Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
05/06/2024, 06:58
Static task
static1
Behavioral task
behavioral1
Sample
97680f458a66e5d28f2d849ab1ddd6e9_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
97680f458a66e5d28f2d849ab1ddd6e9_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
97680f458a66e5d28f2d849ab1ddd6e9_JaffaCakes118.html
-
Size
100KB
-
MD5
97680f458a66e5d28f2d849ab1ddd6e9
-
SHA1
6abc590c8983d6f96563d409166160e63450fda6
-
SHA256
1cb6c05286637ad2b482ab8e88acc8daf3b7bacfa1330388554e76a08715eed7
-
SHA512
532d89ad3040a15cf6770d08d311db14c0296dec6094e5c0620295f327cb1cf43d57acf205e016e9c8bec4c7c7d7f5749c9445623ab740f1ad6856fa7ecc9ebb
-
SSDEEP
1536:2+ue9dMqghFDCke8W03GYjHeiHH9DEqEFkYoYjJYWTR1:JlYqghFDCWW03rjHq
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0B50A8C1-2309-11EF-B781-461900256DFE} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423732589" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0effce015b7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000d4894ee3f1ca850a61009f8f52d9087ef354f614eedcfcf99768ee3717da637e000000000e8000000002000020000000d85ae3c9e464e37e861dff8ea1973b5403b2c8a01ba6da14e8b1886059d80cb2200000000717e17e088fe1fc68b931f7a3033faaa5b2588e1aa7ce1b459f2941ea08b28b40000000bfefb29ee4da60d00bab4e7394ae00938343ea1b6b168ecd3057e5d247b75120c50f9288f9e675f3c217671d5cd57ba7e08834642095e0caf2cf9caa6f95fa57 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3000 iexplore.exe 3000 iexplore.exe 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2080 3000 iexplore.exe 28 PID 3000 wrote to memory of 2080 3000 iexplore.exe 28 PID 3000 wrote to memory of 2080 3000 iexplore.exe 28 PID 3000 wrote to memory of 2080 3000 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\97680f458a66e5d28f2d849ab1ddd6e9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3000 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cddb863afbfbf6bd28d6b6a3125fe483
SHA1c8982a7b4d37d2fa9f1b0432dbfc0c88fb1dfb59
SHA2569cc4d51a19e5188c4f64945f1e15b66ebb3b4d29d5dc334453d393fc1c61b7ae
SHA5126355cdc7ab7825fe9ecf9b01b9f9cdef543109390bf73aebff00d24fc86ae885cc54894df84259a87d27a09c748e2dc52fb2bb2674ee2b945bb5d7bd8aa1e867
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5596ec53d3cc1877946de18aec0dd1f30
SHA169859991049c5f65e40e29114385efcef2e522c1
SHA256b58f1751172d2d311f4323aa14cb8b59a19cc547860aed90aebd0bd53359a987
SHA5124b3ae335c101ed88ce945ec08bdb5b4c47cd1f37db3e2f38a01140fd21cbb7a37797aae7b30e773e99be898cfe840e72f0a3102861e4bab1faad1f198e1b87b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54757a9cbed26b4c94fc6dcb288edcd8e
SHA1c7b0596117cb1ed64c74322143cc45c83cb961fa
SHA2566451eaad9a2761336fe2dd2e9b049bad3481dbd069fa0d1f17d30d280e9df79b
SHA512e50549597c4118af793f985b48985fb40ca75700909f888c110d0ae196f66cbb4eb9a597e21666fd551bc398f2e34185c5793c67d708cd398029b443221c7fea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5759f262fe9e1c99e6a8fa5709c8ea939
SHA1421dbdaefc2e470087b6bc40ca3e828d910d6f4f
SHA256b6c2bf7da09418bfa2b5d472640b3c1a3dd44e49a2ee145108d1b07e27b88144
SHA5122b0366b42fc4b404ff9894f39b10bea18b76b4ad6bd8a84e536a93a006819854ef958ddad2cb8dc114fb88200c6c3a3a1e82e5859cb6cc4624433c7765a6b098
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562f8a77af331634df82b21960e308aec
SHA140b48bd9b835a4d0b8591fa6f593fbe441c45839
SHA256bf81b8c438661ca1572cf655980ea3d259000df5cf5c1c98a65c08609835f1d3
SHA512ded43c146e724ec0b3bd6fe2dbbd703f7307e7b09282c601160ab4842a8ba19c85b7d0614c3fafb7f2bc73261c16ef5d1cfe08fb9a9efbb0a50d0b348593efe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c70e19d497c1125df3ee5f6af93f6d3
SHA1315c43c8344a8e01f3bb82b1da6ae9437678c812
SHA25671539aa1b22e6d13fe1833820408340c42e1de97d57acbecda32d0340f3d9d33
SHA51277fee55f63ee823b7c8b0fbfc0a11817f67dc8e8451e828d2537f99102e79c813192702b392458cb0752076e2f14fef809b52884e27cb1755b1d582b362051ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551bb227d50ee7ef38929b4186a31ddad
SHA1d58543f708bdc7bbc40c0410d749edfd4574960b
SHA25651a6354bfd5aaf2f2a23be76c06f79566d4216e4d6172666622e95aee0077075
SHA512b71add65c372aef458f7bdcac9647e497847f48a555f64faa5305a0f89f5ac46b80434b3c9fa094dc6f22f678c117489839d8ffe91e689beb57ad2c4c52531a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542478f50e67d14150f7e37607234ca6d
SHA1a1d90d5dc70f14cbfce2869d80591626203cd805
SHA2561e5a912321385bd9b6e3d6f9ab81d4a42d516dd7e77ca199e1ac6e9717306208
SHA512c98545ee342f96931ad4455f0fcbc43277391317aaffdfd6adc62c25027e3f51ba645adb3c2aeb98b2fe7b8751f1993f0b8ac8f7b2f324f8347fb0cab8cf77a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb28cf4dab9c2691e1006c26de1b7de1
SHA16d2eced79f6b77fa2ab375bdace84852b33e01ca
SHA256a6a4d403ab67d96bfa9895516c2071d360b2444294b66fe2eeca92e9fdd77886
SHA5124ffe2c66767600d6a9b72401781286eb2dcdc4164506cebaf8d251bb5a550b67c1675d0e4acfdc57e9227ac3f5f04e6a6c08aefac6256dcf62ced51a3f80089d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8a8495c338bc92db51d81147fda8657
SHA14896dbccb3c43eb0b532a7af119d6ffe8b061ea4
SHA25679f4b3546ba3009f5e95637a217eb1c48a595ce46d58a532e1c7a4df1f339ca4
SHA51235b68015fb437423379452eec9122059e396799cb2fa475c4c83422b198ed7fd0c0b1afaf5c7dcc1dae7af174cc043fcfcaaf010b28815e5b16902c4e6d267cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a19e8edfdcee75ad3d6617a28d1530cd
SHA1f4fa9e8c6b348eadbc04c85b80c240593a8badf2
SHA256d0748db8cf0980eb79da46441bd1db2b72f830ce4ae07a8b5f6310a12aec4b4c
SHA5120f1087b2b51081432064eab9129ab1e064c3ef1cae397f6e6f3e69ca8df9aecd9b1f829f339d13980730e9b404b3a1f1385a7e095840cd74c32830c08f43cbf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579fe90ab1584f0556f5c1a79d9f3bf61
SHA1b9e577cb996a719e5222b8fbe884a6426d23893a
SHA25661fec923f2a380db69a75d6a98ceb7425a7f5c88ec6be0cc0d557eab53afa316
SHA51294b558cd7fcd8906acbfe90c14f74f9435ae4a7fec9bffa4739985d8a5dc4d35584c6c5baffc9bfbf8a9e40ae1340a8e536ec5cd000a7e6292a0ebb6c8c8d278
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594b2d632c39f7e16a6f99b8523d5e2da
SHA1087ea042e081b0c065e5e2bb6846ce1ff2cb168d
SHA2568f09058b8e03a74ccf22cc136354030e4529bbad42bb5920a919d1b343725a0a
SHA51224d395ccb88f9a7685d9442d3d2ea00464c8e1138dc7fb8e179e8ccebb26a62afccf9062ee1e870dfd8c79aafb9113aeb960fa88930272f6652b5b974226dd99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c18c5868a0cd1626e08bdecb5f64bce3
SHA1a9d8d1237d557c29bcf04503983e1966b4ddb7c5
SHA25651b31f871e57c39d9d334a55fbc6f76afb2e50883bde63456f4d0500c3aac92c
SHA512937e50c6696f3f28c20250987cdc1ec6957399d1346fb583673fd373edb57719dc6210b5067e9456a80a0938193239a87869a6c09eabb508404821ee423f036e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f8e7c919b637c01e19746f79a04bc5a
SHA13ba917b25868fbcf1f453b40b232323691541f3a
SHA25613dae72515ae96b8cb66626eb9ca41e09cc4397118387daff9a11f30f67b8ed3
SHA5120c65b90a375f6e6f1c20ee4d583f55aad5d9b9181f02f8d00dff9d8281e452697b7164e278eddecfb1e07f0b47da84d963b225759d81e3210a643f34e369d823
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5ebdf7c4877d4e7af16873fecbd6d15
SHA11d187377c9159f96ffd0a0dcd1d55af8224b0413
SHA256949f2504e375e0254d6c37bc45d6894b1a046990f609ccd082b0867f50b87eb2
SHA512780e0afe35e01b4d16b5945af4eebdcd25ea9b1c32961f033c2d726a27b9297dc88a9950085e986ceacd94960566cab51cf6506eec20b88802290de88c3acede
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b0e7f42ad3d3d2402f58939b420fbad
SHA15f234d2b9df6d764975368a79c8884c369bd13d9
SHA256ae4e3603dc8ce9d0f44da9ee2628c3468b67a26ec81c8ee594d60894efa8ccbd
SHA512be7e706c3f5304f7f6015247e7790e22c6d0624de2dc9e3642db6ef74540ec475d4a8863a5e3a726238bb69a239cad9bdc826404de472d964806095244073e7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d82ad23aa6da4b9068708be65844fad
SHA18b62036f014f4e24d439ba1f3dba98a90cc5f76f
SHA256aa1cf7eea992ce81297801c2f8acad270821928db9b4e94519dc633ca96bf400
SHA51229cd24a781403c2975502693faf271ef2e38fb0070d793bae753cee85fcbe5d65e62364d52d5e95d8a14dbd1d6632bfeddf33a4771ace8809be64abd18f0f7d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5659e8513dba843fdb1a153bf5e00588c
SHA1c5d965eeddfb05b2b6e4b42a132596c8b7df5ff3
SHA2567213e9fef7e2333b2379e1e9ea11418ce8e07d8833e92cd9c7bd7c8e87a07185
SHA512995685dcf5dddc132eb42b269aa8dafa72adbdefbc7827b9a29e169f9674a56bb6200734a5a43f830412333e1870dc500ea41a9d3a3bac3f282fc5d13f0a7ef1
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b