Analysis
-
max time kernel
70s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
06/07/2024, 23:11
Static task
static1
Behavioral task
behavioral1
Sample
298c1b026000e4d3cc43a5737a0caeb5_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
298c1b026000e4d3cc43a5737a0caeb5_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
298c1b026000e4d3cc43a5737a0caeb5_JaffaCakes118.html
-
Size
53KB
-
MD5
298c1b026000e4d3cc43a5737a0caeb5
-
SHA1
2cb251b8d8331be69588f0f0945e7955db09fcfa
-
SHA256
c0226e5f4aa5c55c20657412176886e8a7fd913374f42a0a29c12d7e30006e7a
-
SHA512
64cf4676d845d62f363c39dce8b001cf898ee966a87ae3c9fa246c2140f9b5e6f8a0d8f17e2940df899b2188d607e648672572412d0820de4c53539f8203fa34
-
SSDEEP
1536:CkgUiIakTqGivi+PyU6runlYK63Nj+q5VyvR0w2AzTICbbZor/t9M/dNwIUTDmDu:CkgUiIakTqGivi+PyU6runlYK63Nj+qF
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426486888" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E27745F1-3C15-11EF-9A38-5E92D6109A20} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8025ddb722d0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000930ed985b08cdd4cb38e38023150682b00000000020000000000106600000001000020000000432c07efac32edfb6b211062f109f3486b2ff07c404463a6e6ae7e550cc14528000000000e8000000002000020000000de61e1c5f6f63c508031b37ec894a101b513e6c8d1d00dff8014f51271fe6eef9000000034075f1fd89108405ce3ffbdb14f1921a2d48bb3a49ac950ba88bef72aeef91f24cb4a01c82d6e0a6199af30ceecac26dc88f5cb35bd6637a3791ba96b4075c2eae99c56f8a7b1f381f370022e4e5513a63b7f12ba9253d47514dbc1464cdcb9a474838845ebb16d226dbafdf79512374e6a6837921b8caf7f4e25ce89a401fafb52bcbfcdb495284364ce19152e03c440000000f21f1f8ed42394c5cf89bac87a6a7742e957ad042fa2b9746ca1575b9be8c1d45af6515ef89ea6fa2d61a99d80de2cb30b8c8e8526020de87e8a54a5c22aa0e4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000930ed985b08cdd4cb38e38023150682b00000000020000000000106600000001000020000000ea8c58dc9012a5112c0ad57c7b9c8e0e8af372767e10eed4c65339a36dcae300000000000e8000000002000020000000f13c72258c76b4f6495938f9995b85447b63e55a9d202993795e94d7b7137b27200000003ed34ce217c38b18e0f739ea2a0d146c95ef896c4395f5cd7725522cc8d8f7934000000050dfbbcabdd857a029e93379989c46b695bcd258262c9df03e0d6236b33b0b2ad5b395357476961a50fed75b8c0943c7da0da9f5e2590a835e8d6180c320d3a3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2084 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2084 iexplore.exe 2084 iexplore.exe 2260 IEXPLORE.EXE 2260 IEXPLORE.EXE 2260 IEXPLORE.EXE 2260 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2260 2084 iexplore.exe 29 PID 2084 wrote to memory of 2260 2084 iexplore.exe 29 PID 2084 wrote to memory of 2260 2084 iexplore.exe 29 PID 2084 wrote to memory of 2260 2084 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\298c1b026000e4d3cc43a5737a0caeb5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2084 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2260
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0a58195fb3a9579f9f42d9e736812de
SHA19eef92a984539179c36ed41165795a10d5285f94
SHA2563b83174fc9bd320787143cdfca8c99232935c37c2a8fdd5464c411c52862858a
SHA512a76c0e76f6f660687db62b88566380fe454469d1eb1ad25c359ae61309db0a02efe751b09f5337959fe3cebbbbacda620b16702460d4c8574815c27ec2d8acd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0e673a8a7e6ee9f79d21eb5cccbe4cb
SHA1009aa529d96f3f377d632e8a1ddd642af8a0b062
SHA256855a89e4a62763b25c7239a03742b201dc3d7b96c43cb535c4ce7fed0dbc6837
SHA51259ec83b92e2f84e0733557c92c3e66561e521b939222c676e9c1afac782c284304999500db21d93b120a1d8cf5be5f6630183ae7bc9b61fb1b13c34af469f22f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d835a40624ca228ea466c94dc1fe2a9
SHA146d01d65236451d60f058f9caddbbe21415c9ec0
SHA256a9ab73145aa1e6003a81d72956302efa321387cf4d6a9d127744cd4537f43b2e
SHA512ad79107b886db00d918caf29d2cca1129879c2b729c0000fa6c6b1de1df4d977a100ac2c19fed0a656f9716760cec48e697cb400bcdc17277de909463b4a1d4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59be670972499aac2ce34b83593d300d4
SHA1c7c311c8f8f9510f6a45ac7381c7368005acf909
SHA25611bcce29a593c0f551f2aefb597a2abffaccb07d0febec969f0b3ad789259b24
SHA512d26704426fcc15ce4daae4a6a595298975aa9715c6704a2ce240939d6477c8efdd2673735e99c55f15eff88232e097cbac4a9afedfde3d8e83b12bf12944f3f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a247c31aa1e960da2cbc4ecdd525c79
SHA16714e68b91e86f1c6fbac9860fd065b3fdb4470c
SHA25663bf1d4e344a66d49757042f684120e2d4385a257126c676ca113cbdb097864c
SHA512d2feedbdcdf40e960fd24666f8de723af7076c9922fab8320b4576296249d60f05d1d42ce203f03a0a1bdb871df62d5d45ea44eec185c540695073e07da2fbc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdce93d850a8961baa90d0a473f4d0d5
SHA1f3f015651377db472d551653b3dd6c60919aad85
SHA256c23dce3dd0b61d0c8006a772caef304aa3e4e7125762b602d473e545808af87e
SHA5127c20cc9875ca4090fb036df10f60a2032f79d59224834f55e7779fc349b27b8c4de110170ab650ff3ed2f6885139008f13acf5dfd0e90e0fa104b310fb9763d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554c9c8414dafbfc7040cccec73ea7f27
SHA1bd45e325b682db839e4c2cb6c618ca9ad7fa0329
SHA256e4c2007d816f064092123ce0e27695bc2e32cecf82a6bbf81821f1d5799aa240
SHA512b8828fb68554722222cbb3ea564c9e49d99c16346f62c3aa31857c216f579bde381a5da68e9610c4b84441b840d225313d0dd14b725a980a409e97626bbee3f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5394ed5ea6a065c7a0870131ae45336
SHA1993bed08aedce1e069d2870859fced84670da471
SHA256549fa35af5957f0bfb0af8cdfb8a7b150065596520e98ac2a334188a1e89e5e9
SHA512e6204fd1bacb86b22bb14b41f9cfd2d06af5eb241618fa86426a284d9577394763741ca09d754ca8397a80af03bae72d87fc96ccee2238d5064bf65789302376
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504ce24041c3c8f5ff3a9497fa932612c
SHA14dcbbc5920d870b71d50c3c3b01d622a173728e3
SHA25698e7603db9b640da3fdc45aadf94fb1d837eed1aafbe3ae70619c04bc09290ab
SHA512e3670d2e2faa166b456b98b1ee0a97e4de1a62951396702db13f5bccb71a41005f37ca43fe85f90ca37aec126e3aaad950d3717ae13708264c831ff90d62f066
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d83bf49be18aa64dac2e09d88ab9aa59
SHA182711fe0f6962178f55c9c4bb9fbcbd4e4bc3d42
SHA2568afc7f3d8da537b068258fe295b290c0d518095be93c7f4d07f8d70bcab9db88
SHA5120538de2749b0ee1ea10bafe7112d7ea06d1094fe8124cc976d8e978cbfe39490fcf24123cb1a17f5084474e24dad9c44f28201873a9831c2324fa22718c83e22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50677e0502cb53c6c998b730fe9b68ffe
SHA103ca073f5bd82b566505cfad333ee7294cfbfe92
SHA256a5c75f6bf009e450dd880d3dacea9c7e066e292d6cf0905bbf2448390955cec8
SHA51297dd1082ac8bf646b978a2bc42607871ebb3b6a19e1bf08f9e661d88750911f024c0955325882c0f198bcafa424cb38d60ec3dd4af8b6ac8af5d98031ed815d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5322855b1299a68d85f3b62056d7838e7
SHA14eaff7174ff790ce54bd14339e833e90908a198b
SHA256eb3d31715bf5bd181559d00aafbf669c7e7cac974f264a06ab4bc462f2776f95
SHA51241f61a813f31d7f8fccec27dfc08f5d314602278ddc5b883f8aa742ad0d0314e94149641a8b2980ad48451ebf6014cda69a26cf259e23f8383bb5ebb753098a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7e8e1ba7ec9a08f4e0989318ea846b6
SHA1963adb777aea3da0956707362c4ed80779051e56
SHA25627f7caf35893a629081b98406e609fb3ee62c7e1a2d638b6ba323a09bde82ba1
SHA512fa22e356aa85b94eb614cf386efa9efe53fa8364efe1907dd8ae5e3251ef5dd387dd12d684cbc4bd2e4d2a9d0289f63c7ae64794ef0b7567e9ecf83dc7d908cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532b6ea243ae8a0c5c42f006bd8dfdfe5
SHA16834110b001ca423c652eb1677e6ddcef213fb6d
SHA2565c287db4beed74c5ee93ec12a5403277648a46de36ea56c2b9293d7795e97f08
SHA512c981a87e309a769b52fbde468dcf843e70970b7bb005e3f610ced5e785f34b26383c63c6e0a1aedfb94963aa86d3fcfd423277779dd7b27da9401fe4c193c46e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\KJ834MBR\wt-logo[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b