Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-06-2024 22:41
Static task
static1
Behavioral task
behavioral1
Sample
0338fdf57991708dd98a42888952c03d_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0338fdf57991708dd98a42888952c03d_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
0338fdf57991708dd98a42888952c03d_JaffaCakes118.html
-
Size
44KB
-
MD5
0338fdf57991708dd98a42888952c03d
-
SHA1
4706532dfea51bd77c540d89cebfa0cd2028f0db
-
SHA256
cc4201f5f5a71dbfcfa3e15095ac7f04fa595f3e429b34517909b4115c688026
-
SHA512
5d7441684e0439891623c9e1e902ce64fd08a261a8bd0e343d9cd5e9987d6a46e69b87d46e873756fdd88b5787975538e7e1d41607c260e44728c0e5ae86e2d9
-
SSDEEP
384:3682LwgREsRiZHtKTeHhK6JOuHiaIQ9Z3zkMhY/RiJULKTeYrIVSyXz2//unSo8L:tZNDlJOuHjfZffJsDYrgnD2//MyhFI78
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009349ab1455c1ed47959eed406958aa88000000000200000000001066000000010000200000004ba0839b45c6016963ca6fd190e8d5e6288c85f3b7fc0b0a07aa1de123e7593a000000000e8000000002000020000000941c77f54ab2b6cde2f1ca3ace13a22c08932b58ba734a428beb0690725a565e2000000066158ec245357e944d119a2973b8dbb0789610082ce074230149301f38d66757400000009de6ff0f6f712b30e19886d2c62d30332fd95016a5daf3eaec0b2f03c52f8047db22bd141fa8d86375ce12a5fc644b63a2194904ee28bff935effc5cc3da587c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BF862A21-31B1-11EF-822E-56D57A935C49} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70197c94bec5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425344364" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2340 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2340 iexplore.exe 2340 iexplore.exe 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2340 wrote to memory of 2016 2340 iexplore.exe 28 PID 2340 wrote to memory of 2016 2340 iexplore.exe 28 PID 2340 wrote to memory of 2016 2340 iexplore.exe 28 PID 2340 wrote to memory of 2016 2340 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0338fdf57991708dd98a42888952c03d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2340 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571206333f4b913d3084fa010ceda8eff
SHA10e7e83fbb20d484c5e0f27fcf99a23a9675fec3c
SHA256576fccebe394b66234fa67d9c71f43fe4c38354b402b5457ca530f81dd003bef
SHA512262782aa51235ea17097385f3f0013515a87c87aabdb9a2562a52ea37d59ac981d5f17d27198728462513bedde7d53257cae326f2ab6ecb072b021d77d95ab88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594132d7bc07a0f518ebff8547e2f43a0
SHA1fd71f486ba1eb7a8444c3e4bec7867dce5544d64
SHA25664a466a1e17309e0d038201eac5ad6be359057a8dc6745daaa2f2ec9622de223
SHA5120e470c4e57f1bdab87648948d880828f07fa89f03528a90cd4ea57795d84a15baaabab834edb321fdba1829838dc00bbbf66ebbe5b9cab7b98207e954e0e8d78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cc54251a1ee4bc56fc27825fd785447
SHA16761a48f4f8cab9db77724f03515c82bd0c4735c
SHA25623c14892f5dfc0c8d068c72ab4d15284e9b58ef41f5070a0fa0d62c67a2fbade
SHA51291677904f795931b92e7f1b4e2ebed8e6bb8a873d9a2ba67157db71c19b87fd6b82643962e01bd46658a1f53b96046ec48e9e01f6c5947c95d920e276c54d22d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519c7c565776822bcab9088195610d8a4
SHA1b2a04070d9cea80a07262af366b2e62ad95fca75
SHA256f28016d3ce5bdfbdf91707aee2a24ec15568a0c283d6099f39efb27e9b7eca4b
SHA51297f69b9038c0882be471532a82ac35fbe12dffb4c597eebcb481b02cae56804903ed6e9ff23bef561dfe397ec837fd456d1d2524694a3934db0d76f05dc2d7e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8223bd0b3bccd4c1b8b4f6fda327e43
SHA1212dd369f611b4ef52f83fc3a0749ed4d313fbac
SHA2563ed9f09ff9275fef8afb8cdde55d562351b825ae8077198fb4e25cadcdbbb0a7
SHA51237c951e38bf591a809b7652361d76a68e533475adecca739f98d31e4ccbd1b02c7e530a621d81552411a997df3881d7b626e03f9a6f2314a2cc819807412ec6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b39f18ef2cf41ca4717bdbd34d1de1c9
SHA1996b3d05a0316ec38072d7d491488150a6a25352
SHA2564216a2db9fde091ca7577a6129b2d55bccb933fc090c83a450e9ef89ef3954e1
SHA512676941f247cdd85a764291d8e360993373c77613b5bb73e82eda9c5c49b8d8a23c9d200b8ace42771e6c92d340d12851bfe64406e4e4ff20a5654cbbb29827f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ace8d75562ac51b58486e28beba6285a
SHA10620fdd425a647db98467b2da8d34decbb1aa71b
SHA256ed354b288ebdc0a791cdaeffeceb14031d64b2dee955218b06bc867faae80ef4
SHA512feb1ead092dc87cf1adbc3674704f773a1da39e0aa42b2ea2944b64688384e531b65a7eef5b1124120dd201db936e8e4c92dc91c4181c887e64f21f65fc628fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c5aaaba439166e81de4c9cd0a2a3dd7
SHA110ed3baf61f518503b0538bc8b4d7e1cc1880b8f
SHA256566bcdf7d0296d8e5444cb71a8cd68f876319011e121cab08ffffff969d21a2e
SHA5124f3efa4de7de8cfa3d1cb0e793d56d455f021be49cfd6bed8ec8223c8e5b0e3024af4a2ec2a05ce09963df88385979dc4c35c7a97ea6e3a51ff34bd43ffc8e94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537a45229a64adae1fd7bb2aa12c168fb
SHA130733b4bb5aee286730f93ce6a7edcd366ecd001
SHA2564086d643d9b76b7eab0eab1f4c10cc533db129c8dc67deceac1153ff6b18f89a
SHA51286b68f8ad9a9d6cabac2150036639e5c061d885da7fdd1f9ab3caacb8a976c2968cda04ee4981f59b3018351723368d387050d147f84eab1a3fb9f79e846cb5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0c7d46731d1197450737f04de5c1800
SHA16809ee32ab3bb211d91789fc46d877c9b9511292
SHA256f447f85bb83dc552f4b80265be28512c3fcc027e355845513ad73adc226c3c69
SHA5123ee00654cdc22dff494b674d1463d99dfcd14026b5a62e71142d13d8c8e03d62b9f679fc484f26ff0bc1d334e98022f7e139180ff75c63555e4aa8527671561c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589e11f4d470b39bf7003ceeb3fb6b243
SHA1f16e4e5b1c2ef157afa35dd3446237c04419f6b2
SHA256cb98f7da62f3c008d1982709c01228986fdec202f897fb8ded5039e88f58f4e0
SHA5120248de1fc56b2e2a084d8385f8d261f60c4b8eafa86c34af976d82f6fc3769f759ef5d2141dc2344be57afb42431b9068a292e2fec8586bf856e9fbc480665e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3143a59a73822c6048920de9b32c24e
SHA1fbc94174c3aeffb07e2f7e11ff651e085faa42a1
SHA25675271a1458939e51d00fde8675c1def4ea4d0b390107a1de128c56864f71089d
SHA512be6ed9f46917ecb063bb05de0a62542ca106c9af0a4c66940564e9e624d5f943a45a5d29d1cee6c5307acd5ef4c2bd608b4bac1c107bbae93b507a0398ee5b23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2232d18fc3117ba99201d486070520d
SHA1adc1939ddaadfb920ce1681d08e49b4c09ed635d
SHA2562f5ca6897663cdc1636c859a30ddc4ca7609b8f370b86be43dd3539515f00c8c
SHA5122a6352debd560d64487e41decf4dde8e6293113923b50f4cc72cb15d638baccb962c74009e1beef7b855fa29ec8c6b387fa592f91f50f4587df77c9120224c11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5965602712eda4008eea3317bb4b67f88
SHA11c34c43ab5e2acf6be148a3e80a31b27a0272038
SHA256b0aaccab76d882147b17c32cfa76b4d099a984cbd4b84e2fbd2a6d9d153204fb
SHA51210936bcbfa0cb4043c386cc3627025d618fcd9288f91dcd08642c0a145863894ce440174b05c6f173bd18d4cdd1d55d4166e1627fe82e87d20647a1eaad47d32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505e06e6aca475aa7190d60a5d4cbcd21
SHA12d6e21415e3ca5857d5794d74824de13ac5c4de1
SHA256a5066a4bb5c712fd60e45497280a543ea580a63fa02b9755bf7ab3ddaa8960cb
SHA5128ebb7b710bf90d80bbd4430e3f4ee6c66aa72410b40e279c535c085327414e02ec43769f51f332e00b5ff0675f7bc56282b496da6c7109231677122dd4e66258
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539bc9b25f550a6c4d134fa82b7c0c5d0
SHA159d6f132156dc1963a465162ec57bb023bab24bc
SHA2568347aaa7d78e4380fe0007a03939a6449a441d9ef86c94a036d4091ef2dd8963
SHA5128475564fb3e317ab3748a5c5578583f4920526cf2e0057dd09918ed85fd2b0bb632c06818c808af797c28148dcee1e8bc35829e8110d41391abf347179bcba26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f19e6f244146ae5975b5762117146496
SHA1e2f54690bae66218a196668b1d1a1ec11775813b
SHA256ec9ccfdb95ea01ca1831131a368299b518e063a8a063979a1c7255db7a5bd891
SHA5128853395cfed84fcd51712586b32af1dbf42558c220dfc06cd9639a8a1de61ae5eca110d2e8fddbfeb7497e1f3919905e8826362b408eb9e592f536d92c7eaea1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cbf03ceb362f063491708ed79477318
SHA17563d473b58b499a4ef0eba899edb7bb825518e5
SHA256d0171884f355735d12c880cf9bea9852891fef21efe7a7aad7bb35508dfe6898
SHA512160767029ced313a859b2f24777c4433ff501837e2cd9645481b7da425f73748c5bf1c7cf0dcee1b6d5c3d0b10ab65e69b81b540448abe0d959afdf799c1526f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b