Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
16/06/2024, 02:09
Static task
static1
Behavioral task
behavioral1
Sample
b14313f255e93efdc71b41a77f67fcf2_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
b14313f255e93efdc71b41a77f67fcf2_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
b14313f255e93efdc71b41a77f67fcf2_JaffaCakes118.html
-
Size
54KB
-
MD5
b14313f255e93efdc71b41a77f67fcf2
-
SHA1
d1e80e89c5dfe8ed95c1f81eefdb467b5de97808
-
SHA256
9d8aa49f1956c7cfb1045fff7e408c4d3ec5eaa3d3616e7756f6be4033c9b73b
-
SHA512
02c978df2bb9a89383b4f1489313669e3fe14cfa4b7900c49f93c0b3ba362c3d9126a7445188a7b43c70fb146a4954f37711369c42aae061323d4a03089720ac
-
SSDEEP
1536:SK5ctkQrFxqdhze8QZGZLmgeA9KD7hLOlpE2dAhGujbrn5bY:SNqd6k
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000081772ab42d6d6c4a86fdcbff1de0e9f300000000020000000000106600000001000020000000ec17f8a7fbace51057233f12932881742561bf4c3af3247741666e68552e8dff000000000e8000000002000020000000f2e57b8f131b744450bd3cbd3b6294f48a57ef9acd580d775e2067e2bd1dcedb2000000081abc787351fe8c6e2f50e23f9e3153aab11118b6ac2ab8318de24498572f94f40000000386a6d0a5b1c0278472680f8e1ec045fbec029408493d1b9f3125ac055ef8c776a99be9cde20a6cb011017854366db148a239b8402323fed0e69c6a0761ac5f2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424665653" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{802DA331-2B85-11EF-B69B-6AA5205CD920} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70fa1a5692bfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1368 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1368 iexplore.exe 1368 iexplore.exe 1624 IEXPLORE.EXE 1624 IEXPLORE.EXE 1624 IEXPLORE.EXE 1624 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1368 wrote to memory of 1624 1368 iexplore.exe 28 PID 1368 wrote to memory of 1624 1368 iexplore.exe 28 PID 1368 wrote to memory of 1624 1368 iexplore.exe 28 PID 1368 wrote to memory of 1624 1368 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b14313f255e93efdc71b41a77f67fcf2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1368 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5d7bab9228ca750e24ef388f2fd15773b
SHA16114ae2328ac2c573324924d4bd8bfbe7042d2b5
SHA2567352a361768389fe8156699c2cd2f038582366f94f0b3e6ffcd519310f9ceeb6
SHA512b162aabeac05b057c896ba9ee3639740a499b1c250c02b0ed4f24370b0732c90474a8cbc1fb7a0d0abb7b00b58a0d8a010e078b7f8ee87b254083371b65dca04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5d248a6da8dad83ab41c4f9eb6893d5e3
SHA19a56d0c4fa5dabc70f338aa167e58952f29ba4ce
SHA256c0e747bdcf1d0392d79d0b2fc204cd5809a7418158f6b424968aa5d09a9d1f02
SHA5129e4c690716b23474fd43196eafa8d9f60f5a6919b7824cb3149dc2ba53a8589bbe1d7be4cdf422500fbe6080ac618df6c99d6e048634385a488cb32ab1681efe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9aec66cec0f84879a60d1ce66fe7a67
SHA17bd26331c331a30b021cf7acb298df2d9d8a271d
SHA256824a08e474aa819ac40b8f97c0d8f8450a964f4093b65f057c014d097039c378
SHA5128b327215fde828d45b253e5ca39e060057e44dee64d783fc79f461012e9738d3928fd750d7c7f505043b45fbf705460ff8e672ae573f4b15ed4fae56b6ee82df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8c8dc263e0e1c2d9f6fb33c69030c38
SHA16747dc399adfeaf0beb782d69329622dba494cd4
SHA256cf1dc0b2e971bb6d8c510f737818dd59bd84e86f4c376f0d5fb2fcf58285bfa3
SHA5123d8de94166dc6db9fa9f5a0c167d26f5ea3930400ab9458ca8db41d7f68ec79b5a26cb0866864cd3f90e97b578bcc3c878027b6958b403075ddb1704e124a35f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d81e12c6dd5e7831624571a361c47234
SHA13c22e648f0fde254ef5a0ee8cf399cd4e190225b
SHA2567feac20bb2b3f628b3574db22c1b7c1d5a9bf049dd6709c801550ef99ad16e15
SHA512620749c21b5c8363e05bc286f092797304c39eb757a3d680dbd6aaea3c2ee6bc51685f44641ab5592f3943f2040f28ee5dbf10e2cab882521838a5515b3d8cf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d5c3a10c6aa276b818ab092063c9e4e
SHA164a35a3f68f8c5a341ee710bcd2a778590130820
SHA2569fbfe703222c2666dba615255490a7c0838c78255043e4bb7d5c6d1501f44090
SHA512d932015dddecb1791816126a57523a112881b0b3285aeb79419c4274106eb69d9a2847c4c39ef0e68e563f5b68efce42f9581ffb4dec70d7e50b6689d748e4f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fa054df6140c4e5d4f7e0b51eb9dd64
SHA1df40eba8fc43713380e679163572969649898b08
SHA256441934d36ede92e4d849530d6d966281c3ce5e6ee7961f1a0b4686a04bade199
SHA51212d889dba83d7f48c45b07b2bd028b2cbf9111c75b6d2963e13f086082dfc328df2b95b9a46167c0c7c47c87e20d7ab4da563d8922dab7fff54840c6031883ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3186140e4be670f5141b634197fdeb6
SHA1f62c600c35bbfdd7195e7152c85e7622ad85f534
SHA25648436e97e559fe301563c08065e6c4e2950174c74386a1120bbd4b0b116af359
SHA5121279845f4cb33af50a33fc74644976d63e1ff68b910dc07caece7d0352491e76d37f1e33f10d2afd153d946a950f850e835ae28df5ed3a76a31e148e7cb2553a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565df50bb0860fb90544506ecef327138
SHA1e9d61af1b277d83c9380a63c70ae634951156bc8
SHA25670206c4191b10aff454d350a0efd9c9f17696a6340e5a37f8b8de933b25bfcbd
SHA5121d880dbb3bd33ffe3c08ebd3e846cf7678791ae69e3de43a5f8bb7d8fd1aa9f5ac2ba5e251217519c66d743e852c23e2d8a4fc481910360e309af1283ac44cc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a20e7d5a7f6918b1511f991200b3fb42
SHA1096c898d5b7970636b9db4368b86c9252b581f46
SHA25628f89ce56017fb662ab50cb9e418d4a2501e198df43e678f18b7c56c78f39e01
SHA5121c928cffadb072d548d4684fb8f24b2bf5ee3c7d08408e842230b277415ace8ae9b8f8f4ca766522eb2fa0b86ca232be5e076f13d489672b7e375172d45ae156
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597c1c94b296961dea35bbc08a1efb832
SHA169ef9a49dd2be5553caecb17e4e98277659ff9b5
SHA256f081e3fc00f9597f1a84adc39d238b988689a9938dbb12cad912cd9ce4e32693
SHA5120c649448c054f563703a6a2dc492f0c962b69be240a39c7a09d15727adb52cb811eafde978dce73fe535fd5b4b548342bdebb335bee590f19e958999f331f54d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584d43b17cd066046d8d597d4dd2f6fea
SHA1ae8bea3a11d4d5eb6498ba6965a6f494deca3a7c
SHA2560075d1207803f66a37af3698bc44ee5b9b052cc7d85eb6118487bc7b959b9f7b
SHA512ccafbc9a276d13acc227de3761a982e8656eb4590ec38ef580cd06723159ec9bb0bcadf0388103f5c658b34c90af252bf12fbaf440e5301baee76e0e51eb1cc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aeb2859b8c529fe871e33a92adb88fd8
SHA1c19088c7579c66a3ef4b173f1b0b3b3437b70d12
SHA25659641e4d0c805b4b17de6a9c3ddfbc47f0064c0ed73a43ec236ba3327fa1582d
SHA512af985a2337a27e95c679845118bcd495705874a8b1112282f82b0bbf560cdc40406ac36502205d86a8b616cf86fe8f01b3223ef2026ff091ce807c289527d600
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5333ced5b6b0192a1f424149e14992d63
SHA152642a428607b9cf3dfe7c4e02770336e50ebbb6
SHA256183b9e03c9ae9aeb737a6b55586a61eff16107ae88007da3a4ab8781ebb1517e
SHA5123bb672b49729cd49f9d0cd62a09e0e69050683d937a25f7c3a2e32c8785b22b8a4df2d38a8b05ab78f57a2fe3b11b82e0d29aa3e4781c25d2781c4be6960fd0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NHQDN3IJ\f[1].txt
Filesize187KB
MD57967f12e801c6555e724f05f0c2b22a6
SHA1ff42f4d2abf100316f0fbe29b0a3d140fb1e94e1
SHA2562645686db121eb57792c0d3757c7ed3b0adc6c39a5b6480061f123624d239f28
SHA512068b2a59381be44c88c554b4b9f8271ffb72195ca94df476fa318fb2e463bd16e55c293ea79f9466ef5a3bf98b2712bcb12b8cc9e04860761953c3756b46313c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TZYLUGZZ\suspendedpage[2].htm
Filesize7KB
MD5f06237546132e7f8da4a9fb03e89d96a
SHA19dfc45de3714fc91506a52c194f6d5e6969c2d4c
SHA256a172559928f4f8bb3878832b9c581cc202a50e9c33d1a48042945cf1a91f211a
SHA512124950a0e75be5109335f7573aa0b53fb861576e3c4069b5c264186178ad9fe04cb160f8f009020e3ad05d66c191e846f8d3e32f9540d7039f46681733c8c9f0
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b