Analysis
-
max time kernel
117s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 02:38
Static task
static1
Behavioral task
behavioral1
Sample
27e43bd651ca3d41ad6c1250ade4b748_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
27e43bd651ca3d41ad6c1250ade4b748_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
27e43bd651ca3d41ad6c1250ade4b748_JaffaCakes118.html
-
Size
70KB
-
MD5
27e43bd651ca3d41ad6c1250ade4b748
-
SHA1
0088e125e0b3b6c23785a3e2891557dc0b62ed9d
-
SHA256
ef7da6e037670742e0b05dbdb356bddd0039d87e79c7149bc1951b69a756452a
-
SHA512
e6795c13468e279e351bc72498ddf543e7b3a1f270fd3575e924c2bd18254405bdd1b26d50c7d665402019765667498521f8c309b98b885bf09bedbb51b95c16
-
SSDEEP
768:JiQgcMWR3sI2PDDnd0g6cFG7VCXaoTye1wCZkoTyMdtbBnfBgN8/lboiGhcRoQFA:JIRcQDTvNen0tbrga90hcJNnspv
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000f85dee3fe7f8cdbb5ef90713adfe38fd67c9e4e5680dd767565f424c51bb136b000000000e800000000200002000000026b5dd96e33585b938e26af8ae0080db239792a250751e6d92dbda85044c7a842000000099b2b03a35f8a2a33f4d6abb1581141cea8df985614593f72ad101f4e5fd1fef400000004d2032b9962ffb93e16797148c15a2d9c8df4c223ed7e19314f8b742504d1e02ce2a2c1564227c25d7da472158ebc8c7e92c06a76f21a0411f8a9b143b52ea7f iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421384180" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9011170fbaa1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3A7C6971-0DAD-11EF-AE27-76C100907C10} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2052 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2052 iexplore.exe 2052 iexplore.exe 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2052 wrote to memory of 2480 2052 iexplore.exe 28 PID 2052 wrote to memory of 2480 2052 iexplore.exe 28 PID 2052 wrote to memory of 2480 2052 iexplore.exe 28 PID 2052 wrote to memory of 2480 2052 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\27e43bd651ca3d41ad6c1250ade4b748_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2052 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2480
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2ee4806f527c827bad7680ae74dff3f
SHA14d4d89f43b71c5b61266b01aa126317971af76e9
SHA256cb3e219731579391494f6917ed382572bd917e7a41932781b096f5cb705d5657
SHA512dcb449f45b216976cbed1b9ab04e8840cb605999074f77b03542f53ee1bd2195327fcea2a126a32fe7742eeccc0ffa3a522505b29e5a1a0e05d872a427865c3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5426aee4627c8dddb82f34af7e267aeb8
SHA1907998f0883bcff35765226c5fa3ebae4c07c6c7
SHA2560b76bd817e532f6ce90b295729b055ee00685969c9cd5c1ab29a4779d0e9e060
SHA512fbe45d7337e67c150c59eab5770f36cc91ce45cfa29acfc64199d7453367d76dc7ed8f7867196408d0057ba161ec95bfff25d2b9ed4f97c0bfbb26984f4713d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee6ae783f933be1c54216c35d76d69c7
SHA191def35bdcce9a0be36a3c1b50a8322f5f828b33
SHA256f45517c1963b8ee53210475e06098581fbc1fd73cf1103f4f1c8a70325ec68eb
SHA51206792519e44f569a141cc489406a79330174a844be43c6cb6772a1110aaa483b73770df02a79ff9d2a7d8cdb4ccd782730bb3b2bd0de6a8f99499e121551092f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57630ce36b524fb525e3bc89f4c32e5d5
SHA18d7bc81818af0c9a3e0ce95f1d6d8b1229f313d1
SHA2569180bc59396eb8e0408e784d9e8553eb5db744844a556d648ac3527a67cd1dc8
SHA512c0699b030dc79ab13c2dc76f37b21015110a382b0382fb83c3aa4c6fc70a452c7e77a482f10f5021f77f816a8dd951f13e627f758baadbee75bd3ba3ae62ded7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7e272d9cd0196393abe6d5800bd1200
SHA13d5bd8849b2b8438dde75622dbf4b9989fb3e57a
SHA2568938398a05dd0a44a0111e0fde63cecd2ad093acf7bbe3e0e71eef651f2eb228
SHA512ec0be8a28d2ddd134b07de521b25bfd919fd1577122b6eae3ad12749f65ce2cb579dbe4da810090fc81beb3a672091c7677173fc54d389eb71e75041f418c779
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bce1c04b422fcfd5a0af265077fbe8e3
SHA123eec08e55d4d919d0a788fc91ead21cd7bcf1a9
SHA25681ae495a75eead304bdc252451006c6de7f4b75a4528bec246a1caf7c526adf1
SHA5128c0457017c4e08eb0481aa44bdb602756a30849364696001d8c16d6efbd2351ebace3a21991c7acaa8c5e026adaea7f9b69a5f05903026150e97360b71b28d2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540614d7f4414e30103b3f48ab9de3ae5
SHA10d23e94d2c52eb7087359a9294a3cbaeaa7f2687
SHA256b2f3af8a8f76d17aa21416eb2f15dabcb36987dd5df4636b46d07c49683b33fc
SHA512f0112d19c6658cf7c366e08fa5fbdf73a6652d56cd7fd7ed33bb9f7d7ac3b86b5581dd9a4ee1dcaf095d5aa9afbcb638c2d8f88ef568653310c605d74f8cf716
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fcf169d5aeede68a19e03d38cbc5824e
SHA183dcf29a999cdbc45e46eb7d6b1bed6e2e8cb19c
SHA25602fd9b8faa36bfae64841e12b84cfed6886fb6aaded767d5a048dccd819ad1e0
SHA512a4c0cb2c4d9b081243a2ec2f3228d0e6c08c7c99340b10dc868b12f8526dae1ab1ca680fdd80393cb8ed0a4db12fd2d84d481973be310a4e57ef02f829606286
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5caf37016c6b9fa6797685b4b7b483f10
SHA12b20f291f8b8425b38f2a71eacae7f5f0991cd11
SHA2560950febc239e8e36398c55c6b76495041e9db232919789c9b6c240363750238c
SHA512c8bcb6ea2fd2f19b11887c74bbf944bb043fdbf8328d132891b9bc8ab23cfc1c42a7e0a0e15380211cd7b0d8bbc34ae4e8c0c67b32f12db781965e06dd1cbb8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590597254719e9bca0307986edf082bdf
SHA1d50fe6852d0130f50298d2ac6248ed6cbef46883
SHA256e01d283f9d4777ded9973e9d0a4aef21ddc5ee484db8ce358e1b8909b48f8ff4
SHA512e2d180a0223f7bc8b67cb895d477c909119bf2ab246f03282b6c1500c8589153231a5815147fb07e8952a7d9434eeb3f3e12fbbce890fae1105e00dc1d705d44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e57782d5dabc67bce17cff9dbcd744c
SHA108f075a3eee5fe152b19487b67ac6ff64dc2d89b
SHA256f1f5ba3ecbb42076afc6b3aa95501651bdf41fc98824a78149240f2f389f740c
SHA512b04c26361c9b50c3a01ab34c165219740d3690640d530e1bbd6b51445666894d75657f4ddb8da650e72a1dbdd49d8788380e54fee402df8bb65273f9e4648d4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af9f9e2286d1c6ddd547b63947a23092
SHA11b12d8b24a2605a782a41999cad9f9237c3490af
SHA256f7edc21249490e20ab74e94da155e7755706879f5961030c6c62c3393ef117d4
SHA51289c6911c00a50971ff119479edb31b86fe424b9d3e39be2f6c2f848420e3abd76183576bfcc80a73f25f33b5a67fa0065efb316691d520023081d3e286321897
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b75351af918069e497105d835b6e452f
SHA1f8ed97659ef347b06cbe4b475738fb8197c7056f
SHA256bb6e412a2a6fc382f823af806e78d76118d7f57aa545a669f6e45661521b66dd
SHA512ef1a8a0f53af8f52650d20ada75f86f314c2a6a7364a2fc0b35d4207124dd8668dc8af465d0ee5c912a3ca58bf6d64ee7533930a69ff04f713b90033eed97af7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5981c151235345465cab41da3be0d2d1b
SHA139d0b20f980ecbbb617ba1e288fe2b1dfe0894cf
SHA256d7a409cf0d4e80cf3544ca859616dd16cde1a968143d2f3b94a598ae36aa6e47
SHA51217b64181c0587a33fd3156f4e0ff4061a67415033a438320d6faefb9975a2377cbd871885f96973856e761e4f8a9a5076d6a30681444751a9bb5fc2ca2360e17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ce02819092c1488af864b144fc09f2e
SHA1e29012d2cd49c6fdd9db3aa48cf446d6a2f1e3c3
SHA25623bc10df4b9e717ef4cd5bf2bf78302f064410d7195abdb3afa2ca05c95bfcf0
SHA512e00a78ba600c883715cd638f93e9c12bee2dc74b8ee70a6321705ea4f2532ad5fff1ed74cf0f6378aae384a767227e48b1339581b8be191d0f7316a0ae606d1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5264e02c7a1b79cb2bc5b37c50d366647
SHA129285e46b501650bf0ec1118aabfecc51e6c814d
SHA256558e3b74665c8cb7b625be36fc8a202873f5f94712850f5fa223fd1cfcac96e6
SHA512b84dc32fa814cdee054c830a029a58ee9018125dfa4cf4bdba88c1d1b510b78cd777ce9f10422f6d9236d14a7fde9306e315dd4edb20c2e0c8f87a86b92e03e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524f4865c1aa8234c04d179913557c398
SHA13fbb2a804f0505d5bebaf63d61844e7fe3e7699a
SHA256d21535b288737a12136396140792827e6a83dfcd9529f3584693d3d25818e9d6
SHA5121741cc3601bfef2b90d5139e4e2833b6a5ee3e71eef1b10a340f75b19883199f384793ac74a2feebf711fc0f46ea1359427eed2717444f6d82b27e9faa3ec6ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5486e01283f4b9f5387d4ba7750056716
SHA140f41f581aac48f91835b31408c79c9f55d61984
SHA256397f7921f689c8b8ee582ec940c631afab7467661e14ed10ff2278e9c65c7e8a
SHA512f477b914bb857b29cc5188cbcf80d79b5f194bb987883197096e3bbcb139da37bed23c4f637d5faca979c5676db80157342e4f7ef21416d128f21431e1f3909b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f220b9e44ebc3f3581c8aba04b7e8f7
SHA1d48e54e4d6f11bb14beb30f81b1038c181f1a4b1
SHA2563cae6d01875590095e17547e1ebaa25acdfb6e64c7d33adeba315e891bc92adf
SHA5128f8032b0378d1e076fa6e08116b8139164e49e4a576cb1e113a54017d8b68ace9adeaaa6fb6405c854a3209065bc80269e3b2779fb20164cc96934e10e33fcaf
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a