Analysis
-
max time kernel
139s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
03-07-2024 22:15
Static task
static1
Behavioral task
behavioral1
Sample
239f7a781abed4d8fb31ecf2a534d8a1_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
239f7a781abed4d8fb31ecf2a534d8a1_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
239f7a781abed4d8fb31ecf2a534d8a1_JaffaCakes118.html
-
Size
120KB
-
MD5
239f7a781abed4d8fb31ecf2a534d8a1
-
SHA1
c4a46b163d3c3797ce3598c7bc1d866b78d36250
-
SHA256
60a6784ed97e25eef06c52ad77b611ba98e413ea3802c2e2a49195cb360bbe12
-
SHA512
4c56d9d745cf6ab17826130354e9d1786f791854dacc10363e998ae6ccb920256ff88e287da0c4673ed24a9efefd4f322215946c05569002d5bef51cd9084254
-
SSDEEP
768:/8x8114nFvi8uDYvdrB40hU4zd4BN/xN4DFrwPGLjnysBG+PaCv/JRIq7sdL:/8ubYGURC0U0hrFyOPaCG
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426206829" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b00dabc996cdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ff8e632f56b9ec4bb883b708fb0c8315000000000200000000001066000000010000200000009d347f2731d84dada020177345632c1d04f910cb5676abba836c7927c9dee98a000000000e8000000002000020000000ff261e1cb55843e867464f1846360a2a66242d7f628e567365d38ed09a00b073200000006558395edfd396fbc938bd365db61f8dcdb1c0e41916d162385440ea1ebeaa5d40000000950017abbdc07654d0a14505c72c113e3d5cde1a9144811ce31c83736e4801d25f60147c6da061441f0fdbd13508f409be7058b5e33c4bac26583d3a6d5fdfad iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ff8e632f56b9ec4bb883b708fb0c8315000000000200000000001066000000010000200000005bae197604d40f3adf90b54c45a3ca0562e3685fc70c33ac0b1d008ab70e3298000000000e8000000002000020000000565420539266be74ea9ba9f5e7c6cce9687cf61a5a35876bde2f8fc12837cbf490000000d7ce23da1f6186b3187d1352b20c1d81b00d2dbf63c537c3ecc223fcbb35165ef4942f7bb8cd48c822f959c0ee30af31bdfd235a1d76d406306acd2952870eb6ca2bc480acf53a397f4fb9c818d39cd92363bd1fc11e89a4798b6b7e27ae66cde378789382b547f970f62fcaeb1588d34b48479ab630c21dfb108be87c39a6338511a6143ba504341e9f5bec9d1e722e40000000d5965605485c8004526c8a8ffe0e926a74cafc0a81dd0c9c0e8da658fbfd6a83a49f7246f90c6438a2b8329adfbbddf999a675e21a1cd4617deba7f998551754 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D4ACA611-3989-11EF-9680-DA96D1126947} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2836 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2836 iexplore.exe 2836 iexplore.exe 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2836 wrote to memory of 2748 2836 iexplore.exe 28 PID 2836 wrote to memory of 2748 2836 iexplore.exe 28 PID 2836 wrote to memory of 2748 2836 iexplore.exe 28 PID 2836 wrote to memory of 2748 2836 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\239f7a781abed4d8fb31ecf2a534d8a1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2836 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577308441100d21f4d0743039b637663c
SHA15e8ac0b449cb3bd429746d4ab5533521c78e5a61
SHA256b285b640bebd9df4156a43ecf0b9f82d8ad9a69d6695c8d1394f3c1e917007b1
SHA512067d24baf2c53c362882ef52f7e658bc017d2903ad468645cdd91e22aff61cfa30d2008baaa47962904606ff28d4a41de755bac15e51dbc1ba5869869f12a2b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b05a095b7af37626b4e088446a02e6e9
SHA1539f6eda0186022c1d73fb94a8d59fb4df788d3a
SHA25615f3ebaf1b4643e89de31430ba4d264ced2f19acca4dd99d6cbecff00b746536
SHA51296dfe589fb1041d9b9b84fe01ea081074768f19fd5628af986ae7b2e1124c74e009de3820d1a4093513c3bb010549c74b17ed188c046eb5e4e2ace25d69846db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efe4091d941468ebad736656842ae6af
SHA1760eb99a7c6a8251f13cce9254f049a503d31f9e
SHA25671228772af3721d3d464778fa73309b39f137a35a1e12901a011aadf66b65f92
SHA51223af084baee6a67f9c375528a7a93a0c0d53eae1be8d6da87259ba5b2845fc15c7c277acc52f9e9bf16f155c16e68a9b7fa79fa554341b38adaba10e09fd807e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fcfaeb61c9e1305aa1c3729bf61d804
SHA12899c4c36f549360d1e0bd9b7e2aa7eeb1579a39
SHA25612cb9f2fc2ad186e565d814ef89a712895b6e27775ccd15869d50704f81c4d4a
SHA512c5470507f944d4a757d87c1ed29b567d5da17465c1590aa9f95bccc53bc98598204f269957ed6139a4a06d31f0021ae1a9bcb9a190f17c63ba9bd90890e7fc44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503f73ca7760fb5166b5ddf0b8e988c97
SHA171645ff0c03aa81041b90306a14d4689596d7624
SHA2569d4d7e2fb3edb5f995242b7d0f6f669ca951aaa2931d8ab42d4289a91fed0427
SHA5124083ff37518972d8705d53ef248ec0262e1cab3340b503e2c57052fcfb68d44e326cfc3e8f4c579484da034e472e5f1253beb2b5be994f5a5656d6b2f10b1471
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a17e3c4f0562bfe65d3a9416d8215017
SHA102a1f979ebc5a4b1ca29ef1186f15a41475dd146
SHA256fa483b14904d4eea65ca6a251e94f929c49fa76b28908fc93acf0c13590417bf
SHA512da4f8d8cdcba1e14e2886a4982395824796709426b11e2e1e83e67a20d8b26aecdfaa9bc1c1429bb55be5bb5a936e49e638dad1d0e3fbafec4b7080c4574fb6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534bbe8219a678278ce959b1ad5b5fa18
SHA1a13a1ac686d12d645538fde7a8e443c5cf012f3c
SHA25694de6522aee81887532b4df0418ad5c8b604de4e1315e3dfd6f28d7d40c59aaa
SHA5120b435fcf00e62f08a1dd30059db2ab458aa8fa85b52670f7aaf3c7fbeb46dee8764f07c1b2e5385d6509b2a66745442b6624b8a40777f8886afdf96ae0ad6409
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555e979d69d4a72a7ae269e5fa263887d
SHA1211c1b71b9d32d213963f15eb9feff1605a4c867
SHA2566f051bce2807eb86bd0a83225aeb68b549f8817a912309cbbcbfcbb36e9fd741
SHA51212373e9fe51b712a91c0f47777a5b885e4945ea8c21e3a2411546e60141f26ccf6efde15ff23842d6580102197bf585e880b7f5218161630b88da7295645206a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd56486b3d434f6fcba6b0117c3c9c6f
SHA1326425319b96aa41e0f89ece3b79e5b49758636e
SHA2568cf8035c544615cd47fe1454941b9f79d4a9b6132dcdad707d0d68df29a8c281
SHA512d1b7ac2ffa6af0189ba3fa3bd981d71ce47eef0adbc39ed94c51661ec194081d5e17499693da876c7892375414b997c5690d06e41492c29054ed23c3a87b8ae0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530e731d5c9ed6b5d36f467a71f00c2fc
SHA1a90bc00d1c95b1ff670bf48f8a4ae4c7fab579fe
SHA256df305d9534fbe3a54dd0e7195943c1194eefca8ac7c75916c19e3795fcdfeb08
SHA51248976b82ddcfffb9c0fa1d8770853d58e829f7e276fd3720f554a3bcac5440860378b458587e11eeb002aac1b05f91ce2e3f62b324447457f0e2c7311b9c6ac4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff48c9b9573e99c6290017d79a3c55e5
SHA1f6a22627c8854af8f19d254bf6e3d72d9fd7a967
SHA2569d91e919a25a87c557c5c44d8e961f0fe2d778242fcffff06b581def423c6ff2
SHA512584d8db41c0aa1a475be209c31ee80ec30e8eb856a19b1ba826d20119f2e73b6a407c9f7ac8cc79ef2efc4da126374f2ffd7bb2982a27b7d063599ec76fe5506
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cca9f9536ab9e0616e1bf26cbb4a0bb5
SHA1f42d13c4ee19f9acfd4f71db539f902e578e596f
SHA256644deafc75cafee223c555f1d3b4f6380d66ca4d3c1ad2ba1ee1b761a97d5128
SHA512bc30b50e7bae10758620b563a17a1058b88591527a98bdcf6b1fce7e277723641971fdd6f2f8e04ddedabe9080573de2d4af4797277f1071fadb257cc1447af4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53816a58159f4cef72a4410bbbac85e7e
SHA13deddc53765fba9683e7f7a81b3813ac698fd8ad
SHA25644fe27009723c891e4ecbdcb02070ecf371a6f6bb2b83ffbc2216f9f20bb3ac0
SHA512fafeb4896918a764e37b250b809518e2fde69fd2211c404c14f40c1e5771f7612aae94c672d43e1c5e9b277cedb2428a5c04abc505748fab332e338836d9acce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58350034ef9680c90ce19ecb8d4a455b5
SHA18895171d5b57093757e0ac42eaeb28b85fd27a76
SHA25694cfc9825a019d91f2358274946baa15242e05fc7e786d40db052538013478a1
SHA5123a65045609e54f5770a7edeefb9d4afc7a589007559dd189ce53387f95b44c1d2f0aa6685dbd03643855a7b682eec5316c43ad7cb02f9e3e5f0b2d8a5431d2aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d42aeb22878f20e25ba6897630a67065
SHA159578dbf48863bfa75607aa764a95593faeab3cd
SHA25699a2e289be3f264a0683b06d9c1d9a04a77e8640f307a998cad48046c5ced03d
SHA51283369cc5f57cf28b921e7f805c2179a052b46037fd2a69771213dd23090553939aefa7f3c29f64be38772bd29788246aaba9432a47c470b103f7a5cb4512bba8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d01b6274b50ef06a94d64f725ff854d1
SHA16af87c0dacd9d6bddf4ab807bb27dfe5f0113d3c
SHA256167a525869d861b92a9b4d3fb194b6046ab5df0e9c79c6a078423b39c6079c9d
SHA51205e9582f9ff2791a45a331fac3484e81a52fe82d1fd4b34b4a30c10556e2d763aa6406a363627495272bfaac62737cbe2421bbb40f57a71a308a43417c46b740
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a803983b17e0960f95da08056d003e4d
SHA1b94ff8ec5aa8c7bfb729281cc418e6a99d3cbdc2
SHA2560d3cd3afe3b5ba0e625060bf49773881df56e1abda7852842751fce31cc5946b
SHA51202a183bc1974042e52dbbf82ff90d7f0ca60a914ec795e96bf3644b4e5c79543b0aeab3e8ee2da55ab7aa9ec18b09c53a57c8422f1301879b905f7139cb98f6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cc2bc54b759839b101f7497e10cc380
SHA1e66ff3456dba7f8240aa265f5de025d008f5f154
SHA25631f10e3f636efc391aaceee79be45857a59b8d8dd5c6377f0d184743e3ea21c6
SHA512eb61fc7037efbdcd62107c171f09437e6d3ca2d09e1e7f4efb61394d677ea770e8f99b03067b04e2abaa81818e132913130fdf330a82ed5a58a20164d6abc757
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b