Analysis
-
max time kernel
134s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
03-07-2024 16:16
Static task
static1
Behavioral task
behavioral1
Sample
23015d5165b1ef40c45f2e867d46d6dc_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
23015d5165b1ef40c45f2e867d46d6dc_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
23015d5165b1ef40c45f2e867d46d6dc_JaffaCakes118.html
-
Size
11KB
-
MD5
23015d5165b1ef40c45f2e867d46d6dc
-
SHA1
e3f9e7a0e05a2cf2df44c2a390bacc6e4afe6f68
-
SHA256
49c6e4523c02d10ef304fce50999bba8f4d8026361308dddbae0d8501c1c077e
-
SHA512
27e38e9eef311f9f34adc6b41d5a8841e2e3882632a582c6eb55fb49bb1fda3a58dca765c6f7d3c43de8c548ea49db73583894138931482f926cfc5710c53ec7
-
SSDEEP
96:uzVs+ux75hWLLY1k9o84d12ef7CSTUQGT/ku3pYepFfrUMzqzFliFHlVHcEZ7rur:csz75hWAYS/RSYCfU0HPHb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426185288" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AD4FC1B1-3957-11EF-B477-E6415F422194} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb8100000000020000000000106600000001000020000000eb7a4d23bc0882f6f09165b4378cde8342cb3927ef6e4a509841867d2c84fac4000000000e8000000002000020000000c4ebd4dfa694abc3baa92f32e9a1f2b2cebcec3fbbcb82bb027d49e7c19a3f8c20000000fe68d11e4c9b9a6ff73e6fa2c182d2fd7163ed6196a5d802db2415cedd7b0049400000003045999343eb38fd816a21e3cdcf1b21e56f32ce623bfc7ea64b8a355190aa4146a667f6b913a76ced97e212b2806619486368addc6a18a876ce8e4ee64967eb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 908cd98264cdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2108 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2108 iexplore.exe 2108 iexplore.exe 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2340 2108 iexplore.exe 28 PID 2108 wrote to memory of 2340 2108 iexplore.exe 28 PID 2108 wrote to memory of 2340 2108 iexplore.exe 28 PID 2108 wrote to memory of 2340 2108 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\23015d5165b1ef40c45f2e867d46d6dc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2108 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f28125fc3d0d89e58d77690e0680dd16
SHA1646e2e272dd26c8d93bd9cc0d281ebbbd3920a3a
SHA2569a88db073f2e93c94cbfd54dd0031f9b1ccad91625c610fcf20e506cacd8b3a1
SHA512c8daa0c1a5149d702195053f4f9df1ab3188924f72a51f96836b48e00f045a1e07134a3e4efad8ee3b8ce60ee789c6cf2cad58a70efd4e6b03e458b787a57736
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5768dfdc0dd2c78312f717417251446ad
SHA1566dad5d9ff038c75b16fa4fa7bb3f3ff4bbb663
SHA256c3f836ce4222d26f9121849f707e12a423d3aac5919eef7b6c0e927717b4ccae
SHA512272aab6e94c25ee3cbe6dc001ce34e181d1b5daaab48bb0f543303bc662a71d354d43fcef6619157f71254b5d74ee68f8de60cd265757c20513d3487225f2d2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578eb76e2b633a5db142460fa008369a7
SHA1e20e1e1bc997bb01a15de2724dd2ad57be93ec28
SHA256b380fec3affaf5cd16c380f66c49e4d16de3c287496f5960bf2d68e5846198d3
SHA51231c6c73db7db742eda392081a8f036d5e84a36dc12a70bec69f47afc405b6bb8e1e7498de21efe1751950872021732fb6913ea0fcae7ee24010f18d27bcaf65a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5975da79f20918327086fc8a06dd95059
SHA189e1a44b110cc8f1fa3be95902e75244fd769d11
SHA2562cdcb1887facb972376d3bfc9680919ffe78a94f531465f95fe8fdd1104ba4b3
SHA5122923f5f481e4ffa8720fc89ecd26dd1b7be51f519419e392f694607028f5d8606df0cecd57d5c939901646865cab9a2e407c44ded080739d1704695a5ebdf63f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509169a384ba2a5c0f781ce508cb9db48
SHA1ff7bc526f57bb5b8ae218115748cf97d0a7086ce
SHA2563e7cbb2f02931118c4202f3023f2ad073f602723635f696b7336933c0ad81cfc
SHA512113057b527decc78f5e417f5c56d6a836d2ee2e05c369788e6414328f974a146575363518cc5a9d765d232e23b7fae32b2958835d160b78ca38f935728c0532b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5576d45927f3433417fc4ea7e63b7556a
SHA12fcce7c4edcc81c83731e737899b59627d41d5c0
SHA256dd4c8cab95bd5f87f408535b685e3bcf95eb76c0b637fc7a197b8605241849a6
SHA5124b438743589b9b54ea79fb6bf4a22af3a77a7275d23d7b1d2e5de9cb302c696e995ca1b11c5c35fecb045c4ba45d2b84c64573b6a74bff3ac9cd6c18f4b85324
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dbc5b9ad33342544f76179b86ed0ffd
SHA10bc4f0b32b74b2abe572e832ba5018490b23eda8
SHA2562feb7167ff63d8c081289d4667211b0d12851568772e272054c90294d76de623
SHA51261986db6263d205cd42fe6755afd292353505b41767274e4112584b89f73d99d52adbf8a2e02614d27e5538b3b897f6543cedd8ac195a348cd20a1c9dc228824
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d21a54ee747e0022d73883fb121696ad
SHA1d9553089281ef267f6a688f883460eee63d5b944
SHA2564204a7d65c55d3caf9f1fef4df295daa424d7d74cb4abcd67f9813d619237a0c
SHA512e25b96d124904a98a242cb6ad744ce177f0e910798af21e4f230543492ee475920857f04ea3924036975fa1f1b735fe696679a66d5fd43dffeb7368265d9d229
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aff48d43ab2a2d9aa12ef9a2b84b419e
SHA1d0e309d9d90d508ef29471da100b485ac205048b
SHA2567f6f35444ca88500b379438fefcc03796d1eedcb4ca9dff800c3fa07c2115e0c
SHA5128c55575d7122cabc49f2174b93f30b31f89cda2692ed57434f35eebe6b113d4a6ba185371fd30bdcecb7da338b0609d642ad36f693de85bd64db2f7cb7fe046c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ecb2e2e5ae2e1b8cbf1b8768b73f42c
SHA1eee6e90e1fa6bc64609244de2524e57b8a1099ef
SHA256c971a5cb2940a05cfd03f0c950397e2d059d65851b6a0efe1b559ebd593b9e60
SHA5128c14e3b9d70ad0948990e5235e8a6351716a2b2bcf58df3f84c2a9b0b52ac484f42089e5b4f0803d69fc42dc0c01aa97c4acc738d80ae003834001c3636edd6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59215bee941fb7b33f47b0faf858b9ba9
SHA112e69b9b5e650e61e0126d1e2885587d18705381
SHA2568602c65537ec29955075a142d8844b18fbb464906c7b8736ca9b65bcb4d7a6df
SHA512bb959195555962db53d9e0d8f4c415d5f64e0a6bf41b1b99a5b0e17d1afaab1866e7f33757a8ffb3165ad150b4a0a59a8c20f288134b7a87c4523d03474363b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e3c973dabb662853184d7cd551bc5df
SHA18b79e30f439f8d42a5dc45c54c37920aec77c679
SHA25602fd12e2bfc9baa71473ca2938769f5982d962e04a4033bca6d93cbe090df64d
SHA5120ee442390035ccd282a3c8fc58f6ff6fab44eb8ae254183f27665add85c53244a887cf90c417639b67f48bdc3fc1a539dc921909fdec6f3185b304050fb5d564
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c75f524c524a8fa0515cbe02c1f596c7
SHA13292d9fe67bb91b6d01087762e492406ed115bff
SHA2569c6909ae193d27832f60156e1c15387228cb9eb5e3c12b18cc0cac64e54b3b5e
SHA512ef76d044c0e497be2acc87d04ed4b5ef1375053272d19ef4fd74152e75b89c3b3e2f68234e94d8ca882cb9d634f5de8e42bd01e0b168eecabfee355e4dcc2c2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56eecf20236268b109359b950fcac4feb
SHA16f5baab89091cec2bfcf251c49c16310dacec67e
SHA256f0a4f241e283ff2d687f99ba99cbc105fabe11ec2739cc1d48a3e151bb743af8
SHA51265d01d6f99a08526a4600df13265b1f55715063d8149520eedc6ff151e862ef3bf82f40d4df62228440d77d010f0c040c85e077df4ca8064ee703eddbe48e78c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566b797723a850437d20f15d27a559979
SHA1876d185804bfe0e6a034fe2abca140a2f31af088
SHA2565981c0a8248a857046920b6e6eb936bc99d070904ff3e8962c891b3aba9c57ab
SHA51221f29327bf16a8acad3af0e4becb08fa4e26dcbb7971dc2a2cf0d9abb8d7c96136f67ea44a3370d4e68ad146d26ac5098017762acef273353ddacb4d66d46c4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51476a3d3a61b7ff2b333e273e53ed512
SHA1d6df7376ebf81dbdd314a68754fd26d643d3f944
SHA256d24cd55be7aad0a867a17a55f6873eff0b2c3d2b68157e9c93f21414414dd58d
SHA512231e60f5521d63a869a0b1c33c45c271965193d83425c751ed75edfd19c32da719f1902302f6a48006d78a83e80f6a13772ee73a058bd120d626debcde14a055
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff02602cd5d69cb509696205932efba2
SHA1c1d09cf26a57182a1d729dee14df851a182ef0d7
SHA256ccc956a84b0d8a0d8b6913c2a189742e560f975abc27272b773831e30e2d1d88
SHA512d0dae5e725afc88fa49c49369a908e605b778ad082297fb5c0b32167d4395d55f98316f4af581f5fefb2d6e9461500665b3b9810cb535b12f8483d7265535736
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5275bb72b140c4eb20459305b710e5561
SHA1bc756a55efec384997aca852995048371dc13131
SHA2568eb8bce59efffde779d2dd490ba7c9b6f3173c34981aa1d0da24d948908e5dca
SHA51266bc662f14b3688395ae56edeb9408462c0b6673b67d0cf141da14f7106ba4a3d6478a5d04f69386d684058920aa882272c26ded438745fcf4b0cb6bb8a4fc84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593ea2774f05921e0c4f8bc3856fa53b0
SHA19aa7d09d6b89f6f5b07ce2e43144be0ace24c1e4
SHA256f135c1bad2760ad09b8f3c362273e989472d133b5c818c53a9c62c244860dd4f
SHA5122b5f04bcc82da141c53473bd699b796ade3fa11946730c5a65f32cb41912b39175430fdf2ce4d9148371d3e843d5294c0d33c99086e6816c88aa73aa3e642f11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5616e7f3204bb226119a555c97b4de7fb
SHA1d4a713f47d2d2a9d1dda222b08a3c319a4ac25b2
SHA256a9ad1f1d8a5ec802d91057d757b5add5701b61d2d645aa102f732d4109572b86
SHA512a94319b03d48aa82db1ca8d17b51185e197a55c3f86a14bb211e784eb96775cf1ae95f56d01e7985fe9affa7b54d8eaab7d56dfd50b6e2277dfeb872e737c786
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b