Analysis
-
max time kernel
141s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 04:42
Static task
static1
Behavioral task
behavioral1
Sample
211b6168ebf58c57940fe9a210ca4139_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
211b6168ebf58c57940fe9a210ca4139_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
211b6168ebf58c57940fe9a210ca4139_JaffaCakes118.html
-
Size
11KB
-
MD5
211b6168ebf58c57940fe9a210ca4139
-
SHA1
2ae5ac006391f41752fbab9c91b1a99378f8d2ac
-
SHA256
431e4a3a9c71cb61f2124f6ef9a603e6aec2445e612cda26d4a2c5ebd8867594
-
SHA512
a08b4065222be254429d39a699baec63c1e62e38cf98d1a63dfac18dde6761fce84724e4a0331011a291beef86ee1a84d5b1c756f0bf5bc0d8a20f2d5adc64ba
-
SSDEEP
192:2VslIsr03lW8k/w1wvqyCBKRnwvC47E018LOXuBuLbdU8d:sslIculm/gcCBKRnwvC47E08LOXguLZ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a03905000000000200000000001066000000010000200000003957cbd9c8518d58ce76820a099773cad088da85d737522e876cfe51c74e3cde000000000e80000000020000200000002cc6714a00d7c4621d14af41de8d6e8633f9a6aa5213e299377ab03a505ee77c200000002d6a973460eae9ba4acf1cb80107f1254e5ad8cedfdb6b2b8caddf74e0f61d6940000000664fc56f75fd2e3728f5c267abe4fb4e26cef41c2a51f301ed0d69a1e0a7ac3455ac27ae0e2a36dc552adb54ff1de4eb5e09afb018dcaa2c1b159c30f6ed53e8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a01def9603cdda01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9A44D801-38F6-11EF-964E-D2952450F783} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426143595" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2072 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2072 iexplore.exe 2072 iexplore.exe 1076 IEXPLORE.EXE 1076 IEXPLORE.EXE 1076 IEXPLORE.EXE 1076 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 1076 2072 iexplore.exe 28 PID 2072 wrote to memory of 1076 2072 iexplore.exe 28 PID 2072 wrote to memory of 1076 2072 iexplore.exe 28 PID 2072 wrote to memory of 1076 2072 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\211b6168ebf58c57940fe9a210ca4139_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1076
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f933af411f6b8f4a106f90699af1b9ea
SHA1c948ee640ec3cea0f3d1dca24e902779cab6a9d4
SHA256908c57844b41ee41785463afc763336c711c314fd27fcace843c4daab78aea4a
SHA512e6b489ffa57bc8502dc08b9492a9fe10cb5a2f0ddff02d65bff2d88b27004554bdf5e3eed12eb17bd5fdfc4aa34796e64ad8b4fa72d24fa72e2b35225221665b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598a497a0d648f4c542ee4d208e0642e6
SHA1c8db178bea7171baa090a5e65abf400ec713a1ac
SHA256258710f4c73d7a1fd588fbb1660a445d3092bb50231fd9ed93c1cbe94c47e147
SHA5121803f2baf0b796c2cc3956ec461997ef796ac263e3daa3d60176ea6571624d19d126126e1ed2f0938f0dfd3680eb4ccc57b94586568ff6477ec09c53bafa3fb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5c38dc1d34aaf2cbd143471f29e3d35
SHA1dd17111f80c1dc4727749f51c73b0cfa65730e86
SHA256770dfd2a4e722818f2893405a5e82a539cb531b8877596396d7dadeded5c19bc
SHA51232baca99d939676616492a4d9d309ff66251429376638149f8b026bbb3398e32fb831f5e9096ab58e672a675e98276346aa63ab260b1e118daa66a79ce2f21c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b439da43dbe79b366e15fe04a6043ba
SHA19f11e55afc82f93fa9e27017aecafd20ca18af51
SHA2565a9a6e59a06b157185e81eb8067339736d6dfc87817047309679e52350fa7f89
SHA512273d0e1858bd3cc91e063a8ec786fdc79dd7f0edf684781ca770a5ea7ce36f3fc5b174a344f7da39a8f23265e0bc55644eae96013b76d290e4fcd3e21a135769
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ba004312a4db4bb125362fa77777bd0
SHA1550606ac9294f225bc3aec9fe94672ee3d6120e5
SHA256fb7f4c503c7b220c1da753957fbd5d4cddaf06365fa4848f7519cdf46d6ebdab
SHA512d4eec3598688687361161f63ecb1ed04aad08af5d5663d8f44c960613610f81da56dfe96be96836b8ad8367bdf8941d521b12196d9b72ffed1903a8aa8bd35b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530b85b304d7dd0692a946c546e905e2c
SHA12e2493f39f64f5875c998143077b72d705e2da6d
SHA25638f69e6c1630963079e29815831fcc8da4cc1e4f9ee89af8767254324e99435d
SHA5125afe75ebaf22e72092318cc78813323787d78f66ba66b8f828318cdd556f862034c5bc7fe6202f630f9ddf2adb02ad59862c4f13b339163b1202879c7f1f368b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab2b1afa726917fc05b33c8756122671
SHA18415fbb4da04c671510aa90f866c0b968c63dc27
SHA2564e588fbda5ef2ebdeb328f708422522d2d8c181e88ac5c45cecf05541ca80aa4
SHA5123e0aa52d23f1592c4d4fc96abfde8194d714e3a00cca81b7eacfa5772f2a7decbde6bb96ea6487df091564293cb2edd8e424244f4b1d4766c372496d0bc79f98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c07774a3f2497fe2beb4112806338f6b
SHA1a3cc6407c9f41fa4c0f6c2d315be2aeddda2359d
SHA25638358239214d4fd9940366ac11605503b35a3eb5bcdc58cd94c1a0956c23dbd9
SHA5126a9feb6dd57eb689ef2a9f95ad787c7e0db38bd4a0677af3502df4cfcb5f9f73184335eee3f1aabc2f45927e278d1b210ee27e10122eb55d4b9fa06a19306fd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58749cefa8bea04ab5de005adc6dd9cde
SHA14309fc8c3910773cf6f3b5b6ead17d348d92770e
SHA2563c9e6fbd6b775d4dec713fc831ffcaad8db2bdc332f75d97bf0ac99783b45445
SHA51236a96d6a5f7202f5d7b1529da9e3e11b2e889ee27184f0a66967f47f8c01d7e01407880e31cc43d765431de223cc960ef5ebc962fd0c6757c1aac77cc2474114
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d5fbe5984ebe6a4e18112eb3884cc1a
SHA1a755c2adc444e6ec86a87fae9a180e1987f48695
SHA256349337b19b72cb418b57707d58a86b66b88850b24cc4f6e3b70c0c537ce184f9
SHA5126a50e749f893508444c2455cdae1fc22852652dcf06d9ea04c6e2bb8c191931bb6faf42517c16cc4c9c4306d2a039b862af1b84909d0a53e896c6750998c9b45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544355bea6bebf030f504cd0d9ece5d77
SHA12f6bbf789174c9010f1956ea134ff391045f78d4
SHA25634400e59070fafd18c7cb2ed29b0f7ca8be3f96cfbd361850ae9a764682d2bac
SHA5122f4267437300f3b7fb3a8c466485b799ed0219cb450c831bd9cb31e96532d317b12d6a37e5b178ff7798abe923a7ebdbef1983ccbec2d8bd1bf35e3ca9d49793
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1a5380f83823dffe453c73a88cf2b2e
SHA1b0d9b24a5419623034fdf42f49cd72785d4cd0be
SHA2564b1899eb1e57aaba7ab87ccaffaf7d557952fd9ba6194415c135133ff35e08e0
SHA51225d4fea15b9d79a36fe5f99695c45298d863ed1d2369ec2bff06b1ab43ae634b0c946d0f267bd2e9bcc94fad01be9a714bc6c117bde5a63c93e4a3cb6a8e59af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554415f35b61df3e96cb2fb95bba3a2c5
SHA17cad5aad58593eeea4ffd859d4d8b27b0ef00ef5
SHA256f73b46527dc8b77b3ef886467a0b8243dda515c1cd3837d8c5d0ae4143ff2220
SHA512e752e0f680f4b2bbc9d44fe57128a5f168c370ee7b5b0690a0d4cce2b519ca4b02d7bc8ab9aa6da8173bccf91b287e7b1920249c301c66462c3f3f952f7c31de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cda9d46068a8e33bc28b6cb9167fe3e
SHA185132ec26b9e79a5df623ff00c0b623e6fd30cbe
SHA256d0421abfe995ab02daef6a8f25b1dfdf28977647eb0eae3db62d761ca52ee1f9
SHA5127aeb5a19b2448397ac2bc429fb9f33c4fcf66a3a8e566c71254733a12b6042266572b64e9f7b740b4728350a260a2a185a979db184a4b0087b78ad9a4595e5d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3b323af604862e272067d9e38b1c370
SHA10cc6e83ebef9eeb36e8169c124dfed9f748a9d1e
SHA25656b4aa6fb449f03887f06325b8241c1d4b8f64f9438f7bd8d75cb7e67a87ef31
SHA512d588d155756eba5d6b208c2dd4e5745e0598d0cac967c8b6fe959de48325ab3116ccdd3d45379ae8afcc2bf461d59b18348cb6b7e7e19431bafe9f9a1ba25b80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595662589d7a91ab4b5adced6d5709931
SHA1581a0a1a2079019652092738470875260f68eda4
SHA2563ecf15a5a0d618faf32a85732eaa3c7ff4b283e5471b9870960ac0ac93fcf77f
SHA51216fb9b11b127335359503d7cf7014a0972c476f02a6944f85b2d827bfe100b91cf3a73270c4f3de29b371187902827ce7e4b4ba252037667f81110e2467b7033
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5ee1d6c266a4e896c0d08ccc1a005b8
SHA1ae7e72242cd8fcb4104a4773a731ec39af1de694
SHA256574289bef3084e324cf9d3a3783c2ad1fc13b004e46315233a239d7b4b3544cd
SHA512f9ab6f0b244e8368453f3c7ca02e974711d3f7d39a35523996a905923abf9723d07c762a5823d888dca4aae2b629f615775b507fbed7871cdbf7d7a3fb41197d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ac5096515a70f1123d147284bb6a3a2
SHA126b1931becbc9f0cc399479f63bb126c057292da
SHA256652a5990b6e7406d3aa514b0fcc21592d232fca1b465c5bf21bf4060ee37ef10
SHA51241224b50f93028e8bb2b30fc09d96749c7d9ffddd4e96685cb9990d81ecf8a799f48a9e90fa53f197e6b7bf29f4e1956a4b10c4d05db4512afa2af2a84dd05e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e98d9acb47451ab4f332fe0fe909fada
SHA1d74506dcea3c2453a328d419210fe159b9e5329b
SHA256ea4b4427694ffcf2acab8f0b3db5f26ac82c10b58b4bb4ee65f654d6158939eb
SHA51255dadbe9a19059ef554b3c2a856909c0c3449a1d9e010f14fc56e1612912230121a571f4cf08140227134cdcd4d1f7a7cab42e6b4f1e2993108422df63c9fe9b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b