Analysis
-
max time kernel
139s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
05/06/2024, 16:15
Static task
static1
Behavioral task
behavioral1
Sample
989a3f7d00b906e555970366f641aa71_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
989a3f7d00b906e555970366f641aa71_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
989a3f7d00b906e555970366f641aa71_JaffaCakes118.html
-
Size
67KB
-
MD5
989a3f7d00b906e555970366f641aa71
-
SHA1
7a74e05e05298f2b89c723a11044b36490559aa0
-
SHA256
4501104bb67357b304723b8d6fe27c23b38ca35fe8e9e537d57d826143899a17
-
SHA512
199ac63e6e3328f80fd923697edcd332ad7ebb1f43c6f01a93c2eba131473f954e864c3855a67dbad5d171f3376bc5c6ecdf29dfc56e2e896402aa4c37d5ef55
-
SSDEEP
768:Ji2NgcMiR3sI2PDDnX0g6sZfNbq4oTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVh:JR2tpmTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423765995" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e099eca663b7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D240DAC1-2356-11EF-B0F7-6EC840ECE01E} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000020a235e89bc63747b1db2c86fa5ef90300000000020000000000106600000001000020000000f360bdd5349a03ce7db116ccafc647c668625965266325cf8310448d35c4b0f8000000000e80000000020000200000005844bb198e51eeee989c4fb3b6bb0e977be511ecac81fdffb3b66ba01d9c0fc82000000038a51cb56d67fd4affb17e85fe991cb9343d7246bdfb4ecba4e37db12b7bb27540000000a484200c0f64272c521307cd9ba6e4e1de9a6826f1e0828413f2be9dd85bae921953df2a1fb0ee7eeb22b1b3aeee9e0888ad187a1547061b49ec2eea7e26546e iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2972 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2972 iexplore.exe 2972 iexplore.exe 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2972 wrote to memory of 2204 2972 iexplore.exe 28 PID 2972 wrote to memory of 2204 2972 iexplore.exe 28 PID 2972 wrote to memory of 2204 2972 iexplore.exe 28 PID 2972 wrote to memory of 2204 2972 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\989a3f7d00b906e555970366f641aa71_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2972 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2204
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edbdaee3876ca988eef3a36a95c00b0b
SHA15f9bf3e971fcdc20a4b3e012f31f249ac81c032d
SHA256f6e12ddb17e7246c6e123f120b643d9c3a581ef8994e6f04656e720d6ba35600
SHA512acd1140d7edfd6a51dd79af7f9d8ac7eee269c06b49877801794f322f8c2daa395b89cd4b38b00f8959b3e9930265627c03a444cd4fe28c94430b3f017d265ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e353b698a443fd570fa6a356ee051a66
SHA195d6b47729f8c81999a435c9d8f662c92de8f411
SHA256e474a4e0d208c2717d0ffc5f69312ba8aac4b7696e583968426146946fa5d441
SHA51209b3e6eec4b97596d8b2921cbe4b7193d5089229e934ba0b4472f0c6ce109e6336356964c70a705577d44ed3d0bdaac5e989e10aecbf5bbf451b670be26011d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586df68689cc73a1026e7bbe2f84d9988
SHA10a100f7f7e789b59912a6f47674a5452e82bb78a
SHA25679563bae87cad29b8a2365867c68935204ecab73f3a378150ad1ee4bf2c7a46e
SHA5120aa1704d15552ef172a5afc00b73689e89ca8b7590f805bd594075268125aaeb6770893ff063cf157c8c936a2c4683408ea620b36ecfeb9efea4758a7de52c41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5051fd4fc17be8376501396cb95d11b35
SHA1e0cec17191cb0dcd2ee5d6290a2f5625c3018405
SHA256a2bd53fb7773a8deddd220287720b1a2c6d4d44486665cf3c5903822d5030e12
SHA512f8f37b3326eb172f0ac99e4e1733e27583d4cb3546b7d49a55da520e618be060918956e6d4c4364235ddadd422110da67db706c2a4a772106e97f6e971875337
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5901e4436202f3348cab76833e0858230
SHA1a7abcd1097ae94adbe9c13979f18241330f9178b
SHA2566980d48251f5427cd346f11a72053cd168687028f39f766b372bba9d35b0a20a
SHA51285b465da34bf79ae9b8a33e41e6063e2c86039bd51bf66cf9fc171594e0efbfe046fd3201387c737b9dfe656d50ad7080ea1631e06d777688b41316cd5083d36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb7f72545b477d43beaf697baed27a17
SHA17c52c801fd80fd979b66242eecd1f90824d3a0a5
SHA2560ab96f695d69ff578b6a9b94826bee2c7ba219b651abc72af8f35b114eda5a3f
SHA5126d781aea05686a9eb649b3a045ba509415ded218cff33497832112f2b352439c74095bda8ab3acaef1dd592039b71058d59d2b0bae939a05077e1dc4f4b30448
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57510e622d50010c0a2fbdcd3d54a1461
SHA1b9a6fc653bf26815fe2c4e181926ff9462ae29b9
SHA256053e640b2ffb7872285c276a5493acb1a5b30808aea8299aaae75b7f3db912e1
SHA512c4650c596ee57993857ffdb917dcfe4a968e21244a13c712029f3582e6981a60c17828396da74696896039d5e59ca3e5c16123d156e316ab535e7acf7b3e1c27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508d38db7f1fb8aa730acb9919244cb28
SHA1c6e24c84f78540d153ed0dc681a32d341219495e
SHA25631b18b852542d3c37368feebe24ddf1619196141b37a8d18f8a28a9c38da6c6c
SHA512acdbcd0c944d8b1195f82e63542314bc8d32b808376ca0a7bfe9af699133221a867c54aa64448aba4366a26e15e2c741c4a2770ea8eba3b097c9f5e4b143713f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c516f5f939fa3cb228c55bc44bbf83e
SHA1c72d9315d72d6fd5d65c411bc8ecca92f72e6c12
SHA256308c8b2d8317a701d108b242e7e0e8e5c96b6547d1dd02a2bc215d1f3e99db9f
SHA5120820c1ebc1fa6fd14f86cad25a204c2faebaf6b848b3a0cfab38f4faf28339a68e9dfd9f9db51e13d9aa45189389a57162830af1d47f4371b095eece219cbe82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b64d2458800ea81328f165b5094ac5e7
SHA12ab50667e7066d57d52e5b82a2a41b4092d222e0
SHA25666163ee127e3e2e12dde9017c0dc39dfd48c50a3cf9807c091fa6543325191aa
SHA512bdaad9d10f2dc60beb5b320a0329a12bcc51c4186a99a27a1905d161bf530d79352569f7afb06a5241a62c3587f2be338472565bf4459d819d910191a210a233
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3496532b525dae4928be03b07bded87
SHA1ce5980cf74754bc54024a4925bff38c63d320f6a
SHA25684d135f978eb7f6eb49bba561ed05aad98b9bf67c0d9b1d13de126646c834268
SHA512e632f654f1a1f6cd738a252762ee65bc91742196c4749b1966cd1a6f1cd0130a7b8075eb6782e09593d7402a1e44932ead7c558fc5056f5cc14b391677e0e1d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e871cff26d0dc9df4bd408220cd7747e
SHA125c1d967cbc0331b46e30bf650e57e053f290f43
SHA25683131badfea0faa29fc5d69296187bf612d3e4deddbd39cd547257f6aa62702c
SHA512555fa80fbde4d769351ea2e1164ed08c3ae9db5ab962b707f010b293487da1444d457ad977aa5c8b47b3a3aa829550342b4f6ba60e5abd79fb0a27707b857a58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee4a475e0cde694823745e553a234068
SHA124118cc23364d035fe429f5b44981f50ce598b35
SHA256a0a15a1c95c57fc5685273b7ccca1c48335b84bc92f2e92c36ac1d1630f34332
SHA51263ee7b3a8d64096297a80aa813e7b6b2b0493f3f291e39c09b4616ef27e4829be82df642b62378b12dd23e3f4261781ad68609d09a581e4f5f749d20bb32f2ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563b2598b877d35780823d1e48ce121d8
SHA1209b572644f50b9c662268fd755fa91e13277c3a
SHA256ec1cd1298f836b52c0d1cb55e3aa73df16a20379eb5a1a0152d0571c726f8fa4
SHA51218b7a5fe2be4754d7728ff72a94754975a8ebe85658281b8f891251d9961e8562ece53d2db526e551b57a5a1a99b7e729d901d15cd7199100df4f42c88146712
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57276a22cb99bc57cd586f0f79dbb3a6f
SHA155fb91e4d3a3ce374d8b8c5f8e3981d36b218441
SHA256cdcb8a341654c8a4626cb69a7bd17b6d06308b7eaa5fca64fbbab9187f901bfd
SHA5129fafce8f130e2e83241aa503863a2bd16c11cb9b5d7b7f282634300e7c3c72515d12ad05bd51b1b112b295101591197f3760b922d84590b2d65f06a0187b257c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509c6df112a74c7ea954b9cdfd7c29152
SHA164020fac0a29f66b11b0ed61a767b6ffd081d22f
SHA2562968089cd31b0ff92462f23652d01fdab0c2202653a3f67d173749be847fb33e
SHA512b81b8425eccfe8f650d6756a937739c8c07b11a27a148387102e66f081ac9aa0d119e98a507b0638155cd9c1ac2ac41c823956de6998ce6bb37cadd02579a30f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583de70d756981808a6809d0b3ccd79b2
SHA1213fda4d2cea578a976f332f9f474464e9c0f1f2
SHA25626072c1f8459cb9c1df17373da03f2cec8bdb4d68879ef07108ceaa68cbf5f7c
SHA512c01fada413d9d95c00f28da54c3a484004643fda9a656c7eef94a924a1a830d6c54054dca2d706bda3e2fb04d077890749b3064d364c87595321f0dae6dd2453
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5026978f802d70fa1be3ced199b80280f
SHA1a349155c9f956bddec2d378dcb76275ab3bbb308
SHA25697e993d8864fc4ddce9f58e62c467a49181daaa8080a96bf5991ff05592ff672
SHA51265f0d87807603f617764050b1a94024517ff4372057492378a25a935f8ce41f5a54ec09c0bb1d4c9d21bcc95e528d0cd61c76b6626115f6f490a6a2c1f86ddb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d00c625006f1609e93fd7e2d9a75ac03
SHA16f9b7a5b981baa4a2099b85c1eafee00181b3712
SHA2565dee9943ea219230515e79b5f964976425257a91cae2ede5d02ce170bd5fd441
SHA512c704b951b56077c0ada40772736b8e6fdee33cfdf3792ee2dddb49588b0e3981a58ad24508eda16506ce091e328157b4687ab3e2ff8e8e5c265a2f534aed376b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b