Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 02:00
Static task
static1
Behavioral task
behavioral1
Sample
22b7de9b0df148876312c2b9f8413442_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
22b7de9b0df148876312c2b9f8413442_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
22b7de9b0df148876312c2b9f8413442_JaffaCakes118.html
-
Size
460KB
-
MD5
22b7de9b0df148876312c2b9f8413442
-
SHA1
227115a035e45ab2a4ec708f67a96c7f65a73b3c
-
SHA256
843386dac4a64e9bc7d0a25cc7f17892e6be88a3f61df0547d91e859b710cbd4
-
SHA512
6fef05423e79885cc1f3948db9260a1069587e822ee7e7594962a5af937533c9a3b664448e2a29dd0087274798973eefba45815b65857f910e21d4626857da60
-
SSDEEP
6144:SLsMYod+X3oI+YgQmsMYod+X3oI+YKsMYod+X3oI+YLsMYod+X3oI+YQ:G5d+X3q5d+X3i5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421295518" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b05952a4eba0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c6000000000200000000001066000000010000200000006541cd557c81153c831ff785a8b79ac10a4e2636a4655cc95096ce9663eaf39e000000000e80000000020000200000006a173271a37fa22da1f1611fba0a2092954ef958fd646fc59e685af42071747620000000c7562a6e9250b4f6047a83f263129b41dca3f22b3d1177f29783d3e2807d1abf40000000f930353a8d88734016d7f7a5363921fde682b7cfca56a5e9e464a5cf151615d4fbd54bd2d7709323e49897fba219492fa192c7612d1396e7914337c2d88d9ade iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CBC99EE1-0CDE-11EF-B6F2-56A5B28DE56C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1288 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1288 iexplore.exe 1288 iexplore.exe 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1288 wrote to memory of 2800 1288 iexplore.exe 28 PID 1288 wrote to memory of 2800 1288 iexplore.exe 28 PID 1288 wrote to memory of 2800 1288 iexplore.exe 28 PID 1288 wrote to memory of 2800 1288 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\22b7de9b0df148876312c2b9f8413442_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1288 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512e2b2682ba71b72485fa36adb4ee18d
SHA137dd39d48fe7a5ec08af274473f72fbb282ec71c
SHA2561ba345c735a067612f94a94f365e88881a26a59b8a953862df8d4d0a2dffa720
SHA5127f9eafc388986b4bd52704903f7e35d2e87c0064300bf67ed93c21d17a067728c86223c9d2bb1d250b37e44294a9b0c2a08856ce00751f8c6c0f5ee65c7e1fee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5041671c0d2e4949c7f3ef5265fc484f5
SHA11ce1c4668544c751883954753a28cdf5a51cdffe
SHA2566ecec8c4892de23341d81af3a3180fd7ea0e656e28ddbbfbbbeef2f2f324321c
SHA5128fee7f1f5e22e20cc518d70aedb58a42c884daa4ca6c571ba3ae6c4637db47fb1d99b8a0a62b229c238cfd4f9a686d4e1d2524aad4b9bcbedbf8d4dc62558b41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5784e25851de93346b38baed3bde330f8
SHA1198294792eb5dd28df3f96dccded064a597f5a4e
SHA25601e0edb809ec8f4f221277dfc00f145467307c38a3a6738de1b6232c112920f5
SHA51280671fec97dc1188b8c4c4e9c59c88dd27f70410fe534beee8349e3b91a5aba8e10e572026edc304546a50543852d9061d01dfdf3da8bc23f67325403953410a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d72eaffb0066f6420c0669ecc83c3c8
SHA1edb00f66e206bbaa8931f2109604a1ae767c645f
SHA256952b531f74f507abba9a744e3b5f18baef26739f09a2b9e2dcd293aa7a792bc5
SHA512d7d9c3d22d93a7c44de7d0cdd1259772dff59e29da8c6b3ff24bc5784daba14b34a602070482874e4eadf0f130de13dbbeaee30b5517ffaab4f7f8faf3b5f22e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57aa9b7309a7a4617b4f7f77b32560dcf
SHA11c9b2ca27edd12eb88d5fb44de15ae4f1a38e595
SHA256aea35c48956ee597a580e1ddcdfe66d0ac5e26d308c3eb832a158c37f490d212
SHA51288de78f77a5c8ddef6e2a59f37f17f05df040e8919598fd9e2a07f3f39724e0290995b493bb9fffc71b4a45b8fa916fdf26b09eb61d453c130dc7f7ff20bbd52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563d7eeecb778a03522575a00fbc1fb67
SHA1a56628b235496234cf9e1c411c79bb14ad07bb32
SHA2564fd4674ce9ff9f242b0bb7c05bbb350838ec460a90918c60ea39a23076538d3a
SHA512773817cb73e0e86afd3fedeb737e879d6d058d7cc733750c926d5119c16b03078a4c06313f428b9ce92e6720efe51be7874fc16ded6b51af1878c83c14488614
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539541f0710a0043c20272d57fd5c1a7f
SHA10a25a44040a0eabeaf07da910363011d649c25f4
SHA256e4e4da8edcc9b7f5a9732d7695f3777bdf58d24a74823128742ba4e2685bbe39
SHA512123d25835ee31ad910c7f904b153c50651ff7bbe3c09f645013a099a48b10a3d95a24e7d0675bb9bcdb7dd2c014da2985b13ea033cffc416cbbf42c1ac58481d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578a6205d2cf12047bfb91bddff299555
SHA1c3a6064d7dd9128d9755bf0cfcd48e4d2d9df488
SHA256881efd6c9966f1f0999d761e09ceda388b1c780e68b7b917c74cb5e25af5d74d
SHA5129d809d4bd2995123d57ce73aae9b0fa6dff620144a108c7c42b27e9affa3245591e12e0f437311dfc02a7c958c3c9aba3838199fc6aa7e51e045cace7e33a0eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec01b1368f0c615e75f5c6c29050a05d
SHA11cc1a4ed22e218a4e94dde51cd48c93a02ab3bc5
SHA256c72624c0cd2041980b029b5047f50e4251ccfad4000352730fefc6903f3276cc
SHA51219167ea1fcbc15ee8c793ad12112cbe58a3bf812f0aac7dc6bfbfc8398ddd6c14764ac3a496442a7b7af3b78b04e4999f85ebee8595d5b9a81cdb63779a3d082
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57499bbcee256e17dbc7469cf4f6da006
SHA1be7f1d4f6cec1825d658c1a0cde9cb44f7ff47fc
SHA256e94092f66b27dce301f49cfc302d68b2cab5f78f14b554abbb2b10e92f7cb705
SHA5122fc3bfcefc865de30b798cec6d8ed62747ae5d1ef46c060d7eb13b330a7eb7dfa66f73f6eb8df355687916c6a5e8041adc671ffe29a2d056f8b9d62dd390f820
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f0d713fbe11d5575a8e1d0dc06eb079
SHA1c255e7d1c81ebf1f5cf88f443fdde4b536924e3c
SHA2561cd4b523c290b3937ef1f08d61d0cc73b964eeaa3f2b29ec79976c5f053624f5
SHA5120d67506d9bd318c905c5894a10b86cdf97e51ee0534799b77780cbcf1700c237699b1641ec701000875d1f3bcb9476403cd4533307fa8a7a9624b115ae1aa944
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560ff5607bb311560f97cedda96a31eee
SHA1194d76e9783fc86fd85d67fbf9b8b61382ee8b1a
SHA2565d81176040ebf80dfdd4c1e1d30448b6b5512fe4f937855d4fcb7de89302021a
SHA5128d482ae1f6f483dcdf52f3daf2860699c948512420d0a5aa78eae9e976e446f2359247bda627ade6dc1060165c303d2b4f97c6139e980845175b10df06f2836d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7a1a74f133af4e69bc3ff4625a89938
SHA1776cb3107111863aea46a27016f97b7980d18c4d
SHA256df78e48c9d3e15ffde42428f79e7766c8ef0c01806494e860b0e1d5053bec149
SHA512a96898596b6be212fee7f9e5720872def32636806c793c0c3e6914d1251dc22c8fedd504c17e1749bc08a5bb703f406b46351b0c8da4463117785516f44a7999
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b316875bf4ed964ee0acfe84c0104e11
SHA133d9c12b05b11c13af938f733e881ce1ec9b8d30
SHA256de7385beb0089ea6480a1229545e3e4d40c49bbb93ec72fd5f5f958eae4f3417
SHA512483f06a345d514a84a30adcc2f26ebb98a76c6c34ce75fb834cac7fff32efc693df714bc15c9cec37f9ff2672ae5d4cd17f1527643e10233ae0c424187f77c75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c534b68c3968d295bd35f02bbb0c578a
SHA161766a405da6492f65d38e32e7a1f705c793f28e
SHA25603801656a29b70c28ce153c2098fd75399d4602b94ebb82245b93512d58572da
SHA512b5126e9801c6829eb90e8e188c60522c9dc70c9511c937f5d3f053d617d41f5ec71f8ef3204ccb4b17fb4a6b2057672f78c16b51a646acc60d283e59bd83f5d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564c49803862881dd113a9e43c37f5c41
SHA1f1b4ff6204976334ecdedde2e0196576b1eba579
SHA25607f1568933c18acbd88bca4bfe3fba5b27669255e677a87f20d7d5d095649f30
SHA5123f1975844f4997bf684677e4e81d72f3564c2505ceac2eeecb23530f8d4bb0b6e4183f89a3864de02b59265f7c096c1982a3387a15d381acc637b20f2662a4ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592fd676b92827828e9978fa7a632a886
SHA1d55eeb21ac485c825e700fcc86c4502896907d04
SHA2563fe80ec358b702196fe0ba3078228d60cfa4a528780d0288ea461deae380b167
SHA5121fc5ad31061614f1cca9d641b694cdf13a10de67a44e5c75769dc9bca7161c882364e25d3b4abad673fd9ac686b999fbbed97989b35c94695aad265a30ce5431
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5513546dadeefa586c31f4d9f44fada30
SHA127bb440f252f24fca1d53c7cf6f6ba4a554564a5
SHA256a04fcda7d27b321eb3c6959b7ccfaf76b4f422523131363a9e0ade2e60388291
SHA5123094ef47dc0718e5adfa7936c6b947b858335a0c41ef8bd5654cd3c153f2ceefa889bc0b89718cf5e6744cff37ccb2fee038fa031c2c1bb20dc65c3cb0f2f79d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bdeaa5dc6a45ebb13021aa918cb80a61
SHA1649c161d7eb2288074e4cfb1891294406989d859
SHA25649c9e957848ccc759a51913cd90b5555339f189f35ad3f42af1589df45223fd3
SHA5122e4a784a84789b455255093452116184bec6414a8831b523770f8db09df743179c03f52cf843b0f4ce8b57417c6ad8d8627d85f854374d585bb6b678044f6cb1
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a