Analysis
-
max time kernel
138s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-05-2024 16:41
Static task
static1
Behavioral task
behavioral1
Sample
25c303df1bc371df2738b873a2df8ad9_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
25c303df1bc371df2738b873a2df8ad9_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
25c303df1bc371df2738b873a2df8ad9_JaffaCakes118.html
-
Size
73KB
-
MD5
25c303df1bc371df2738b873a2df8ad9
-
SHA1
64ab62b52930e7473ed07cb3df5f9f4193757bf0
-
SHA256
f124b7e569706e560adbc80fe447eb0f3fffa2285700d58ebab654ae7621279c
-
SHA512
ae28e384a2c4285e64bb8f2c48e63ce1c5112236450f2e047c245808cf399df991aab8639edfe8c76ce6980eb278385ff64bd3a8fa977b60ea00bca20fed6503
-
SSDEEP
1536:JPuIfSdvIlvIDTzNen0tbrga94hcuNnQC:J2MivIlvIDTzNUq4hcuZX
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0efd2a266a1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000c1dec62cbde37eb6d8b596e66b42b34bc79708b6030ca42d0f96ac9db096e1be000000000e800000000200002000000002c304a8f5f7104d1d83459116f2305ce209ab261876ef5d996bd47c0f53938d20000000b1562841d5cf38b3ee3d70a19d2056afcad65cdf928fb9f3182aaf2c61e0f4974000000011fa9bd1218573d8fe3f63108d4785f5ba9c5610c3e71b6b24de520c82fb0c15044ad65616a2ec2271bae22a24bd0107398359fc82bf58491c05b3e280a0e41e iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421348350" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CE1C8A11-0D59-11EF-8AAC-6EAD7206CC74} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2848 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2848 iexplore.exe 2848 iexplore.exe 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2532 2848 iexplore.exe 28 PID 2848 wrote to memory of 2532 2848 iexplore.exe 28 PID 2848 wrote to memory of 2532 2848 iexplore.exe 28 PID 2848 wrote to memory of 2532 2848 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\25c303df1bc371df2738b873a2df8ad9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2848 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5940a50dd78f68b054cadc5246f142f5d
SHA1f8aedad594cd9b899a43afbb91329a2f7d137b5d
SHA256b07e21fcb10e6306036bc07af6e08b977e713b1798a9cf4d9f37ef6c0cd87c6a
SHA51220d5729108d71f1e6e89402cd1a649b87906658018c2502c934bf358b6ae9c77a443f6ebbd0d6194efdd3b9fc6a2c73b2b2186d36874bc544385b66e39dc3df4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554841575aeb68949c9fa5b44ccd6cdc5
SHA15fbcb31ef5190802b51eb09d2ec774c4bdfa3aa0
SHA256a0fab07ff2d74be5f775b646212bf701f5adf4bb7f3fcfece76bea4b6206c11f
SHA5123985c6f4009e216c4c705a52f82591f8f2f741da9347275358f592fcffa460b5ffceeddf41115421a58027d7d3a56338433a029cc77bebb6fb17f0b38992986d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3c80101cd86fdc764dd9d08c255efd8
SHA1f6afa811255c7e90f8e292ac8fbd7d17bef6567b
SHA25653cfda61f941557c1d25352d948d0f6cb1076e89cffbf18482815d94a4f479cc
SHA51252b34a9727c83c99566850e3094734fdcad0a2c99fb924002fb96711cc930705a5776cec9ba37108336ea4e1cbe4508ca66b22c9c0ecbd19f32e3293abeb6d11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac784b8fb72708c9d424978c31938750
SHA148f8a5c9fa05587e51d0c133bffda524dd76e4b9
SHA256e2ce41bfab33703793fa3de78e0eef95c85d43a3205142dea6567bdcceefd4ea
SHA5127ddbc57ac704b87f1380e672a597a33fe575ccec1d9fa00cd081191bb14ea93d619791033239a265d1f1fdd7e7766efe5b805797e01c7d2dc42142cab58ea8a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548ea717411e441061b67885ba93c3d38
SHA1399e350749c6b0aaf76aa86d9ab66558d8f5dd15
SHA256ff0bcebcbbfe76631219793f5a5e5d88e81222c3d050af9765279c05810c6a5b
SHA51212b9348b2586a73c39d3339feccf9047f36957200c6bef6d26b59cd372533a654a8e599908fb9beb69482f14736575e2396c5f958f028d0c2599b60c5544b35f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556d7564114b1dea7bd6ee27fcb4bb564
SHA13864c92f93e9bdb84cbe1450693394fa88fed97a
SHA25636cca67cf9e2dd6d5017e9e4f9cc7a16b9f4f0f26bf3fddec1f688f25a0d331b
SHA5123e22dfdfb1e3b19848199b746c5bab2e8d909959cd1337d7aa3998400c308d9b30fad7de2b00b48944805ddec081d225c0c5278575219d61013a6f72171649d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50bb093b392710dec4aba739602287561
SHA16c3fee94e12e204e9eece2186f4260ee64574914
SHA2567b29ed736d7a66fce009efc5f33bf01ba0f9ee78e3f04fc41cb1e81aec3024d7
SHA512916e4f7695637b824b09ebdc00f1a6a85dc7d8fd124d7314c0163a9b15c2ea2586535f69f1a078be2406de95219789abb3c6953269c73041ed5b2584ea535d55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5793da5e606b6587dc6ad6aac099cbb02
SHA1a23bc7a76e59bbdba3d1473acaff29d9dd74ef69
SHA256bb4bfc17ebd33965d8a9586a41f63eee1afbc7bfe5f1daec00243e2a5ed930c9
SHA51288efbed776d4bcedae8220227acbc4030d891a25cebd7b37cd64064f0af86e35fc34c3f03d796dcc1d66f919d0b40f25363060c8f92583377cdc2611b2bea764
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b66e971202cbacc106eeddf9c1fc8b5
SHA11b0a15f8262fefe11def47e068e6c44c07e6be94
SHA2565b0411ebe9cd2fc813d90f362af97eae5ba59f6c6b85c1b62e5c6d6dbde6b37b
SHA51222741e68793c04952f868f75cc871d3117f625c1771595d4f307add630e9858866808c423f49038b78e2656e45d44d3a0366582fa5c1706b141bfb8e57db7924
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5963591f3816bd88fd986ab81a7a36e75
SHA1756deab65769edec1438164c14bd3f12357f739e
SHA25691becd3eb31ac1cdb652a1a1dd569798025c7868f972f9244a1bd7ff57386106
SHA5129ee8d255931769175d25cbe26f20d89b1138804e5d4091eaf277b381ad5de46e994742f5fa7023b3f36cd9977a69b21b3b58fd6d63ffd8b3a845319c1dee517b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54304888dafc58dcefdb2471fc8118e13
SHA1058cffeb03fe6a0c143cb99a4c393555932ce8d8
SHA256167a0235c0eee6120eec8b9df87c795d06a91b0efdb7e81cb8c2e9a92d24a356
SHA5126dd3f04e5bcf3b79fb64ddeaeec67aa9736ed6834920a344f3c869676cfc5e5ffc678715808049badef9bb1c88cf8c745cd895d4f140c15490dcb610f6ab4c5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d81135dbfa29799a51968677563d6fa2
SHA1ae775d1f9949db7144dd36c5dd98cf958deb0573
SHA256c3d863c83049de46f4387690bd60d55cbc7b4a4c91c0fd571d834fa5a4013eac
SHA51289596e85db1304276c18504224b29e41acccd3a5ef0803df9b41d5162aa7e27875157e5dc897d6d3ae3cf5d2f0d5126701aec463adbee851e9ec0bb839b7b4c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5335ee73c5a23fb063f1b5196c2e924b0
SHA1b2795225f31ed1633b0d98892bb573a8b5d944be
SHA2567dd19c68a97c3bfe7e549ee48e0368a48396072d782727c0223787cfec95971c
SHA512f5cb73e7a505f9650f7d29c981ca507f6f57af8230ade0c0cd4ebe2c7123c90864fdd16377492e68dd7ea18fa048c0d5f80ff1c6189f7e5c783e72502ab07c2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d81de42dc9e328a018c922b770cd57a0
SHA15972c62adf2d1d04263d8730dfc936c40ac88097
SHA2562a0b4da13197d332caecfac93f42e8b9527c90fd6dfcc28ce58bd1569eb8a51e
SHA5127cfcfe6c3ef97ad29a94f8bc13b5ee7f68897eac2b2fd3f7d8d106d6dc721c17d1ce09cfeba051f7f3ed6589e4eda581d669b3c4eb9a10a430283fe9e0cf1289
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573c2e2fda66e3228c962db294b857fea
SHA16db9fb4c31d7edc4a8cb396518a38dd10688a4ce
SHA2563f043e8d84323437ae54dd962e5092a871df035e5fa3e5f62749729438950c72
SHA512a54cdef42d7bc1c78cbff86d23368b1c0fafe62dd15f2d7ce53edb344c2058155985632e5cf3a328f475f52bc3f250d1d50fbdc49ac1e3b40563fee0dc748bda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5df5d32a2149dffcb09809789566504
SHA1a058506c07518bd8e18db8f479f0d66e40104626
SHA256fe3eba17ed4be68255c0f1c0f83a1737250e35ac764ca6b2baf0e01b38969188
SHA5129df42a6a69e9b21cd21944ec5e531579e15ce9054852d176b7632021195dfc2a1552751afda7bb868d5c65ebd12cdb868c60125e02da4273126d232b8b2e88b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc50433b5b2bc45554431b039fb2ea77
SHA17074ea87db81dfe0c23606ce9360d5c38d6cf95e
SHA25623f5256619a9f2bb33072334a52c4ffe74316935189a5ffb2a2bd5f78602e943
SHA5128168d89faa06938db826cd9e5bcbc83aa6cc806aa00b0ddf8f9521e9d499fe8e9a4972ea8ae64dd98434a6c365635f3940779cdbd7bbc58d47f6210c28bfcd9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fbee3efe92a0420f555ae2951a6903f4
SHA12b79e26b3aefd8e133805aac711a7ea1fd1da5c1
SHA256e00b0796eaec4724d9a633451a5465b626212d867291859a27c8812c47b1c460
SHA51281c2be8a06b782782c8b7f6db947eeae93e2db4bb20191b5163f99cf6ce3233eccfafdf86452c0880a404e26668de9a334a898df5b1ab0b623fe36180b2f7b4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbf022006a0240160925ab72ffed7010
SHA1a18a74666ce4603726ecab3d3f2e9123183d5d15
SHA256c887291b93564472a63dda2a3f0ddc16e158938b8adcc86f6fccaf8350bf2be1
SHA512219fd73dfe7ff379e07554d68a56519ed58379cc5ca477cd47c34dff0083aabfe70d1121e2ea82c985f0c8b857c8726e0ad29bfa740e3f3086dc2a15ee63a3eb
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a