Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
09-05-2024 08:20
Static task
static1
Behavioral task
behavioral1
Sample
291702982ffd30a237aa1ffee20a5425_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
291702982ffd30a237aa1ffee20a5425_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
291702982ffd30a237aa1ffee20a5425_JaffaCakes118.html
-
Size
11KB
-
MD5
291702982ffd30a237aa1ffee20a5425
-
SHA1
71e63e16b0fbbda9eb8cf039e2852bc9f0118e4c
-
SHA256
527cba45407a8eccbc98330e26292c279e53b842dc720858317510c7607311ed
-
SHA512
5ad1083e425c60a3ddf15ddcb5e654f04b8ab0ce29a336c5e1cba3dbfd5bfe05ea8865833fff65291586f04032963d751d9685bd307b4d5cf2c5bf055ea00123
-
SSDEEP
192:SzDSgZ7AM2AMMEAMdAM5AMkdZFZp+jd3oEhexaiN//iOPc0X8Q8//89ciKWL1g3g:Siky1R1QRZQR3pexai9M0sRH89ciKldy
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{01F05D71-0DDD-11EF-A233-7678A7DAE141} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000a3d024cbaaf256aba1719aa3ecf8c59566c8e27afdf08ca0eb89d94f8bc151ec000000000e80000000020000200000007ecd828d4fcd1a3825905f361e1fc98dcf8f247e0c700b508e23178b28d76623200000008072dce7c30e1611023d44172fbc9b1cf8e7d1351f855d4dfdd6fd4d0c11017140000000b8cdda353cb5711060b9c6013c8f84eef06d6688f6cfd3ea1994e89e3bd858b46b1c3cf2c360efb36fdd17d04b501dc8adc38b39e20a420b6a69d3182303a9ee iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70e86dd6e9a1da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421404701" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1300 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1300 iexplore.exe 1300 iexplore.exe 1708 IEXPLORE.EXE 1708 IEXPLORE.EXE 1708 IEXPLORE.EXE 1708 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1300 wrote to memory of 1708 1300 iexplore.exe 28 PID 1300 wrote to memory of 1708 1300 iexplore.exe 28 PID 1300 wrote to memory of 1708 1300 iexplore.exe 28 PID 1300 wrote to memory of 1708 1300 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\291702982ffd30a237aa1ffee20a5425_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1300 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587ef5f9234d74ab1a67820ac92056f64
SHA1b9d31321ebf1054ed04caff5dc7950f7e9c9d52a
SHA256d957318c1aa6ea971d462ae7b2bcc84479c2c90ba147a79d21cd9fa6edfca5e2
SHA5128eec5b0aa2ca9b918230b283d68173712ebad5b709be6be14c26c677d9e8f1babe2d294d8aa1f63ea046c9d7860a1307d2690e98ab702b356d034b72e14eb346
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559715e0aff28506562af3b1c90123329
SHA177fef9186063c3f65e4107c4c48e480e7694e633
SHA256ebf452ff6298e33ec8e9dc845ad8767a73f18e212d1d775ebb9a82be1147e178
SHA512ddeef1206cc2fa3f253c673f5fe76f16cc385ca4bd8abe91b2037b19165b38da73e82215573bbe96d162c232629d5b2a790577b34546502ebf255433b4b1a1fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501aa660282963cff16b070c34fb6336b
SHA1e44e801e629144e41a0708c63fb7340590ebb5f3
SHA256af6dc5cc5d03ff226c6a13c647dec14009ae0eac364e81865ccbf70c2b6d4ea4
SHA512d8a99ba58eec5d127478a956a6dedd7b892d650c59c8503b9c491c72bb9917d3337d9f8d8b045767c16c41eff8cb9d86aa4ff74a6bba653c587dd8ef1c6501d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e74d6eaf25cb18574b31fb617d135a1a
SHA1f2cc2e561f6b4d8d4379ea2ac7edf197104b38e4
SHA256c25e1b2825b260ae50ed16daae11a1cac7dc435b33d179f1f434ee6cd54e1435
SHA5125afb6dad34fb87bb9875d9945c4a1cd4a535f329a13b587d42c7aeb5e23bbadb8eeed22feb5207a6ea62e4fdf49aca60ddd66e1055e4fdeaf0a3c117b534be5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f762274cbb7d308714c735c576fad02e
SHA1795cced0e68b8f45204884a14746bd5366b6498c
SHA25636f6b5127b318dec3dd487037a2d5a3af4be5566905ad0710acb12f2d92240b2
SHA51299d68adabf47e1808cced2f5ef8cb96923c4baf0acaab8cc59146b5e1dc1e9bfc80ff3ce6852f8327831bea9f4b085b79292d7d055f6a023c0e2a9f3e9a29a72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f23ddc496fad28fbda2ea62848a646d4
SHA16802fdca415fd9e6b72919f19d6a0be1b633ef7c
SHA256a9bf752959e323b3cff36bd13ec58cfded36f63a9af698f726d82b1ba0270eac
SHA5127b36be2ad48ca5dc2040f26ba7cef9a21e4f027aa47131e16a57dc098f13ae87ac8676151db95d01042ef2a1e841f1270f3fd53b001152aca6f851012304723f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565f913e41f7c5998ad98f5162dec9138
SHA14470b25dceff7e7cadf007eb2ef3ccca2d35eee9
SHA256106c1c4bdf690caa84f70788b6c95ec164fd0bbb47ea91bf32b2d8b0b56ace28
SHA512864ba6a9f7822c068415ad8f3d9bbe819131917d63cfef290ad0f54d0b07482ca65ede2db41807e287c28f2f3fb82e12f2fafb67ab170cd5c3d9a3516b5ed3b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530498f59f6a1b1d4ecb0303cd439d150
SHA18b07de081d43001642caf31ad1d5e73e6b71c995
SHA256d07fd3f5702d7c5d2f6edf9ecc52ba5b5c96d34cada2f41ac3515611285ac135
SHA51237e3870615525380e4f37d6b94e5a53ed919e15031eea4fc6572522cf3a12504b510078df5742409c578a851a34401bd9266f0d882cf0b0de38715ea5613046e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5839127d50687e7e413372548657d3810
SHA1016673f7c6b568e9dbdf7ad56d857818aea26f2b
SHA256c7c1b37e3d27f7cd968cf149632bafa744e8646e34d2a3ce3a572e3799ed82c7
SHA51264e8047c07dafac82b0f9d3c9a786f98bf67921a0046c728eb2a5d475707fec9c46fde834e35e3e31492e03fb48730def47bed6d7eea2b875f11f8581af8dfaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2adee4e672da44891c3c4a5264d4aa7
SHA171203d47daa4d41d205e318fe98c2d1f59ccdcbb
SHA256f697b0814bc844221eae3ad8b3264add0b16594007e62145873806824d575a6a
SHA512c38b2da25a9812028bd9f0d42cfa0fb1c45de1cab7895f8f3f47c2a9cc6177ba5602db1e5ce7b2c8f38f31a943a64e7e22ac1cbc487a720de4c9a962ecfd00ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552b5eff94625315ac1461fb230d1b422
SHA117a372b13f405d2e6208eae084d9db47bcc11ee7
SHA2565c6889779356d422dc2a789c1a0dce3746048e99b926b6f3c9a067695ca721ff
SHA5122f1580b826445fe35fb67db7eacf0c4d20728ed718d073241728af5c60c0ae2dc63cf279c936952205a1827cf87ce0792d835d5ba181820d0499606391356d27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b95fb9211c12384ca42c620e8fc04e9
SHA1994df644860c281ac7de76c6cfffff7507c32a60
SHA25698d53dba3fd762f22e8caea3bba596d70f90b2e80259e6a939b8d99048809371
SHA51298114731429047f80c983162831a04b3080f95a443774ef8791254f168ebc1b79733eb9f6406a22932f32536564f103796c1f095adbf562bec6c4d8f170564bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555ef053e050fb81e425905b8ad85610a
SHA1f514779ea4ce4baa9c790b2b8d7edfab42318c51
SHA2561301def4621179539764464fb6fcb98b262fa3d8ef67ec62a65faa6c76251709
SHA5120664fa9832f7a7cb9ca2697465010dc3a038759800ebb95b108d7d2ec23056e302191a7b5bc25dcdbcc208ea0c8398a9e75d7e6401ad001e2b62a3d662037177
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57451351afa3c0ffebbd6fa9dd5809304
SHA1432dff8367d31823a1b27ff0de384afaafca5821
SHA256df229cf18f1b04652d212a5e869543badc7f6af8b08bfac9a91ac1e5e7b65d59
SHA5126da817f2adf60a3296b0952c8d1332a49fd1dd33d063c9f168d08b04f011272161a23e9b7f3e3aded310ce03e3d2d6146f9ddb636ab8cbf8b05c0e4982013a2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508b7a5e15d3590eeaf945934eef6ef80
SHA1c7822a4cc53607c024d64b5783be3a9544001d86
SHA2565a4eb6136e453ec3933f1da2ffe2217e3036a03508a82928ddcc38b13ff2e1c9
SHA51251b9299df6185165896d8515268d0df704bebb8410ee0e631eff9bfb734ba6017268f1b9c84e263b57f647aacc672170d7cbb6f13e8883231ff2c328b5400867
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57efdb19f5726dd0e84d6ca81234763e4
SHA1ffc8165313a3920535aef8a99049def0507b1f49
SHA25640776535a42a9b63599d4c6b9a372c873022b3887339ca30fbafc59d1112c58d
SHA5120766468cb76d5c4885572240496701db0daea5e1cce3df98efd9a34785f39a28778612067cdef950a01dcda6dcb0547b8b7a25942270c5ec63b619ab487652ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fdfef5515cccaf115ebbf8699830b330
SHA10241b9d21d9914551428959453c48dd24663be8f
SHA2560a9f38844fa488eb53d5f969e146d8f69c16c5df4cac1079ff611847afbd646d
SHA5127009f2b439182ab87bf9440e73d310b600ff2ee867c7fe3f7daf35394e578645ac15fe922b27a658f9ed8c269d4982ea90ba00a82c86778e3189b93fea547e0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512061be7a78ad2d294f3cb68eaeb5e26
SHA1a4c996931d04c9c2b666774d9ed87c3213f7f3d9
SHA2566e46d4283bba44d773efc920c110e93d397848ee17d4f8cbbbaa54f4eb1e1d41
SHA512b3f218171a7506cd39f5b5a909f10eb36d1b668d3f787694bc8bb44e18955ccbfb0af1424acb0dbe18423259500f44634fc2faf584844fdeba6fa3d9755b8282
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a