Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15-06-2024 21:53
Static task
static1
Behavioral task
behavioral1
Sample
b04847f088564f8a886e5cbb042f8583_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b04847f088564f8a886e5cbb042f8583_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b04847f088564f8a886e5cbb042f8583_JaffaCakes118.html
-
Size
4KB
-
MD5
b04847f088564f8a886e5cbb042f8583
-
SHA1
d38708e16eb62464caaa6fad40eff0922dffbedf
-
SHA256
c3596dbf810f2b99e44c814ad024b9776b7942b785c012d346262ec7ee9b65ac
-
SHA512
0da4ec7c6059ca2ce8ec5fa4a4b86a802172d12090d77c64e8fba8c0d5f9923e78beb7f5404bcd9b3d129de81052419299f5cbe4091822b000e2f2c4e481ba1b
-
SSDEEP
96:VuQficOahtPwDyLDEb78dddddddddddddddddkRkrR00UASh2SZtTShpiSho2d2h:tc4tc41YtT178+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0aa54846ebfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424650271" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AFC7ED41-2B61-11EF-BEEC-D20227E6D795} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ac43c02eb776f540b8882163ae740a1b0000000002000000000010660000000100002000000043469011e30be688ec2c9c8d07c2cee65b61e80b5c97ef8e55c92967dc4ae35c000000000e800000000200002000000006836c3af19292e8c3a303b051fb17b5b47eb6d0fb0052143424b4b6424ef73d200000008cf1a2f5b481443e20228d76127b69739f9ae6b625b76db892a391c29cad12c040000000bd561291fcefdef4130ad734a456c95f45c5b600fd01eca87af4935e938fd966d2f50e9f7f20df625c77348eb81a0b184b2f4323498da7b56472deae8684d967 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1924 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1924 iexplore.exe 1924 iexplore.exe 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1924 wrote to memory of 2484 1924 iexplore.exe 28 PID 1924 wrote to memory of 2484 1924 iexplore.exe 28 PID 1924 wrote to memory of 2484 1924 iexplore.exe 28 PID 1924 wrote to memory of 2484 1924 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b04847f088564f8a886e5cbb042f8583_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1924 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2484
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56de17a8d9296592e3d4439c5e044035a
SHA1b9f54ace08574280f777e4b89932a670725e689d
SHA2563fad66cb69672ade534af4c81474bd1e5c5d52acbc4bd383d2e12806c8b8ab56
SHA512857005a684cec657c69208cfc7124864dc56230e93fc602f27da1ed07380d03d7364a07420de64634f9c7171e6a95282e657091488d03f71ba22391e208d2eb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588ae3e8dc116ab6781112e2135206733
SHA1b95e83402b24db56f59d6c321ed2c61ea677fdc3
SHA256b2406f14f6c72af380e0431989495013096eff4bf1f8b7a8a587ca555c3a67ed
SHA512b0972705f400f4763c11837cb3983f5cf35a369c576638589a9203b960f810f863ee959e796b6a46bc8d9b201a966ab2ecf235c5a31e65f4207e4274e7bfa28e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c27535f2e4b7de5ad7199b1e64e72e0d
SHA1eba95e73a34a8e4491555dba81df418555a5a9b1
SHA256707a28e1633d450bd969648aec45c83eb2de3a408802da1d4a70a64032139847
SHA512bbffcb93d84b3fb832c77cef08a3833980b9fa60a2c2ea0b10e17dff10589bf82c1cbfa6bdc3c4f49768b7f288659f91a90abe253f14c9f660f73fd29b42c053
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8e3e979a85f1c24975d399fee8e6e54
SHA1874854f1f66e657eb979f58fa98a821651eedf5f
SHA2562e1365e96283068f25364b66473bda806b341420302e88d00baaf64ff9c49e1a
SHA512616e71c9167c3c3d8db401f7bf488d230e2b88451e5a4c78b9e7f7538e49bf105f982b663510e7f9ae04d84dc461f7524ee89eb12b335569402f1741b4813a79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57905e45db8b860619589b21624f2f5de
SHA132c1b37c0213ea1fac630a1b907f39f205c9fc2e
SHA256a75e403802eb0e7df0e1e3ae7c8b6c81e37c8a1f0fed072111d800473999b90c
SHA512967963585ad829c2a961501c780a7e182e74f0f75f71f58cd671576f491042d4145dbd6015be2a1554d341798cb4df07faf8f419d8526ee461a09b577be6fd22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5433135346f979d078005b5f64881cf76
SHA1ed28e639ab25680526bdf806e8ebc2ea20e0d19d
SHA256d09884e1666ac5830bc46eb6e42efddf9d85da03cca8238cee7c3deb7e2cedad
SHA512edaa6930b4fb60329d7379a86d7a1e6af5ea94cc59aeb6b663b9c751fdcc4a25b60a01b06963b0fdf23f170f70a509ac6095f10459135ce311b3473056444f8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd99c22d0367d20d10a99ffa08fa8618
SHA1645e96d87b69a2827ef72a4b4518533e96ca109b
SHA256ccb67056ae67709b4ae6334e971fd99999448feca8035934bd43fb1abf1be321
SHA5128ed5608314c1c6bea1182336b5d61f9ce951d81f7a43bedeb3d3c69ce607c26dfbfdeca09cb69ec356d747ee80826d04b55f3638895f28e12ff7deeef30eed83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5742b0f1c7d66019fb84570a2ae362b63
SHA14e6013e6dfe54e708da0d02b8f3f1bc0dce4bdbd
SHA25672e1f8c83b20357b4c82198c971c985331a88a8572f1987e33758724fcb12d8c
SHA5126d9a66aa1150a9010747c411045fdf9ac964429e4d400bdfc5ba9b6a0ee57a27ec5b1d774b49460d08eb7b8e29073298c03117a7ea8d2239a6768f85117318f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56057d84f02561bfba34f9166c045c0e6
SHA17d37013dff181bd1a90e6ea7bca9a72ca91a8946
SHA256aca4136a9071988c6ed993cf738dfc2eb952e14ec30692ed333099eea36943b6
SHA512eb114e174d71885c54b508398e942120f7a67f56bd38851ffe5a2851b3c81ad52ce1c584d5a66559baeaa4d51e36c030d7d0233fbeb5ec6c057c33a9d0008194
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b816ab634d8c0f0bfa954e36b95c8378
SHA17546be6dff729b7985ab51a64fda864c8ef6c19f
SHA25649afca5b98f9d8b7333ade14e39caff7324ca45b95750c614c294b358894165c
SHA512cd43198a95d249cf083caf68576914297f50f6b69badc7b2031d3b3f201fe9c447f06173cf2285fab2cb2e9f4e805af7ae41e3b8672b69e6674c3c4a364298f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56195ae6697c621b1075a2d78bf60e5c8
SHA1646de43aa853098741d9b6f46d0a7c41a8863b7e
SHA256d977f8283fec238f5c664664f03d6a4b1155696b2ca74825783008c830d34168
SHA512f147f5857e570f26e8b6a44405cf0b1f37c286ae90e5f928dd72d218de45f7d01411ab4facbd3ea7a6c0fa9800ef2ff4dc452304d117f55b487ba374084752fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f890edf6a26a2bd28ee2378333a252d1
SHA1fdee03f3118103882ec0d0fa01d16a6c745be27a
SHA256edce15dcc0f41eb10b222afb0fd9f1844d39d78f01747d47c771dbb77eb7ae00
SHA512dd40ef974145cd5de90645087d0721bc4d9dac8bcfd11b40fa0cf866d2a027b4c1129094a19652ce4ef87d3a4b7193bc6c8726be2be886121b63c6b9aece59e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d979cc80b5883f0c0f36e01fa004e59
SHA16cd50152189a6b32b82b050c2cfb103a738040ac
SHA2563e9179c6662d6bb611949a62c95fa446e3d33326edbab8b10fa8229901f33eeb
SHA5125312f57f35ad95e79bda67c40699e625aee8a92b5fb432ea6a51251e386818e52ad2ad805ce301c0ddb404328a798c0abf182fafd7bb771de2cf43251dc610b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592b52cb155d5b567d32998e859f2bfec
SHA1434af0d808812ce99786bcf41cf5bbd17b8bc582
SHA2567f130ff48d036a44e3f6282d4fa544065ee99261ed88364d4d7e5cc79c36720c
SHA512b2f19059772f1822c7dce9184faf27f3526d61b4fe2560d0e21f3e740e72efe10661eecc1ebcc4f4256fcecf0569db74dd21525bd2ec9e21e610cc83d327716e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dceb3afe370fd2dcf6f9949a2c0a70f
SHA1abfc40c20ca6c4a065cbf8c1ae739655c4aeb4b8
SHA256283a70598a7dc417b6008b58c4c830d19244261815b6de235a7bc6963da5db59
SHA51276ef96f6c7433171052fe24eba13ee390059c701c246f30131511e82f5ce70815f1b3331ffba211f6a154c58d531fb332845b57d85dbca991cdb64afcd766b64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5526018350d264c5412a52029ab8fb2d9
SHA15b179cd33e141f8a6b8a4b539e232d48ff8a43ad
SHA256fd7f80a68bf028bca09260a14de8adada05aded46bed5a4b4d55b2a811fbc09e
SHA512416bf39ee43258906a3a0bab8ce88c9b80bc33da795de2ead40ffd658ead91ac7d3be33fd4cfe466ece7ed9aa4d9338c04825182c8eb2d040cb6c9a39bcedc73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54eebf763ff4d00b413c1119e9db83712
SHA1b8faeab3d041091806c09fbbb9e6d823ee555e7e
SHA2567586abaecd6f21f1be77adc8a78e316e30bce0f4f7940e58fcc89c3ec6757b60
SHA5122c552bbef11651b9e8d62e1726496d807dfe86942b2b80e021d41ef85b3467f9755e56943cc2d064670eade8b278adac9d2e76e705ea4f6b43404e310f0df9d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5b6ff78ab75759412de3471da0123c7
SHA152723cebba2b0681655793c9fdea622b8fc5b3be
SHA256ad4d3458f6fff94b3e3d2acea764e93bac9c4a9007d385b779c9c9fff2d96b8d
SHA5120df01081cc316457ec39fb8700ba89b4539c0007a00501c4cefa85c0b322ea01fc34816924931c3fde9f861f5df0c1d4cac01a6123d0a90525eea5399db98bde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdb8da4751a0081659705c5a7de911e0
SHA14bb3bed57c9ddea934c993f886a9ee1a642790b5
SHA25683f2bbcd8c135a812dab7becf3e55ecec187306de0422964b6548ddcb74cad83
SHA512f749e31c009123ed3cf59185bdb0e3e87d6a6ec1303d668f20e01b30d429c01e156d4230dd12ac002a4de8f7656d4c2d16b8d5de92abad870b25d307dfbd753b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b