Analysis
-
max time kernel
120s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 15:13
Static task
static1
Behavioral task
behavioral1
Sample
22cd4ed3925b66fe3b4e8630edd3c6b5_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
22cd4ed3925b66fe3b4e8630edd3c6b5_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
22cd4ed3925b66fe3b4e8630edd3c6b5_JaffaCakes118.html
-
Size
10KB
-
MD5
22cd4ed3925b66fe3b4e8630edd3c6b5
-
SHA1
d5e4bc8354ec03f40eeb86d7f643efd0f5cd708b
-
SHA256
45e00993f99c756a7863974da4fd2328876f58c3cd95a12efd831b8f239f5abc
-
SHA512
7b707485a1662542368a2781c0f99383e22acc5cb18986833a414840e8848e43a789bb41c398dbdc0ae7fb4d1e11f4be5593e341a1c35f849229dfadfaf38932
-
SSDEEP
192:l2FKpwEoixo7tHucblU0SI4vAUEioVd53vYemHiM6yat:l2goixoRHlUlAUyHZfm76h
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006e68ff08a33f7d45901df87ca69511bd000000000200000000001066000000010000200000007da39ff8d4a4338fcaf0225a1078423577686d5f6a95e2bc7f42638a479bb111000000000e8000000002000020000000844d19549d018e6f922013d2530af567f8b91131ce7271d3f90c2f720116aa2f20000000dd04024213a1a69d24d827e4191724f6983f17297b6d595d92a52ab8f3466bd4400000006cb63893727965090a3747e2b63fe83f86141bacc3687a9d8fa01a630639ed553c8a5336be0988a987c4846acecd74b49601fb90ef17ee18cff6be308052c39d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0492ad961cdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EAFB8921-3954-11EF-B012-52ADCDCA366E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426184103" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1288 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1288 iexplore.exe 1288 iexplore.exe 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1288 wrote to memory of 2716 1288 iexplore.exe 28 PID 1288 wrote to memory of 2716 1288 iexplore.exe 28 PID 1288 wrote to memory of 2716 1288 iexplore.exe 28 PID 1288 wrote to memory of 2716 1288 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\22cd4ed3925b66fe3b4e8630edd3c6b5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1288 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595f95509b1bfad2b3de67d44c12aceeb
SHA120cdb998c77404e640ef243c9b367812f33a807a
SHA2563ca5552acbf6c6bcbc88bff2567f52a8215c98698deeb6dede7afca153b344d2
SHA512df05d1a57dc30f5104b1f52f572d9272f1c1065b8539f276f7775a8c6f8c3474bf96aae5103151913601b129dbe3058fb57b396c2b175e775fa0e0d76def0b5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e7924d2366aa975f2f81d53d66bd079
SHA14b3b4f8005998eddc64dcee8502d72cdbc73e3e6
SHA256fc9ab09e7b2febff83551f698f16189add1dd5183ca0b4718a90a4afb6d4c216
SHA51261b9b2e85b78fcec7d775c7ae7fc812daa78f83c5d011f5b7406cddbfc12a708874c9bcaa70e1acb140f152229a02e4e5f3e0724b11066e134faef3fb1ee2351
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a4c5f62819cd23fd7431afd2b96129d
SHA11bedea090696b2559b14690b533f9fe696ec8dde
SHA256c698f7b3522a289dcec16f003fe14f6e7495ae9644ae0ae06a9dc8bc067e4405
SHA512ddd428efc792dc17ccb879a942f5a943c5b719dfd84d3a94a6528f38b8c763216b8a2065bfcc3cc65d82452abc73aeb3ff62a22231f35092b96c226265bf80b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7c504890ca6d2ecc3168fefe22fc511
SHA19fd153ff4f64c05a5cc709c0aea94922c3143faf
SHA25648965091a96da329fab77b5e802650fe3b229cd8c7ce7f257ed63e646bc09a92
SHA51202b0b0fc847a5b7ef197048caf4860c52271a7d1de2d5424455ee667b70952ea0be9d34d8879c3fdac1e699e65c0b85b330c87ef2c68d9a6b90e861a75df68c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7ff34e01517bbcb3ad071516461e2a4
SHA141c9f8601ffdefc0208821cd523d86f3a61de7bc
SHA25684cb04b29cef560feb90879d57d82b329f9d7c5591daae37dea24b0e4ef0a9ca
SHA5126353ede52a1cd5dccc3300ef1ac8eabe1f00089b31d0e2d27ae8bfc1a7ea4062cd8fe52b2e1c7327217466ac3b04f3fc81137de13ef17f5cd345a2780b0c799d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5922340237033405681481112b07f20f7
SHA1b57cf40af099ca1e7ad725f7bbb77fbc22f5211f
SHA2564f3111e86b6e40b29edf499543ed843ecb7f5d81b73c95aac17fcc2b0344ba9a
SHA512e0bb1ede8c0986f77460c33402160cd304532674a94c83b1001dba6f59705c12e2cf57b02ebca0da23858072249f07ad39de64e1b1e4e39f1bf908aec0dae02f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e4a4e57c237b63412938e1407964969
SHA1ee0710b3b4878c54526933a6e3a3ff8d9a745aa2
SHA25647296a061cf8744b84d62c5d2044126333542137d811a70f9f9d3fda8ea6daae
SHA5128e995bb843b899a32da3332db24867497d5135788e9efa18e649ffa919c8925c6514300f794128f85665d1b76104b1ad1e38b6f73218f5735f4ad71cfbbf18fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5361f88521da2e829e967b9887fea44b5
SHA126019cd1b5095525741f192f3d847e2a60556cd2
SHA2567880f498dc858da7813a600a5a0d830c5ea4e992c73309bbada7d23b9cf46f33
SHA51238d77328a63f2ac9f694e7ede12b6cfe712c3edbabe419269a35255849fa16b10b40e9a6ebbb77c8cea5433f608e9d6fad8feb864476658f4c8ba94bba5ffbe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55af3ca9b45f9e14e776f23d6cb7e9775
SHA182d7524869ef228628e5a491f1b8200de25dd063
SHA2564c8c79d37eab5eac98b2f105306d48c465cf4255d838a264c7b2737e835145b6
SHA512e86c5cb8301f5f177772e17da9d8d8a7614c046b713a271801ecdc6a74156a02c7fd68a7a92562c73f7c8bcf32fd3e68f496825a2cfbf437e7069708bd6b17dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500149c29ea1d58772b324329dde79d97
SHA1cd7813b8026d09fb4cb12a1865dfff0465ff0006
SHA25604b4f66613eebfe9fda25cafd2a45ed7d9572a6ea200cf62c0ac3c72defeb205
SHA51240e9799757fceae05e7fd31fdb81a8d8620c1bc1aaa0fbf89ef9e81076658726bc1b241f1fd0c448b64798b755902fd9adeee60beb6fce823a725100c9c9760e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fb19de7c24d8fe7a968973d935c28af
SHA16b5c8b3820ec38b7787c82da14bc0ebdeffcbcae
SHA25629659f27f4fa9abc5751b1ca07cea695dedf008ac9ccb7176337104f38d6d8f3
SHA5124ce7c1559d93282358ff40f84226134bf4feca787bbcb0e2554996d96da6b39e550172da96bcacb8d4c7eb54b6b62484a4fb0d19b00ec93970ccff63353c125e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aae0a5827cab295953967699e2b1c603
SHA1962446c2e485d0e9b7bd0b3c75031a19a5bd5ffb
SHA256c85a7dfc8ec983c94bd15430ccb9ea0f6d70e69bcc82558edbabcb9456de8a9c
SHA51219cef2815f6fc09961aced8bc5562ccc7c3f77f87f8314714f0c06d6146ecde8f5662c4bf4ef34a992c0386510a750d4cec5602669510b300cc2967a54b76929
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50336ed90acb03164aea8b35beec69f01
SHA18f59a5ae617fc3d83eaee3e7b5adcbce2a320d6b
SHA256ce1c7d4181e08323690a18d7a7fa32fbcb2e111ff810fec48491c59d404354ad
SHA5120118c53578f89ed18cddcc21cf17922ad298b1cb2c6d4e908bdbaabdedc6e593c4cab04174061f87178a0603c5ab544af990e4b06fd69ccc9af0c06bae915104
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5a49373b199fce08e14ff9b06c9baf4
SHA1b347b70b7829d8a53f02f7aa813ce5110b9ce3f3
SHA256460d52ea3877dd4d1ddc1a5df363f050557871af10cee06b7ea3392b3e5c57cf
SHA51271aaeb707e181937119d96ad36284f17baebc0679e26e06317e75b27049587638a5b2cfe30e813707c679ff5de70f0bcc3fa997106f8e4e7485aca9f692f6bb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f7392455dd01412d01e878f131c1870
SHA1be4f5f3befa97b0490cd5fcf48febf6d6dd04864
SHA2563c1052a11eec026ccab226697652f2ab3f9dc5eab262b67a1016f428a9abc954
SHA512a59d301e718ede5cf036f861f7a5cefe2514ff8f8c91ade65b3665fddc2ac28be9969be623a01037ed957b37a95ba1d5d9cab40ccea25447d64b422b06826831
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d56b2e368696ab05f33b3a93e87ec388
SHA1f12d0bc3151165ccebc203c45bc454b6af75534a
SHA256cc2e2f1c255a0319f5fb98c8cbca47583060c371ca9ac087e0dc9816a7672bce
SHA512980d723e5abc227fbf029344a81ff06a8307257510af86e9ef713c4574ab9d51c572a19027e0f17312e63459bbc9cc60da5b6f3a15bb3f98a47e2909d9f5690f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524e7f0bf96917ae712c24ebbe37c0303
SHA114624ad37512d85e9d0da2ed1fb6abcc63e7c2df
SHA25641a2ce7c1feef5627265ceb683d67a2f6d4a30a85e0f3fadb94d701700c74d04
SHA512108cea5a1b701c875986efdca84c7fbba2d378202b88da83bbc860a359e5304914d22a81a6d15bb4d9ef3548547470ea9e34073954c619e5e52f018390a4f243
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bf34b9f90b7dc96a9ebf9e125797601
SHA16278028638999f686aecbd7910ad4bad7f01393d
SHA25698c9f055bfb9b9d56ee5ae6ff3b7e5834d9939bb3369b183a23a831242655dbc
SHA51253b1e491f6bd9c08f4e21e266515ecefc3cda686020a36cf300ca66b3cacc159b41375a1363341667a8e47bd13f81188254ab3addbc21f550c6260510efc2535
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556548fd686031b9513d71804d73e3a93
SHA155fa4f7863eaa3205b28540b45738212bdc3b2c8
SHA25680b1630e9e245d77846cd0bc0f8aeb482469b96c508931b23d77208d082a5e0d
SHA512da6d75f96a60f6c253c57f2963e944c3475846a315b864f322dfa327a41be17fc6ff6d80f2339e8a10dacce85b5bb860fcbbd18ef2713262a5ffd02f6a9acf7d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b