Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
01/07/2024, 13:44
Static task
static1
Behavioral task
behavioral1
Sample
1b851f3520e2675dc225cc1515cde99d_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
1b851f3520e2675dc225cc1515cde99d_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
1b851f3520e2675dc225cc1515cde99d_JaffaCakes118.html
-
Size
122KB
-
MD5
1b851f3520e2675dc225cc1515cde99d
-
SHA1
821423421ef66a0dfb082fcd91fb009de97e23d3
-
SHA256
6058851ea535990abf5cf37a5371a06bd3427fad58b924e15039e54faa9be3e5
-
SHA512
3f0ab5474bd1350bc42d8df866d7cd91811f9dd77463520731c309f76965b7eb0136f2a67adffb5050fbc52b911801fc27649dab4f4430472e4d4961f98b0d72
-
SSDEEP
768:fxxcD/KeEIvHu/vZ93uUX6Zw26j92IQjyhmsAukC1e5gequwCwOb:fPQ/7m/Rl/qZw2lIQtK+yuwCRb
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb810000000002000000000010660000000100002000000053dca4ba0eadf013881bd9355018dc770c29a2b1dccfa2567001bf1a1dc82ec1000000000e800000000200002000000042b1bd5d082cf62d0a1822226766b042936107f2597b0fdab191b83ec853941e20000000ee204df3677154bda380087dd54c73d2d0f353c3f6f365e2cd6748f28d89adf24000000068ffd4bbaab8a36bb86600baa9fcd660d6b5bbd0a36277b55911a75538c4ba6bf3dee0132546a85b3d58cdb549d9c4f66e46d3bb42c3bd652f3f77ee1240c8b7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FD7DE711-37AF-11EF-94DD-CE80800B5EC6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426003316" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 104e5fecbccbda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1212 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1212 iexplore.exe 1212 iexplore.exe 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1212 wrote to memory of 2200 1212 iexplore.exe 28 PID 1212 wrote to memory of 2200 1212 iexplore.exe 28 PID 1212 wrote to memory of 2200 1212 iexplore.exe 28 PID 1212 wrote to memory of 2200 1212 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1b851f3520e2675dc225cc1515cde99d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1212 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2200
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540669e4126e698bc2bb0696354431df5
SHA18248c1dd4a983327dd45bf970ea26fb13a5d51e1
SHA256894f21d302e82b7f23a26db9fcb96bcf0a74271f958387c70ed59e3a54e5fa60
SHA51259d65bff161faea5cccb29cafea915e4cd5ffe69bf6cb629c7fddef31b4129ff014b77de8ef760e3311839068490392cd7cf70677a26f834c7803dd1847a98f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d700df163f7808e4fc263d1fdc9a646
SHA1c466a3d77e10a3eda1b2cb178092c5478b8f1eca
SHA2567e363382684abdae8c8ca7e02ffb04cef001ee01c84329b58cc058089d5b6a1c
SHA51290e0e305d0ea3cfb656739a7a82d57dfb39f15a32e8ff5f7279b9eb32a4c76a5cdcf8476ad4420eac22203cf7853c7da12323515f679f5dbb43881bfc06d69ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fe6b22c89e83484ecab54c974350d4c
SHA1182ed4965b54bea12fe23cc3dda1cef01b55f839
SHA25686207296bffb6180dafca9e0caf2099573a32c31353ed69dfc656fe556cbc43f
SHA5122f694a67072de288f2814dab3a9a349a97d766f0e8fa0310075f46bc738292276ca8fd13ad175808aff1be6c72b74c70f358ef70e2bd664a5a6c3ca7a5a35e65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6180e6c1b9d992fefd6fda9700db9d0
SHA11f050f2176d506560b886cc6fd4a29d6377eb3f6
SHA2567ecb97af54d3955d4aed66c47ea4f7338c77a0011cea9f5041513a55d6f55f79
SHA512b7211507b219c27008c9c8a94792c31e950ed1d8a87d443672b78e6ff411a1a67feea46bb5d7ccc5c24e346683a4f2d654ec5dd1f01e9ce27637cec1ed0c741b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfb3686978c5dc4efc490c4873e0502c
SHA136c1d59d5d5012935d69d513d32f112437ea4051
SHA25684e2cf958adee33983fb999c9e5d505ba9c71224743dfda52bafffc953b205e2
SHA512aebfc75150d5a84fe0077dc5a7f04ffd8d8124dfac1f9f87f7ad30ce9d0fb305306a6286dcf0ea6cb7955f7931c36705a9f6a364433c61aa3f7d06388e8fe5ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4f328b8ac3259d796d56762ee0321b1
SHA1f1784254c58c532e4a62a2644471a68e9a927f24
SHA256f536950134d8f35179167b9444f935c71786bbfa647439554fb2af174ebe5be1
SHA5125592481057ace3881e06d1aa8af75e28ff37cdd83ddbcb151a2e5d9d71b049a75abac8b9b26425367013c2dabe93dbfb65d1307f400633b9f8552fb1a110af8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f28a40bc7e267562e7ca3cfc7d2f9f64
SHA111ae5fe85ab0dbac6a6cb6e5134d070876f5bbd1
SHA25606e58a2016002b02d564e8db146051f9eff20c34710a6df469e36ae6cdd5e1e2
SHA512fa8617e6b155738cdddb14300425f2d69cad5fee9b29171d4e2ddfb0e3169a9de30db86d11aadb7177cffcca9b969ab463f314f03d4657b5ba6c069af6a00e61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5479cdc98528636408016e031d9f4c5f3
SHA19afdc32993d4a219b22693ba3386b7194949f65d
SHA256b7ae755afbe0ef6e0c43e7ee72200214dd46700f5fe833894b0400f18f050d83
SHA512c1ff93212947acc3cb93445e907aa3e61e73ef5a0c9a5368ab841e7a2035218d26d31e5ccf4f76e231d430b8ba6e661ba13c8c1c8f39eed2453066929c1794c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d655be70c64f402f73c5096b27a4ca9
SHA13de3474cbb6318702dc3a725fbf9e06b382bf233
SHA2560368641e02b3bef83dd805b9a0f341915efffe50a7ec484733c75aec06c00ebf
SHA512b48ad563d2ef09945af9981b990148aa266e9ff79ffd999992bf1a991317143112d45f1457e9be500a1a916d268c7bf17e1a9a1b74bfe1cde21bc1ed3fd0ae33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d97621726e0ba4948650040800bf19a
SHA154123e61bb7ab27bc1bcba3b95fdec8a5df5c043
SHA256cd71fd48bfc0339ad768cc22b08a9d9bf2b1dba848db541797bddbaa5ce1d333
SHA51279088ff62aaa66bd6d8890f0eeb0e1f5cfe09165779cd444a61ca6b35045b55851314aaaf250b36a26d95cfa0227e07b3adab33497a3a3927b2ba3049be2ed88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594901f7178421f860e00a8d7d7b2a2f5
SHA1442baa8417a1dac37acb85d231b359fd36405eb3
SHA2569abe95da94e242ed03c53fcd7a27682325be94b6af63fbdc39432a051afcdbb6
SHA512abe54e4841e83282a837bfe47eea185c67090618b9b48bb57374d93b9afb8227f73c36034e8934ff327ef06efe62a842c996602ae4806c55b771a99a9040fb32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be4ffc9353488360c177e9976e947a3b
SHA126bf104551bd6164c96a56d0935b99612ba4e449
SHA256f2a7d046c4c793d398d2be5143bc40e39f2020bff9c41f861b4fc11df69d9486
SHA512ecb356dbeba486631cf893378702e60363297d061cc75e7ba600e54116feab0f60673a311a85c61b4ac33a2917c28ce5916af4f9944bab60ac9be1374c013141
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a9ccddb5ec0980c37068462373b4964
SHA14c366e2598d1bdb5eefe34807f0848cd35463c94
SHA256eac3da54fe0dc1ebb0b6f7d8b13f466adddf8d7927d73cd13f3408b7edc3deff
SHA512b8514c50c71ae5dee4806fc5237417b8acafa962d019c8991469c6f969a4d59d929d08c75dfabda3a6ced939ecd641cf332ae85a13616167afd2a1f3d86d769a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578777d02e245cd4cc166f1dd45cca7f2
SHA1a5d59db4ca1d728a43ae12a591c16e2e0cdb8256
SHA256d7306bc57378ff87c82c61da6c25d4115ec734ee5bd127a12dea4e663d1fc617
SHA5129c691c644bdc381046ce9b9e71a7a9b50ad354b73702937ae33f6cb2db4c738bbc96041257ca14c0e5d65cc37bf4aad7cf70677be63424de7cd9e1778d8e7ac9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55201aee3a9a8715516af4b6063c21f52
SHA1e755a842a3cce3ad8e5128846114a9da76ab14ec
SHA2566b0fa2fc74c50d2bb7b43cfea0f8f4a2239af8f2d49ee22112e7a41930bb8630
SHA5123a86663d4eba090f25fa2c75d3262568b5e02d20235c615c7e1bd2ad87a3e3d5658b4f7fcc0e13fbe84804abf4458525e88359f1677af0be0c58430d33f4a1e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b77d6ca461724cba138f47bc53c2efb
SHA17698150571f75c8e24f2b3cedc41d7e1c5e7b2fa
SHA256b136f2782dc2aa788542500d04e2f2744185d71277258cb0231e67c312905a49
SHA512b86c4accb6695eabbeeb356defd9eb1b0d41bd139648ef5014f518d108ec7dceaa6a2d76b0a05edad7ead56405ffd1a95b46eaf21016b1f53e52904644a82f15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1ba668f74bc93da47fbedd6e20a6d48
SHA19e6dbe3f24b66d2ce6895d7e2595e797d3e3537a
SHA2563cf63907adfeeb0eeafc61d2cacc96c6216fa8580bb69206f3fb9acdcc0ae63b
SHA512a1408f8a61ea86a40b50a308e92c572d2088efb85ec340e32477097c78f8506eb7fd6c8f5b159234425428c2bc093e659301a5b4e4d0f8f253221ccf49e6fc46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557c5cba5ad4f51405d84b5b0948cc0aa
SHA1d325654b9cfaa57290a31dbdbb4c19acac30a566
SHA25665729256a1dc09abe73b2951ad70a292b746770f353d45d0729a64ec0c1c8f3e
SHA512f13af0282876371105b1aacc57b27a457e698071a2cb1d287cc61fdc1d671106f88fdf1fbe417c940d51f192c160f8beaea3c92e5593460d191033b62806988f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e126c4cc91742f9f7e4398eafe22955c
SHA152b8833fba6d43224d691a70e08359c1de3bc5ed
SHA256a197e3024d88e1122c7e3b08f6af7046ed31cd967581ff5fcc6807de6725ceeb
SHA512b69b0aef6576e99bbed9c8710bb63d4c4886b08d443896dbec35765b49b62226b130f999c8409e8f72c36a5703daaeb9736116f4111979c30a2995727b615286
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d906b8b1686c9f000310b9469bdcc4dd
SHA15b8cf031d95ec43da6feb3396ede77f5c44afbf5
SHA256e2f593891ef1958014a653290d1d291f4ba63b668dbba4da0cbcfbab40513857
SHA512f401c22105ab96e3d1bd774d0713bcdc0d267f9136b5daf0b7f3231a372f6a61c6be518c3d65cc1cac362027225eddeeed2682142ae09bc8fa04700972926faf
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b