Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-06-2024 11:11
Static task
static1
Behavioral task
behavioral1
Sample
b333d64824f8d337e57061c598fb4114_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b333d64824f8d337e57061c598fb4114_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
b333d64824f8d337e57061c598fb4114_JaffaCakes118.html
-
Size
6KB
-
MD5
b333d64824f8d337e57061c598fb4114
-
SHA1
d2b06bada29a154a2846b91e9ab22bf332bf7669
-
SHA256
cc3346cfb7eae03133d9f54387886207a097f718cef539939c498b79f83fdd8d
-
SHA512
4d9fd04d0a8f0e470181082ba857eee73e79c7ac1cec37e3ff086aa69c2d8059dff250fc993e2da64ad9a8a2d0c575341f1a43e73618ba7c25bc33d7ed6d21b6
-
SSDEEP
192:m9iqZOrjjUL4ogskT1Vgrc0ddZdRdhdudIdvdAdId3adXdCdVdGdLdmd6dndwdlv:KcUWDWNy2
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000051a6735cf95e304b8ac964ff253f0c1200000000020000000000106600000001000020000000be660c80aef4f57fa89090521fc5f9c306aa4b089425b9641f054c4de3adc089000000000e80000000020000200000008d5f257f9985734b296ac7d60f2fb1cbfa130b58059ea5dda1c145f05149282b200000003249ec539ed587e64730f5fbd53a1cd62ae69697aed2a2b046dd8756822b8c55400000008d87fe21b3ba1584a55b9b4d80c5a59caab4d4030b8317bdb690a5690fae6a9471aba78a2e826dae349d0e9e758bcc75e74df3009df93b1144ef9b59dfc33e5d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424698141" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0d8f5f8ddbfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{24881501-2BD1-11EF-86DB-FA8378BF1C4A} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2080 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2080 iexplore.exe 2080 iexplore.exe 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2080 wrote to memory of 3064 2080 iexplore.exe 28 PID 2080 wrote to memory of 3064 2080 iexplore.exe 28 PID 2080 wrote to memory of 3064 2080 iexplore.exe 28 PID 2080 wrote to memory of 3064 2080 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b333d64824f8d337e57061c598fb4114_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2080 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f5155a4f1ccc6de18de92d880fb3d1b
SHA19ef88ce439c4d18d8e8dbc6b6dec154914ba21dc
SHA256ed585782ce72b33604058a88e17b10f0eef6442559e6e0e81fec457e0d7896a3
SHA512ec114703cb7ec29b4393f755a36bbe60a7f832b412e2d13fcd3d20b5ef80625fc0e33c3d05fce59f61c5158cc3587a250d7dae9c6f27a82ecb92e989e10749d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fefdd74e6ecb1a267adf23bad056f197
SHA1c8375e2c8c782c6cfc787b3b7f68b6ae6b2da0d4
SHA2560d8f3b4d765da8b4689ee8db9d25ce5e6920714a0fe75940fcc01c11403fbb00
SHA5125ddbb59101b09fb272dc3f8e1236532d5d5ada92be4e5e5aceae3a328007c62b56e3678ea9128f0c8354242c1950f8367948be4c211e50b3c3550a2eb0532ab7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce8485f1db0f62a178b7b9ede1ac8343
SHA16906eda5d170cf8b326c3eaef1aee45f6e273af0
SHA256817f5eb4d2b08899d179c760b0f560260bdb22806830d5f47ac5132aa86986e5
SHA51279193cc884e5a14707831eaa25e8852f8d2d038b7143326d2f7b44ccd5e8ebcfd0099754088a89e0c2bb9dc9a40a99bc3507ab58a09e8bdf6785f04e0a85a216
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59df9689d600402c93709537b815513c5
SHA1deff7eafaf0dac1b53ffb3c9b91e5af452540c12
SHA25644f70d22058b75f416406d4da52612d543ea4a83889a6f0e0137277bc550b79f
SHA51239e0b40e52649276126b24ce6e042fabb328b9f82163e65b7ff0919521a7b1c3dca4544b44da8af8b4c4cc2cd0c4d149e045a5fb81134fb3f9c6b04c3abfa8e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514bac13c0842dd0d7931b79fc43283ea
SHA17e1a8e41b2d69ea5e8988e26a273e1d90a8981b2
SHA256cdce90eddcfe7f52d1b9cc4b27f231ed8d2e6772b724d112d99435f64a2128df
SHA512ca1ccf37ba9d290eb16730023ccb10406904894777e32d9895f979e404b03af145f1ecdcce2ddf52436c94cd99e325bf53b66cb5315c1debec3b21f1542d52a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e1c12def207a233f90d27f2c6950eff
SHA1203d87cd61b54edffa859b1c346bb1da4cb02275
SHA25660af1bb531d0b3c4f17d68efaf10108f7299ff73cd581977a00f47cf2f7f4992
SHA512535d0caef91019edc20e3eb62fc22db35906e1d5b957d28ad7cb87cd1cf56501917151add4d8f1485de4dc5cb57f1b3156ef78fcb3de5b9331bc077674927a91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5571f459e54831af28fb2692e49b80b5b
SHA1c38904e3169167a8514e4f1728fa2fb9a5097c40
SHA256755b6c30e069f8402fd8d68b6f36cf2b02268345cd5232f98df57938c446d378
SHA512e5776369b6c6b43859e62c86f84b3a7eb98f0e8e83802e585c62d43c0b5a994d7a086d72c3965a839369702b7c2ddac9d40a0df0f3cff7e64f2e86874bf8cc98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d0a279012877b74649952005f1a9fd2
SHA1d12341a86f9cbf32e98e86c0807c2287408408f2
SHA256b967b959fa5c4e24735f69e9e07231dd0dc4576194682242673e5744573fead3
SHA512e2c6c1eaffa2cd41fdd14dfa1d4220f736c36d73bfc1013e5d0d968cfe938803e194ee5791a35bce71469dc88757070d1b9f93b865598105e1e1f1c2630477d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5271bf4b25db2dc7811c2d44be3908b6a
SHA1204876ea61a94e0a98ebfcb414b5aa3d5f7d82c0
SHA256d202083e10c98352453f409c2d0cc17d2da6716a357605b2d2fca67c26d34620
SHA512af07494742c96da85a9d0ce4edad243b3fb3d83a3c827f8d43d1c7e38bf59230d41a227b92c70665dc230b3308fb6eab83117212e15207e910ef20ab639c76cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f29722671729bf380f0d6904fb589c8e
SHA1d78f8e1ca6036139a4ff1cd2357c035fff7091c4
SHA25641c535f5157078148c4d102877091ff6e0eab7895fb60555b3269c7cc81b6f1b
SHA512ff9f7f91d3d5bf9127c74cbe8a66a48b75fc426c79832832e3de1c36759c9075738071c7b937615e364239a95c82bfe33344025493224f6963666ebcf3dbf4a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed8e470fdf90eb10d77f3cfe37f7acef
SHA1829f4b3eeaf069608a5245cf282c1e57eb791967
SHA256b5810632060f724007a8a5ef52d356808a5ef42bf49f0685d99779e68e27d262
SHA51293bb04cdca21b9b15331b27fec79ac3bbc828dc7c79fcd8e949ea450cd5481d8e05bb9a3813382249b4fed70144ce15876db3b9afd01adef36a49e1810061f7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59aed9c4d0b39c8fd6ed75fb3b754325e
SHA12139c16f8810bb1896ce5fdf1fcf4ddb81ad127c
SHA2567c39ae37a94f14596d5faca8336bab38b6b48417e0bb6b302f97b787131e8537
SHA512e42db6d71010cb84c2d1124d01bc944cd201d4240d828952e1090bffc9a0f48cfd433a0154199c1dc7921be0a09fbf28664414c87de23435fc5b50971cdc51ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a647555b44a81e0a2543df2e1cebc1a
SHA1b4a0303eabd7cc8352e8c586f0216c3ba1707635
SHA256dec908bf4d81acfbf086d5acbe07eb64003bba2720758748fe461af31bd2b32f
SHA512bffcd88eca21fb4079534416a731d795045c8fd09f77fd6002bf239ca3d26f2d08cfe9ef3c33b32f24b1d98b3142495d498beec1c6f8c3827ae5f9bbdba60703
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57868215f946d39e9157819af2df42239
SHA11fb0098e3e51cdb860cfa74e9592627aefd24e37
SHA25635dcc292a88bdbf95b6ebaf6778ee3b4048b00df0ac4ee3f6bb13eee1aec5f92
SHA5127ca036223c12133d7edd2845ab95ce9d9197185e5830d1adefa81e0fcada0c023751f7cd424c2bb7f7347a5a85e67aa623ad3087b70d6b7854148f3569dc688a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fab8f6f3d8e6bdfddeb374489f96603
SHA1daa4e35d48453e325241eb9960f7b622a6c70776
SHA256bf3a33ca873d1c0fbb65b98fdfc164aa7c87e8ac36f360ca5abce1b742293a01
SHA512f38534c85ff4dc03402c9c54b33b7effa28896902f47256e2a1cd0b53cc8c6b4bc1acd2e531cee5b3cbb9de03089a8163b5b83cb58182640ce031f2856c74492
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6972094dc5efd6a679d10475862eee6
SHA164e8beec9a32307fe6872a80bed5127e6f636a07
SHA25663d2809354d7e3e2479152f49fc535ab6c448a9afdaf2b711b3fd6fdf1c347da
SHA512aa10bceaa5954539ba2d135e5307b0904671818574e7f3ebd433942d1d84ebae564687ff806cb634136a26cd327cfe6f60ac6d5deffa0615d668fde3ea74ab8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5196c0e7492a1fe2ce9d80c060d287789
SHA192f738494f97128e4ca70b0e628e75e46fa39368
SHA256e7346ef37bca97243faf987c361c3a499b75479d7d69c9bb5ce55072546736bd
SHA512c8841a72dfb63080d15e91b4dcea22786a3ddbff9edee082c9df43efb52dc285700e28054013526fc4c2849708fdc3301135bf9889aff04eb16271b306e4f0cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57da62def37b79735279d0fa4065895ee
SHA174d0a913270578679faece9d4f5113e3eb88692c
SHA256b169a41ede081595bd2e0f58a1bb14c9df8812a145a5687554fe6e429190f0aa
SHA51262cb7acad8a92e7d0f1f516e67a5863e680c8797bf50d2ca5f57663880c626f2da3847e4d320f24ded28a99d3bf3eef36cc9e5d0c1900d7ac47c60868d7965c4
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b