Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
08-05-2024 01:24
Static task
static1
Behavioral task
behavioral1
Sample
2295c9986b388baea10d905d4dbc1741_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2295c9986b388baea10d905d4dbc1741_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2295c9986b388baea10d905d4dbc1741_JaffaCakes118.html
-
Size
90KB
-
MD5
2295c9986b388baea10d905d4dbc1741
-
SHA1
f18605367c9304526c288bda9c26d8a0b020ec37
-
SHA256
9d944d83b66ad2b3595da53e6f9ced0acb900bc07d5e4be065d4b8e57233f6e6
-
SHA512
df36389064578a48dbc5c8751640aedc95b6e7c47319831e677c3be66858414272756851ad267a459c90fabc57fdaf619cbae73c21d2bda96498c5518dba0484
-
SSDEEP
1536:tUbyXMWf+cuAASENzT8rdan4cllrlwDWn17yGkFVb:WbycW93ENT8rdan4St+DWnTkFVb
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90098582e6a0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421293320" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ADAEBFD1-0CD9-11EF-B837-5AD7C7D11D06} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000e02cc54408b828fc38578cdcb07601a03a4cc52553e16ee985bb93d64fb1511f000000000e8000000002000020000000ea5756df06345cf64a8d5051d47a414d50580794c4e46b1922a5184cfc69384720000000ec6af2a638454ae6a16e93d82bb58a796aa10c2a3369683d251c73cf9d99685d40000000a567340d95dff296710ef50b6b3d946a8e4b73894c57b7a6b02663e2e944fc0cb1178f7fce063eb22becfe335364812a6deabda6513d44152b54f30e1a901980 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2440 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2440 iexplore.exe 2440 iexplore.exe 1732 IEXPLORE.EXE 1732 IEXPLORE.EXE 1732 IEXPLORE.EXE 1732 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2440 wrote to memory of 1732 2440 iexplore.exe 28 PID 2440 wrote to memory of 1732 2440 iexplore.exe 28 PID 2440 wrote to memory of 1732 2440 iexplore.exe 28 PID 2440 wrote to memory of 1732 2440 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2295c9986b388baea10d905d4dbc1741_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2440 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d0fae47b45d12cfc83c0d4b73901a2f
SHA114eb3bbaa039b1480efab627777a248ada6c3e8f
SHA2569cd1833a1e9a49b828f1ef8a62ea2b31e803e18436777a2184e47caf962133d2
SHA51275876d13a2e3d23a215caac996fb117f69d8835fc09a9331dbdae68191055af726353ad390271671465f9810c57476b5395f393faef914310e3b5ce9f89684d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf784cc724720dc3224acff485e39fd7
SHA1d339d3b3b38a98f847ef05a7f808f970ad46f9b5
SHA256411a2bb616f3804b54d3f7ed9f06b974eebfd9f00e9731c3e58cf7863fc252e6
SHA512942c65af1fd8738f42bf5d96b55e66a748bd93b0d3d65929a54ba5b5e7f697ebf20172a9cd897369e405e4b092ec1ac786a597abeba843fca04f1ffe00f914c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eee84eb4b68b72e258f96fac05436425
SHA1631160fe64c2021b491357a275a0b97f339332cf
SHA2561ea4a57e836d7269505866ea6968da2a58e6a0f2c1801777bdaad85d1c619d5a
SHA512d38a584935bee18c13cd4cb521f6811475ecb3e2ea3de3022fb8f9fb7fcd54014ccb83263e067142d268ae66832aa19cae836a8bbf06d41206a309a8ce8e4a9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae1bfc18e927e2e96f7ab97cce9d19ef
SHA1633ba7cf31a4990cc6c76c18cf8e7e25083d7346
SHA25654d8625c60b27a55f757ae1f1ca027ebf63708baf2bb55dc6d2760a73daba77a
SHA512da5e7a3b4bcdb25dd68bc8df026dafbbce40a7e2449f3ce7d700691535fbec1d3cd8b88338aa2a13023727105c1a1e99d4cc0647b587625750030d7a6f4ba00c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58490583e8894e9ae0f29e409f42a4c8a
SHA129fcd5500311a87afbd668886c3b07861434f3ef
SHA256513d4c187f7eefe14320306672eafc4b6d5676e391e03cba7019af8f973484e1
SHA512a38acd2774d5e4558c5f4e50e5c94bf3684ef745264c38fbb2a4496ea4477415206b7534d53af0d770e3cc0a3d975fbed6024f89620cb911f743154fffa5b1fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e54ab05d9e22c3e8002c66cf6bfd62e9
SHA1d687d7ca83f2e49eee393a999b113e605f7ab1e7
SHA2560ca21252e0a1d0f8a3e77278520729d731427e7286f23662ccb47f1da857a1a4
SHA512f9e8322b2c6e608afbf8603a1738b6f6087221138ad78c6b9729873fd2a15df583348a9a54a481827c6f84252fff13f24669df634801c89314f3a83684ace1e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2629d690b4c4fd13f2f65379928900d
SHA13418cceee5a70b2cac03d5389d359fcf3af1ed30
SHA2564be1909856e7eaad339d57896e41cb6714584e62752848415377680fa930c876
SHA51267ac3fee3132a9a45aabb09c5707f9aa7543a2f7257dc3b5334c9d64054386f8880cb9008db5e87a83cfd52e81657ec78add4a038661193aebb4686cc24410ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e8da50115f9c546926aea2486e40c9c
SHA18aaf2963d081edc90c0d27a80715849da1eb3210
SHA2566a4844e4bd9b8e4300e0c612a3f2d37fd50e0063c2fd1bb6676fb3cc0a604771
SHA512f8cc17cb57b2c1c862b0daaf3c0bf4df49a7b183fc20633e2b9218454cf08ce121f1a2de6db2e79de3a22786bb33435b185c41cb56364396bc112b390c762d84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5764231f3ed01e52e7ad7c0caccf2c082
SHA1485433844b1ad530cb38504c5250fee2e2d13a2b
SHA256cba1f026736cc12da79bb3d14e84628c048f4a55ed83d54fbd53fa165dcd18f2
SHA512e6416d188cc53da7ae81931e3d29213c98aa151395409338167c703914b04471ac660cf5a31d9310201123e6f82ebe4217e415d9cb2284ab2439a6328f16f2c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598ca5dfa07fa7e711fa493e8b1b88eb6
SHA16ab4b8fe89486c40a68a9515211f1c6c5d41bd1f
SHA25627bf0359d1a770cf6ed1188a045e64e61ea978984fa2705ec28c2b5d1f3fc3b9
SHA512ad0ad2cba04ae4b80ffeefed8880fca126de5be191ef0e274bee4af7944ebc92ea313a95f7367d7e2709d63d76496bf7445572b942144598583ab95f59d020eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5daee08f79f0b81b9a6cbbbc06cae5664
SHA1189d4fb632225ec3876c90446a08b067fb8bbeeb
SHA256b58f25d0a7389bd42c9f63702d5943f54c0b351e94f1f9955d29141de9a50344
SHA512a442e2be0a35b4fd1789367bb5a602a30c953f42661dd03d4749e778be73d151fab2d4d94532648c596505fb48403615fca7caa634ec0cb309bb9fd61bab849c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548c82d2406dd79ab743258bc098ecb86
SHA1accdcc207fef7700ba1bd8772326e0a4cf18563a
SHA25660c1777c74e26b9f2284b64d6319f88f5556178101fb7ec03ec7fe58c5a9fde0
SHA51206106f5f57aee3bb325f90f3c5ac0d54e6a45a068ce7f0d53c89f5bf3684a33c367798e2557bd4690f1e819f826f5e559865da22efeccebe211f60e8591431e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e01cf2a4d7131f23c50c4943a536a5d
SHA1d4862433793789b94acbae568e4cbb7ab0e94031
SHA256d09f0575777739d447d6e08f8d2951c5d771c14a4962e30459ae1d968dccabc6
SHA512264069415249d010c4c7fe38914d2f7b497add2e21e7b7f3c34e2b3a3101b2e4f1c1e0e2f02aa2b5db086bebabfbab3a1634f324c843fc30b3850eb59cc14930
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5031216a623f63cc741038ea0f2c89683
SHA1535c8b8d3f37d9d8c26504de3a19c4c951b67ade
SHA25688c5ccaaaed8cfbe0777391fea6b7a98daa74f72516e69c31fe32978ea282e4b
SHA51226dc8e8f7be4c84bb23eb026871ea967a1ff684b862a80fd231edb6da5aa352eb279011caf467cd502928f52125fd65719467cc80c7213c5cdd23b1068ffde02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541aeb979c9c5aa94bed54f005d0c62e9
SHA165c4c31c8508773efaca89b9dc56830e71ab6ee7
SHA256ea4b6b0db0deeab78b9af79f76cb1d2edb891827a2c73a7b9c48bd9ac5e114c5
SHA51207fdc80ed142ee4a443e619168d5dd62ab2d57456a51449bcc339d3fae4f73394f4e4e1b606b906ebcfb2a0b5bcffb86bf147d8ea17ccb65f5f44fcee3f7fadf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6e05303e1f7b20fbc84f10e1cf3d8d6
SHA169d0461fb398701360b7bba9490a5f38aafc8e84
SHA25677ff753e562d08aefd402d76dbb00c393565e644144f05406fa745f188637821
SHA51212b81c73755a49995ac7eda5c70d454ebfa3bed4884cc497c00a6229a6be18b1783d059281414b89752be0f9023f7569886cce22f549f572150c6f5e86180dc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d129c0c505a6c425d9c50dabc754b7b
SHA1d19daa84fe304b2bd9135db4b7bef12e564d09f9
SHA2568f171c87fdae17aed63b7ba49510c77628dad8bee5563812317a1184f8990ccf
SHA512e09b9000cced9df61040d93c8a7d42c47b42f7974ca1b9f6aff85248d662cb6eb203193dc78757854359e006d409c6764df2fe7e3f1251a90576fa33e4e958e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517d702a2fe2957306f0388ec93c52d81
SHA1c7e422cf48d1f5ac3b011cf17765fbf45c6dd77a
SHA2568c7b14884ee8847a707f63d3d943e094ba839b394b9867651d46620ce8220571
SHA512120934bc8becb5002f9eae4415452463ab67b021959b682c1f08b129a0866d6533be17a4b4677eb628926a4b6b21b70fe44ed9cbe9e890f3ca1a511ae6b4f44a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518b917eef5d065a583e2e2ccde39a9d0
SHA1bcc236e2a1cc338bf3eb88c3dea6583f32a6c293
SHA256dde61fff5fc893177e076d27d45c1004cf033bb20c6dbe3521509e3bd7db1f20
SHA51237e23b75050d985ac606ca9ed73cfaf5f6cdfe881358bfe34019f18a7be49c85048833a0a6261a5f87ff7102df9c86d2b3b6f7b1f14fd78ce57d479afaa8607e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eda64c82cedfb30c76ca745ad79c486d
SHA119ada6df5c648a8434703e16f2aad1c5269a17e9
SHA25609f439d8777b7ad070c84c49edba0be01084ee7d7d3eb71053c816e990f9af4a
SHA512cedc1eb63caf4caef1036b3285b7af857d061d565d126d01d56251e0bb7b2745ae6a5eedbfcc1781d0d85676f446abef83f302c9f39f8c5878e4dc3d467ee786
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a