Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
04-06-2024 15:24
Static task
static1
Behavioral task
behavioral1
Sample
95596440f76c59a1e180b361904870f8_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
95596440f76c59a1e180b361904870f8_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
95596440f76c59a1e180b361904870f8_JaffaCakes118.html
-
Size
70KB
-
MD5
95596440f76c59a1e180b361904870f8
-
SHA1
0ce5d8e9ee3cb8fad05384ca7f4d4915805ba22b
-
SHA256
40b55ed515cc098fa83d2a4e567b09fe3dee4abe3d60375d16269a67339d8ee4
-
SHA512
e425a826d49609ac9b2827c923f77c76218c791f521f8a3284d39e8846885e4ee5fa4d08d67e33e444f60e895699cd32d9c3547f617cb5ceb79a06c488679868
-
SSDEEP
768:JipgcMiR3sI2PDDnX0g6s26dwC2CSqKoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpq:JvSRGTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423676560" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 206f846b93b6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{96CE8E41-2286-11EF-8B56-EE69C2CE6029} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000708c630e5415d342bddfe51e290f553000000000020000000000106600000001000020000000b6f0ff412166d104e93166c5190677cd4ecc283722715913d9e73720258a5bf3000000000e8000000002000020000000892958bfab73567316b6ff9889e2d37e5c762d567173875fed35d6d6f3e1da092000000021471bc38d44c125a03d44089e74dbc66d0ab2dfb2975f025663cbd91d0f3761400000008ebf1390540e17cafeae64de8674e4d3f7d2ce32694712b85192c274288415c81380905b420b6c76f520e213a5ad8ef6629a5ee0ea18e1c0a15fa28021e2db43 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1620 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1620 iexplore.exe 1620 iexplore.exe 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1620 wrote to memory of 2212 1620 iexplore.exe 28 PID 1620 wrote to memory of 2212 1620 iexplore.exe 28 PID 1620 wrote to memory of 2212 1620 iexplore.exe 28 PID 1620 wrote to memory of 2212 1620 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\95596440f76c59a1e180b361904870f8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1620 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4cd8982413376336f9c9d849d6424db
SHA16511d758c6e6dcfaf7be3ea6038e4689dda46c1e
SHA2565705feee0484908ddbde55b2ed9a0edd0a480847ac1a3c4b5e89eef2e975a9cb
SHA512e34d940021ed62b7b676d71cae0f12f1da81e2c27f4182abad28d6c2b386b154cdd6658f52e91308653b7a35b1dbca74f9fe298efce32b045d0dd1cb5821ab8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f14ea5c995ec23a4dbf4998590bf19e5
SHA13639361ebb23d4777a2a5057e5b3ca37f958b2f9
SHA2565f2ff8eb1ceab0c16f57f1080c5c88e035ad435bfc86d48badb6cfc74abb8450
SHA512803606814e0ac45d0273bbf8b60689e6894288acc0db3fe4e262eb2d22bd4ebb2a4472f6d65bbe36c28b0fcdb503267c1142ceb8222cd13da6988aa89ca6b6fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfdba37dbd26de10e24a8ebc1b0ded41
SHA144986a91c927504241aefdb67d9b441726f486b2
SHA25644939286f8e7c70693eead301ba4d5460f806239acec225a004f19596dc4aea1
SHA512ab7d69c29fb4ef76da79f102035e8ed17bc7f9ddae2428e1a03dac87c1612bad400ae48d702b69c7d1191f58ce8b91a02d1077038d89b204d307362e4a047287
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7861f35a079f21583c7496efad8e4ff
SHA1cc17736553b66388e223fac749d7ad4d8e83626d
SHA2569d600d9fb2905e3e09b11aca51687ba866c0da0a0c6ce274d0849079b1e95b02
SHA5128d86e9844a7fdfec1ac9846886f14899a6a7403a55cd06f001e007a6bea9b509c37e4761f15d84dfc3382d319adb7d42632122ac46531afcd51a68516d3425c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5121aaf92e497e4a6ba482be87aaefc9f
SHA17c6bef91bc89110cc77d7885a18f755fe7555f5b
SHA25696eb33a52a614076a36dc03aefc4a2857ad2793a97deb8bdd292c6f956487130
SHA5127847de133ce303964f378d63c9977386577876ae8da78efc45667675a7bcd79d2f8aa681c18d31471e0b5d2c818416320bbeb902fbf566cb69956f9acb30dc9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cb3aea5a817f03fee08194a3d26f863
SHA19a753e86461995292a14e92241fa1c5c24844fe4
SHA2562a6103f73b02b3be49bc2d10968b5cb547b9f1f9e363abbfb0ad084064e432e3
SHA512650008c143b1d1889a7e46695a546dbb091b17374a78bcec15bf362681a46d68ef348b558df769a6f38b68a28e4963de6af9e5b21a65ba3c2957afa4c72d7d37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c9e33ac98fa41c7622c93a1ae05a394
SHA1bf28c4071665c7fa042b80b75bafb285a03e6d12
SHA256d82ed670118688379d8fc8db48d7b113bd73f87041ef253c6fb7466f9af33c7a
SHA5120c675c8ddbacfe409481472225fd7b6702c65bb74d649613e48c2ff30eff5f00930f5360ad65cb4f78f691c6d0d456c78a51d43438082a18c189e382e6226cf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5046aeef42163859855b27d19a16fd494
SHA1771bf67238c40b9fa086cde4a39f1a79f1ef00c5
SHA2561f1b1178d19b319f9d5d2470b3d2673695cd220640d75cfaaab7d9eb543e69e9
SHA51256289864db4813de0e5d698f474b8e9d815b48f0a600efe7f45c0a867660d1e39639322d21129959f6b4032a3e24c44d9f042094db82d95a0634b8a9b1b6bf65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bc2be9e8d1d1c14ee26c0037aefea4f
SHA1cec6753210d28a6ba5f9e772961ffaacba500ec3
SHA25647a2f1dbcf88419b6a5e4d95cb6ad97d5bbfae1aa2a86c3907647bf954e209c2
SHA51294da76eb04bd8f015b9c614e749f736680729b5b9e383810e0957852c2a867e4da477cef0c23130b87b0221ec5cf0fe91f4b79a10b201bbbf2cef58403c4f5ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f40bba574c55240632c9d931836e2bad
SHA152a96401f8161412cdd97b2e66df96ae176f99a6
SHA2562ecc595715258ba21049f409b8deb2d6900d7943b55561c8ab4bae7bccde5102
SHA5127d061cd2d4eacb5b1785f47e0027874981a5fef4f64b3447ae077f51cc6a073af5ac47d1607667d74820df7f6d07e39e6b77cd02dadbb93888baeef651827a29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5226bcce6f8df8938041eedf1c5fc0af5
SHA1da0ef2fe926f4d58020f3583834f10bb8b7f7a20
SHA2569b65097b5f13aff4985c83a22eb417fe29780cfa41e82beee70b4623e28f5f7c
SHA512e2a903ae4640058b06d1441943c3c0c3846d3933b52a49d7ac6103b49456662fd9b12849c901b3075c86c1f623581ba92d7349cfc4a718359de158f335572b98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff7e32fa80c60d359b992ceac68b27c1
SHA103c794f39c0ec39594bd1c428e523e3b5f052649
SHA256e0520009acdd16d483cbaa845a903840e6f3b25cac84fb8cf78794337e28bba9
SHA51212fb187dc0858d5e66856141afcd467158c3586fcf87bc97d320d30a3ae088d9bc7dda7706ccca013c4650d6839046286340ccc6ae8d7f43704814609c6f3f25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52361e402bfdee0bbe6a2b7b1e0d60362
SHA1a14ce6bcfd6bbd8fd01fd6a41571c9ef4e5e19b5
SHA25643d19cf29d92b01f1e4bab2ed0c32acef064a426b20b1266803a12f41d80da8d
SHA512638ff7d4ad9f2e68522c21dd05a32d8f813b70d0bab32f5741d483e424ed581457003c89a9fc352268e49021e73a0082fb816e246526e0b2acd9ecc07d425d24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f20f5203a6cee64e538f168ce12260f
SHA1c0ae189a1538e0d3060a616298b66aff4067078d
SHA256b69bcbcd7a2df95fb770e03669ba809f1f2c69003959df2ab7b083c4504c8a75
SHA51247dd7aa31cebaf5c53ecd07b3c01f9aedc32a08c192e63ad13f254111893d8ef1fd0d5f33d341d565c4adadbfcca0ea644792bd3c82a3083b9e8c98174fcabda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59326e4b627ce524a3e6758ed9c9a25a3
SHA12b1cc697115ce3caa2d302c6908a18ebf70e53a8
SHA256609cd1317fd8eb7d4a577f4e57a62ebbad898a9e353942809b89db8abc2cac42
SHA512e0b13546fbda0c7285c3c7fc5471ae2335e93d0c449e65f23c8184977eccc414899b388d9842865ed6fbd8530c627af64b5a1c36ae933b416b6e9390a075bfcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b59c6681b312f4243ad13d8b2a28f92
SHA18d68c9e5cba3ea26c52846a02d61d7120a90f782
SHA256d4a94bcd70ebe87430766ceaa57bdceb58e36471bb4f9eb3a015b596f6d05c3c
SHA512e62fff6e425a0b5af11eef00a9be432f8908ccc5a01309ae7d23b5d2a18b3fe70f893c113737774125dd382e4c1e3b6caaf75956db0f880a3d983706fdf2fd40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd75694dffa8b5b0a690fbe9dee48aae
SHA1a08132299ef9d1ec621e1be8398642255ef1830d
SHA2560005bec96415cab22c199953e7883a4c4c4c1c2c279008bc80202a4611ecde5b
SHA5122be6dfecb7d464e600afb25197dea8c5222fa247802dc4e5c6407062b59d5a8ffbab4a4a210c5949ca9118b590845bceca2a40f137182387a5e8bf15cc599d33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0dac0d1546ef0000e8bbf12ac28d033
SHA18052108f669b28bc7f1c8ddcc11346cac1912f4a
SHA2563eb52498182c59d68d3a89f0c0cc62762bb6260912672ff5dd4a9b8fe905cbdd
SHA5127d96f5d294a278a2e3a818196b88ab632649c6cdfdfa1cbd8b3b4a72a8640d0243e09f9c7ceef517efd60385dba11655d60d1818bd7009b6ab5bdf6d550fbe20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542f28844e8602f3dc8b132ab3ef123b2
SHA17d689c47daa24990d35421bb48757588f8644f97
SHA256c22a5830a9994c02cdf12d8491e86663c70bc5fc0ce14f7e07ef597d69e7d9e1
SHA512878994be80db0c835e47365fbfb015dfe00d77ffa70056fdde9de6bc15df51b91c0158f3ccb5bc09f93a65a6887f42490af8be08e4ba11beb1d52c986f5e956d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b