Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
04-05-2024 13:36
Static task
static1
Behavioral task
behavioral1
Sample
12f71c8d7d13878e3b0729d50e0f37be_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
12f71c8d7d13878e3b0729d50e0f37be_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
12f71c8d7d13878e3b0729d50e0f37be_JaffaCakes118.html
-
Size
30KB
-
MD5
12f71c8d7d13878e3b0729d50e0f37be
-
SHA1
9de6641d2f9b9ffe066bbc01a937bb82d6917a22
-
SHA256
2b3ef09a8e84a6b4af71e118d19bd7994a547d0e6c80870e26e306e8710de83e
-
SHA512
11a9ab79507d6e966719b03e7e2ce1eaa308645e42e934dc0b8673e9dd7732ce84a39b6cae74e33048a71aff6a91959f346a73995976b7ad60e4a9b449372225
-
SSDEEP
384:hTOIdUb/810BBwsgjXXPrbDruiunKNmJS0TuWVWje5a5Cdip1+ZM9eNoETPh26g5:hCdbzBwpTfHPLn
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3FD7B271-0A1B-11EF-B411-768C8F534424} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c6000000000200000000001066000000010000200000005c59b81f89b17b6b229bba5c6f64f2814fa99eb20c19ef2fd37e07964a509df2000000000e800000000200002000000036b2777be34470d9aaf4dadfe218171575b370eacbd194b152a595d52e546a5a20000000f73b285f517318a334a9cf41b3290d76edcb9277cff99553db93845a854b397c40000000ee6b35d23692028c943a11e1d898b16d09d6341abcaa14e7ee5e1fdf3f12b569460e5490fc2112b13979fda10020e448a44474d823fb8ad73164cb54233bfc76 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0ad9a15289eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420991630" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2240 iexplore.exe 2240 iexplore.exe 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2640 2240 iexplore.exe 28 PID 2240 wrote to memory of 2640 2240 iexplore.exe 28 PID 2240 wrote to memory of 2640 2240 iexplore.exe 28 PID 2240 wrote to memory of 2640 2240 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\12f71c8d7d13878e3b0729d50e0f37be_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9544e7aebcf174fa2bdb5c7dc6102de
SHA1c24b8cfd7254baa2bf7a18ef86a6f3e75f6957b1
SHA256f86314033d32a31faa5a3176c35587d2f4ae1a00acde0d2727567f4fe4afc39a
SHA5127ee37c746c7a293d3a4190992e14db7be9c3c8c2d274c169d0288f110fc2ddba510917708dae12f24ea1e85c80739d33510456e190fccea00a906ba9d0be915a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d87b1c449c513c26fe7ff71fd61dac15
SHA153bcc791e73650d24d3ce72edff09c917268a382
SHA256e1a8de735c031576a197c235cdb8beaaa8a15fecfc7f3b03d23d6a416e1ea6ee
SHA512519bc14066c1ebfe1a683e3b5f3c644ec5603097824964a1887033fa9e6dc33749ad77aad8cc028203835a890ef050d8af427a9b317a723256bd7d3b03e9adeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae8967b95db3ad34fcec72147a6a011f
SHA131be8575859f92113d6aa0de6258f6c4fdbf2ba7
SHA25654e2a3312becc48e9641ca5983c24f01558a7311b7f6899d527052dc52b7f884
SHA51250746153d5eb01efa0a761ff24e1c6fd28c47c908cc1c4d735f1ba4f1f3c73e3130246dfd6a9f89796acb632ef3efeeb31220f0572f497da5734a46e5522b2e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523dcd919421d1c532b8997a3c3f9af52
SHA1990a63dd30557d72d2b691d2da6e6e01b89523e1
SHA2562dce52228629c1f3bf72231280ada73aec4d655da17b8cca0801733d7b0fd5b8
SHA512731249b1f6c1bfa4d025231f7e2aed472f29741d9ce75362034dd775b876ce289cada4bdbb66f64004db7c0b14f1e1dfcd02d5d601a6fb4d2cfe68adeb376946
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5299402452a6e2c90407233aad4335923
SHA1f4bea2c2b8adc4d4f2f67ff232ab2c07e1329702
SHA256b5a70c1e366d4cf35bb90aa4f11986186211a6903db6af1cf8335aeacda9b76f
SHA5129b029c3eb8b4c68d22dcca475e04cab73ae5889f4468ffa34f7392ef8dff88bb2ef6e8c28956481426ee9e9b8293ef6b85ab33bbcee7a5bae963ece792233c21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57906ce8c6990c0d14c76428e1998a67b
SHA121f2e5f5016a89d988634ff5a58a790f1ec30c9b
SHA256e0ee7642607bc50e95b47625bc6002600c6a607b068d6eb2bfd5afc1831af923
SHA512a2c49d196b455a994f2bf7ccbc078e0cbda3cfc97e50a66ba0df711b81aafc440739211e82e59ec88b61a196ced8ff3dbd57960499d9f30fe60f11de475fa596
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4013fd70039ca5a5cc6bc011faa853d
SHA10370074250b4e931d0381db524147805eed0ca27
SHA2560082cdccfec05681c44f23a312e66cb237ca39d203a90a9e8e372333a1d19a22
SHA5126848e034d021b20733ac67bc99b5b3f4e1a895f4a48d0a3cfc18af62614c7c4269aebdb3ac8f919f79891b3e38456486f5e645e47439564f0c7b21f1b9f08dff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe1a46ac7f990e9647fef572231e2b9a
SHA10191f46fd7ed1886f7ed6fcfcd64f0e0c662f8ba
SHA2569bed397f8a8158d84d3078143eae7c9d4de2f783fef1a085d6c4ddcfc5dc447f
SHA5128ffa9191ef1c222fc11f165c3183dc4d8a5935f66a1b398ce594dc43780025efb504a9710b245635abf11ccd5d1260932515df67224b01ae230c628da715d548
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2fe22ca7c3d97454f04362923959182
SHA1f6622da873c2f9c733f551834e9f6844c03db0cd
SHA25623d28caf5ad644db97b0bd464f18d7dc6152bbcfb0d9a0d79c7e93f8d5c91f9d
SHA512a074970df3b7257379da2181c71bd54956e8f8816dd0e1dc42b45151072e04e53abaf7ca4886136e8ef902287c35edf06623fe8de162a6f7acd16cbc313740b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511d4c640c66dc752282f6347bed66d16
SHA11b7fd630282c0fe3ebf7d6fb60967488e3353a0a
SHA25603b130f3075677c306c2deba0907b20bd7d324d4fde498cebdc2b3a866a0fa2f
SHA51227050f6e96a157c04066142e6e2a55c1dc35bbe8cde2418dff30d8c96aa5571f35d85dafb0b0196d9167203fec66bbaeaed6d76e173bc6ae2e0af1662a8ab937
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506469c55932abc5b9135a9769e230196
SHA12a485fa47e7416aa36d372d2b3dd69f9a2032c40
SHA256a0b46db81ad161f12da1e1a2f88e2c1d0e8e14ef79bbd0ca78facc049c1fcb4c
SHA51251dd0f3f710cc9a381fc9f60aafa8d68b435bd083c8c66a113d15f6d073b03e830de80497505b1fedb730939ce32ace263cf698cec6332ace32bc9b919654ae8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5580c89e0dc5f74edbef6a35107937ca8
SHA1531118cb3a0e00c5d79a07bcd5dc93f8c74d29f8
SHA25649699a02c853362d69943cc722536eed64a2a178ae68e2753ada4c7fba40ee71
SHA5129de65060dcf093a78470cc2f501ea8daff5abc9e45947bbecfb481fd66d909de6cfe63d43324ec81cdfa5afcb8713b0504a1068823485be18922337c06ac3824
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5634ec1f116eda788e6e6919201b11ba9
SHA11c4a7f72d14efff40790c3891fe5f76a24d14052
SHA256be98c23156c4f2b83279d7a67d1b6a4bd05897716c04d80f807f608b4f476ebb
SHA512b788ded076fd997b64edc43b501685feda500881beb5375db17db86d8e98fd9f8e661a3bd0974c12b5b7bd804fc186fdc27ac85831aa0cb7ebb732d4f5f9eafb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e8d2c042275e2a232e1a6ed54d70149
SHA1b397fb13701187d905fa099cd8ddfac60192b28d
SHA256dc686bca13d40b7b4907cbe0eef44d605fc5450a809e6ac24aeeb8572dcee029
SHA512ab299c5d6c25888bcc3b97a21e2fe5fd1fe09e673a59662039508d9042daa7f226f76527f622e45ffc75c3f470ec0bd1baaedbb2b42b904b908dd1f7df2479a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb20bf7ba72a87d9b8d59ccb3676ad43
SHA131d98b7065b8e5ecad42aa1069e5d27db87562bd
SHA25672c59df52efe29b9547ba5f603adc4bbd08bcd863815e74f843820adf33af2b4
SHA51277ae2ce37e64d795de0ac4efe69ceec8d842f62c4948556ba47019ef4a3a2578b12d8eabfba0bfc5f828efb9a37d000e415fcd19d519c5b357b8369877cd217b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57fc2c827ba0fd1c3ca105cf04d3177bc
SHA19e439a6b542c72a3a834efbd34bbd0940bcd0de0
SHA256900d529436025d3c4777abd0b0abea42e5284cf12f321a67216f95e1462bb172
SHA5121387873624e7a42e20c10e36923ace28964d3ea169007b38df1740e580ddbfa4923e355f1a344e1c81876696e4c0476bde92713bec8e855df4b5dc44ed8132f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f9047ebc9ddf2521193d0411983fe78
SHA1eaf95033afad2345d6963c58403c5387a14207b0
SHA256bfd13aa582eff8eef9c6c698490b9d524464aeb38bc9b6e5fae6871a87e034f4
SHA51295775085a0952416e9e1de5125ade6342574fd1857ebc79b3c3b4b8099e00f71444dd4a309572154a7338410e196aca0bee2e1719b75159151483ee40ff0a853
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b95fba9ab349228c846d091b2294fa40
SHA15d7e365b44140e3015d3ca724acf1ae00f1c6ba6
SHA2568efbe8d6ab5d6357fc6abfca7d462b22960e6cc4a45d67edc34d8bfb9c37b3f8
SHA512385f304c0b2be8f68fe96c5ca49ef6dfe941503b075abc5bdc82759993679d81767afd4f775b85519cb20fd99083bcc5b6b24619c0fb0b01b15149aeb3d08746
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5aab68a409eb64c353d4acf738192a1
SHA187996057f6aab8716f3fc04261a932571209634d
SHA256c36b337bb3b49c3d84953bb68d60f9c7ed3f7fc6298eea7d2b5b8a344c90f0a1
SHA5127765947f30a8b89a32c948ea0c82c8bd7de7512d707619749dbd329703b206cbdb2b10c25a3e2fafe7b0e9d19270fab3db21d6edfe590f9bc81aec30f2848418
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a