Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
03-07-2024 09:48
Static task
static1
Behavioral task
behavioral1
Sample
21ea3142d917769d46564a2bcd2a38da_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
21ea3142d917769d46564a2bcd2a38da_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
21ea3142d917769d46564a2bcd2a38da_JaffaCakes118.html
-
Size
4KB
-
MD5
21ea3142d917769d46564a2bcd2a38da
-
SHA1
89e1fc74646ebb924c85122c78323c3acfa232a3
-
SHA256
8bddc5411f0e12cd7704957b55e0234bc9f1d953a70d15b1cb4a4affa81cf7dd
-
SHA512
9bdaf51b3e6246bd105ce6da528658e74c57ce34b4ea074a3ff6c26822712b413cfb59d92ca52e2662cc8d335e91981097f103b86d67453c58946a2730b32630
-
SSDEEP
96:22QASENf1fcf/XQtfifof0XNCyflYp0XzoGkfl1f9tfXAoDPQimPf5fMYAmpvf7U:22QAS/TNC4hk/DPQDmC7zSPMUPZYQ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000009ee75fb7eccdbd984508ec0c8d0c31b8dd5cb611a93c4b384c7d2d6f5da3dfa8000000000e80000000020000200000006f5a3411d96b675a3e5d7684bfdab799303ff65aae932a8f6d25b929e7083898200000009ea28cfb3752e82e0ce8227adb1926c09b34fca6ad2390aff35e6b037943aa6f400000007da044d88c5a52f655e26abba182b1895282ba90da4fe47b8a925e0bd5a2f86355a171ff645869fb9610a78d8f17963eeb21c7e801899fc5301b3ed69e1d7805 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6DF6F5A1-3921-11EF-8F47-7A4B76010719} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426161988" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e03e99422ecdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1744 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1744 iexplore.exe 1744 iexplore.exe 2616 IEXPLORE.EXE 2616 IEXPLORE.EXE 2616 IEXPLORE.EXE 2616 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1744 wrote to memory of 2616 1744 iexplore.exe 28 PID 1744 wrote to memory of 2616 1744 iexplore.exe 28 PID 1744 wrote to memory of 2616 1744 iexplore.exe 28 PID 1744 wrote to memory of 2616 1744 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\21ea3142d917769d46564a2bcd2a38da_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1744 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2616
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f41f5359f18594aef4f125963f10d1aa
SHA1adc2897625d27a03472d869aa7bc3e442d70e1c2
SHA256ac66ee8e9670e762c50e58b00d234e6b0f30b658be31418c3e34aa4ae9fe78db
SHA5125ef6c4e2754e092be0b6820a0e82caf0ba76c3cfa01d02dcdb35c0f2d91170e7754b3567e3584d4b9f074f46e266f8fec5e0d5e835f794428f81397e8f317d93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c3c7cde97cf563c06c0070673e90293
SHA135affbd055549e3e451252464a878f8dcfdd02fb
SHA256316e99e8982358a01520455668506b2abd0239d06662fe2e3639c232d05a6c07
SHA512c75e2f7cb5b3ffdbda7b703fe208df5a49ece349bcb6ffffcbbd2c6935787ed9a280f2661a266b46361ae6bb3f2a50f7d49d206adc4175f67fa0f84abc17bb8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d320dd9f8702e893f331cd4315ca849
SHA1368b56bf257f8806342d986c49a923cb89bac5e1
SHA2569996ea653c45b984390eb3b848b5249350fca117ddd69a14284a2aa91e6acb36
SHA5125a4736242d565df1350d4519d292527cb0dca6f77b102dce7c900b5cd7d7f89e69c3e6662c70862377137434cadf8180eb0d3e781cf58345bbad38c9423bc8d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc1151c5da372c1ca366104290ff40c6
SHA17875eab512e410dea4ec5824c970fdc945646d58
SHA256f3c3a1a47d2ba24a4050a048890a78cb3fce9a558a1fee191c786ed777a9007a
SHA512822416969f3fc0bfd0aa7be8d766862f2810933e2396e34a55581a88a07d7d05b31ae097b36179e5945dca7b03722385a6f7ec14a86cc438964488a52e35e0f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6f109495a76fd694ff40bb57c4ae004
SHA164a33e7c49fcd62681f270b84d1667749ca116e8
SHA2566b077cc2d7bc9beed2858e23da0899ed1d2109ccb1e6d7674463252e96e06a63
SHA5125f3b7268b62374f87aa9d63947684cb0bf7677245d647577c531cbea55843546061103ca3cb2ba489a02495662ae2c9bd8b9985084723b6fcb394452c4a0c7a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c712da830ea21a9f5c54a792f45cfa85
SHA102eff8865ec421f3e8e931819a3ba4be375eca2d
SHA256a066575e140fa6929b2d90c57407f22363ae94b86c2ac17219c4cf9cec30ab69
SHA5122775de2fd9f6459865445db1ce41f1336a3ff57e3ea39e1c02be2e514226cc10b0f31ec1d66918eed6cc8b6de3e00a883c6eda3c3cd85c3f6332c3b3f0be896a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9ac6ba61df4add19d3126240edbdaaf
SHA1f90b134877e1c747c8676e74a7d95ad77ab47991
SHA2564425c3ec6aaee5aee5a4de37deafbdc22db6a7c2ce5a3b6962464ccb957fce76
SHA51276a02a77a4848507e25ffd64b3e91894cb1835c94aff0f466027315084473eaee0057a15027b7c595635f5634343894ced72d43dae46e37fcf25990e42dc8933
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52336b1b77fdd9271b30f2eda6ea96f48
SHA1e41178d422055d3d39ab7d39e762e37fa2e6bcd5
SHA256422359b25654294a1d041906c0064066a53c33f71cf7850b7b201922c04dfd05
SHA5124e794f1f6c00cf0e66cde93f68cb9623eb42ec7fb35302fc272d0ac62bd6788999d4d75d4d16490b24e049f26601dea7aa44f24a54d54d948d0183ce9aa14d8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdeffc40562da4f20d774fa41b6f215a
SHA10872491991aa454f5e923cebb90eb49b718b26b2
SHA256e259357cd2cb9f844e406e5c988e89a23bf0fe0a5fd5fefa5d3c7d2bb1084e92
SHA5122d0a3fab156dec7055c117bbbd4ff0e626f9a1e068309f099260d00a0311afa4830f649515145c486aaef956d4174144a935752fbce92d71f4fc6ae1d20328d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e380282f1c0c852beccbf494b2c357f4
SHA1d7c4a2d39483a6d1d7bf911af677e745ac5b05fe
SHA25674115539f86f838e37a66fae2c6cff49b5361d0eb1050dd481e9ccb6af09661b
SHA5124774da8d1b26fabdc0273247a0c9351357abfdaab2de130a9cbbcff45124dd61a4c3ee631fc3a770318c527598744149ce19388d017b4ce745fb21136f63ab64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50caf36c964667ce5488bb2a237f13706
SHA1df85ba12856fa51bf7e73d7ba710abeebe86b7fb
SHA256aaeb502afe9892de617ba5d367a208327d5a412b88dead1c54c3cb4349fe8e6b
SHA512583dc3f8c68c399ea4913ca407fc9a8a1ed357993d2ae3304a1965ed276febc507da0156318d59630730c60ab13f5e0521b70dcfca128128cf62f17b86c2b54a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503a23879545340ff3020e40261ab65a4
SHA168f8a05350754f7981576a95f1c657c6cd795309
SHA2562e25f28a3f1b5e64054c1941b2349d7595dd3e3ee4903d4aaf41ad4c621f427f
SHA5123d3955903ee7e4a87b9389bcde99854bae565cf13a4ae279a353c3299ae94cf80f8cb1c7b2d505ae0a98178a7972fce2a06a0668a5fdf3feea600def9004a2e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aea4e27a4a7948eb88f0d33b75246b55
SHA16026787443a7f41a8bd393eb36b41f11d3928be6
SHA256bf0e7654f6b4d6b6c6b975bc8fceaf9bb6e44c7fcfbd25210b392a581c5f4a4c
SHA5125daf7d255476ba50774e932c01f184147928c614db73f1a5a9402ac6b178dc8011d5a650ecafdc9fa7cf96b7159132f912047a54f5c64b2ccf3f96d43a4b1bc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ac0fe2f560b20362cc72309d187901d
SHA150d299135e98e1a89a8fc85d8bd0d55f5019b0ca
SHA25686e3ff35d9dcd7d975bcd967acdf949c468b0edb99a65c0e58bd235077a46e72
SHA5125ad3ee3f2d61a20ae69ed417a55a2814d298bac70a492405139fc123ea68343b63e0d895a69f203001d9522c9897c0537e8ada16d40b9c332fc7f91bf709ac40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b9e6049a548b1553455409920fca77b
SHA15c4772bfc16d5fc6a5fec2bffb46b59c27cf3747
SHA256677fa0dd5719f87a08d91db5e1104d8974fe4b5184bca1acbc21cb45ea83dad6
SHA512c08a8f1577a8f4aef4f15c9652a9928081db9d0fa88db2773f89a7389c913ead90f31d80b7e7e8a812a85f7f018b9667b2a6a81582ee9efd98a4c26f26b06e43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be0faa37b3a81fb26b3493a70f5ed504
SHA1e789525f133fd9adb9df0bc4777af2193aa8ac22
SHA256b86b9c162920e65b20607c875a55f3018819df2ec578683849b28466b4d200ae
SHA512d0aafe11454e2b432a8d86c1166fd55eed0c9d13d833e0c4e306802f08d5e002fdda031034b2a8701169fa6b9335c5c711d678528c2605bd407262aa2920d38f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599abd6a5601fb0d5429c3c32401774e2
SHA108ab7d4a7f27a9a145025312e3f85d56f10fb51f
SHA256c01aca544007c6ef9e346c520d96f42bc07b0da9e94b49bc2ae060f8b63126ec
SHA512a3dc7226e1e0f7a517e561b4d1e77532b08a481a22f9340a558b018730118a28642846d3c46b049e605796be95d4463b9df8950f1b350541ca49e5e203df6bcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d41a6ba2625ec52b65f1775297afa3b0
SHA17165c96d49685df47480f25ed2c29f93d38bc652
SHA25693d3b2bec76ab93dba0834e2ec9e581243559dfae5bebf6e6baede1200520588
SHA5124a81cdb9acf6c10f2537fe74189d68137d0e4dceef5642bb59a85c8261d6d3db2254684c3cb09e1060d5bd277ba1b61ea979ea0f6e2db29ecf52bc80025a0a0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5798dc51f6c972158f57254e42e04251a
SHA1389ce608ecbab97d1e8cc6210e5b791f8fb38713
SHA256f040a889466f67d55fecbeb0de174940de5268b47d725c784bf04a7a8426231c
SHA512a9144974b8a7bc44911fe37b38221a3519ab4f2e80e4239cd8ba9ba9dd3c62458caf3855a763e151ae5afb53f56d4caada8b66f740ef1f4515d36822714dce25
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b