600fce246637aa430834ba7684a2c24b59bfcc8961363b490
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580f424a781ad7beca53df94d0fedf523
SHA17b06640bbd1c3fcb4f6c9cb912e0a170c591df34
SHA256ddf0d5105e9b9ead823fe55486713a140456a239d09e5694ad761b23d54a57f7
SHA51241538801b7da5a9ca1dab586030b0fa52a40679d4cbff813eb5d43ec6efbbb574cf5ab7a75000d32603dce66be547abc39b5a8b3c66c60a77331d71ade592057
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520f7c5fc763964baa967f8d4946e7803
SHA1c1012e346a98b7fd74e8c862645aec7160b127ab
SHA256b6fe60f8ce6bd1d972f75f6bc83aa2ca513fc8441c8659a1ecaf5bca32d2efdf
SHA512bb7b8702b5b5b970e98692ccfdc37d12530ff4c6db12eba34924d55679f87400e2422b871db25e19e10351784b08335e253b6510ec485fbc35cff3845fa1f122
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5c81482e23a8540b1124546850352e5
SHA1d8edc6d02556267392d0f1804d622c1bb9e86b54
SHA256361783ba788e5e8f16bca8c3441fbd19351f574c581c23d8310e555f1d61f1b5
SHA512e76043b8be3fba900d29b6f7bd436f659ad1484c87cae9c25b08397c2c2988c58c0964635f5e8a0ff7e0ffc4565b78be7b6dc43019137877ec06d978d67bf942
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567af856026b41f75e545e28c0b92f94b
SHA1c70d2040c09b75f75ffa858a31dd3eadfb1f94e2
SHA256c49d4af9dfe05756354a3b04786a55292afc88e412a4656f66532bce22700fdd
SHA512e5df80501626eeae260cf10338451f934864f0af777958569f637e612c7f4bef86fb4735253e11ff30b0611d1ee3b2c642f3c0d77f8fc1921ce6d4dbf219a52c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582386ac24ce456d6137a8e62bbeb3601
SHA1954b0b401d68733d583cf58d3fa2fa141abc6027
SHA25660789060ef5bd247065bd1e047341cb7451c5c4f4bd0d4b3d351ae735bc4a483
SHA512e662a885ef7bdc982b279bc55e41d3c767565488111fd6cb2166ed693f6327532f584db59a51b14f47568ae3806443d77110ccb10cca510bf71baefe7117828a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a9f1b09d6a9e1a21384ad7009cb2b11
SHA15b1e10365ee2cb754ac2886aa6ff3940e51a4864
SHA2568edce142d7a6f366cca3233c595a9ad5cbec7af0de8304655136c22b909db236
SHA51266227a1c6787b028bd67325f79b78d4613b0ed2c0835619bc78c85a6b2f2e22473f5d522b2acfbd7b1ca94d2054448a5a8f9f2bbfd159833c9fab13db6f64541
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4d72c5919794e467e66628babc6bd74
SHA1aa4f643dbe581145e54c73a864ee9a47e8e65cb3
SHA256aa7c3047e0d989324feb7744186dc2195cfe4e93bb0ce05f2ffa42d85e438f04
SHA512c971eb1a8d584de97eb3419d3fb3f0345640cf4f39fbb92889b57fdc0541e35cba9c20c8a7dd9002abefc1e5093213d83ccbb2446d489e0c50e7fe4009756b14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6c18e16959ccd2109890ed45912a1b4
SHA187618a3ac088ea380587aa2cf8e0bddb52e2d06b
SHA256262c2a01c53a5b382560fd6e68272cabeb9a62613109c46fd706cdbd4dd0748b
SHA51261c17fe17c7c57d4a988569bc7241a572fddaec9908ba71bb62cf96912b52393245d0b978b45150fe63b7a17c5df72a1296661bee29cf14dc47769907484d3f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57abf201345f648b98b53485d645de58d
SHA1d5ca5139115c1c1893ad09d10afb5bf93d6b8f7e
SHA2562512129ff8fd2a901ed7216b89c4f0bf38b94120c204a4f1e2b993129ef65b5b
SHA512f936701096de72f6fd93317d51f2b86d6209795461105bfbd2a1822d4ec17d92ebf19d67d41d4574dcabbf13af8492c5e2fb38f17ab5d40690d4650f2903e766
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5820c10d02d7edb34ba9c2d6c74b72b57
SHA19f17d0c74b042a6a5998c6a6cf0aa3033119ce34
SHA256e5704074e00db5d7ec7865730ffd5c6930947eabf514476084a611d04beeadf8
SHA5128dcb1a18943ad7ea9e9681d2d222b7ac97f497d0679b3cf2882a162dae543d2762546eaed84d7e5acc46630a8cc7d63e1250183cf1920e502df71fe5ab0effbe
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b