Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
07-05-2024 19:40
Static task
static1
Behavioral task
behavioral1
Sample
216ea918a31eddc2464ecf17d0875df1_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
216ea918a31eddc2464ecf17d0875df1_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
216ea918a31eddc2464ecf17d0875df1_JaffaCakes118.html
-
Size
461KB
-
MD5
216ea918a31eddc2464ecf17d0875df1
-
SHA1
d9cab9e5643afb1264612f25d5f1851d914fbdee
-
SHA256
8f7697631167338ba0b9808b553d3ffe38029c986a7f366fa0d1923090862e85
-
SHA512
5df3f9c45af36f55606939bff0d84241a3cbbd6d3f4a467c36c40c8b6e48b80c8343e7b71311cb6feb7c0bd974dff2d0cd4c7083bd40c9403ca8aedc4ddbcd27
-
SSDEEP
6144:SGsMYod+X3oI+YOP7ZsMYod+X3oI+Y9sMYod+X3oI+YLsMYod+X3oI+YQ:x5d+X3y5d+X375d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000f1c97b34a1f65a9e66fc823358eb2d6975e8aba82ac4ccece429efcca580516a000000000e80000000020000200000001552cab9970591d7f42fc11140bcfb3352ffefccce53360d61886f2cf1be72af200000003a98c507cc367a830dd36fbb5ed90fd81fd344d885fa254f8db9213bb4eae96540000000a295466d93ef02481ea389f48e32fef5158f89ff6b5709425bbdc5a5bf9f8803cac817b7097c8e76a09cf99a494ce8c0738b8e69b65153d37ec357d8055c0c51 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 903dd277b6a0da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421272681" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9F4AB371-0CA9-11EF-A0EE-F2EF6E19F123} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1680 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1680 iexplore.exe 1680 iexplore.exe 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1680 wrote to memory of 2928 1680 iexplore.exe 28 PID 1680 wrote to memory of 2928 1680 iexplore.exe 28 PID 1680 wrote to memory of 2928 1680 iexplore.exe 28 PID 1680 wrote to memory of 2928 1680 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\216ea918a31eddc2464ecf17d0875df1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1680 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0b137f9b5239980b65ff35a70b8d1c3
SHA13ba3f08f733979f2758cce3df481658621f16227
SHA2566d7a9fca46524eaf6c16381e13a862de02d1a0e1590d9931be4832fc989050cb
SHA512310d53e2ff4c583a53bb5c25630963f4fd50e3816b056cabe00f28e48b1ffb64d380afa6a61b4ce4cece5039db0ed71850799d43b00bdad12bedbbb5527c08cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552b55562c7abf60c8be65f739c215b91
SHA1c93285009ad66d2cba10333e3fa115cdcde1d545
SHA25686044d0b97b897f45178fc266d157271bd32652ce53516f12cadb5ff9929795b
SHA51254fc16cee4cf3ad8de6b5c6e427808e4a1e695a43d3a1bf97168255ae649200fe4c48b15fcd5ebecd9ae14daa77157ac439aff31eae0b0edf180c086762f6ab0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5954f5393553bff9683a6eb9a79a3e126
SHA11ae85b408a7cc63adf8891bec2e75730aecdf830
SHA25699456c7a2f05bfa36e73d70b937b9923d0a263861b165bcb424f95ccd8d94b36
SHA512a5f35e24eee490d60f3e83d5b86bd3ce47968f6a217ab0c7e396b147db2c7fcdf56cc9c136e0687af86119354162ecd717ba96ebffb4c04c4c3afbf5b1a3967b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0f2787a494016c8cbe974149c31c348
SHA1474140fd2a9ae93ad29e9c675357e8595a1a1c2a
SHA256fbb6a6f0f07e6689f5f513c9c531a39beba0b629b54c7121c3d83376cc23e32a
SHA51293a546fd87a34ae9cdbd9fcbc524a88385d1e91338dd7ee33442343193d72370ddbe4c888c8b97191cbf18d28082fb49abe3b164ce798e294454685ff464e971
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53fc5ba56d237082f7f46ebb5f217e014
SHA1f967673587b3e58035bae28ebedfce66b39c783f
SHA256b3f24a30ac138eab89c46218f6cc9799d0a5173be8e78b13379db7d1c8453d69
SHA51240d3bde5bbfaaba653f21233f5b632afee41305960e5aca5367ec6cee6e28b642a8f669fd7d7c2063e0706f854ed419dd2291e9986e078f551c527a3d2764e7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50641e0d10d67e53a219ab26483f391af
SHA1a6a38f3290f55b0183677a73c18619c984e11915
SHA2560db4aeb0e10991adcc85a526eb8aba9524e5a081aa26c537bd5b201ec4b685b2
SHA512bb2ea5187669004b1111e78eb8c712aa3f6487ac453f31931c694c5f3a112101b9dc4751a686fa553a72619bc5fcaf9148d0a2497da529262add8e746ce63eec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0e03ea6c051d5345bb54c1f533322ff
SHA177bdf6207f22e2d6dc597e2e7f8aa030c348ae33
SHA25678060596cf042e9024cdb4fd8a911413fab139486356030030612a60ce3af466
SHA5127dfd5b36c403c8992d2784415ef3b4ebac03c21991c1e8ef5cb52a32ae9f7bded7cd962ea953e571351f8c6568f5179b65e352eb5913f32f184b64c60723a3e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533aa8f492268fd94505b5e3da196c311
SHA1092599bcf2661c1ca521b70d883a4bd5b9562d75
SHA256a801315e0acc4f32b006701e44c7ca47e975ea11714d33feb8180a28e26164df
SHA51275a4557c0fd303f3b424e375e22cc08e17534109ab2f956b4dca6e5da85c78117a7a03d3b84616bd3ed4655d00eec289a32b20d805637610f779b59892b63c6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53bbb3b18d48330383f2ece1806d68bb4
SHA1ada16cd7875027c6280d462feb3b3c590cfd1758
SHA256fcd55c7364331cba4d08a0757d5e742353f18ddf7b2719961eb3db1ca2589d3b
SHA5125920728bae5729512213c2b7dbd15dbb83bfa0527139b17fe8983196c4b25c68f6952cdbeba7c87d5e62ab502b1fa3e56b55a17fb3f49dea449b8169a8d5d675
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e0e3857d92d72c756fb27e17cd701fb
SHA143dbf7d8a20ea668b02b93ecae0b47bf09621c56
SHA256e61d06b7b633c32579129cdc8242958f6a35de279b8dffc624a8fc84913a3bb9
SHA512f193522214fd25d890ef6fb4603c1b6c26c3b1559173a2bb648c7b6e46ea7c74ee6065fecdce6d193c7b385ca1d9a02d842752583d7b1052f6824b4d1a906b55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e60c48ac23130f0b6a6032d3dcf64b7d
SHA17dec4a360e2e6c03af5ebbb9ff515f309f154396
SHA256af4b1a17d5804670ae510779aae3ed45feadcc9623a021325dbfeebd2189b43a
SHA512d442f0132799f44ff518c7a88950dbfa06e5ec6953e204aec191ea01b5056104942809dcd0bbe3713d7db324441653443acdaf0ad3dd325a78e5ee867945e4ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1a34053ddd4ef833aa300c778c90680
SHA11d77b33b7432b752aca1a92d4ed943d4d944ed82
SHA25609d5cc48c6d5d19c444e3a3ba63c1e6b36afa7aa980e98761cc0e8cbcbb346df
SHA5122fb3ec3eda882e2ff272531393185acbd7a413a2e87ae672289e98286de24cb61d4065d275ea0ab1392d400a14d4d33c734c24e300afbcb3b98fbdc5976e9a46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a1b302bbb948bf3609b4556a454e780
SHA149d5a9d8f44715564c1dc65e976726437aa57559
SHA256a833eef588502799cce6d6a9d908f21dd31126ab2e38a2ab02c169877b3e1c6a
SHA51211dd08defecda898aebc32fd0f4a0b1f610a9bfb782aee01cd9237a995809cefed97ac2431dbf974ae889fecdc030b7de5ff5b4df5689285da45269f91333a76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57421aa9836d69b05141cbd143605d304
SHA163f5c29b20830fd23ece2fc1ff5d157c2a414560
SHA256287edb4c3d33e8d36fb479c07c45f18f83031460ffec9a47ad08dc0914217088
SHA5129520c650106a40249dbbed02d3a29c037b55ab29392a81aed339a5e64e73c272c2524af96fed59f3b0f4298a9ff2556558c2ea92ae0bde7c419714bebf1a5a87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e03284e3582b5c054a97cb18b5ddeb58
SHA169cb5ccb63dd4000643539ac8d7c167d4214f1df
SHA25643e1ba87d95a79a6340303bdf1113286214c741f7626c6fbaa59304b1889490e
SHA512040f8fd3230cbc6cc24d2330dc6adc7c8f5acbbce29dd8788956e06ad5db5264fdd711b250311ba849d2794dead050d908ab74ad202135f52811b49c6537a604
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac8eee14b71f04508801b7368ef717c4
SHA11e5aecd31a23e757b500d9078d38a126a93393c2
SHA25601085d78a04f8255368de24c42c613d37adf10c926d7eff4994c10f3c9a96bbe
SHA512495c0791c213966cb8d41f8e575412daae54d909ac494fa912ae8db00acc70ef8baa1d227a79de39ddcef9160aa34aa9c6f7c422fc51c847fd128392b099846b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5262fead8ccc5c4ded686f4efd37c3dd5
SHA16dc6098947558a76cf7fbf0bc066e7d3d426a25e
SHA2561bfd2f31fcf901b741ac343fd1e20408e2e9068507adaa6418be7709d799afa5
SHA51245a33a8dae1cebd9ebdc9823f01a5454e011fceca4d30b8fd8a2360b2201fc1830c9f8d8a8f2c7ed21f0867769bf6c301243e9d265ba7676c58c0c35a54a9c51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53233b17b1c4f86da7178302abb2a7fea
SHA1f9856b00f27689aeceb54b77225341e2621e8b08
SHA256edabf9ad74466c7a4aa732c5ff3734aaedb299ac8ba66ee8ce9d8cda8fceb5cf
SHA512ab29a43a8123b0ec02683ddce828f227efe6d8275c8de52bd860d124b3a5a587f7866614ac21709d05446583899bc38da6950faf0319f05aed5bfa56dfe25321
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bb7b21950797e68d1ca2d3f941180b9
SHA1768b72cd0b2c0d6bdfa14374cd28eda960bf67bb
SHA256e97cf3cc78831afee8d05a4d54371a45351ceabee5b181a51bc9015a10e2542b
SHA51252c9f5e18aa39914eb4289ac9b0efca18d0569cf69169989e111912bce939cbcd2e7c77eb186085f3ebbd55fd3344bb0ad0f9e24efae92a79f9536a9535cfc30
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a