Analysis
-
max time kernel
118s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
18/04/2024, 07:22
Static task
static1
Behavioral task
behavioral1
Sample
f7876120957c1ae462c326b4705e5bf7_JaffaCakes118.html
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
f7876120957c1ae462c326b4705e5bf7_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f7876120957c1ae462c326b4705e5bf7_JaffaCakes118.html
-
Size
65KB
-
MD5
f7876120957c1ae462c326b4705e5bf7
-
SHA1
cc0b34c9766bcec1abeeff0865553ca8630f0b20
-
SHA256
e0632e11c9cc459b5520559e7394e207cb667fc51a6097a3a9a7d34fe3e24f7a
-
SHA512
aa78188d26762c3c572fc9f59d976463cd37f0a5cecb845d97912733b176daa659992a0073febf5fb2c883dd1bc6910c64ed25047653e09e2fa452bbe47859e5
-
SSDEEP
768:OAP0+9QtkubKwCtfwmjNVq2eOb2LyjDomv05WR5h7eS9/eMR5NymwIDKNsoHoNq3:tP0+kowBKhD1vr7sl
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9079b5446191da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a529a2e22ae42f4084bf8a2f7b0415b2000000000200000000001066000000010000200000003f7f34368921647967b728b72f3c7dcd80ebce371923a71a77dba38c62f50139000000000e8000000002000020000000d8653d4ff565d08e283c6cebbeb62b48f9cc5b856ecfc9f7601a874a5a8dcb62200000007068e3acf138cc6e6ea2113e43527f1ab799e52cfff8afc9534a40b9ac08d36a40000000e4f84a9e0cce375d51bd24802cbc8c6c2777a8d3a12b73dd4e906bfe8827ce98aad3e4e6fbcb1c1121c2b552840ecc7cad0fc663540a2ef1bc0c04f7906f4c86 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6F609991-FD54-11EE-A801-52143FA8582B} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419586826" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2276 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2276 iexplore.exe 2276 iexplore.exe 1496 IEXPLORE.EXE 1496 IEXPLORE.EXE 1496 IEXPLORE.EXE 1496 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2276 wrote to memory of 1496 2276 iexplore.exe 28 PID 2276 wrote to memory of 1496 2276 iexplore.exe 28 PID 2276 wrote to memory of 1496 2276 iexplore.exe 28 PID 2276 wrote to memory of 1496 2276 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f7876120957c1ae462c326b4705e5bf7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2276 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1496
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511ae5b5404aa0e3a0217bb9d60136c86
SHA1f9b2d75a22f2861c1d664824b3ee929c8c755d1d
SHA256a150131dabebb6a5b3b7de2d5168e0445fb50a168a01a37c449f751db7fb955d
SHA512ea59a5b004230ab0c200195c6704f78af574cfa4a500ff48e016e207026c3cbd55c23bf675b6abd4d6ff71127baaf5d537ad72b51d8461e54931f68f1c2106c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533e82bbc0e08aeb9fff0a84d0f49df87
SHA13727cb6b0c7e1ccadd83f87373fa6219bcad2c3c
SHA256fe7c76b0b69ce97ecf7349f3045b0d5ec04ef07306a70263f950e5c01349b713
SHA512505f9d939323510d24080949f7e43153721a43706028c3311bbc0f8d479508636deb9c972004c22b60b1c69d26206938e97c6680784010fb7cce57ff9e14385e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a22c4161e1f1cce372fe4ae42d89009e
SHA1549da239636e255d2755afb180b2fabb1fca2b89
SHA256103c8039f4372dd13d965a963bbb46f4bbb676491a8aac53487973df9445728b
SHA5127f28c7d6f009e5ae4b26058d4aeeb606d2cfedee439b9391bb294d0f0cae47639c656c1971ce03b61b8fb2cacefef84b11ec098800ee3cd6e858aba725cb4d9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56abe558203af45aa0b0c1fd6e4d41a31
SHA16fe7771806b7431251523674f74cd8bd8aedeb03
SHA256027f3add86013ee84039e8bb6e191dd26e4eaffc58b89dc358a6ec8e33f7729a
SHA51204082dc5eae3bd4371f0f76d8a1acecfbebd8aac4363610a5cd6a967d2ad1c603c71f7335bc5c1320a151a05e1ae9691e55e92ba5bec395c24cbe16187c92240
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575e15d1a83a433fa54d611484a06bc4b
SHA1cf4f10866adebbed25e1070e65bde37479162bb4
SHA256e698fd914d8695e4e4e3462337788ca0e4340c59bb12e1ae04dc4845a1d631b6
SHA512d243fd785427480a6ed47b1453b2b5db2260ba9d123b80be6d4bc62b8ba8e22bc00b36856bb7dd8c1ae8df701f00e715c3ea93529755e84386af9d071f95968c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538676ae9daa4e3b0aa62cfefe2bf211b
SHA1301a58f67becd60025fac70a68127ba93b9bb7ef
SHA256f45741504de6e286375c1f3f9f6b6e208bd8eaf5adc44d0c30e8db58e69930a0
SHA51262110c7c55077dabb0648a5e8375c110cf5e7e5e15d120b995b991192394ae4f1528365115b852e1d8a2834824ec1d86815b781e6d0143373a5f9c01631f7b45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d40ecff5bb7f15ca018f01e6394f9c8b
SHA1095b9bb74838d161704fc8c64fbbaac7c4461c4d
SHA25624aa210911cc3d623ea304b91c16ffbf101314c7f3859903977c7df8e1505c2b
SHA51255ac58ffa680322ff593a9f366f642ea3075c956b92a84d281d17f73d69404e4b4631aec82622c8e0de82a035063e29a8f0b9cd638d8ec3f408fc940df835ac6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5986c77ff50836dee009259e511e4803f
SHA1e163dc90893fa8b7f375713162266c8ca3aeb799
SHA256aab6e9f44a5082075047045563dedeae180a51c50ee72747a9bdc09370e0b6a7
SHA5126d25979a18753d280305fc27005da882c0bd48f5911e3a014eb545ef1fb24b6b030ae8aa5b7ee6f4cada94884ce54eba274f95be857cc46f71617f669194b9df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e51e0e6dbafdbccdfeff573f3cfd9ec
SHA1a237b9b5df701fca0864430a4ef61708bf73d68e
SHA25689310160c0397b9124da579493da6d9b179f950a11614bdd9c801c3b6d2bde06
SHA512693f9f8b118cb0e7e96b25a7b94ea23cf69a91c70b25203ab078cf48cc3a7bf4f4ab0904d95584c543cff8a06fcd19395bccec5e25bdaa06c719d561e3603bc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58426e8f7b0f8876d3be143947790f6bb
SHA1a38b5ab53ae70fb765e5d4fb8b59651ad0470179
SHA25678adf79a728ed181cea2de9fda5dbe7a0aedf65091295f7566a348012af92c48
SHA51213fa02e8fdcba376b23a5b9bb2430f202aab83c9cd53b8c7bfec67cbd0596b31de77140da8095a8f899fc446d7544da762c55b140ca0f0a3dcf60821713f2f19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e28222e3eb0870d997dd8cad9c70a66d
SHA16788291a44d4dfe0ee7613888c69d28f39dc6e49
SHA256c2de91c59393191b155977ee073bab0e02f41d84672d9fdd1d689ffe0c048ab5
SHA5123babaa01b03e5557a038f581ffe6933a6b96691810e3eca31a4c9bbebd77e79ae4bc650e2873639471f2f077ece49c210f31cd3a81eb45e46afeb6695060459d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af7808ef37726a733bd1207f7e5d3f3c
SHA151e25127d141d35d6e68c7e19bce6d19436ee483
SHA2567da35cc09735eb68021d8c1ec67c0b5b9f88710cb4a5b98c7d7a0f1285c1f086
SHA512a298c68d8e6ba6ec6e32a1ebf9d3ee74984245db50c9c1ea2ae64e507f9905cac2bbb53e296b1def98087097e8163f57b6efab55afcb82063afd80fa82e3d7d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51047dcdedb386e5ffbf3449dfe2a7251
SHA1d23bdca6e3a6d981477519f0d4f095c3ade1785c
SHA2560dbf05a1e4fd47ddcf4690c921177d798d7db9fcaadb4a56d4aa3d4b8c4da316
SHA51261376469547b905282d30f208bb68bab9c5b640519763ba2971426466a5b46f333bcd0d38e6c05ad1254e545b19058cb7ea135145ae63adc7e13a931840848f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b54e1767bcea4d850e1362967398a19
SHA17ba83311fb41b43d6554550eb3d3e21b158de000
SHA2563fa98c1d553fb0727edd5f5c0e285571db273f8b54e371572574990eb95183a9
SHA512c9e29b6d8053f9c42e1b17e0c27c2871f610fb3587400b5904807cbad009f247d5cdb8cf736d36e633d1c47aac6d9004c34c75bc1b42dfe9a0a61ec3008a47c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53138f125b59ec14c6d4a51d564f5b88b
SHA19afaa01c4933d63cc9f9fd9f9931c66df4f183b8
SHA2566076567ce481f549836f60f11f0e5e46bc7d10012f35d41f61e7fc1982908b0b
SHA512524633c03a64b64bff26f954bbd03fa5b39c3c47a21627a8caa999873be7d076e8e39b354527b9eb0ba1dfcc47be378b6901a5ee904817ea69eadf213f1fa6d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5559f5f3f4c32f54b279584ebf90be0ed
SHA10f9e0d9613982d63e367b93777be8cf528a93a17
SHA2567867ffd12bfc97c94331f36c9e925872b4e6c26ab6b4f6ff3b8efd4a54f12738
SHA512b8a99bb65c9fb2dab8cea73b904197729b3c75b4816ec6ebdddd84ae3d1518752f3ee4cbcb91edfb2d9bbe4cb002541e27eb377e8b21cc1100a8b2abcf71640e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1f56c243369129b1cc766146d4004aa
SHA19cc20f7f41641ae763ff41153d87c7d0a653fd00
SHA2562cdfc73177cf1d69581e12fe5af024404a1bd69f083543456b4a02fb56c61ceb
SHA512dd1f19b5fcb4539ce334e66baa5c2d73fe54ddf1f7325f4ae26d3e3486ff1e7c20c4b667da427d90ba59682e66d3f950b20a3de32c38a21017f3248c7b7d9f93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563763fd97d259c70cdd89f8d25c24678
SHA1c594e286c53c36cfa0b22cd2950ddfb4307c6d84
SHA256b89a0882bf338f389ba4134aa05eb09b366d6d12eddf40b0b26563822ee39b33
SHA512994cce56040bd800a2c653bf98d59c3e21d3cdb1e3e2ab0823f4a629a53e5ff3867cd56f98aeece4d034c6e552956dcefae50e2b2383c109086b01fec78ca821
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f329c80dfb098ddf92348d4c05366b8
SHA121087bfad43618a4c8fd6313d4c2fd06f195f769
SHA256782d61a736fd6c35a264df2ff3ff55dd89de5962df44b8d7225f1637a3c1e84b
SHA512c286fd07216346113d10a6b7eabc60a2dae846e1114f13f4915276dc3ac45d7463f36bccaf205e390e99afc5786ef8515699b46eb59f9c98b9dde008c05d468f
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a