Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 14:47
Static task
static1
Behavioral task
behavioral1
Sample
2556730738858dd50e346c76b5ccec98_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2556730738858dd50e346c76b5ccec98_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2556730738858dd50e346c76b5ccec98_JaffaCakes118.html
-
Size
41KB
-
MD5
2556730738858dd50e346c76b5ccec98
-
SHA1
b5235b12c0fec3b4a39c7eeb1af047fbb8a028ac
-
SHA256
af798d5e8fc5700361f3243aae9baca6cbb7018004b3a8e8cd84db8dc47c57b4
-
SHA512
903e8c69e72e8dbb2775904f18c4e87fe48568c072df6bca59c1e831787fef5faf61961ccd714c6a14d0fc3562fa559377777ebb41e86c3c90707ea17193c437
-
SSDEEP
768:Oxh5ijIcdL3/mqT0BqXcVkW/oeI1eAnzWPmuARSAMsyoH/GB0:Oxh5ijIcdL3/P0BqXcVV/oeI1eAnzWPw
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c6000000000200000000001066000000010000200000004da35d54a36e0ed95df6b2500b0cc0109d81d79857f23cf08b3f340117ac441f000000000e80000000020000200000005c62a732ad60486828d7f5bf3e6918a229b8215cc49dc1bd1f3fc06c3dc76d9820000000b7f74d334f2122cfb3a696972e307dcc3fd2cef4738aaf913b138280feaed1e440000000e988a58b8c97c9c3e3408b9d289dd6d315aaeecdcf6bbdbdc327c9b5505893389c02777ab1255d391ec6424a55f997104721bf28607dcacf95343bd9c9e5ef89 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0cb21cb56a1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421341526" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EAAF08C1-0D49-11EF-9DE9-520ACD40185F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2952 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2952 iexplore.exe 2952 iexplore.exe 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2952 wrote to memory of 2300 2952 iexplore.exe 28 PID 2952 wrote to memory of 2300 2952 iexplore.exe 28 PID 2952 wrote to memory of 2300 2952 iexplore.exe 28 PID 2952 wrote to memory of 2300 2952 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2556730738858dd50e346c76b5ccec98_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2952 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2300
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de3bbb68bae8991416b428d2f5b4fd13
SHA1c76626325aedaf3fed44ddc713574ef1104864a5
SHA2566a789408586c818e9a54d178f489d39864f8710d8185b44fb632d654938bfb72
SHA512c87735a4c44ee1a8e8c13c9a2b0f6c27affa9770b2388444888b1b5af0c7c90fbd406ddf94d40d80c1f7dfcc6df0b1bb1f46d650d098436387dd15f06e515f5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a312be835da4776e22685abcaa0be9b
SHA13cb054bc7cf8f1073da634d3925db4fcb00258eb
SHA25643811740101e270698eea187993935baf7017c711e8735fc0b1d2c7d64cc673f
SHA512e1d49a8adc27883da18a241beeebb2886019d6ba3c7e5c8953907f6eabcbf3424048e8053f9177a3f74e28b5fe56d520a0b1861a335865584137216dbbd026fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5849891c1f588f07876a82d2f9ea25622
SHA195625af18b62dbb3b4e2634c253bd1d2aadad8cf
SHA256f1097e3b269b7a9d4da68788867b7f38de6bf2de6e15237a60bd8c58287b36ef
SHA512c5197e387016d039f5b39425d0fc44bdfe5246c131873fdc9070dc2477944648c463f0ec0628c02a6af5611dc0abe5019e9aea8b3144b2b2f7a1759e8310a3ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc77bfd17d10fb8bf23f3db695d424f2
SHA10f58e305ff1a934f727c94ce08ca3b858c35c2df
SHA256b9cb74a483756b077073bf3bf82eda89b7e53ccdc6fa73799c6a36d35a5f9688
SHA512cffd26d6855eba58c8855c93ef4777351dbaa55a74e72ecf4c6f1c15dd97f19711ec42b2781d055890aa1da74de867a847e420fac969380b3d7b4db860b2b0ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d81daa7734f1d20cbc5d7aa42407acc4
SHA1e1946e33b58040d025a3b7fa86e24ab8fbe5467b
SHA256d6c83f3b99bf78b4aa0ad3ca5942bd84e3e6e2dbf61c2a3df6e8f4c4690414fa
SHA512016eb0eabb6be99865ea1037423ab685cf86d7b8f9ef1cb497b781b7ee63b970b97a110c50d978a4d5ac9d4d9099cd83a1e3098720f764e521dd3e43103bf292
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5043df2812414edb3c0c6006e0658f91b
SHA1255e34dfbbdb5beaa03052c690d9a842d9ca7c25
SHA2564ba629b3773808c3a88f4bf83cfffb76c1eed13c671d4e1bdc13d80d76e822a3
SHA5125309ab487984cce316fbe76682fcafff2ebe30df4f88e5a5449753052efac9fe766a45009e3f0bd64bc5b99ff6c8efa1ef948770a0fc8ed11af9fd3c112405c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4580cf2bbaead49df8a8df1e30c994b
SHA10c8356779260f6600c1d2d0c3d850d48cc87dc39
SHA2560ecda7449995d98178610a7fb9a2553656273d7f00fae6cf32cdd12b53de3050
SHA512475e6e972157a531a89f4852e2c019f5cf41912dd02f7fb2a2b96333ad486f090c6138e943abdc4710d032c84a2742e97074faf344d496fed25e35e64a6b5309
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da84522a819503104c1515e908817dcd
SHA1ca51b50c9731dec298f79e482d56855d06a86f8d
SHA256fa2fe39e555159ca621bfc619193540f74ec835b21ab29ab56dc3470ac8e7a85
SHA512ffef975e7b2b9e3ce509664f5616ba13da19e2b08a2d85c3fb54f1ca2e2e142e6dc63f2d4564e41347a7b1ae89ba6b2f93eb39372e133a080429fb5c334fd2da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592c50426721a1c050adca0fcf1078d9e
SHA15be78204e3e5b755196ce5137dcfeb6103a6a88e
SHA256dc133f951d4f052bc7234a9daadd7b3bdec116a3da252880c99a844f077ac48d
SHA51219fb8eb35d023cef92741ec7b7d14686ff40d4e4b5cc5515ee1399eac7269ec236f638c0066522a99e4aaa54ae2f590c87d9017e07a432e527993807ccdf10e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b373707d976b3c6a81d78067e3b97dc
SHA1827226fdb8c129cc53d536287c29a599b228f4e5
SHA2563f407200c94fc3f9b0de8921f249541979271c1d0ea51039146e51d10c4f7db3
SHA512f541f6bb785928fc206cae38f5801fbf26383b70e01f5f1147db40445b092a02a68b51455922d8fecfdc3512562c0a88d9b9621b9ea42cc2162aa67842d6eddc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ab7d8cbc2174eba39efa89d36d0ecba
SHA103350d9b8436cf17e439ba7db6bfea7f28f2fd37
SHA25686d4a3b615be91b308428d43703f7a8af85dfbd54cb0acddc72484bc63b40149
SHA512d5255ce6e34d63bb3fb1c450fb6af31fbf114ca7751e34c91752e00d1d4ee544a09bc7499c2fa16bb646b3b577bb53d878ed9b1b57362f4cdab5c98fe45ca33b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd220d5499ee468be10e1d81f1afe23e
SHA148fefba5c14c703f7339456639bc4e2d56ffc620
SHA256857d539a0d7a7b1d3e50b1eeb2a5fadc3708161797ef5fbdce7f53e08e6c091a
SHA512071b5eb5b5bd961be69d63a773930ac438dc1006a02b7f60fd59e5a6cd3b462e6309257335376f166f0d6c8c340fc747d91453787d8526fa91f45ede1673b993
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525e2c2f6a93d137de4928f429379ffd6
SHA1aff92bae53d06a05eac88cb66d41424a46ecce55
SHA256941efefa1251d1f0465e5ec23531d2870d3f9b481daa3d55c506edc12ec57f7c
SHA512536a0b8e84c458f142785ac79ff7651b8bddee25cbc7ecd71669bc46e06b7261015732b3218ffcc4e66cc774bc1687b1c9e4232c91d8df613d10ee2ced6a368b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52daa98857daf127f8041ce69373d46d8
SHA1fc8436aad80a472d92a9fde6dce3bfe88c33ab04
SHA2566fce8ad726714a4b35079095ac616b2fa45687a9da0bf3f7ac9a00c02a3188fd
SHA512fd65eeef98301615c08395935ff572f7dbea9057ba273e4986b459f1a1d7047ea6c688cadb41af4b24dddefa6af01fbfba54d83a349d570a9c725c195c0dcd0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52890f660ff217cf93bcde3b0d7c88424
SHA13bb23f21dc68f68430b6ef6eafb17f32af998cf8
SHA256a58fa36219e3723b7aec058757889ab85b5f7ee20cab42564f1b99775010c8aa
SHA512c91128c13f434ce05e5db7cb4a95731f194294375bf5eeedea8d5f0c29d2887aa23e2d2bfb8a87a0cbfba9e93727ee58630b922364e71f7647d54a01841f2618
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5892783f7e7f760b7a71e2d75aa2423b7
SHA1378204587afe3ce6e399cdf84f316f7982e348e9
SHA2564613f62f682f663e604691d08df52a083021e285dd7a00ec350e5bcafa98b758
SHA512b433502ab48ae12a31c735eee23a91775393ef07d6af1db01b52a660c5593ba2eae832e7ed6cc8f389617a1d7b006ea97939a0a8e51c223f07090234cc20a1df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5327ba3f6ebdd56f980e61fec278ca934
SHA1587a11068cf8e993841a3408f87f7e4ea39fee61
SHA25604e5854ce619c98c4e7f113239c221032ec19434824cc66ae36b7e4cae27ab11
SHA512591f4202aa40bd2dd71c5339f936668c14f21021d22decf83659911cf70d97d8f0829e4cf9b1cce782d3755aa7bb3840507b985343d12faa9fa0782b96ec2dcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a985838de34bb01a3a62648a8af8a688
SHA1b8630023f8ee88056e17f8fdc884bf058ada7769
SHA2567e3cb050ba2fbd916efb6b8ae8e5262a840e225506af905f2f9225cbc434d9e8
SHA512e587d85f361394b27534fb804c0e7e690576071da13be4bd31668c91a28548182775b61923875c944c34300b5f30174cca59f88c4efeaab3ebcc1ae227ef22aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5512e90e990593b8210dc3ef0f059770e
SHA16aa53e5f5b1cfeea6ec2b9c9bc9122e93b64e358
SHA2565813825935d1c563a06b447881f8db4fb5e5ab7b6ec351a17fdcce524439ce91
SHA5121a9ab634eed1bbf738ce4d22a678b703d2b465560a0ade6108fbbdba1ccb5216eea30d6712411e3190d847dba4a02557ffbd1be98ece1561bd22bf7a40e11da4
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a