Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 09:19
Static task
static1
Behavioral task
behavioral1
Sample
242f78fa7e5843538fe192ccd8b57ae6_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
242f78fa7e5843538fe192ccd8b57ae6_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
242f78fa7e5843538fe192ccd8b57ae6_JaffaCakes118.html
-
Size
348KB
-
MD5
242f78fa7e5843538fe192ccd8b57ae6
-
SHA1
4ac46866bc9f2cf9e6893d39c45e0af7e26dfb08
-
SHA256
8ebb4ecb684deb58fe960a9e1f00bc3340f2cd1ceadc1d963a9045ec0ea14df7
-
SHA512
63c97edb08591fdf30b4a6adcc4cb0592719b2d262e0c873aaab4ad4e6eb88764d4f83e4175688acc165ef5795477e20b23cfa0965d457c15215d9efb6ba210f
-
SSDEEP
6144:8sMYod+X3oI+Yp9YddA9YddzFeE2sMYod+X3oI+YcsMYod+X3oI+YQ:q5d+X3SFeEU5d+X345d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421321839" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c6000000000200000000001066000000010000200000007e0f7f5c0c8fcfad19488e4ab6652d34d0e9e7ef89ec77d377c3949f82d18485000000000e80000000020000200000003c6b0a44900eaec853630bd2f9165feff430dcebbc6f7cca28a513dbe8cfabb7200000009e41261271f13b643298aa3ed61b8483cbe7e07227c1f3cbaa6e69d10abe2a854000000010a3b8304cb29f1d6aba291c9f4a390401478402badf87d216a37265304ae20cd4680d35172e30d62b42f0e2d40cc93a9625328e67ff366c2fbec78694c2b044 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0f55ae828a1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{13C074C1-0D1C-11EF-B411-768C8F534424} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2980 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2980 iexplore.exe 2980 iexplore.exe 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2744 2980 iexplore.exe 28 PID 2980 wrote to memory of 2744 2980 iexplore.exe 28 PID 2980 wrote to memory of 2744 2980 iexplore.exe 28 PID 2980 wrote to memory of 2744 2980 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\242f78fa7e5843538fe192ccd8b57ae6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2980 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4e265d22d87b5d82332be64b33c0dbe
SHA14cded49a009bbc1a6c04fc4ff90842f5da4e3918
SHA2565cca54ca2ea5937030d5c66aa71f2d6c2806d2d24486fc84c625537a9ec2d11d
SHA512c020d019f61925191c8675852c25201a661e644d5c7ec14eed56115a5ede30a802e239296fb83cc5446f66bfa3d2030be5a0727a2c2532cb353f327c724557fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5604b15f6e3f7d306b206134813f54f13
SHA1969aff4a5e9abcf91564c19ee5fe7d480d95b390
SHA256e9a1bda020c441ac3a1cadfa91028502c29b9271a7a1d13be289a7685a6c794d
SHA51273cf1c416d35552ba6827ebe6b5c4fa5d609d6271fcc1f410ce87578d1f2095bead061d87b3ada645286c3a4db66acc0ff0716efa61aa89306cfc0f13caa1a04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc8c9b0324c19792cfceaae46eae6a7d
SHA14773bdcf53e4a4c10599a545e942bfcc6fcaca4e
SHA25640f71d1da233fe20e169a3408a384b8f21b85f030b6a8a6be3a789fba52fba94
SHA5121e352620940c2bf8d65fa16d3a5970f87e28245bec3a5c4bbe0194f6335faf7c76233cc484caa6da2f5a183f6aedd707d294f191d1ba131676afe0f7a2790bea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad5914ba007a65e71c46bd52d6b5e090
SHA1c54946974a7b6676b78d1fee06dbcd718adc90bc
SHA256279967163e1694efb0650c7ddf7a3db74d3f97658d29705ffb191b166c27b38d
SHA512dd325a771dd2ecbe8191b2aacf171c82689bd16bfbe2f6823264f9762a42c7006df2d3579e7f4c87f26f9184490154b6d1fb328cd29fae8e80eb1ff3b8263c9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57db4876e2525df8cf30808f987df597d
SHA11256ec9027b8d28c27745a3f385612ba607d6fb4
SHA256f50b3d6eb06ab70cab4d00eede81c98c028716353eb9359ee9c3ca9639896e14
SHA51250cedd4f0d010be96c1ffcc4a74441104a9818ac6c2c57d565ec24037e858a713c5311f97f57777801e221d89a8790273a5e48a972cd2a3985bd604488406154
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522783d779471c2ac93e8702f6850bc6f
SHA14cf6226d322969fa4a042c32a336025c07a47839
SHA2564daedf5260447511da7341e20a531b810ad4cdbbc6d38eddb74c8bf8aae21c48
SHA512f427dbb3458e59661234808d1cb996bc58cc6abebf1a2093ef96e7a76be5126736a3760ee15972e11caab6c8fa467bb27b1d970622469603a179fec7673a31a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f2960542912ffd633ec20723a1017bf
SHA1c64032b2bb41d4deeaa3d5b492757bdc3a6e1e54
SHA25605989cf8b96400a43619cb9e9b2a9624546cf258e1ff0a4af97ef2f656013984
SHA5121deb293acaa400f377da1ea3036daf6b883924407b1649962b6b32b2ed650bbf2151e465b540df60af1136d6bf82cbba715142e2a296cdadc8d9bc8f64d18690
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f167e334ef3a5f9f62aa9f9c705e8670
SHA1ef8c30ebadbeb0deb2ed34939eb183a46bf64677
SHA256b0d2518c4d9f55f83390535ed0046e77c6e9a175a34a009601c651ba2f115b0a
SHA512394d8ce89acc44389a295dd5e4108171a87eaeb956b122ba1554b3dc7fae947e813b1bbaec51c64eda9fcc0ba0f50d7f6ff0d082e414e055ed209746846a227f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4228328be4284172c33f5f967d2d8b8
SHA13a98a4e447e8ddd65060ed5c4d7892bb7a574ee0
SHA256a166ea5ef1c5617383fbde3f030be5281589611adcb9496aa0095a8d0058631d
SHA5122c7c6c11fabbc2decd87f8c3e0abee83eba6c641e4c16792bcdf49fa77a36a82f4128c9569f7ebc310aeec960d7014bc3f13b6a8c8d6d27df3a3a82de1f2c2be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a41e85863a79fb5d941c5036da72396a
SHA150f8565effb0a198d402bb93975c0e65290055fc
SHA25655b6fee58188848cfb5004e3ffa0d5ba162602607e69578f5441066d551931d3
SHA5122a00675223dfd917f70715965f24cb4716f34a505e8adaaa65e72da36d054679b7166bc7e14c9b46339e771d9fa79abaa13bc711d12196992a20848941dfd533
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5acb47279f119ac383d413d0c5e48808e
SHA1042e88c73f65899753c5d6e389e2b0581a6a70c3
SHA256ddd522f2ecfb6af125d5d906a22e2e5321cb6bd989b92372b990c1591300213b
SHA512122feceac6bf383ec2c38158ca7f33020dac7c4451728fd54bc4752ae6e5cef554a3baf9c7535c8f9f965a4cbc0c1b30941f881d88bd170f8babad44a226f5dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5afc8126371091f48563d0c3bda64078a
SHA180a059a0fb3498ed9fba59bee54ca2a657413690
SHA2560c5a18a6b36a1f4be8f59c3a9c267241f6c7251b22636300cd896cf5c9504491
SHA512e0f830bd76ece889348c7006837b114c0020b18e06ea3f09d3900f9c5172be0405960a3959deeac68ae82e19c6e91ee619e7df1df25138d6d3b07706a97e6c5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516a43ce7c1820f6d3446de9d70a71bfd
SHA15efbc462c6ade30431a4d158a8a3686294b23b8d
SHA2566b0c34c91bcc05c99cc3472e59b8355052060233473ffa034465bda77114bb44
SHA512a751471bcb9af97b2a9defebb9f377d8cc382275b89254e3aa64aa3404adcc2c36a9fadd9c15be400ac81c84dd4a4bc290e49ac35d9e861ac1052de49b2befbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ffc21ef5cb7a6bed4235ba01123f735
SHA18801b7a4ed75c83e3217b3da289e4b8e019a3101
SHA25698ca00193a40194261d0453100cf732d3ef871e45f860c0374e0fcf0de6b87a1
SHA51233ba29c5c99159626f0edc79175e55df23469b1887f29b3f9e23482d53c08f9c8b9c403e918bfb3662e9b9e89fc2f98f62d4f9771f4a165b76989b7cabcf3a20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7c68e171317d4eea3a33fc2c112a5d1
SHA1e2ba2baf000acb7cc86f6b47dc4ede9e49fc6d58
SHA25601846201c1a81e72c7bce58e45edfd00ac6a42238978531429d6bb84fe68a5de
SHA5123633c1bd5c674a278cbfd93600afe37fa7ef012c72e303aade87a39d0afb4695dda7d268a352a0ea5e50d375d3bbc6bc7fde47f7553e94190503c4ad8c6b49dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57782418d6a7d30607828778afb5a58c4
SHA15c0bd6e62c2ec0e152b276ee15547dcd94f9da5d
SHA256aafe7ea96d8be3b395557c57ea135230c6ddd8dad79a70a0f88fe4d2412007d2
SHA512c058f329823aef2a4a1c4af2187295529b33b31c7e1fa7270bfea7195ca38c8c178d9173f4334fa67d8c341d1d8d5da3303112ded460957570697d7870dcbba7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59fa7f0321a223b7f0366003c28ffa332
SHA17aa2f528c8d76f51682787237c4577374c1b5d41
SHA256a6b21881217444bc6dfe8bc6b541c56fe734239ede53021d996136d9aef7e2e6
SHA5123e1a3d87c04a8b40dce1bb992dd0783bc88a55fe4ddbdc8364ba0df5cfb65a7120f20731f0e0678d2963ae202e2d5af8c42a43891d40ab43a5a3b049d53bd808
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5494ee0649f9f31299b45913d7003e84b
SHA113ba25d1d02a6ea93a6d1a17e9a050a70d8c6cf2
SHA256d367d3d723d14ddaea4ef344200c3b91b8b7c8c3665b8f2f32b1d0f98ab4155d
SHA5122b9ce4903fa620a7ed7b871a38b6ae262237c7ca2ebc5ac4022fe669da4da126d931ec6e276ff91343784e1704fcc3615e0d4f849a540e8de76c9dba167fec00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da61b44cda650e9f7bdc80901f9ab3dd
SHA1e3e0239d78f9b77e40a13e3d8fd1be66968839ff
SHA256fb50937c9843b84e191dd1ad95aedc6bf003a094949604f2f87ed3c85c10a840
SHA5124df3246c826ec2de185aeeba96076b0b32795ed4a89cbdd868e17239aea7ab73723e2858abbe4cef96a6fc43a0f857bc44ad7e6000cbcacfa14df111f192deff
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a