Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
04/06/2024, 11:19
Static task
static1
Behavioral task
behavioral1
Sample
94a532695f49854c69bfe96875b08331_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
94a532695f49854c69bfe96875b08331_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
94a532695f49854c69bfe96875b08331_JaffaCakes118.html
-
Size
19KB
-
MD5
94a532695f49854c69bfe96875b08331
-
SHA1
36df0f37270d8de41b3914729d7fb6965c927d9b
-
SHA256
cf7824e0fe93f114c576feca5904230e9a82b285347501aa899d33cae9fb1172
-
SHA512
9002e01958019d70b5924e96fad630325d66bc656d22f45e484119a91de7e395e403e1bce435c2dce888196f92c9dd81c9728234fe63e3e53317a31da4e8cc1b
-
SSDEEP
384:17H61SiWD0/exiUlVDmTnMMuYRFFacToN8uwavqiOYo3L7wX:dql602YiVDkMkRFscTgxqiOYo3L7C
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5BC23941-2264-11EF-B97B-5630532AF2EE} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000bfa9f27a2b06a657e39a5b6aa6a63dca5c77e72086becf3287ed6d6b122b4fa7000000000e8000000002000020000000d7b6664da5eb31644c78d84485801b71963dd859a14ad912770a44b8e7588e7f200000000077709d4a8fb5b4208c3bc6ab6b66321a912988c4b3b33bcc0291d8b50e0bd240000000dbc6af91ef715f70d21a4cc503bcba29680eeed2d965cdd28b5f6cfb792a970714f65ed65d2aa2b701b3fc7ea8726954a1e54617428d3a29b815a84343981a17 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423661857" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6021703271b6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2188 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2188 iexplore.exe 2188 iexplore.exe 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2184 2188 iexplore.exe 28 PID 2188 wrote to memory of 2184 2188 iexplore.exe 28 PID 2188 wrote to memory of 2184 2188 iexplore.exe 28 PID 2188 wrote to memory of 2184 2188 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\94a532695f49854c69bfe96875b08331_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2188 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2184
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f194d4e58f3472741e42bae25cad25c
SHA1375c4c38f10c4586f2fee41925018101c0b38df2
SHA2568751974a40606b7f517efa8cd8e41e1680966f5a5b4810b90a0158c107c3ea30
SHA512c85f52f3f4c59ad2f9732690e305668c4aabf0ab39ae48150cae1d4a61c2f41550e01c296554e3ea19fd430a0984b0dab3e2c3568d9e6e03d90600186dc8910b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59330b5cbdb437b454857b10efecb99d0
SHA14c663abb0fb12d707c3246289db519acdfd18142
SHA2560b9f5909d1737cd42f48cfb67b20f85caccc8fe1d7c92b3863790f6f9831ee64
SHA512952ac28c02192ef1dc5a85a047ebd33ed6d7ec4bd8aba3790d3c460669ed432ffb31afa2b3dcc3d100c9967c530c2806f7c81e6b9fbcb678bf7433f79cfc0a72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5228a9f01bdb6a41ec35610cdb84ab5ec
SHA1c0e7fb589ce88c71794fe6f68cb4b214ac696f50
SHA2566c3bc73c978c3c388f429b7b77fa6bf6c6313ffde27252d618dda6d85207be6b
SHA512c31c0a7db87fad26f8846a91934e879dd73a2a8c968763cf548ff0488971b60ece04017a1f3247545be9d3626c4a1aec61f2e2c3151c5e856bc3f516bb96f13b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6c6750a3ebcc1a8c19b6de35ee3d12d
SHA1bc86be51773381f976d2f7a0fb63485eea549e2a
SHA2563df963bf8c3e64eeef9895d01f9aacba03e2b76c647e326b82789449f3a74f36
SHA5129ef7f74c32f4de3b597a1f98643fa96154f8d7efb8f5063d3d443cadc2e168fbaf5ff19dcc6b16794c4e552596240c73279d8f05696d05500f7cc3ab91ed5497
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6923c65dff25c411cf5fb16ee427bf5
SHA128ca0d1a75ddc385290d97f7c00931a74968b9ae
SHA256311928f1c6047fcb1ce930c5684b1132b3228299a21f555f35c3aed21d32c3a4
SHA512055b48fe3b4659422a5520fd80340afe5b1c430444bdbd17cf5fa85785f7065169c3e0714234185bb676445f792192b5744f94e08df0764022a0c5358b07ac02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c853fae4fdd8f1b4f261739d272d816d
SHA1f6c8fbb3c1fcbe1490ea196a2d46188c657f3b00
SHA25638368177d2640e6f0791b21f91e45df7ae85ef34bc9f731f8a90d4d6ef7e0bfc
SHA512ac594e5d485a30c7cc1757837ab0329be2989978fc241a14b5abd6eed70d312ffe15f1b7e5596800bfa5989ba8322e6e544cfae01faeb0ec0e35ffce0e3459a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dc2d8f4ffd868d2a243a23f5fa6441a
SHA14471ec93b46d90855f986193c164e94e36e4ddf3
SHA256d931189b78ce55ba0f43e9ad24a8b444767b18ad022d5d329e3a07624b14b5ae
SHA5126b2a7bc6f0066dd61469346bb8e64842e7ed173533188582bc467184010c897f5c40987e7145baf0844f7564f6f43cc8c74d6d27f6bd20013d3ba15c88007b0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d81b75071d55d50602ecd631c0bb94cc
SHA19f479e8da2f4268e719a61616ddc58940d9de6a3
SHA256bf8d518757686af5767de9cdd05b3b98d07985e72ab7d48829340c125658b54b
SHA512dda1d22f0c600a0bfcf6800c002083a807a05ef36199884d418a5e97a01d76cc84fc90133381955f613a9b1c6beca487f9754216679d165d502273d5a08ebd52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5fe3a53ee3d4aa0fbb40bf3c0ea98f4
SHA1a9b11e1460fa5aec62741f26f4792e20083e6e71
SHA256b3f511fa163283506a19c00c65f76a33b9165ff2f684e0d49cc1ab396c4fecd5
SHA512d6938e725d4ed3116a682d927f0a918de82eadb893c43625aafb17ff28affc61a337b372340614247631b6fc75d5dbbd530d5ec696c399cad4c0be635560770a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5c83110e2c8a6e0f7b00b3ce4e926d1
SHA15056418f4366930ff353010f899f232a0bc2b505
SHA2569c6b3d148bedcdfa310ffb929e3dc35ce52dc8f29a6670fb4944e340e18bb921
SHA5127160d30ce66b5620e015af09087d3ab0b2a18fc5f600981872c8f9b664097a10bb85138402333d876fcd790d4123cf851e36274b0ef65f8e7d9e0b3442693d01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557b0ec48327e1e1f19f5b32b6eaeccf0
SHA14eb6ff0402124427144ae9c5178921fe66e104af
SHA256fba9df7b529e2d398f40b574ab92d1753214d2d7f728e0cd3bdcf1e751966a36
SHA5121772f9205a87d8712236ec32da199349074095f9c24d5c3cf1edd6846d64fc31b446c9713a945f2cc6aefba5291516495c3769f976b040f2d89258dbe3eeef87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9eed28646e6c79915674a44e960e6ca
SHA18d3e24cb8e56b28434e48ef15f889e8c079034da
SHA25629535bc494e2fc83ad40bde60b4249148c2e795c6c1cb274f6986f90ff2a02ce
SHA512801a8f3f5481ff761375085ed5319d7049a87d2e9f5dab993bd6055865618d6569088eb0b32398989956d44b02eed1915504e151ee84d7c2a1dd4d78e893e26a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5300bd31d17ac7e49cc02ad600d9ab382
SHA17ef1fff75c11abb0a72f83a4d89e7994c06c58ed
SHA256c19388f95d5089339f827c4f718cd3c2f20a9ed77594c79c4edab59b4b61c9a6
SHA5127a725a4101fc5ce819d449dbb6d06e20f5edf015b8bdfebbc83f85ac00bf98766508c67683dfd116dd8aa334dd282d63e4e4cafe18d4bff2842d7c9052b08676
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57120e750a5f1ce1acffce819a00b200b
SHA104c98ff3195b4e7a71d65c6dbd6a952aada96375
SHA2568fa9ec35e3783c6fc0e0f4230ef75f2f2fcd02ed0f263a6f4c20c48ef60ce7e9
SHA512539f95d3d8896b579b174283b9e368a5d8f13f4dc90c9bd79838fd57b284d8316337b23c69a7789355a3cbe9bd5ee57a1e177efc277102c3e0b5ca66058a0b27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a6161a7aab4ff5735807bb508560708
SHA17d06301493f50fdda9535ff9b2d65acb030b93a9
SHA256eba72a8bbb3b9c5393a84d5c23de7f1afa23acd50129497b76a9a1d55162da10
SHA512f1c3de04a51d3db0dcaa77c0ffcdfeae3778f37ef208137861625dbe5a6f63c5d66ef7fb4c1643e02eab428d22cfbae67fe85069a6975289e92b848f07861acc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edac2dda774e314c6b86315320bc912d
SHA1cf8c6eee16aebc170cb6c28e470ab51a42b2ce4e
SHA2569db224754b4503b181678bd8ccec291066fc215117fc68500d7bc060ac56cb85
SHA5126963852829b914e5e933759ab8cf8270cb2028086b2472f748dd5755e26f764c1129b2e879b21fe2374fbab0c6c7c24915bc992ebcb4262eaa4ef77967f3b214
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505d7dcb3a58b507a130010fc7a1c9dbc
SHA1965d998850489b6fa4610d78246c7852871ee0ff
SHA256a1ad0245d1134711f42caa9b875dbaa594aa8a42dd0f70660f7fd4f1bbe8c91e
SHA5122cc26bb8536bf2727016a61df383ee45511ef081be2c92ed5f193763f9f723d6327aff0a203578f021f34403ad414891e14167e299935b1794f974816ea02282
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af50297f5643451f30a77218a1db78bf
SHA19a88348bee21d66075ef4ede7c546d78b341f25f
SHA256e786f2e3e6d587505db3abbae49e058f3f8da6d7b70f6b76f589945e6f650544
SHA512e37c403938013d63875e728a86a633a3c12512d280b11544f7598f1d4f3f005d71c6c2fd97588145b628da3530c5cf47aeb96093a44c1c927d563a9fc2268aae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa45183e79b4f7ded88c8f48c630b9d9
SHA1f4d1684edf053a37515266b4a230c15078a4f654
SHA2567d3dd31ea3c967fdf2c30365040c50df911cc02cf1a91c2f59e832eba2b40881
SHA51203677fcaf02d14802ee3baea44e67d09c5e184bf77d280ec9e1ca24bd4024b02ec886c784544123710590d5fb50d9f5c6687208e980d08e4888052aa8fe6cd72
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b