Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
14-06-2024 01:50
Static task
static1
Behavioral task
behavioral1
Sample
a79efb40963bcdb13b98e2c6e9074236_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a79efb40963bcdb13b98e2c6e9074236_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
a79efb40963bcdb13b98e2c6e9074236_JaffaCakes118.html
-
Size
460KB
-
MD5
a79efb40963bcdb13b98e2c6e9074236
-
SHA1
7e4d4d47e0bc1c43c9fdee86efa9c10b85abe6f8
-
SHA256
23fe0f3f32fda73ec5974bc47548fff81e9accb19e1191ac8295f1b377a751e0
-
SHA512
f455fbe14f0190cfb11921bd334e244052756872fb67d208a5f43670465443c3da36be1afa96e14af628f36e270af1b35ec4536447950aee3cbbc3191be748a6
-
SSDEEP
6144:S8sMYod+X3oI+YMDsMYod+X3oI+YJsMYod+X3oI+YLsMYod+X3oI+YQ:N5d+X3GX5d+X3L5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30af484ffdbdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000514e0ccdc06623429c374aefd7740ac1000000000200000000001066000000010000200000001ff065fc5a391048d03a6d27d71275efee7fbda2c1183c6442f48ee1d78e57db000000000e80000000020000200000003acca984ee2f015dd313ef4f147cb65356d0072d770148e0b2ecabc1f85ca22c90000000cbcb911a7429d58103563586da049022df727a60808691a21c68cf613316241c70d25d4ae38e232c496106b9d2f50aa11f0eec77bc3ad761117fedb2c30f1d510ab406b55b904d0fe2d86be1bb3c372096826a230813e11525494f4e239575bc2e193b63f6a82e6af6a5883162259fe9e4bae2305830b6b9465379421d41b8f8530ee10454d6434b75cfa1d0a8e5d492400000006315d660840c538f0d74bde1ef22da149a1321c7a664aa4f828f16eb6bdaf3bfe0062f01beda9b80c80c6f5927568cc30440a27331d6a5e5483305848afd332c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{76C0BF81-29F0-11EF-9A4D-7A846B3196C4} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000514e0ccdc06623429c374aefd7740ac100000000020000000000106600000001000020000000dd6c8ec95d9fec93da5e082005e97d5221ca154b5aeec7e51cc1470bf0e3322a000000000e8000000002000020000000fb04081b603891575158892b6309369da788a56d529d7ca9b7506a621b11184320000000b66e79bdf2cca9eaa4085965a567d8104550873af6fd0767dc04861789f0ddd54000000045dc0b0c3d07fda3d210af0ca9e413ab86f55492dee239791b96d7685ad38a16c4747b3fb0631a4c172e70694c0e9d59710424d445665579c0ec5abe9fb473ea iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424491691" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2916 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2916 iexplore.exe 2916 iexplore.exe 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2916 wrote to memory of 2480 2916 iexplore.exe 28 PID 2916 wrote to memory of 2480 2916 iexplore.exe 28 PID 2916 wrote to memory of 2480 2916 iexplore.exe 28 PID 2916 wrote to memory of 2480 2916 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a79efb40963bcdb13b98e2c6e9074236_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2916 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2480
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed5c00394be81d6f2ae1752ade75b2e0
SHA1aa65891056b7e2f08961197cf52d673235826ab7
SHA2562080efc47d9a18d6dfe81763cc12ad4c9d6d46f4b40fb4cbfdc6506d17e9da8b
SHA512c3cf5de170a8446484a6db95174c56de10924d213fc3fbefbeb7195988ab122d82592b2694cba0a239d9fb2dbd3add167765ec9244867b158d506280357ebd81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3c7b243e79c78ee09d2d4fee9aa9021
SHA1af15ad153770e6eed98a05369b23801a737714e5
SHA256f1878de0a100af5a71f83d80834a9120f746b583c4609a0d594d0e9d9e934dcd
SHA51270fa3d877b0e38cf09af08f8d87999bdf14a0999f76fd4a7639a28c7bb943c8a17876e2ac1f84689148b3d908e67f2c502d06f818c16a0888eccb9b78e0a217b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0cc9e9e0eaf1c25838fc147304a37ff
SHA1c98293e39d733f07a2d218a311df06dcb2b1e7e2
SHA25656d15e31ef2375518b87098a79d0dc7d1e49adb1dc0c51b2e800cdd56052ed5f
SHA51219ab292a766b5ba7404c25d36af8b1057c443b66297234ceffd3c112805542c185664dcb4a83aea38d3ae26306c63638f0234ad6c91a306441fab6bd227b7392
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b5a558663ade2811520587d3b71e7cc
SHA1a242e7c429cce95938d68e63b7f9baf5e466eb80
SHA256b2bf83ce9088069f220bbd9aaa8b4f7e56f64da11e52403059eb6ea7d718dce5
SHA5121b107465fa56370d321a8ad8947bcb31df92d50dc00b1b7b5e01f7bcc2dbfdb221a97ac34ee12417397139b1b9ac77861c5a80e1662a05818335fc63d5e37028
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b14801b037b6461cac0442139a9f45e4
SHA110a25188b64d7992fd68d9e8c04405fe7606f444
SHA256e1cb90f53bf9eb4949e88bc983c1e3a40cae72142fc99d7dcb21783dcf2c5645
SHA5120696eded6fe47e0c0da195ccf41bd57fab58b6655ea259ef7454a525eec3842ffa005e8d4862183f856c5f8b639a25c8bb75cfcfa672bec8983cfd630b190ea0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5971024f1a4c87a80a2ecbcf70b19aa60
SHA1d89ab358a8ab09d6facafd0679fec9de766516d9
SHA2565a9cc8ad54dea91dc39965dc8d103c54544a307402e299ded75ed211540bb34d
SHA512c85226fd406b54319543e68e4aee121c9d10d60c067af34d367223ec8080d383a7464c9c5b13c3bc2a6f15424271e495ab9344c61902240271d03e79c2a415e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53727bae150817685e5f18c53ecde1107
SHA1fcb64d1003633e88fcd081f2c177b1ab8775e8eb
SHA256508161f23728a3c36639b8013b36f598c45cd54bce0b6c620f552e2ff6f86565
SHA5124cf973ea112433eda346a9726618789b5f280bb4a175d02d1de5fca1b3ca19a36aceed941ba1cc3c64f9b4fef5960e63bb7c27c6189f8c184a7e42c5651883b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c2e60ae8a9f971dcbf0452106513df4
SHA105a9efc6ef92aa01cca2f6311e4b69e3cbed2a18
SHA256b7537c639ecd9ac0a1f246b8205cdbcd8367bbfad71d6bacc0e09fb6ad0862d8
SHA5126f712c53416211464fb0a8188f30eb8b8fd58bd2a2c3a578d222e030589602e2b0b6f3396c956d73d46fe690c30df5fbdf38e31471f3b1796b183551cb9f01c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5541b41273c7771a6b4527c5b3f365d6f
SHA177402172a41e81ede39d66282ff7fa69e0850ba1
SHA25697154e44903beeab94a65a4aa002823924834d0ed99f69c08929afa1844a8489
SHA5129572eb59875d25ebf646b029e4312e41e18ad53f7a21216dfe291c8c78b4741bcb8879e35ae60bc00a327723fc1365f5091fd9a614509cfc8e97b4691303399c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b79df1aaa4284affdda36b9b7c48dc62
SHA10917443e6ba704e4d3f7f0150a2492fe09cbd422
SHA256316a0965153c2fa9e6d648287024f67680343ba53f7310b9ed0651fc953b8935
SHA512fa317312c5ef279b954f7da72dca431dd839a626465dc00bff8b316756530b2fa3ef6bb287eabbca20ff80278269246e144f21645a80489a7f81c9a1aeb85d37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8bffb9967903321a3cdc42327772c43
SHA1a26d4985571e4bd488662447ff174221a669b42a
SHA256fdcb887ade5d489dc5aa4491e7bea0dbb51094669bfdf1c81558237f65511045
SHA512424e1267d211dd22cec4b043eacf79f1e9b40865fe96b024c1dc110fb5b2b0d11130ce670098a2d4b61beee3bd147c59ce70fda02916aa7c81307da9db9d2853
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e28362e69fc5f70e9cd8dd060569f27e
SHA1a07e6f493cc0b416b82f76b44b012a34e2aedb9b
SHA256a8a0d2b2a1781ecbe40ee7183485e260b77c247d2f3bbc6f5e871332018a674b
SHA51205c44c86efe20984fe5c6d10d1ce7e0bd104dac4d26fed64d86db01890bda4f2b5d807618fabf6d3bef6367e4478a0202053b9eafb0a6142dd9a4907b4e8eb14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e66e63520b9441d9556bce45288f3421
SHA1571f2297c9168ded21cca143cafc3cd39b6bb780
SHA256a13a95b5c52c7538eeb9b60e081300fafaf19462d43c95d69affe361971b550a
SHA5120e72d616c38c963226f516c7a8258e8becd20f4d50fc65926970bf0c6665d94aefa31496cb3bb1aeb17412e50e82bc4a662fac2c290e67f444825ec1c502fe64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58601ae8e910626cba267730ce3665d71
SHA12b635ed2f0aac749a21be581c91336b9630b785a
SHA256da214317dd14f054b2c46ef549ec897d138306deee1ac9e49a52a72327027dbf
SHA512c1e6a31fb0fc92f8def8b9aaede7b6db941c0275ad05c72b7c06af4e40227bf316ae165710e17de449ce26048df73b6130a52d45f0f14647fbd787101af4e846
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506218c142e159d2673213638bf698d56
SHA17db0fcafd19755f2994100f3948793cf75e7f4ab
SHA256cd28b75576412b029c9a51630efc56c5278e5aca6d39a3777bdb5f2a58830e55
SHA512da897610897aa731fb0d18dc52539e0055fbe0c076c53c7104c2c26538aee063127b9da2a5b5cac115e7d54bced9ba3682b0ffe84d7a7695c37803578099c65d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cba447f435305d6937dc34a95700abc
SHA14f057e9a345301385cec117263e9d78a32b7b411
SHA256c72d22469deff3612376c447e5576ec0613bbc1bef47abf622b6442521041948
SHA5129e8f95e7310a37decb07ee1e7216954273a5f98c80ea7cc41a34ed66bf453ab9cb976eba4ee3774be880efd258708542e5698a401d323944ebe7b02819e09605
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590ca87564abc322f55add8c2d31eaf17
SHA164b55fa4d345380b618defdffc6ecf915be849ce
SHA25657a7d3616f03d0499c7e5f67347e3ff03456baab9715ba7e39257abcb66459a9
SHA512c3b3c35deeb6f3be715489f98b1d4944c23537352185afa09e013002e0bdeec95dc5fc2fe7dea01bfaa06d99dec25f6aad88df1620faa5260430fc173bf9764a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a018d468097a5a3b7e931070a76fa41e
SHA1e66ddeeec63ca85316613f45a8b22f1d962b8f88
SHA256bded0bd11bcc29a1d0a9e66fb2197f0dbf806a11095ed8e82b4fe4b2ed12c03c
SHA512be36d2eb2d567aa549be2e86f2d8e267c85f445ab008c8bdc9bc25d84ea3160a26889f694f137dcf6198d31b0a666a17b27b4304842d3fede384fa0b2532e992
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b