Analysis
-
max time kernel
133s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
29-04-2024 15:18
Static task
static1
Behavioral task
behavioral1
Sample
07f7fe180d8e6e96c03e808b6c0a9997_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
07f7fe180d8e6e96c03e808b6c0a9997_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
07f7fe180d8e6e96c03e808b6c0a9997_JaffaCakes118.html
-
Size
461KB
-
MD5
07f7fe180d8e6e96c03e808b6c0a9997
-
SHA1
0c3231fb878e929741227a8a5bb826a3e7b615db
-
SHA256
b6adc6ec97210b1343213a3c187a7efe73b5c2d73d00351d4e3d7da478add118
-
SHA512
ddf122b66a959334bac820ba8541faa5ed6082082baff9d2cb621b27acf2f3758f219ac8efefe523c7f1fa80e04f80a942032e19a8e727e04ddc8ac481c9d49c
-
SSDEEP
6144:SVsMYod+X3oI+YeJhsMYod+X3oI+YPsMYod+X3oI+YLsMYod+X3oI+YQ:I5d+X3QJt5d+X3Z5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B940DE41-063B-11EF-BBEC-C662D38FA52F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420565772" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90e3c791489ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000ed21dce57e6eafbb826073665ad40a2bc200e0a21bb3728362ee217728953726000000000e80000000020000200000004216f95c59ff2d0c31f503feb64fd1fe203ca84f231b7fb28b679c65f0a61fca200000004ffd635f2d1ef44f76016e3066e0d057c780eb2898142ac41732b8e68b2615f440000000375030d455c85a371fab0fc48c405331e03d37ecf0a85669b46e9651345c993ca9289ad53268b344f1967690cbaf726abbd9700756b4178f51a232a687a3c735 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2460 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2460 iexplore.exe 2460 iexplore.exe 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2460 wrote to memory of 2836 2460 iexplore.exe 28 PID 2460 wrote to memory of 2836 2460 iexplore.exe 28 PID 2460 wrote to memory of 2836 2460 iexplore.exe 28 PID 2460 wrote to memory of 2836 2460 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\07f7fe180d8e6e96c03e808b6c0a9997_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2460 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57383ea614bce965a86f1e8f1928b422f
SHA183a3c4a9b8b004ca3c09942164723c7c0374bb40
SHA2563ad1bb0f9929362f0725c4cee6457c3c0e6b7bda552c6f9433394b9ce1249161
SHA51235e8442b3233ec7e24c88f4aabc52705a0d50426c60282e57910f8dba555a76259936aa523845c74bd1472fbfa88819ef0454a422e87ceca0cc69613c0c3fe0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0f92979ab0fccc2e60337bdf0a2db9d
SHA1e2b30c0d24778d62f7df1991fb2de4f3479b9448
SHA2568c651a158cbac7370ca23e286e05e0dc95da11e8c23ea3ae06f50cd2fa58ea6c
SHA5122068504ff38c454091f3eb382a63080ab822b4e57f363d7319550ae97d77a25743907df7c264eadea0d9e4715e536e6c90a6a99d82a2fac210ef6a9b0070428a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c1cd3c8494dec688bd1a9aeb908ec22
SHA18c646ade9264e367c3fe85a74da5a611be67fec2
SHA25637a44443bbcbca4e65fcb3682b58b11fc8623fb254fa0d36c2303615d99d7ae3
SHA512de4b0ffb2fc3d0bc3547ca24511e2270181136d2c535e7b97b35a11ea5d3490a323190cf2a5c5ea58541418178aae751d1e2084d25ef0c47a8a14d72cb271923
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5190eb259bc192304a3ef970a36fc88f6
SHA146188facf2d26fbed4f535452f5a545529025d92
SHA25637c55b6ff42a1ee2ef4271c6685374d99634069f374d11703eaff5cc2b17271c
SHA512b556204b47164b27e676817e1baf10288873bfd5b084b3b90b96887db1439a1c4010e2ea599dde7b4110eda9cf66bb78f2cc3f7ac2ccfe950edefc9ff93c682e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576c545a1fd2cf6842512f71c133e5fcb
SHA17870006094c080fe42329c54effcbb289c768161
SHA256627a26bf4cd9bcd465df86b949a6875a3ccd6d0111b05b157b6608caba4fb5fc
SHA512ecbed964fb779d9b919bbeb54fd6d551915a732aedcd1453a89abd820b33f6f0db480f77fe4197cddf57aafe7813e4613cd7552c5f973f7d3888397aaa20f64f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb3609afd313030436c7563788c8e37d
SHA1aea118b7c067fa1124ca8b33a311c87612fc2e9c
SHA2562af72e671b21acf7502275bdab784e7f9e8925c8eef766b0224c224dd8a92e4b
SHA5120c6e6f9d53ff098ae578780f76a3c0d8e15be7be362337eb60c2346c30a8483f70f23fe187f29e9943762c80c0133489a9d11b3586adf7a790b03d3fdca8873f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f36e440e000154a088b66e0cf6b32600
SHA18362c19f0b9bd2b143913d948e126521ab0633e9
SHA2567e69d5589f44b10f74930532c5e1323e92b0ca737b3d834c45444a8d75a22eb0
SHA5122d292cb1ef7e2c20f7dfc098cbea82ddd0ae81f02fe2c58f7c7d9ba9b6bef673a9ca79749b3311cfc0a9fdf0ce0da56c88127ab56193b5fbde6fe10258664e64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5131155db3635904f5920cac9d69c249b
SHA1373ea6696908478d21b0d7418156e0f85c70a90d
SHA256549c2255e7157156c143a10907c49f22b4700bfda003511c18b4842bb9f8662f
SHA512995f1f5f0fb9a9841d675bed52a49f2d64d37d44b4b8a890a2998dcc835642fcc16e4fa4f6aa6474e40cbe1072e6e4cc299f5c2c8131759b254384fa9db146c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597f1f9b5b38bdca2f38af7bdc4f1898e
SHA19f677255dbfbd82e04c7d218a1ae172c5f7b79dc
SHA256697cb7eb3f68addaddb50f9bef67739a8683f83a7551fc1215088010baa1ede2
SHA5127b4e29c467dcc8306a93b4cf6e1ab127856dca62d9879d9df97fa42acde29e5c1b9991434224f9f319875650dc698baa8741be218710f64306de41ba12afecd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536870951882b12910feffa7d80197218
SHA10717af1308ae45ef6b1c78356e4e2800d794d920
SHA256f59de1650b8b11d165defb540464cfceb87ae27898b75a52f781cfbd40d7f6d3
SHA512bb8ba47698ef747244a7e79d0ac545491d3d6f1a3024fde2ecacccf5e2ca606efe2b48bf2114a750196c55819880f13529bbc0147c3b82d518a29ec70c5b1bda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d10ea0f1b9c348390a982f2c29224c98
SHA102a5405d55f4ef1b98bb0f51ed53f61502715631
SHA256820d2cf5adc3140d99d49af5965c3a6d7cc80e757112bb9f092cb25b30f68324
SHA51289f843801bbf0461f4fadaa1a09f1a8bcabc6c0f8c9ffdfe565280fa1ef82160a1cfbe0c84e741bead13ba8dcb93a067aad0f7dfb1a6e747354dacb481664186
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0551296c9c02122355bed7faf38513d
SHA1a78b75160288a370798b01df922ba1d66505d53b
SHA256689e5b360ae5d297ddc4207e56daca9fd866c6fbf72bc0dc659f31ed3e69432e
SHA512a268e227706d264d230915f2ba4ddaf4e94b0ff05f68b97d072b8ab2b9c068d0eab8493263c0b2209e4b87ea936dbad4895baa8bde09e31ac4cfd6d7d59faf7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e28612977eb8601b304f91f95b3bcd5
SHA13eeac8c1d7d3b440302758c5208974a43deb8f12
SHA256ad63043aa9927023e4328a6680c16c0a34494bf7d186f6c19ad0180101f61cbd
SHA512a8e235680895e91c68c8647b66ea372cff80ee1599ea563d4e6fdca1da9e991797911341bde398405c3029de77711d605223906036e50371d80bebc21f6b4c01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f96adadd39aacc2d98c039b79d66c5b
SHA1b8cc9a2c0586ec06bcddad88b7415f3df256c8e1
SHA256611a25c8884d430a76d71fb03fc60fc5344d0e8ce73c97e438358e17d08ff1d7
SHA512c7459d793ddcb7de6caffa97ab62a2ee7d1b738a9ce3726ea25e7bd27e90281e2dd412ee1ed8139f8c96134ab3044c050f8e3ca3025f61a2fa70c3a87c91bd6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5431765428f9650536408dc8f24dbaccb
SHA1ea2de286b14e87c33dd72d52fca65fdc4d61375c
SHA25663939ba26d850a0360e97e1c3c308d37a2f5f820db5223b8ce6f2d683bec15a8
SHA512036663986a4659783d3d271c5268fab45083b474c199310e83ed0df4fe3d001e2cb77c3b238adc8d970dc76e0afb2cf8ca691a83c695d1fb6990585b426b7f84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5323299e8dc0ede14d2cdf0e64722ab7d
SHA128a03b47fa531b4d53fbfdb00d4b58044775cff4
SHA2566e6f4ce641907a93d5a4782812e4d7c21be8fd55717658082d9d8f1266b189b1
SHA51295ea00aed8aa927eb6299851a5b6c7a5ceea1425769ecc26ac95acebb67e51f009b02b4500e72ee67f5488e59c26c65eaf4ac576afbf7153f974014e75081659
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565fba8717a6e4530c56ecacebe645dc8
SHA10361fd0e04f1a9df6f5638382867b05f8d564c64
SHA256e65bcdbec52abbe5affaa85ab17a9efe1e134dab5f2865ae61adbd1898f30a37
SHA512181b2a77916c7d83850d807c77f8176525db1aab33faf8acf812042ac25bc4a7def4ff6973521fefc2019d04f1ed63fdd4e8bf9a5764d4a232da39a663174bc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c37765493b17140ee36964b9dba88cd0
SHA17d6e8855df623e18a61ac8c3b00ef04a45d77d4b
SHA2567916e5120752ee2b88631c5da8eb47356442e49e3e3d552b49520cb305d38fea
SHA512d2d15b1b88915610f9b041801bfa8523c944d6dac5f97e1074f43a3bd1b5ba01a69dea21a25c5efc4ec0f26b7132b8e7d71e0a4b35d8263a8448b2d13b5b8e28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515a001a9b1384532fbfd2e19597bc22a
SHA1d1a6377ef7a01e4991d988500b3c6c931687757c
SHA256dfc67b1076f6f54d2e66d2c5a3afd222dd4f77dceba78215b073435254076dc0
SHA512b764250154b5a2eb552bf109c09cb19439d7eba9a5f686ba5b9f7907fb1c233115ca593a7f70648549470db590d94429afe5c5dc3fba66645f903597149a2fa5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a