Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
27-06-2024 10:56
Static task
static1
Behavioral task
behavioral1
Sample
15bce2de92aeedf0637c7e285618aa1d_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
15bce2de92aeedf0637c7e285618aa1d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
15bce2de92aeedf0637c7e285618aa1d_JaffaCakes118.html
-
Size
20KB
-
MD5
15bce2de92aeedf0637c7e285618aa1d
-
SHA1
1a34c944c5bfcd9b3781af2b0a9c90b008fe134e
-
SHA256
1932499a32aec86aaca5aa0be062c38e3fbc155bf294a92bed6f85b32db50b06
-
SHA512
162fdd82d85e6bc2d49881b810ea24c6ee48b81ce3813b2e9df39040d7ee6238925993b24936ec2f9ad2218f8dc7922edc36ffb9c336f47dd85ecef165f9c272
-
SSDEEP
384:maMYHE6r/T9E8r0ltI25M7LwOn9QpxFieBCjkpCA3ri8tV:maMYHE6Ty8rc225M7LN8FisCECAn3
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0113db880c8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E37185F1-3473-11EF-B477-E6415F422194} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425647649" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb8100000000020000000000106600000001000020000000f3891bc6157c9e8dc29a3defa29d94c27e7652cf8275f31334c8e412bc242f0c000000000e8000000002000020000000ea369622d0f72f954d5ab98dddccb4ffa9be4c7df7679f77174b8d71747755fc2000000038a4ac263fb33a4a2602ec51bf1bfc362745e7da09e0f0f4a86b89ec3362b169400000003de2ec5b5c6141b5155f8c5267bd50fa0ac7a105039ba1217ebb68a53542ebef5911d058046fe51d13dbe06c28653cc3b3d3967246f4936b76caf0163fe8b7b0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2108 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2108 iexplore.exe 2108 iexplore.exe 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2352 2108 iexplore.exe 28 PID 2108 wrote to memory of 2352 2108 iexplore.exe 28 PID 2108 wrote to memory of 2352 2108 iexplore.exe 28 PID 2108 wrote to memory of 2352 2108 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\15bce2de92aeedf0637c7e285618aa1d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2108 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571c1163f93f2ae6394e07f165e3a21c2
SHA1463b1123d4bec2b7bfef61232366e71333de1229
SHA256ac9b43f3273a4404b2c87c706b6e41d14208027fbbaa93895338631337bcebf5
SHA5122078683db2dd23c399a7f2fd2c6c4cf6a85fbfd56a277c97f282608a42b7aa99b80162ef3a514bc77294d8006eb14275664060f4766009eacccf44301942e636
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54962426d3f0a6daaaff2dc68fded436d
SHA1849d91a1af00c6517f50150272fe3565782d2ddf
SHA256b3709d98b4eaf8eee8b0955988fe2078fe81cf3969975258dd4c531496d52ca0
SHA5122bc47db5089c7a4bafee2e97410a43406264909f0f3795a4a520c8f0dbd5e7d6a2ad362f7d948d23f378249ea4e65a088224c4427f299b216fd9890af7977996
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57320ef4a126becd17ae00c6577747f47
SHA132aa10404cd5cac7107640b57ab112e10be376ae
SHA256135192275e29a32fa1507ef9fb34a04ca78340ca61c1f165b911c6c361deafbf
SHA512bf076e449652feab92274388a1801be63c2b7552f1a2cb1a5ef500c4a6ab958f5696b64a70c92a771f0ad86278e3c578ad67cc35853a6bb977041d3a304a23cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f0677a0d23c0b65ca7423745865260f
SHA1761fe10d0217e380c04a94047c57e37f97900478
SHA256e2c9f89d6d60370f0de5e2a2b1226c6000110308443f583ebf0e55e534929b92
SHA512adfd93bd83dc7f5c38ba955bea598c215b0d2c7f7901bab3d15466bf0ddb6e879bc029e4453531d1f00e4a6345a6a6cb7d1aa9ca675b1daa6fa0be6291de3a44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58df0aa56b561b4035a9e06922e97834d
SHA1c08490a03bfaba1c3ff8abf33d31faca74a2f1a7
SHA25664cfd017c10f70e3f16de73c84a0d032740ff40650ace2563d21787e4ac095dc
SHA512eb0d6a73b2c2929137678bbb7980fcb40d1f089d7ba71a2c293ce7d0b195ceba33e550be22b92ef86aeb95f22c5102339380f9024f05cf33abae7924b4d12d22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577a33d22f161c3dbaaf0024914a733db
SHA1fb412c028c17bd5a2db44af78b4168b4177ba462
SHA2567a79032b7de695e0153a6918e1f706eadc768a2635bfde7a0fbe9db3974e6fb6
SHA512ec0b25337cafec48d75f9e33b026c65ca05f8775fb20c93ad05eb1095891ed0a6ae29b88de0087545d515c6ea1458e389aa67a437d0227c7383d4b28c3aab38e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d411515d9aae6a9caf4b1e1d2a4b3c14
SHA187774b86127837bc49c0e6a18671902856df5027
SHA256454ed82b7a9ee0553a04324be05395efbe5af4f338f615b5ff19c0ee12ad7a33
SHA5127ce8e304315f24329799c7e345b92f908b84325b89a51c27b47abac9e9d9392acfeb16018103fe77cef652b53999f36bc0ec0b88fab44932790b5af0cc738232
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9968d61fbcf231066ad8da609072fe3
SHA1ef89b5eee470ef14343c00804b393897d1d482cc
SHA256f9c930a3015ddcac96c882fe1ddd0b4c3d089ebcc8df2e1561714223bb440090
SHA51246b3fe83bb45af3db64d2e341aa0df9d6482c12baffdf3d74b5ffd59967d0eca8e0103b4182785073872424d879c349e4cd5daf7d42550f9987b6db1247aec63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540a6d648f51b38c8e702dded064c9657
SHA16102a539cc176a36adbd17c7a0292e1dcffc0e75
SHA256e7000f00777d6b70427cd2cc18c7e7930e96d2ab5f50f29659d752a323059381
SHA5127447c399b84c87e77cc969193809252f0b8d852276fe8d4edd5a0b1cb56bbf015bf3ac1536dce5647d911a9a881de33d57ba3c1e673fd6d7e9c40ac372acffdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e70b30e1ac0b9cf9c467c491242bccc1
SHA11d11e3302f70f197cd51c5e5a22ad9eaa595ad8f
SHA2568688e90249742745eca16a1de2b2ba08bd8e14f6ebcdb195f4faf5d7a7858b1f
SHA5127a5a62ba76ed2af7630f65612e17b8c8f233985438c0cdbd491c96e75a08573fd281b9c9719b8a6aa5646a455199e8c8f5b9590be7dd941b37b105fb417cf395
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559f66e15257acc3efb051e5907ac829e
SHA12e2e7a0ea448b0de033bbcfbb020c33f04052a17
SHA256d38f146f332f8f6c5c6ee08a638113c3f093a00d387448ee056a91a5b4b122e6
SHA512fa43223171e2114af2059488b6abcdc40e2d60a751e6cb1f576f5743e5dc2b39c4c07b68cc9440ddd3cdc9ea566b297254c285ff167f11a5b9cda3dc6f0b3280
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5109cc0dc1d06e4c7e8c417e0d3224600
SHA1596ca0fc32a2f8ff8dd35f2205bb468ce117c716
SHA25665c7e19cbf1b56e5bc783aac270670f22bf28c1a8fcb7530d70d9dc170f18103
SHA512cacdfc37136af9b518db49cf1f350c571e4d552c200394cb93f519e8f3b47071e7702af12b91e5d294bfba84d23df7d8f366d71154b26773fae4ad68e7a2bdc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fbf5cb514a1105c199fb89eda0c1876
SHA16d99ee891f48fbcae7f9458a08f7c6ba16c32b56
SHA2568a0f9645100b58cf845b3f1155f886c5fc2f2739f365557670753ba0068ad9ba
SHA5122ac7c71ee514dfb6cb8d5b621cce2bf11658d45c111eb213040a4905c7740704698d8269a7619e54ff933c71eccfd1cf8229597f6c64a7ee0adfa6934b3abc4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54038294bcbcd674b245a080e4fff2de1
SHA120416bac8d95024db5b3b9fff571aa62354a9874
SHA25607378d8add70a6ec01ac8eccc542551ba5b880eb5a0d20e01922fdc67b7188e0
SHA5121e8c33323eee95a5960a72e65da7324f218c6450e1be5a3c46ac732148bb18151dabb27d79ac45c1b1ce502f2e98accac53f0f0a9a932faea87d274511165952
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b19650b751b41ed13d8ab9bf3aa43917
SHA147adf4fb964e112ea53087889c0b3a83785103fc
SHA25698617164d7bf7c9a5c61f87688d45d08f6be16f66110b211192d9d0703882a4b
SHA51290e5c4a3a144ffeba1f596a02fd271b1188366366e66db08a8f1e4dee78f86484f84d7ae267fda4436cba4c10b8b949946326be30bb03fbc259527116a1c4639
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2fc1b7e411a9f712b78b3c3818b3906
SHA134fbc6b4450165f15d4b38441b4611dec20507b8
SHA256d2c5d5b2c6fe67c48e7d98693f430debe69424dc12513f0df9c41372d00478df
SHA512827075f135c1f12d5d6a798178b17db45897b57fbbda6fd1cb2eb9b6484be040860bc561c8c297a61edf1a46441cca47a303636fabd50ea03acf3ce04e06aa88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507a076b57f204b901e774c9e55d56edc
SHA1b671241f8da86f05474ef355767a325e9b6d30f1
SHA256cb2c5b27bc1e31364615493d55544c0b1319e8cdfbd10d0252282f8ae9813f60
SHA512d2a01ddd310bce156acab5b5ba5feff1c9d9490790a46c13843f4e2e4c5d20a5f28a0cebf11848874b9e8d55b90f17fb797c3a6ce0ccc25e200444bf7e673dc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e726c18314aae91f3d9ddaae0659a7d
SHA1c8a45ce7f0985a573187d53be6fef8a2e05de5a1
SHA256762e94082c535864c7d90efca9ae77d889cfc9260f6464b1dc69b9edeb00f0f6
SHA512c7eef18e26b12c887e0ebfc5080cf6251b3269eba8d16d4cedc3f992b2a6275c2158d31e23c39982a2d5a74d983be6c6b0a5822fdd7704f74301c361eb455ab6
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b