Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/04/2024, 08:47
Static task
static1
Behavioral task
behavioral1
Sample
ed067525adfe295da89ee5569c516acb_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ed067525adfe295da89ee5569c516acb_JaffaCakes118.html
Resource
win10v2004-20231215-en
General
-
Target
ed067525adfe295da89ee5569c516acb_JaffaCakes118.html
-
Size
12KB
-
MD5
ed067525adfe295da89ee5569c516acb
-
SHA1
73940392a55cf2316a5b29466ad0f83dd486368a
-
SHA256
93ea203615876cc7f928bf971af43884ad7de80ed1d0255b93ca1ca8289b889f
-
SHA512
5a232abfeab5fc0b6c0a746eef9e821b0c6c773d53b7b349e63347d52adecec9281c2634ee9b0730055d57f953dca64c4ec11b0889ad36eeabfa83bfab72456c
-
SSDEEP
192:YEb6NXDyQH+lmNrauNsnZ0leWrTKLym/A0CFyPbchdY:zb6NXDyuZdNsnZ09fMwo
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000001438a36efddd66dff5e38e6676b7d8720a95f1d37a7d487cc7012d9a84cab31d000000000e800000000200002000000078369a55f930934acf48ed9e00f7e2644394b8a48eb10e7fa4ff0907964d2b4f20000000b8a6614e72970ce43f53c60ed306eb7428098652247fc3d2d6b6d9b91bff972f40000000832b9049727358f9b833f766c2b8bab0aec39958aa94c1f22629b32a2b5f865bb4cceaf2efa0dfde942c6e1aac9704d1e28db0dc439af47b23d3696b853afe7a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1CD0B171-F7E0-11EE-9DC0-D20227E6D795} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0ec1bf2ec8bda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "418987110" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2196 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2196 iexplore.exe 2196 iexplore.exe 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2912 2196 iexplore.exe 28 PID 2196 wrote to memory of 2912 2196 iexplore.exe 28 PID 2196 wrote to memory of 2912 2196 iexplore.exe 28 PID 2196 wrote to memory of 2912 2196 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ed067525adfe295da89ee5569c516acb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2196 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5102273da6957dc8067c124bdf3d562a9
SHA1325bd3651822cc5468925394d16de0e0a9290cba
SHA256b5c86ae40ec03fa5ae496fab0c64dc1abba9eb1a127c30d0e1555eec0404937a
SHA512aef8262fccd086f8d6caf7b41839a169662ab5f82cd15b92613f6dee80e1ccdadd18d329c311a884cd00d6127504f7ae3775258c8c8a877626c1404e211ee587
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ddb6c52a706cc38f6082a9faafc9ad6e
SHA19e255307d352cd94b1fcf9e8e8440a1251175dcd
SHA256a4970b2b53c873f4827e3338fe70d7921abc43bde472fbe306e78391eb35e3f3
SHA512699e2836d78199be4a9cd1731d517fa806e56168816fed714fe650ca751465dceed3bbdf65d912480196c969ed85417611796e233a2693a37c6a86079f4ea562
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5427a65200e417a41ddf761d7a5192dcd
SHA1aa00c8ec8e6dada28bca5470bd2d3885fd8b93f0
SHA256d6fd4202a56cdd956790b64c047bb7dcc891eaa2690dff376969cd85eed140ee
SHA512b235e314ad523205886ef0b48720e70415bdc39772f12948fe03fecd855fd2d28451619a937def4cd1c9926bd89c89e3624d733fae3e261ecffb7f8fb920cef8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a185996b2069a4816ba9890c7e5e8be0
SHA18cef368eedc6cb8ebb8519df5c7c33da9df26b70
SHA2565ee52741bb7e7d233f1203d97877b09824a43156d18131930b4f5691db995690
SHA512f49d3365545ca24fec99023d91ef17962e342cca851e8b03076eb9a6c97ef3aaa0022afc14ad035cb90003f96328275485ecf52dfc01b1d89336fe80177898f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d61afd40e777da5f7b548ba0dfa8f690
SHA1d9cd8ab2bbfba20fc29980c3ef1eac17d2eb238b
SHA256fe58cc45894ac08237c1e0809837c4aebf61cbf0bd90d35008322d167e4a7101
SHA512fb1b069467b365ad03f9ab5c57bd99ebc811fd5956ec5ceaeb74b24d8eaed077e8b9509054eb236bc7e6e8750a2acf81ae70301a32ce98234a4b653d4e21103b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eaf21e5c5b266ffba8406c0480219d88
SHA17ebbe8865d1473c4ae2f256829824b917822b848
SHA256001cf6ba63818beff7063b0baec754c6563888eb1252a68fea5bd92e3e95c0bc
SHA5128e1fabf3baf94474b5a553d98ad463589ddef15a111b231ab7b09b770661662395bda3f22b1c616b76daa73707876867de8af60c3989aed631662b09c90c1893
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b426fa40c4189b588e6ad9f82d0ef667
SHA1cbb24aef6be070f2a59e35f4cf675ae387b7fd01
SHA2567c2e6c8112937995387ac2417f1ce1b5287468b26babe58b8a8c8ccbdcadd63d
SHA512330dcd4b3fd3854920e8bc11d9fb7221eb5fd8f12de2a652d627e59978060a45c98f49528eb80a883946d3fa7aebf8dc34b62f820f3a109862443e0447a2cab3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5862cea751ee9da4f8d0345f7bde85079
SHA1e011b1d8955349f82103931cfc2ed89282ecf1bb
SHA25670be24338a29886baa6ad84230af7212bbbc51bdcd3d5db3394c35a465852e59
SHA512de02dbc833133a6fb147bdf0148daf2d68da0bfc62b67755faf877fdc8e0a02df68d6b3f6f70951f174a0fd183ff34d1bb98d9a46b4200001bded98ce2fae443
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5622c0adfa9463f21957dd0f6a011b48a
SHA1f59a7622f99b7ee84de9b0f000656c922d3c6421
SHA2563d4918712276510a9b04a901d14eee00446cb57bad74aef96d240c2287ea422d
SHA5125f18a961b69bf83248c53661a8af34ce4ac2238d94c06d0a196e09dff16b21bc01280ca02f65afe6fa886fea10d9c06700aec93d0c36c6d24934a3446eb1c328
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f848eaeae116177b9db79516f8899d7
SHA16cac4732c400284c645c7c6f8ba28b424dc15864
SHA2562c3b47573d752c85f3cbc78e48a7a5d38933f16b99abc64cb0a3960689673020
SHA5127cfb83badd021535525375c90b6a4f68ed6b07d19597f024fd4bbd1023ec072e5df2877786f236d9d1d64db68526fd4fada9667f77b715b1c46809c833715825
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b33665bef3d4fa2b1a49bdf659a9f8be
SHA15a32054ad7871097c21f85f37e6393a1e6bbf86e
SHA256984543f4e2217166dbc1a240370118f3982462c501e520affbee1db73dcddbfe
SHA512ff2ec6f7c02e09d79e8a306b436c37b9a34f75e6903321e61fbe3119f6a299a183ab69a54977159ba94e9354f13a2db8586eada9ac920736eb36428b823351ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f907f6327e9e9e561e805a8437fc3f89
SHA153c64706e0779398b38ce3220cc14fd20e6fcaca
SHA256efb0db4a2f5e59ec7f1743cb7304f3c3048bf7420c64da334c5fa23ee15c51ad
SHA5127897ffe5f4d0e28269aa8500bbe60cdefa2239cf10480bc70d61733cfed8ff899d096fcf71817746a1ec8b0c48268aaf17f5681d6dd397fab3b8c5ee7af6128a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f2cc4e8c1e54f79e6bf53274ccd0ea7
SHA1e1b5607d6c00cbe2f775e7ffbc8e9e999781ce21
SHA256e358e79b389d722000875d87063d34e48f159bac4f2e576a68d4747d556d64ef
SHA5125ac6670cfaa888ac39c348496c370f9c4b0bb86071d091933b18ce32b0ca3251a7b42c318630d5b090406c9598e47f055f02e30d7485688a545137fe50977ed6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7a2c63e2eadda5d58630598dd30c0a8
SHA10811049e9605436bd43e5d48c85a993b96a0fb8d
SHA256bc9866b1021a535562180c5b219bd0fd0876f07c87e4b0a85f15efdb02cbe7ae
SHA5129928cb2c865e8548747488f76569517279513d1ef946f130e99524a32cd9964871dbbdb4b950497e2e1d5f1e75efae1f0de1bbed035a758cf8df088c30ba5531
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5885db0849c981e120932aea098937548
SHA1fada8f30c66d15396515014f84ecabb2011c2ff8
SHA256861f39797071a19946edf3e93e6b09538e643d6e9b29b3ba70e074fbc3408b35
SHA5124ad327b7d82426a70e14d5c2b9afba15fcaa68106053bb466da43026805e557fe3cd8e95402d91beaae60a052daf882d6676b798f152b638f2c703b42cb193a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a87bfffecbadbca4070f16e40c7df8d
SHA1fd817ae71efd7a60087fabe49100db27edfe4ec4
SHA256d496bed9b20baac4e0d5c7474ce6fe7b27bf5e2450a85bb52486d3b40b3341bb
SHA512e03fa98e87e459d1603215a8c83a6afc3d003a9adcdec468546cd41b8de8d8b02ce8a424fa5aa0607b0dc8406e355c23ddde8b91beab99077413e9d91eefa637
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5855cec1ab120e9be1319df48c95dd486
SHA1dc50f3874c1c93c6a3e7eeba62639f6d18e34728
SHA25615bacc0bd2fb114946c6c1f3e77ee95672e22b6c10b29a0685d6a93d80896fb0
SHA5128e3946895389175276470f5276b7d73a81c204346c0b01b23ed4907fe54e6a18ddd752b5c6e9f29eeffdec4a13cc8542ad296dca123eaac45332cdb0b5a03029
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52aabc0946fd401368bf027645330ba18
SHA1dabb06fa7f0a8bd0ea378a9848bad34e23728c3f
SHA256e70cc77aefeb39f773de151f1375f71197587ea5c0ace223ca493b67fd0e3490
SHA5124d0d022f98c2f3b10f936fd415cc8fc3925fdac35ab9dd44b7ecdd24168e92fad829502bd873fba4a8e951407d114390cbc02ebd29ad0b2786c377050a84c92b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd011a63cb9571d242428211890afe27
SHA1cc9dc0e8f7722621f1e29af8ec9b8bbde4ad5666
SHA256e791f94e95db9bd5958361e0d22433227337baec1c35174ca0b62137f6b392d7
SHA512792e7d098bba542823f605549b21c63b53f58a636ae474a0882229d6d31e6ee95d18dc4177e82cc65383593ad9f05c1a0b7f7abb98963fa6b7cf0650c42f0aff
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a