Analysis
-
max time kernel
120s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17-06-2024 08:50
Static task
static1
Behavioral task
behavioral1
Sample
b7bc0f1bbd6b003ba557a54b5db12530_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b7bc0f1bbd6b003ba557a54b5db12530_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
b7bc0f1bbd6b003ba557a54b5db12530_JaffaCakes118.html
-
Size
4KB
-
MD5
b7bc0f1bbd6b003ba557a54b5db12530
-
SHA1
2f1e4bc64c60cc20d33a3faa15f25488fee8349b
-
SHA256
ffddd8ab584a920fe9929350b1b0da266211c9558da13c6cf45ef357fac47f46
-
SHA512
4828b1a9c7de053877c822f2f318f1edf818d45523559e12ed9484eab72467a256150d044c57fe6edda8e2c98f7e17c6f5a6450a2b5b3857c3761fcbb3bf7fdc
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8o4EKJQd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDu
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9D9B4831-2C86-11EF-8A7C-66DD11CD6629} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b058227293c0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c86987e598cf484fb09f91a490efa92600000000020000000000106600000001000020000000bc5c5e6e22dd06bfda462c0b47ec2652d7a9190594096e283f15f492a34f068c000000000e80000000020000200000002b930b95300dd1deb8564a536fc21ca1248a429ac9b94ac7402104b3aa649fc9200000007a4c8f82c063ded925e4b77a4879cbfba97b4b2a8c5ffe2c9f38daee7dc89a8a40000000400cd4f1b55767e1c5f73fab69d0158d9b4dcfaf404b5db1f03ec797d100af53c7eaee8bfea872cd4a234e7c46777350a08acd8b60c7520014e91a664d1773b9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424776082" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1912 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1912 iexplore.exe 1912 iexplore.exe 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1912 wrote to memory of 2868 1912 iexplore.exe 28 PID 1912 wrote to memory of 2868 1912 iexplore.exe 28 PID 1912 wrote to memory of 2868 1912 iexplore.exe 28 PID 1912 wrote to memory of 2868 1912 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b7bc0f1bbd6b003ba557a54b5db12530_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1912 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500f8f742bcdf4cc3a5ff6d18d3d2a35f
SHA1c0c5d2c075156ebd7f9110c446e0058bdff60e0f
SHA256e2245c4b5b0f82c0fd4396178cd5d50040df011565e2d7a7e5a00817ea82e98d
SHA512101d487f39da6cfeef81f735c0847e562803cd4c8f4db18fe6465e7189ce01ddae6d0374e851fd13ece63ad51e64fc5a5c9ae03998ef1d75d7f8803c729263cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5944458ed6f8e09805822808ffcd886a0
SHA1428f7b85b8a65215bc01359fb1ea9f53ea0276e6
SHA256ebe81b282ceea14b7d1ae68f477e32ed46ec56acfff707b51df1a763a8936058
SHA512275c766b995dc52bf77427934924c9f20cfd47b3f58e82d0e0bc041c2ff22b5962aa1fce7406162b7640afd7aca8a3be3cb5320687726fa62ae036042a4e0454
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577a62ab7572d678d3ca8892ed30bb6a7
SHA192aa304f296296413c361da703da4aa97fb1a2ab
SHA2568dca7e4b5a11d511165bb29e4ac4901494d76e8f27586ff42c241370c563497e
SHA5128d45f08162464c224ae15a7b81da245424fc9f9bcf28ddbdfc80a3953bb276d5b04535927a6237cf4247d942cdd3408486a15f421fa7a8218c9a193bec5ac173
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3471a305dce411bdcf7fb4705639f8f
SHA13dbcedd774f91e91557c9011a89144984f743a07
SHA256bf06675767d6de582537541b0ce03a9d716cee6e26806156bf6a155e6bec8170
SHA51251017951116e150efddc00ae57075bc8fb10fee2cf6e414973426978f0ffe708f8cde003272af8e58532665e18a807b8692252c268a349bd692ccb75ae76f8b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509d91f15007d7085e04202d41b03cf4f
SHA1086e1f6287552a135903bec82502c5ac266bbd7b
SHA256889a7cd06c183b4b42f59891508cafbb337c5996614cbab5db57e2a2b40352c5
SHA51255a2704f61d8b645867f4a3b39ae7859a67419f26171d3268118ddd334d8c8c55e18e4e3d302fa786e29a51c2635ff1306b39687cb2a6862bf9ee2287f4e817c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5096ca64df993bbbd9e689126b99de7f0
SHA109653f4271a34df1c9a384a1e76563b7c177871b
SHA2560b63945da90128bbdf4c36123935fbdcf5a4d49e9227baf1971eb8cee204b199
SHA51296e60c8dd060c7191d1078c44d0d59723211c6f8678ed4bcf44e2a12484ad50abfa4e7dbc66daa693b56ac9120a63625a350dcfe6db0960441a15055ea307c24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c8e62444ca97c1e0774f337e555680e
SHA1d06788f9d58dadfd997019a280b2f12664eb7cc6
SHA256558866d448bbc08ecabaed2953e1e52af34b5d44abc4b1b2359ab1a0839459fb
SHA512295bd6d7b34d620c21752f35e79fea0ec7af1572bf2ee07b26339e3a7ccd6c6a1d983419ec05b9e5e22b824c629d2b1ba0c25817f14a1f30124bd75da935976e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52acff87a4b820f37d803ecdcb389dc5b
SHA185790170a8742ff99ad2e6d4a95757e788badc99
SHA25624e437f49d58f678d7f9ce085351db0edb30a46851440c649c6727e747ec691f
SHA5121114319f6ea3ae6158d6f476e9752a28f187c1d091f1943bd59bdd21dddc4a0c277f6f3439973def78908473578bd16ce2cfb677e98e0c2aa4a3ddda417bf5c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5314666629ba2f425f899ec33146e71ac
SHA15f22017f0c40d08f542dbb3ccfa5210f3b2be445
SHA2562d2b489136d2a10d6d1736e4699bae0703ee84cb74d6ca64db30109583ada4e7
SHA512e6f858ae59b4610587bc215b3f7f0e4d67e127f6d57148ceed53ad4f15b5e87c452a11d9f62a62915c9e1002841df5dab1275d2b6013ee75b2bfdb1eabdbf7ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d9ca6e14eb89a7535e1c0776a84e064
SHA196863dafbc60615bdc3a58994a1886eaf385c0b5
SHA25664139d24745b9987682cebf80d76e1ad72472a4434bb328d755cb7d9b7cc46a9
SHA512cb232482e36ecf08054e0d8c9661c5248acbb6aadfef0dc243b610339522813e0f22fd4ec5491bcfe6348295c78e11732489cf5113abc4902e3b49d1e059e207
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbe2355f01c6c770b584cfa4c980bd96
SHA16cf57573e4e4b0f15e4d951487de15462b614502
SHA256c52d0727aa08d908f65c3d1d804ca591eeeb9446c9a1d67b56329f69de3967f7
SHA51282d278ea4981d6249118efd5b53cbe7109e7da7b0722cd6d2a6f18f27a3d842878f4c048b4f60781e73c37c79109a62409a567f850f884bbb67a79540e4f25b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554fee2590b90a369d14b46608a205261
SHA169e0212ce6b3889975aa9784822341075c922a53
SHA25693ffedd68f309ad53c292ceb04d91f3390c4582d3eedba3bf5d0278e132f4e0b
SHA5127302e0fc929f2358d44ee0682f20095c16fba0a3467f22bada65f38e5603e54e8c7de389a087639a5bea8184e9b0391eb5de53f0ed1d2040b484829248a2d39f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593d9a4fe5129c04cf3e02eac4df02942
SHA1ec15002a631efc450e84131b7fa1adc93ba1ed8c
SHA2561e95b0f82a30989fd909f15e7fe2c1481d661185020a87bb5b91951077bd1a55
SHA512b0bb9ae7d0875fdb14c489eff05e1f507ef7910b6851884ede5c08f6a6eb4f90fbd8ce42e33837106ce59047e7ba8493ce0b0be318b079b2d16d49e6efdfddd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bec03e481f85328bfc28ffbaea992e5
SHA1a7f39b3bc7984aa391dc06afc559741525a8dac5
SHA25602af9a3b87f5456a89924f3d8882eb642ff2a7eb2c88ede7b6625f3bfc00de7d
SHA512d93500185924a15df2fd58597fde864640f91533d7f192ff92e519e68aeca90d10f291c1edc1c681fbb451384c60cf99c821c078170105b23242a712d04b833d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bf9675d93812092d78e420fd2cf369b
SHA195308736d8cbc1d66c5e42fc53e2c332da441efd
SHA2560a739b217dee27908ec347ee8c0cc47b317ed4d3a52e5d57f663a81aa0e22e8a
SHA512ecd1f17820261e9961e98e4a4cd27b566e177463b98b0ae24c59e2bbd79ad6d36347504ebbdb4dac311d7c5229208b01bd13310f2d5f7de0fcc3f5f7947f767e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f9fa4a18c9ba895be060a4bf46bc60f
SHA18ecd80081908d35ef4be77f994d8bd2db16b11ca
SHA25633a36ec48dc9214808bd43c9a86c6b6b962f62fbc91c047c553a13bb8fe249b5
SHA512bb2b70ea2b7611b6a7355d6964de46a5974978b26a43e6152442fdb1d2f9d892308334a3496a84614655400a17eec5a2254a6b6e61e321d16cb3bffe03bd707e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5decedca5d7ba7ba949fa5ab8219f4ae1
SHA138d376b7faa10272656a8497ab48ff1150bb0792
SHA25600b4d6cd09bf5612a4d355d0b067bbd5a3d438a169505373c3982297fb86f4db
SHA512359d499cb798ebd2a368e64705ba54f78745442a856cdec98f4e5c1c9165467b795e57ab2c6d767e9c58c5d1094cfcfbc0ac8e387e8744f200b6533fefca24f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba226a4f6036adea9afe4b1b9791f6fa
SHA11c2ddea5293de4745c077b94c2d60e496395882c
SHA256264b24b12775262d545697cf3fc23ab87302934fc2d2e2180c733ffaa1d2a7e0
SHA512a2210f3536c5326a2f2f8b8450805e8a6ea2314e0c628dc8a3205981b915abdaf252ec241a9174e76e36504e723dad913ac8e229e3bc97e49651b3be8020d191
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55891806733ce7705123237e2448b3d9f
SHA1621f0e246cc57ab1a83fe629b3295ac7de1d79ed
SHA2568fdb9ac6b9d98e9eab1dbb576c5d4fa0de489f072a8359951cef8309dc3b1280
SHA512b7d55e3bb49b31b042c3f168d7e6b0eee83c62f3dcc769afb85863e6db50e6647da8e5601f89a71d3b28a7d5fda3fe5960a425a7fa99f630b3078102e30dad1f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b