Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
27-06-2024 15:38
Static task
static1
Behavioral task
behavioral1
Sample
168d30ba55a7b320548c420dbd8fc8da_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
168d30ba55a7b320548c420dbd8fc8da_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
168d30ba55a7b320548c420dbd8fc8da_JaffaCakes118.html
-
Size
45KB
-
MD5
168d30ba55a7b320548c420dbd8fc8da
-
SHA1
f2de77dc0c60ec2f3a029011ccfc82c41f25c57e
-
SHA256
c495ef4198d79606f730e0ebf40297d38f028cd09ebd7c1c6504d301c401aa97
-
SHA512
02d91274553f2c796e9ce637b07b60c7a322f608304e3645c7ff86763a90ecab4c909641493914adb2f2764861930680ea70a6284d6f49a4c94076bf8b57aa04
-
SSDEEP
768:8gUbFndqqyOI/Lt5JcWmehESl2UwBq/wQI4qQ55ZAAKylzsuvn2lDavsY+gMU2gi:wBBeLt/uehNl2Uf3rqQ55ZA9AxdIgR4
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425664548" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3C9EDC51-349B-11EF-91AA-4EB079F7C2BA} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000001e2fab79f1b1d317d3a3c6f6c567d54bd76ce0f0cc4973b7d2fb4ca2fdbe2c0c000000000e80000000020000200000002ff7d5a834cf17cb1c3c1220321995b8ce5c604af5b2e18263ec0acc7e682fdd2000000063ebe9095a6d4dd2850ad87284ccc5ac86e24abc90b57149e26235b8084740a340000000330c3cc429e54d495cc3eec1ddb7840a021e1ddd9449cb2b724c17dc667641acb59e44dfef6db8b5957600fdbb3d3ee9607ac458e624d43041a413fe09faddca iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 908c1b11a8c8da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3016 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3016 iexplore.exe 3016 iexplore.exe 2268 IEXPLORE.EXE 2268 IEXPLORE.EXE 2268 IEXPLORE.EXE 2268 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2268 3016 iexplore.exe 28 PID 3016 wrote to memory of 2268 3016 iexplore.exe 28 PID 3016 wrote to memory of 2268 3016 iexplore.exe 28 PID 3016 wrote to memory of 2268 3016 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\168d30ba55a7b320548c420dbd8fc8da_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3016 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2268
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcad1750817e082bb6cf919b4752ca7c
SHA17855880d3af8cbb35b85632e9a59f8bbb8ee5540
SHA2565b013bf3f693825969fa1115ce7e64f6bda0c69cc9feb131f46da4802cf9b4d0
SHA512adbd25bf2621b1f941c49fcfdf1a577e2b906a753a69a520c971adec8ce52883b718e6d532da0195e9cc1cf6bca638b2ae2b5397ff71161077c346b73bc6539c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5381a7fac0eff1b28bce61b9081dad935
SHA1b3e9d41003bf8474ec35acad89e839c7a9834e14
SHA25668398355e0f2655f8a3980e1bb86524b635e01b86e0c2b889e7bfffd81a19bdb
SHA512454ad69a87e0dd24e4613efa18c8d21809ee764f8443fb9cd6064c4b3717ad352e07dc39339dfe389b41a3fb3f179489278190b18d1741f8d36de119f748c1e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556f19c8b83b9ddc4998392df3938445b
SHA16333c1e3fb725507c8cceff313a1b07a355d89fe
SHA256c0063408ce48ace57527892c1862cefa095c45d6762d3709bc0e987b1f82756d
SHA5123067cb0dcb6115d68e9f4ff514e51ed39e5dd478b37238eee5413cdb67028eba506bfae15f34fff12df1cd5958b22d985537911e3b13f1f631f7ce5803fddf0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575ea7012c833a27cc0fab59f5808f03d
SHA13a1e05cab24f610ead6ab3b70675be8f94b10b05
SHA256689961013f94688c3468a53509c189fa73d1e4fecd375eade8850286aef6a1d1
SHA512364ba9b42d8c0e454ea4a7be89d2b24640c182f5e843cd63a8fe1556f2e954cfedde118fb2e06406dc1bffdc9e2607558c8c64ddc20139cd95c8905b184d0ac9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58caf71c4611d19df8494fdde435b8938
SHA138917523824f4717634b4b9485b3747eced63382
SHA25682d50160a57657dc14372374a84651c4815aa665fe8e3596c6895ad76d98d8aa
SHA512e8448c6423bbb8c93b0d39edaec374802ffb336f74ccdde23d490c6d5753089100be83927dc11748451a2e44b6137845db9e5152ab3e46cf39bd514696cfcdf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584afcfc1874187e86243012e074a5e53
SHA11d317c8c220acdfaa6367516e78c3ad3060a6e6d
SHA256feaad3d870ffc03b9e98297aa49fe4138fc5cd80123860c570d125920520976d
SHA512c9a3cef9d34d5993f9219a0a9fbcc4e9fa2d888685b3c24f310f880c8ca8cc9c74a79434ea896ecbe74e692549a3028c5d0ba97c3213a3be62b5c36b3c45556c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e70a39f6f190d3ddb63a2a7fdf86709
SHA11f040fc5b8aff2e31c2948ffc4d5716f379a30db
SHA25670b58a55bcbc384726f5188e70c39d7c59cd44e4f3be9d31fc1278f71d5ec314
SHA512c9e41c1e219394ff0759b886dd4eb05011ea954a472faa351be30e015bad268bcd02b430227777cbc38754c602ecec98e4297eaf520d3cc1d68c6afc72d911d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59589eb81112d6b5c578f2515ef094af5
SHA1ededd6bbeb4730ca3efcadd46140605de5d55f6f
SHA256204a34e5a6c9558ad0b9f8260c492e05a3bd9aac965cf182b6d856e813123388
SHA512391d51ae33270ba0480bed8b18cb1efae7c6ac4d09930ec114f1a88836ade17600884c2f6fe7598fc4c33b5b7869b6302e1e67c470a7632a5cb47040eb39b042
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cdf8361ef60fdd7692262cdb616b4ce
SHA15f0e9b1a880e8a290595835ba4106e3497559d6c
SHA2563875b01e87800a6dc107785aa90fdb0368c278d6bdd92fc57c692664caaae3ca
SHA512601c1e4459c2e19e7141e50ddea20b7690c6f226f21ffb96dcf00d58e4a78776dcf181f0b3a830438afb67e9f265aa76193d5fdeddb8128805928ab28072d750
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577d79c682a9b97ce49f2b522df25168c
SHA1bc1da4b9d715aa9f4498a0917cf3444742a63949
SHA25658505c5cd219548f1afc9676499d16cd2f6d21130854725d51674b2993aa5499
SHA512104047f2e71b08071bb49f03ea5a8c1249145a66e7afcbc9941ef4589d7b864fe83e472ad1ee6aa98e7566d09aa2d18d1bc6a7e4f160fc5561be2a079bb62d6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0aa0c8ab3def0d9a0b4f4e7ab4f0af0
SHA110ea2e0c7c091f1cb404b5e4dcabe805bbb5fb7c
SHA256713165b03fc2d207333de5d18f49097c5fbeb0541e528e4c0d67024a0b7d07c0
SHA5123abfc5b829157fd4e22a7b5abbf7193e384565393e9e77aee004d5f48e5fc9e195c1116e36b86111ed0527681188c03164f8941942116ba731f2693916eea58c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510baea1035cd38e020ac260d6b697d35
SHA1f6b579d949666f014face2cbc69f95f45afc449f
SHA2562bb0508b84ff3a4a326f7a61e3e0d0694ea8e028192691e7272fb7ff81be7e6e
SHA5124a67ba34053100a4d5b92b5ba9d3ee8051e9f61a21854eb301afc6206cdef27300c67c8b49fc2635780df5fc68cbc7038bc858134e55f89c3a724b6d3bb96933
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe7c306f28b80ed1387abf7aff00f38f
SHA1cfcc0adf7a2b5141b430853bafe2a9402924ec33
SHA256a112418a8621702b25cdfc9c9251cb358449924230606f98a07912cf5816fcbd
SHA512cfdab412fc348ec944c763835503ce77b27408b5933d0bbc37cc55a0e6d859da639d833cfe2af051e7874f4789edfd8fbe3f358013ca958ecb592da11cef184b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a3d249cd8aad39c9397e66b2e8c1ea1
SHA1c832c86e8583c65a3514d5a0bd509c5a410b82ec
SHA256f13b01b33cd50683217bfa23e042b3f2773ad1949df376646c7a0f0fdf0b22ec
SHA5128ea295894b4a960da2baa936298539ea99c8a11af167df5c8b5d8e0f126dc08eac0b080b67395cb253b22f941b499fc5a06523ad43badbb7666582820f9ff74e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0d142f17c1498c1ed9d7d708e2571ee
SHA15fc9cdfcb37c135c463fca9a3a94a6c604ba82b2
SHA2565355c3ff033ad9e06236f29b4dab116abca2706f70b742304c24fe3505be5c73
SHA512901578615ac8e29c6bc3d785b80cbbe0d6f904c5c8cd12fdebc423b2b29600079c9b3fea08f933a94d02ffaed455f0e23769ad571cc1f500e4bb224ac127362c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d26235672bd661823381239f7909b83c
SHA1dc8ef6f67f59a97b0dac2560e0426bcbdfbcebe6
SHA2561c50e1f17183270b44268c6fe40f8308b3779721b2216cdfc1be82e133fbcdea
SHA5123287662b6d383442a0d9c80bba90f2cf3dadcd66348c7ea8b3e4bf9f594e69a264e7b5b0c221b98a94246655e59e21f8b801c3e2c847f1f0b8f680d84206aae8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59784252343bfa35bee760feedc30775a
SHA199d7d3baec119494bb7d0a25eb76b61476596de4
SHA2565b13cf1732456cb2f1dc919f9093e709d6c9db9ef346d4b8d9f927cfcd49dc6f
SHA512756e928be389dff1c5cba6037547b2d48a5061112985972bc26f31501e1dd8ef3b37e33b82232150c55112712061730d3ca1b6206b539dfe524679d1a39feba7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5650e0a4c888880c033c860d25a648da9
SHA19ad7f9a4db469bee37e8e4b94590d27323ccaffd
SHA2565443d087dfe2983d66bb976e7b025165b68c5f692632641f39b31484eb5b255e
SHA512989ad8e74a3f642dcd99e4bab923fedc42f92732eed5d7ac30e86fe7513a210d73198a7b276809dd4734be4f771c9dffcc005e8981a91ecb42a616467e834680
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59043abedcf96dae612c2daef040f75d3
SHA1a725327dbe4b8e481e710926a3acbb592ab6593b
SHA2560add55785744fc67f37cf2ed69c1151cc4cdf553452ad23b5de736a94fbc6382
SHA51229ab3566a2c98182dc634066e626643425c1ce02a55c82c0579707b68fe2f5e58723e3ac608b7c0ff75a9bca50240e8fb228367521aa2d79353df5e325e701f7
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b