Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
15-04-2024 19:26
Static task
static1
Behavioral task
behavioral1
Sample
f1be35876dd7c7d121dc2ead8c841ac6_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
f1be35876dd7c7d121dc2ead8c841ac6_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f1be35876dd7c7d121dc2ead8c841ac6_JaffaCakes118.html
-
Size
8KB
-
MD5
f1be35876dd7c7d121dc2ead8c841ac6
-
SHA1
751d55ec497bc9781f4f1df79caecd1654ed957c
-
SHA256
198c33fd215f8331a006a94bbc97601f53e897eb5cd1b389bb05c54c252e39aa
-
SHA512
5706945b741ccbecd321838e2064ccb4512fa944850731e2403051cb481a5654f8a377e1c75c147a0302e83a5e9a9b4710837f25dd2fb84e334e126c7e4fb940
-
SSDEEP
192:BbyPVVSkGFzGZAbAaBCN0ah80aHqbSxQQVey1+UiE34Gzq:gPVVSkGFzGZPLu+yqbSxQwe4RPoG2
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FF99C571-FB5D-11EE-BC03-E626464F593A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419371030" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000aaa17a7f43c7cd12547e649729fe847fa1f5d95e5aa4fced5d19de3f08572f0d000000000e8000000002000020000000b3326c1f7ffa6ed0fb4266ee813bbce4a21d3058690d76e3d16a2cb76a557dc22000000059d4387024bcb0cfa85c11c4c609deda5af38548b90bd78c8097d30df5c3fe454000000091fcd69b467c5e11830eb24b492989b5bcb995de406a221cffd01744b3edf78f2a2299efa2b57bd07c420a712d7f712eb8fde4e23e1741799a1e9feb5b025de6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90a669d46a8fda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1888 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1888 iexplore.exe 1888 iexplore.exe 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1888 wrote to memory of 2556 1888 iexplore.exe 28 PID 1888 wrote to memory of 2556 1888 iexplore.exe 28 PID 1888 wrote to memory of 2556 1888 iexplore.exe 28 PID 1888 wrote to memory of 2556 1888 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f1be35876dd7c7d121dc2ead8c841ac6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1888 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54404dd418f165272633aa464658fc1e0
SHA1512da37b20a66f3dfb67298a39b38254e36eae6a
SHA256604d11ea015d1db3555311eee17037f0805626d86d3c85ef571f5d83a04f7c66
SHA512a745bc87c6dc9c0b90534eaafdaf69954f32f93b183431dfa9a9459d7ddff44b79d1a8e298391fb8f57f0a643c11d854cd9741c2720d0eaab3ba404194580d18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532f5b9f49bde4faf14560c7aa7b2f5c4
SHA111f13b1edd9f91b844adfcd0169b09a49af1d29c
SHA256e6cef8f86184661ef726e7d68444fb9e74308a040764e54b3321cd8248e34a8c
SHA512b95283a25cd228922f502e54f50e2e588f756355f5c247466c556ae7b8ff57270f2bbb9498f5e2acda1be6bedeac462eaf0c4f3abfbb5d9fc9d39d405d48ba52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5014917f4fe21b9629786ff37739d050a
SHA147d6c8e7eeff42dd989fa5befc6b447f5d59de50
SHA2564771a6ce18ee15b6b7e3682c399e491ec8ffa702081bb54316610450440b9ecc
SHA512a0c0809928fe29feb4979e4b241a021df8900ae5743ee192904c4794ac3a9105b82c0db434890a2663b163a4917e983ad9d883faf387e6f3b42f46ffc4ffae92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5283c0904936f70bc3ad6589d7f8e158f
SHA1efbb9611010e6d4f9d6db76c7a83db618607ece4
SHA2560da879baba0b1691c02e982558f1bb2cc76a4873bd418c9964a139aa319ddba8
SHA512cf282a23fc366eab199fd7813db65d01552c84e14502f45b60c86f0d50964750e262ce59c50760ace148aaf04d21575d3624967392c76305ee782a753100bb60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d7d061541d79ebc83d5671448212efd
SHA1dad53facd99128cd7c1f584474c6b1c5d38ed7b7
SHA256437fc55df923ae1dc01a98028c6e95b4019005e3bb55456109a5394c64742947
SHA512f369285e0335af26ef60dba6449b422a5d0c79175191eb4c47d782706b96dc029cdfffa7d946621aba783ae304ac0f456fe5a8d7875b5b0e28c5361ccc07ab3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53fb07c166fb18633e6a501cfe6655656
SHA122ec2d065bce28104bdc7630408d3f2d97e322aa
SHA2562dad494cf2b8df3e9c0579437caed9e3d46307eac2bcedf7ff779ba2ae0425ef
SHA512e5339d58d3962cbb114dbef10cea2ddfc49686dc58a73cece213297f4745f6b7ec674657971a61c1cb16c2279eff69ea11f771e3468296f0bdd88f77480dfb53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a311a62d28b691b1eb27f912fd30e6ff
SHA17f8384fe496fbf212ed9990a739f79f69c49872f
SHA2566cac14796e9e44602fc76e7a18d74e6be4c3f0ec56815a19a9f08949a74456c7
SHA51234342dc34808c126dc89548f31803dc2d9debf9f3eb3951f8c3f54dba10727c9a17d70224785493fd900957d8fb6601c42260596f130e766d0531fba94bd98b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a76649ec50843a9f18fa4c60e9689c43
SHA1b4c6f2baf304af8b830c62b64f3896ef550829c5
SHA25658a2d915b60b7a7f361415d0e6486015f88845f1206365cd432248b7d514b91d
SHA512992c06a98fe2121d499662ebd49a4bdfe340a0b3bc6caec43725769c51cb955e9fb6bb831854bef29502a348c28db1c9ce20d99735cb78ec92845d8b7646dbf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568b7ec9b727aed4c2184b105e6237b2f
SHA118ca7577b2b5641006b46fdffd2988ac175ddf58
SHA256dcd431ca47ed363cfec862e2fa10067fc242ccf551d09e41c9cb01f328550927
SHA5128709d9c4ba890208b21343d3f02502f672e9f4994a3ea86d519c45e5796ec6321bbf319516718e885a576c5320f28aaafdbdab1c6c4fb3e22cba2e7aff4c3916
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f0bca647d5aaf050b3b761f605b322d
SHA1615676c0fd614e25257d30c47db2bf3d777da12c
SHA2564adaea6b982af2ffcb30cd6fcc6b4108635182dc882f95a59a292bb80cf38973
SHA512a11a1d129c29424a64fc3c9a2d84aeee31b94d9e0eb94a1f82df64f7f477bbd8d7896febb5794b432fc6e75274f8fd1338845a83b30505ff402c8f6f3f1665fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52338e7b8873cad786eda2824091c7d39
SHA1d17b6032d9921df16b2257ca94aa5e9444eceacb
SHA256539f696d9f27df841de42f8d39cdedc3bb216cf8b8ea27eec0b39234b6a8ea6c
SHA512a015abf1187ef4b07aefac3c07e6fd2d3fc27ad578d2428e40bc4539d2faec35a95ef0dba81fe82bdefff35dfc57f62d283935ef0a87f301449ac2f69a32deaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5408327435880ce77d67c6d7e8e35b825
SHA1afd0ddf7b8dbea0bdbdd75614704064926a05249
SHA2564ab08c7dfd030c39786c42ee28e7b3b7c6430a333c3d0ffd928d89e57a810ee0
SHA512ad3ac531c8de66d46b7115bc078fe8155c31cd558ae95a7818ee58213be4aac101b1c6438ca56aed5ed9daf4158a23654e821d611d5ea33ecec891a8dd8c9f34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2763699a4ecd552ef12cf5ab86019a1
SHA19a56c0a1156b7117d05f0a7a974db54d88837b7a
SHA25668a114e13430c5b7cc87f37c2704c73787317bff62ce08b5a575c5b94bb0acab
SHA5128fc22c088463d0e64b08e986ef9c47c97069c47814e666609bab42ea7ca14fa1219a036f6a2600892ecfaf8122478b911826b473274873051010f068cfc26e69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519d72521f8d0a3d8784d088a24dca465
SHA1ceb97b9575d74cf50b23a4ad59d317d8ba578416
SHA2569d7c39ba7129c38927c6928e40a752949587ef08bc52d45af8b19d4ea7c513e4
SHA51293940257013a4fcddb134236a3c5ba60384ef5ee505a667f5138bc7c49f95cfffd91f5a569c6d00c536b28f3905ce30c00b4485810c3e5a1c24544bbc5432924
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9f1dcd8e4d3f8a532d432cdc0ed78f0
SHA11f78c8198865b2ea34f40ed8b103e40b77fa8140
SHA2568a33f66ba780ceac8c0b41f9a2ce7ee767425434e5d30691947257a1bc410b70
SHA512a2da6a3bbb9e6cc6bdf00521ae702c975751bc1ff8ed0cce5b4019fde071aa488ce3c37a78bc2a86562dbcb47521335aa5b23c5db561081da315832da6034331
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51119b0a37cbb51b7cd8e6e55b91dd615
SHA1c7f08729019cfca82ec8f445eeb21598aefa815c
SHA2562c937f21b2d901ee5f655485bdc63fe379424988d14336f417b043cb69a2f99a
SHA512a2915c3225767cb9f63d4764348d48a2b25e1f50c2a71b709fd6730d0bca4225179efffbb291dbc710595c3d6ed60fe3ef6ee3cab9f181cb98946a691c5a1c0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc0837e153d15cd568c643ef1173feb2
SHA1ae3e9edc6dad2ef594aa4a300f541b9c4261acd9
SHA2562369f02203aa3a5dd9a5fe4c59aee71bfee6e09beb6c9e4dfcb735bf49f7961c
SHA51292677a6835932f600d873e98e4cc5d49af864ff390b3431de9e494b17077b8139a915842de1ff3739d180f173c739fed706afb013a1f9b2b020c50dbbc7133f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5387122b055b563b8113cdd71f222a2c8
SHA1045ca85bc464ad0b9aab6598a4933f30f51c50e0
SHA256c28997d220d688329f5e54bd344ed4f0cad51e27e6f68d8ca446c08a7896d1fb
SHA5122d8d0e591ff56c5b3cc46726dd99fdc43eace4c3512bd1723f5f847e43dd7ba0acaf8f79dc44674bcdd5cbb22607fcf2e19fcc11aea6b93a1b906485ac53123a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a