Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/06/2024, 23:15
Static task
static1
Behavioral task
behavioral1
Sample
96953c04ef65aba2e7161262cdb2bdf9_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
96953c04ef65aba2e7161262cdb2bdf9_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
96953c04ef65aba2e7161262cdb2bdf9_JaffaCakes118.html
-
Size
21KB
-
MD5
96953c04ef65aba2e7161262cdb2bdf9
-
SHA1
a99decb5b8a96acea88b2f561f7136f50aa9412a
-
SHA256
29490684d911a97c480cc56183deb73ad793883158fab5a5f3821273f9eda03a
-
SHA512
ceaa49a69394f1ff4834ad5179d987a34bc92c782b58854972658fa1bc912809d6cf08b96e4136d7aa8549a2a4aab0c5e97cdaa679133e29618a2d9f5b337ca4
-
SSDEEP
192:Hqvl596UDrvW4DYsEE99Oo2UQB7509Vea9LSdNVMjP0kuP:Kd59ZuOEE972Rna1RP0kuP
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 509bb929d5b6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423704795" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000dcb2bb1a1a3b914e85a0eeb35efb215a0000000002000000000010660000000100002000000017622197adf27294e914d2f330aad9c11aa991a2c3d81ce5065af82d32a7aa44000000000e80000000020000200000007b47b77e223abd76e3c0ba859214b5ce2e67533c1bedfe150e2b26cd35724be120000000eb3ece376ab542b1e3d33f1449ba914fdcdcd7450004e96bee8569a987de9788400000005393f549532c33d85a72dfb1311682789b820253740001ca3acf2a2f613b97ff7c86ec67872590b441ff9eab18b5613e0d2c9493aee0d54f90fd62ec6f6d4fa1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{543619D1-22C8-11EF-9B89-EA263619F6CB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2868 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2868 iexplore.exe 2868 iexplore.exe 1992 IEXPLORE.EXE 1992 IEXPLORE.EXE 1992 IEXPLORE.EXE 1992 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2868 wrote to memory of 1992 2868 iexplore.exe 28 PID 2868 wrote to memory of 1992 2868 iexplore.exe 28 PID 2868 wrote to memory of 1992 2868 iexplore.exe 28 PID 2868 wrote to memory of 1992 2868 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\96953c04ef65aba2e7161262cdb2bdf9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2868 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560616e64194ff5009197dccb4b9062f3
SHA13203e11f71312c6033882bb404644475b44c9ab9
SHA2567232737c3600ca25ffb0c100f94b7b1960bf03db8afa373776f622cf886c31b8
SHA512b5d2f8f97eb1c43144952983278de3d54c70b11588040f741c04763dd53e20804f0e0e1d38e3b4a659d802f7ed770caeb17d5fceadecfbe7f338239b2dda980e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f755236603ef9beab731e18645bbb578
SHA102d3b06ed7fd205fe18669aed04f4ff6da4796a6
SHA25639f1927c1603328df9c45c9626096bd2b141f13aa92e2e3ced42d923976f765b
SHA512f6ea0945e7a894a17c6a75e10a06152c6914dbcc3128ee6ba09192b5f6912507775cc3375cc82ac1e4af41a1f216f3c5f42075bb458c8ad1ffd70425a263f979
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50796ca2674732f218a8aaa7fa83db83d
SHA1201492173cd666f9cd154f453bae2bc2b7aea195
SHA25650d8b48f4a8b918f7b35afee72962c0207305736aca47695838f3a31f5f62b00
SHA5129dfb464940e171d34e0f47fbd5288facfed209da984b5674f7d8aa51b9ed573a95bcf9d31e13bf9bc1f719dabdcb7a006e83042fbda0c86e54ae5ab3a11244df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3e2e82f60be8a1e653455c256b46851
SHA14026008a6cef106f0a99a2724a425254fa7f9b4c
SHA256f02b0ffcd644158122a017d5e40d9e6f2d24b698dfbfee41e5c55b586d7f9510
SHA512d5922e0a3951ed3600491741ae6cd19db77c5a6244c3bda15da573551e0cda8e77cd4661215172b8f3cf7d00b23512a152d48aeff1252a1185aede508d96d69c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8a220ac83e559fdfcd099903a4a7fdc
SHA16f00cbb463786c18c1069aea8099269fb775e38f
SHA2562ab7148e351bffefab3800f7109f807d7f01d543925cf13e82fbe23285774dca
SHA51294ea65e23d844313891435c58abcd947e6c194abce184133283fa70b06c38f5401d91a17c47e616b2f18d00cbc8986df781643541e28536444ea6e49d28c6c10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9ff2ecea186881f36d34c267e7deddc
SHA16b14921e0a0bf6d4d8d08fba628a0d3f35436fc1
SHA2562d4dc951eac3be9314c616a52cf30c67fc0b4527f7f898e9bfd1fd6b5698115a
SHA51235522ba5639799929d9244c5b8d10056a35d1b6a8a1374ce84bdf42131203674dc55bbca5577c8aebe13310080ba216ff62047e57a8afe1785d070bce154c76d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5e0d05741ee74501a10ef1796c81d28
SHA139087e2df0198c71edcc8608ac16d9d1d2140507
SHA2565d10634b148708a52dd21888dabc6322532406e2576a2d9d49eb55f4fdf4aae5
SHA512d8d2260f7225febbcde210a8cc14a79a6f23d0d676cfdcab17c3f0c397e796c8014039c78da3c46311168874371468a351263fe0eb3db7ef5b2b00664b0da585
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4a94a53108c5b0c4a31d9d23c68cd85
SHA1b6a871c836660261922a4bdb1ee90ea4db424397
SHA256751a37e2680d5608fe1cdeaf4d3a98013648e927f2d1789542ecb96653e3f822
SHA5121101a3cf8a3b5f7bea7b3fb8d09dd31f8ceb07d2eaee3f51cc4e628c59dd14a40a8e6b6ee22d6a7217e2b856008faac73e2f7cabfb3fd40fc0c2edf42e962f19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bfc8563668f6442b5201243702f38bf
SHA16c0461ed260d56719fce52123d17c828e232e45c
SHA256099cd61dad727e1ab876c897f7523d6a1bbc39abbbcf88216276f4b59aa5ecc8
SHA512f7ed6736e5274f8565339bc48357ee5860afbeddd11d1679b7aef652c3fe77ea878a8afdb304a13d3462416723ce7a60e5c7fde6482552de1344a270d96496c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cad21f419ea802e7fcc21dc72a7dc45
SHA198cc6d7f4bd89faea09b93adf129d754bb712e64
SHA2564767a5e0adfd12cef95a7fb3a30bac509b78f06ff5a1bde19f2ff32931a5354b
SHA512764ced12c3da8839787ab3bc9870c17beb7a1cc09e28709d3191d9d3cfd2f519b03c3398bc9fc4d4eaeeb9e39789ac2bd76afe0c173b59f6159582723a353c7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52085e1e01ae211ba1ff19b8942fa025d
SHA1670f2df8c2534c0fece19ebf76510910060a3a97
SHA25625fdc3956f7e71e0b9709de0ad153a46980ce5c39a1c92c80863cb957cbd3eee
SHA512dadb4d8dd98b1131720cd1f1f906e604c5c41214472f00e6f283edc46284ad6e471087a862f1c25e2a921aa783b28d873ae60c286013aa036ec5eff4a4d02ea1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51548375443e43504cb27fbc9e98afe60
SHA1cab262f262279f1d204868b9a46bce2c82fb25b3
SHA256e09c04cc096a7ffd37a3381ac105a2941c8f67815c20ba7f612fce70e6d12b6f
SHA512a06077753b41b49011b50b5a424422f436a512247b0fd192513abcb9860861dfbdb033bc8828ee5a8fce263bbc6024c11fc167f474becb70f13e41da12f5a434
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507944f62767a7b615d3cde261e2ceecd
SHA13c6255700f944161840336c2681c2089d2e46c08
SHA2566c77d45de50d7fc4668635972b3290b958df79df675467f983c7dbf2a9a6ae4d
SHA51274e9233c70e04f7f3b75c095371b7696a1c98c15a14846a70678fc3d41abae69f91e2714240afa30c1bf08209a11b05ce56d881d525dae64ee635e4fb4150985
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500735dd02e812b6b6b46fb37eaf67535
SHA1d338b02e40000f79b12094f09fc5aa91dcd2d273
SHA2560b0a0a8878d0af52ebdf8c064609d129266f6623f4733f3c033aa5376b8c3195
SHA51203ba547d7bf7aea97b3428f4fbec3bda255bdb4add62705f0043edbfeed1ad43fab91b9235851acdf3cfd132666cf60afad19374affae8805ff0381607178230
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d362e927dcaa70b2e6639997518fdcd4
SHA1b5861b1d7ac8cda779dc850d1736a8db75f9ac0c
SHA256c4aa22978baf548ae35fbd70e0cccf171568b834fa632b1051a1faffd3335a50
SHA51234c5036350ff1585a657d3e4838f978a65c1a7fa2af0bbce949aadbbbf74d923b3dec334ba446a16bff2c70c404cee9d82324ac537010316212e4f61bca1192b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0af32187069e39c3060c00e583547b4
SHA12313ae82382c983d0dea3cc3649644ee9bb8ede4
SHA256eb261b9b2cdd97fe814347fcb50bd40234aa0eec84974906f11fec81ad39cb6a
SHA512e2f4009c0f608ea07edc174aa27c812cf3e8c54235d77f074627173c1b479b3c4a552ef03be7fca97877ac98f8ce84bb22672924f0893fdb71904d6ebc466d54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5226fc17f7c9005ff942f1ca3634020e1
SHA1a447f19c8bb1605cb3e0250a1e01afbd102e3760
SHA256c7756c8d91ee05dcc542c34cb5a895d0fdb08e7302b2c210c68a671c3176768b
SHA512e1e597a7ad879f1bd337ff9fac5776532a09c6f12e1d1d486ae8ab7a0b2b13792b1146d783e9872881fc03cf11aa0d7e09798e056148628963efde438005a6ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2eae299438c35e844cb0097eebe429a
SHA161886c658f8835c2a36d9fb56702b0606faf5d07
SHA256d7cec891b805d2506792ce738f4c4ee4fe783105cceafbad97365b4b3c7f4c89
SHA512c4851b2aec427e2a3ee73ed42cfcf414b8b00fab2a2fd67ff25eb29492d480f7836f170e108dfda4990f473e765db6720fa5ce7ca92e952fcc2783d43f0f939c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5685dfc7d3d1f03500dd35d55aa039cba
SHA1ba982b20f383ce99bde2a4b81a462a9058f735c2
SHA2563c320e26bd62d34755f97000ea3de5c98eb31f6d65b232f04eb944cd611b4b19
SHA5125e86977f0650d40bd58ab9cd6950ebb8fe05989000c6ffd5ea10c33b080149b9f64e8a85683d583334ba8c1242cd0c8dc3d4e1984cc3bfd2634255bc57d7f74e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b