Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
29-04-2024 12:53
Static task
static1
Behavioral task
behavioral1
Sample
07b609932efdf547478ed02c2e2fd9f0_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
07b609932efdf547478ed02c2e2fd9f0_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
07b609932efdf547478ed02c2e2fd9f0_JaffaCakes118.html
-
Size
8KB
-
MD5
07b609932efdf547478ed02c2e2fd9f0
-
SHA1
965a55b6d5c66acaf1ad3099a359f33e56ef3c66
-
SHA256
c17c97d6cb8773d68fd20f80d3310638e55e4ac580c9c40e6cf76aeb181cfb08
-
SHA512
4ebc97dbf8eac2efcb55076c91d151e6fad03acf6dda35cd2ab72e6a776683aad305013b63b06dd562228c124489fefc8b121bc44ace714099a4866812b3823a
-
SSDEEP
96:RxSDdCRn990H1uNaqU4yDIT4LHdc46vGC9XcohpH1uPTHRot:a69k4/ELHzC9sop
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000002fa085f1f5f57a7a0a3a19deff2dd7b7304757084f99432f5337c29c3b566b6a000000000e8000000002000020000000cea321d310602dc78ce27406b7eba419093bed606ea08ba7f70b39d1a27cc7a0200000001fe269d18c0f4891ee9d031e5589f2dc5a496d225d7d35c5455666f738fc20994000000032e19ebd564dc7803e023105ea8a4bf78960730a1525fce33b0dc749acf524d5af5ef58c3a432bbc799910042064b5c75cef609401968988a9533ff1f5df5b7c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c00ee352349ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7E44DC61-0627-11EF-B54F-5EB6CE0B107A} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420557084" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3056 iexplore.exe 3056 iexplore.exe 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3056 wrote to memory of 3044 3056 iexplore.exe 28 PID 3056 wrote to memory of 3044 3056 iexplore.exe 28 PID 3056 wrote to memory of 3044 3056 iexplore.exe 28 PID 3056 wrote to memory of 3044 3056 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\07b609932efdf547478ed02c2e2fd9f0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3056 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff7bd61940a715669c121960ac5c1729
SHA1d9e7f5cdaedcf683689a84f3beb523078ed5e9eb
SHA256d4c094501d028f0bcd9f0702e4191b60e2384dd2e3a0cfe0e6f4c6f650bd6eec
SHA512f8f91159df721e2dbaa0186ab7d221b9a006fe0c0e98a6e85cdc2eeb8af96f48f335571ace346f40b497af922cb0d01d806038ac30b8bc884fc16f5f9d3c7ce9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5673b644b24de7b81b3ceb54ca0085250
SHA1fa9ad9b8b4558281907bd9a09ba888e6118fbf46
SHA256483352f12e125c15376cfd11ae8fb2561741ad86cc94d4b1ed451d08f6c80d19
SHA51262ef1fccf388db1ba95f8d23089a90b9d29cf7caf33b3f0fde24305d763c6dbf523681f1bc48b8926105246245667b8a84052fd1013a8b08f2512d390735477b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54670cbfdcf24d6c516a5ed8affff8242
SHA1bafc1b89ac1e7c3b86a9516b807856d32e55ab88
SHA256a9004b65ff0068b4266d59cb9e46eb2f305e69f988d41a3488feec3b83ae25be
SHA51271e636812a6661c87abddcd16e0259cd9a21a059efd053b9e338903d9a162106752e0ac0e107b9f02c8cff78b1fd0e09285acd54a484e930e31cee659057b0b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ee7178b1fb02249000120f0335dc6ba
SHA1bd76979dadab09478e576feb1a6e470dc0847c0a
SHA256abf9ff75e35a3f8db652f2ac95e23dfebe6079e79a2754aad3142934f37ce207
SHA51222c022c0629fc9bfa8ef3cc1b45802a2a2fcda0a11a035230269020db6f3cc4d92860f27bc4ebd02a33017c549c6e14aee67fb52830b59f59f624198f074caa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a94302ba8a15fa43bff6ed72571ad296
SHA174d848a6a12a6560f4fa4f392d4b35b7a0ab1008
SHA25636c95c7ccce929f58f5904f5525c7bd133436963128ae020539be96187566a75
SHA512e0d288fc3bcc66cd8978d89e08387e2a976e6c88ec985f7a878b85226334fdefd7d68b239c675925a5c99d151d257f02430ca39226b07086012c525f46cf8fc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e0ea82bb9ec731ee954f029b49241c7
SHA119ef710e7c1650a35d6649e9a9f8e00bb19c3f87
SHA2569cc78c83920d6fdc66c2818e9dc4895313b811aeb81b32c11b93d609e935a7c4
SHA512d82a31a93270fd393ac5cca345fb7d4c4042666aae753f2d89cac0fd8ba6d69205b12cd0133e9e82a46ffcb94b03cd12880fd90fb802ef05e8bce2c362194adf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53561500cb1a9e358f8e2f1e263f5034f
SHA1410983be72d962428eb23a027ce16e7ef09d4c92
SHA256814a7ea68dd8cb63750df427f51f847c9b9487cc6a1a3c7ce34c0c658ff0ab24
SHA5120617b0fd433043def8cf63c7bba67dd87e7713c840667b550facd58a0a3d7443acf19f9260e01287b5b77b56f4bf8f0c4e373ed716a777591c064ff43c5be2f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5faddd9d7beab812ad3269e8a8edc1cc4
SHA18beb68f02a85049c3bc04aa380d31c3091a95b68
SHA256b8e5e6a91cb8a8fdaa678ee481396f6fce94bce8773992ba0b6ebd928634478a
SHA5125e265f775c7cb5090eb2bff8f1334b83d3d18c873b528a2c1433e1e2c58b1f1889fa4dc3c95b48b9a5d0be8af0aa61d0b5768ba1c65fdab02d4458b0703efb27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab37229fb3b74be1577a3b1fe72b22be
SHA189addd5b2b8fc03abda3172a705203ef0f723f06
SHA256a1153fa69c773583a3d7c4b26c69b372338f2bbdc31ae445dd83ee60380af6fc
SHA512fcc117db0fa744ecafe6334fc90346d84521c8b920e212c080af84f5138f7fdafe98cf4ec982fa7440849f7b16c60ae3b36d180c8f786779f9fec758b2943460
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54087a2563c3391cc7963e7cbe7da1746
SHA1edb419c80fb890311ed9c77333a5008b345cf2da
SHA256f84cd3351c79d72ba97c5323216208b4a9a052e78024fe088c84f28e1e2ab780
SHA5121e1ebf50840aa50cf3d68b0bfd39961ad4ec5f58f922b19ee7384fbf13f31954bfa89ad9cff0df9c327d43bf7f406d49f8d7294c5d10a7b549ad2d9fda76e7ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ccaacc67507b68e3b1d9d3be00119e3f
SHA1186e041eea8b5e10629887d3f60ae84c338c8b4b
SHA25619fdd8b9ecba28caf8feb17f77d56fc3ee7c7c0a8c989035074245f490ed69b8
SHA51217a3e7e47c7a49cd5cae22ece2834f8aca21f74bd5641edf3fc886c345937e5011c111bd4df128cfbb3bbc7b0b24f2248088cefeef35a725ce3d9eb48e3969ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c46b37417f5cc54591bbd2bbd29ce76f
SHA1e370297b80e94178562c4f901c112359935fc4cd
SHA25637494f1b4939f98c11f359ff800a409c7e613547c9af98b6787ec0d709da830c
SHA5126a67522c32894ff15c435f2c11cfdbef9059943b234b3fd6c94e0927037789a3d53df498775ce6677c39e0e53e14548ee9c0ffaaed62ec6704206c6892e30273
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5690496f15a18b257ba84f07d9b949b89
SHA1dc51374c80fcf34524b3174bb4168d2d919d1599
SHA2561682a50c64a8bc708cd89c715e183fb375e124f453ebe85999d2ec3386e5e89c
SHA51257cf6b4bc394c88a66fb5cbb289893597021961c6abce4858a2ff9873044ef02c082fa77e2cd7d9694365b3a4b9fcf5b4acdaac5a51abfc79a3741ab155f0bb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574e93b3039489880323dc060b277fd0b
SHA14e2c4196cad6f3014f78e823a6db99a6a95981cd
SHA256bd592674a7560fa28f55d06c9d58bbf7fc16b2bde4d3a8cd8c60f23614b32e68
SHA51285106b9def810ca11aa466ab10da084e7c546bffe472545f8e8059c77fe632c55767ecc050eaa47e7e5798eac3becd9aed5a76c41104ca811345965cf7c3694c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae0cab9d2eb5c756b765ea8d4350d7c5
SHA1bedb860c7d06ec7f4008ed0c9075eeb69524edd5
SHA2568d5dbc2c52b2468e706099caee675d69ffba8372c1eccb636f0da4be93cb78fd
SHA5124116c8458cb6ef7407173330f738dfa46e60c1b5f2a7cc20f692bb66b7c7a54ca695a1388c96a887163d20b10f838d3fa45dae63f531b872cdcb1e5c62c23618
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf16209970a2d6b56ee599df6cc8e98f
SHA1a94c34a0d0566f83e05920ef345a049185d05830
SHA256bc3ef8e2e466bce478431285775c7ce2e89c506955ed26f6d9e034a3f4faa71d
SHA512052636da83008c8c4ba185bf64b464c6ddd8d011500dabce2c9119863aacf4865b5bf7aad91fb5db337f2ea577518990466c4f6e1eb1bc96855e118e761636be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580bbff2fe9d05726fac358dd62bb14d4
SHA132d5e13af3d26eda7d9c4c2e887f300948a8ce05
SHA256399813512c23ed18d0a97bd555f324dc0266f695444360a3393c45518196adad
SHA5125959960f8b15e60793b870c94919de5bfa1a3387c6117fd177526d5b122d36f04227e521ca15774e7232b1c666bc0c838ffce2f4586a09975a3347b82a770435
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59588e5d6a1f4c282ddd2bef72c3b8e58
SHA1dacd4e5acaca69fc00cf9b10f2f3e91e50e149e5
SHA25601cea3798804f646aa21daba1ad5661d707b1ef967952b89ef5531fe644ec04a
SHA512401c7215befa94b93c7ec93e08668db29bc7c619dd949258c6b5124470377b76eafa5006300afd03aac594bfc36530414b8281e6321613a436530d892bfeb32a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58445a4499f22184986eac35b69915b07
SHA1051fc3b759fd0b436542a9be95d351d97080f2da
SHA256af35387c25b86022e1dde2962bac1738f3d3d7c86a5e9d42d328f9503b789796
SHA512c5887643c3d184dae069d38460b066d41b1931028d0eba7b7a85bd876581fbc9768d0162d7fcc0fc0eea0471badaef3701ebf3ca0912e4831c75309864ce254e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a