Analysis
-
max time kernel
117s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 05:06
Static task
static1
Behavioral task
behavioral1
Sample
286bf1637fcee83df96dc4908f61daf1_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
286bf1637fcee83df96dc4908f61daf1_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
286bf1637fcee83df96dc4908f61daf1_JaffaCakes118.html
-
Size
459KB
-
MD5
286bf1637fcee83df96dc4908f61daf1
-
SHA1
58b6fa8c23f030fd2488f256c71b8428c2ef73e6
-
SHA256
17dbe4c75c354c12d571a084915a57abf3a5533ba5d1c320258669c710ecb909
-
SHA512
d9c3aa11368bfec006233b05fccdc5b5212b9b2e7b3912b94a472974bd5e49d0c4e3fce8a90cc72bd240c2d954b5dbaf60ad6e484de5f4c478decb66361c7125
-
SSDEEP
6144:S0sMYod+X3oI+Y7sMYod+X3oI+Y2sMYod+X3oI+YLsMYod+X3oI+YQ:z5d+X3x5d+X3a5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e93610000000002000000000010660000000100002000000003ea98014bb2eaea049c6cd00ba4bfcda993120b57a3fde1f3e6444dea446cd0000000000e800000000200002000000024d8f8c2c9e98424818798f7e0a6e6fb06c7bd530b483b52b0c8d7b2173643a920000000f97f47b169244f2a874e6d00efcd4f9d85a4a2e364e46c63f370037e873e73d440000000e3233085344276a447b1f3134b1c7a069dd2efa7a09aa0f643488ce523f2132cbe4936d4fe8c47c5ea1f3b42a42db2ac7ea3fc46974f7abbf9b80eb51d086a44 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0470fc1cea1da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421393062" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E889F051-0DC1-11EF-AF3D-DA219DA76A91} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1684 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1684 iexplore.exe 1684 iexplore.exe 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1684 wrote to memory of 2600 1684 iexplore.exe 28 PID 1684 wrote to memory of 2600 1684 iexplore.exe 28 PID 1684 wrote to memory of 2600 1684 iexplore.exe 28 PID 1684 wrote to memory of 2600 1684 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\286bf1637fcee83df96dc4908f61daf1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1684 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2600
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a2346d502848b1ff1e811b6d72a1db1
SHA139dae0996a405ed422b0b904bfa6244fc5bff351
SHA2563036fbe526b3a7a142fcb1311c68d59d3d962a37d9ccf267449375abcc14ef1c
SHA5124006f75d65e6821f5f9ad5df04cd40b1db7e4dc5cfb442299af4796d826586a918a65abd3ba0a14bb272f4f58fdf108fc94f6f58bd644d8f01387f7c83b2624f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5307406d806d11daf70f58fc4f3d52dbc
SHA1d4eefeca15b3f92555fd16162e330e376202b4af
SHA256b90dd686739768fbbdfd4aac67389d8daa6e6c24ce2e77c7bb648838a44dd6de
SHA5120681c92aaa4771604cb79c1cd2cf3518d2998e1bd6289f1e2e26a1d2bf0aca6f3317acc2481391f5f782835041a0cc19ef072cbce9a833db5b486363c99f9512
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6a0ad8a5be718475371428f79725c03
SHA1a2868c7d6066ef993ba67944561588090ff27be5
SHA256517459cab53b47af401a044a0566e494322cabea2ba9a46a24efc7abc5e38f70
SHA512643fa5706e35f1b4e0cdf53b9f2ca50f6d7c684ce8f73717dbf50cd49d452b5222c641cb1133375330a39f99b8e65181825f26f37c00e264b04f200dbf8d82dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0122398830a5193e3862f3f93a16cfc
SHA1aec2c9ce1dd51ef4d62dee8257f8fd3ba24e9013
SHA2563cf46e298d962fa62df8931611e69ff6a6532d39639b9768532e5998c82c0f7e
SHA5126f1d3c04256454e435126a3838fbab73586fd81a1e1946e764968c0db5140215999226727c9c247968855e8e519254fccef0cb017cb032369d4142ab1f260bf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5542bf4bcacaea1fde3c568177cc0f070
SHA1fd040a8ee7fbd89289730724542d5def37db5ae5
SHA2567f05d32de464bd53e6f48a44b0d09a4a3b1e2bb35039efd82de5ab90a5caf89e
SHA512ca55b7e7a590bb46ef739239ef63ec06b82175775d66f31f924faa1518639e3d6af9fc6bf02d8ba411ea868cdde269eadfc93f2b2cb5cd34816767cf6e21a28f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e62d6a8bc76415706277d1cee650c1d
SHA1dcea8393da2544747045ae71a94807e0002c331f
SHA256fe207346fb22ff35893330a8d8e5182278d2972fa1dcc095470a10768398cf99
SHA512acb1e7e5228b7979b18f05d8ff290e9bf5f5ae3e9c43646d554dff263510bcfb1a2cf27db1f5c80d98aeac7fa685c4a8c8ec7d1831d007e770f17ac238e2e5d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca619cadb713c6c927c18a8516a5f374
SHA1ea33bd5a66132343d50c17f86a004a39d79c4683
SHA256ee33a91bffb3adb462e201bfff6ab4f5bab98e50a8b3752b674d25ae48d1d579
SHA51212ca9866c4f3d3a9bbaa5140818e6abebb901578aae4aaa55b211e7acef38eae70354c87e199ba750aa16ee197bea3b22a82f034fe5c072f9edb1f9ec88604b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aec25340f9028d4922a4f73e9b9765a7
SHA1ce62598b78fb59b570ec2d17d3b75b895abe033b
SHA256bd1be8dc9461ca044e90f1bf6c2ad96f6d39a2481244cb87155791cf06e16e45
SHA512bc4135ec8e409b8808ee13765c05dea42cf3b40f2302848cbf7aaac4057ba8c60d19c0c3d28b8c9cc5bfbc5039080aae87842c8eb9275f38573cec506cff3a0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1e52c2deb24d08b48bc86170a2d75b2
SHA16f7c3efc0170c2a3d5f66a2c098678fee62fd180
SHA2562b432dcddf5afcb33b7fef9eb5520ddf1af95dd90f721966c8d107c9f8769988
SHA512d099d730c3dd37d04c93f7a0e875aa87e82388766cd0233acbbc4b347e2795786324ed3a5f88ec24d18b6fcae38786ffd06db9b0c45f588b6a3c8b8c987ea58d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5146f463bc5e2777c84545dd4561d48fb
SHA18ca46ba1f4b79560bd5c9fbe6ef0db7026ea978a
SHA25616a4074585935603cd3349af91a0fb257d1d01229d990e205be7cdc8be3b1e99
SHA512bb501d20bb9ab27e8c48057cc142f32f251b46dd9311de10eeddb4bc50853e5a094aab2dfe00720ba3ab0ca2462b03cc923b08b04747f5689e616fb80840c898
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5257cf7eb0d1e88e5b365fbc815dd2b8c
SHA14548eceaa3d5df1923987c0b3f6c9d332dc6e412
SHA25680281f61839e145089f151037dc19ee7a7a95e8564212581faf526cd2b11c109
SHA51205d3ea7b40710dfe1ab7710344bb389094f76b1dffc4173a58fe18293012092724b362479ca3cb09f5ede141d9804fa07e2095c3e77896b37d3c010aa27bf0fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516442c3fcc58048b1e12bde16f953ff0
SHA14fe6f79f253e9aa51711150585db6e75b45d21ea
SHA2562b8b61783c119b231589f3952dd70a330090dfeed18cad8911a295dc0012a9c6
SHA512dc1265f4e13a1a90eee37d2badb33b089f87a60d8023351ae1c4278b697822715b623b797a4168277a2d6ec4542124aadf0d6c3cb9e218e2fd9b08e8c3648e94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c644fe7471cde7c756ce1f177dfc104b
SHA1d4ee131337c048ee498b67573d04054a55a12a0b
SHA256d921862cf49d6f41dc2dc92fbb88dd7d77debab912b3c552c036c7b5f673f294
SHA51248534eb409ab5a745da249f96c9f515ff86818e187ffffc74973590b8bf0e671824b123da5d735c425d9442dc848b6dc5b2a1f742b9e6721c3be6cc21dad3056
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8648a997691395ae46ff65724a1a295
SHA17c67902efcc590b76e88fd644992068c8687dfa3
SHA2560078246a644973385ee4f7e326d4c6ac09ef0d4c92265f26eb3e49a77810114c
SHA512deaa06f60f011c3af41705b6eae7236660f78e9dd3961f017a375002507593dc1de93d877819a192aa604f431f552f15011c9c50e306a55b7f2ea01cfd16df2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ba3b11cbde14231400d707a318e8cd9
SHA1f8a5e44770b1a1fcb8d9a166c1ed9e42a7b32514
SHA2560b6d873b37b78abed4d1c572398f8241e9fe1a73ad455e49bf64058b3d812e98
SHA512b7198094aaec36752903777066d479b52f879a0d08695188f525af4b0b74325a62c212cda6ce385bcf6ad11e51cbe0bbe0c1094ed8e56564f9b326d874c1e6a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58baaab99fde71b644e38d1a9aeabf3e1
SHA1e2807a8f8a725e38928f23121a2d9a34e2f6f896
SHA256d6e7264e15c6dbf960d934dd4b97e672fa2e37fda5da629a3b36810411ad9b8f
SHA512cc1e9eda3bd633a03b3a49ade0fbcb09b661617c93a20c9f9ce923ca065deae6046b836c7af86590ba4ff81be012ea5758e869e30c408a42188a1207529bb5cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d41b0b66f37edf07000552449b22bbe
SHA1de6491445e89eee0db8192c0e4104b9479d97509
SHA25669b25f409bf3d3824283529f012be0184fd9763062ac16d627d392bb6003f717
SHA51201e8131e6f8d143905c03572a55450d01d601457ef7451efdf5f630323fb9c22a78ab51f75be330ddd7808fada6ba3796c63864050ead64893987f678f036155
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58034742717ab0e6c379b23047a279a55
SHA1d40d71c48e12f1ba104365edb32ade792a68694e
SHA2561a6ddc9b3f61eba23df50343f84da8b7033b4697d7ac50142ebd0fea79fa87c6
SHA512fcdc6fe8fba1f83dc53d9507e1311f461709315aef04b195888a96340612e452011717d8415b307d93f03163157842e6e05f01e9d44689ad9df7f049a9db8d0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594df123c82b699cd5b11478e48c40fc3
SHA1e296f21a63e246ec21a7d7ea1f9a867c4e784d2d
SHA2560d271e0c3f215b41f0f8547f07a74ac31da33c54ef53986a05bfb9b08175f383
SHA5122a7ec6200cd7a33958307eaebc063d9fde5cf418906cc6c4de5e0943aa537ab131fed3f74647299672fe5dd78df4b16b9ede9cb7a72b17c92d8f30db35f0114a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587b02de7cdb3d0914a18b02b97202707
SHA1fd83dd78b9de374cd9c76da6d26c37fccf75238e
SHA2562b74d010acfcadf7acb980603b9d4f2516503d706c86ef1775bee38f48a79e26
SHA512939b1ad6fb8262efdf8dfa5819cad14a5c0db27218ab48bea40437ade87a207fd20cf613ee54c715accfab76e2eea4f8157a7cf3ff87ca77822ecb9bca67dba9
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a