Analysis
-
max time kernel
137s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 15:43
Static task
static1
Behavioral task
behavioral1
Sample
2aaf444cbc71f934dfed26791c1ef876_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2aaf444cbc71f934dfed26791c1ef876_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
2aaf444cbc71f934dfed26791c1ef876_JaffaCakes118.html
-
Size
55KB
-
MD5
2aaf444cbc71f934dfed26791c1ef876
-
SHA1
77b5918db3abf265a345cf6592476e88c9feda74
-
SHA256
06e5dba876011480f31f775b0abc6304f9c58ba53911752646f6ef3afaac25cf
-
SHA512
e2e41fe162393d8be517cab341a1db09b562de6af7fd7dfb8200c3cd90fd14f4b3bfd78f22b50f779cdd2d66088661643fa7216e18b8c8952e4e09d15beecc41
-
SSDEEP
1536:+N37DBSDgzk1+ujIQjkH5zYM/fQSxCI+1x:yDBSDgzk13vM/fQSxCI+1x
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421431290" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E9A3EE61-0E1A-11EF-8B04-EAF6CDD7B231} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000bbe0dc490da4233898265305beb7b061e357203814439df896e4b429dddc1642000000000e80000000020000200000005f44a36082e22e8eb2adbb40d97bf3eebadee1de8a5d69e7162b6cb1e38972f52000000011d28fdb82cdefcd08c350e6e193ac051c53dda7d1f0b45e6f822a741e259e7340000000bfa4a69200513fd3a4621d4c067e47b9ae7f8084c1a87884fa07fd1b98d90c14acadce1df04152bba953120fdb6ca80bcfb35fdd0310722808d24d89a4824284 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e05966c327a2da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2368 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2368 iexplore.exe 2368 iexplore.exe 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2576 2368 iexplore.exe 28 PID 2368 wrote to memory of 2576 2368 iexplore.exe 28 PID 2368 wrote to memory of 2576 2368 iexplore.exe 28 PID 2368 wrote to memory of 2576 2368 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2aaf444cbc71f934dfed26791c1ef876_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2368 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8aa371ce50a095204f72a872e49e816
SHA16fe7e3bb71fd9fa636b9bebcdc0063ca42d754b6
SHA256c9c63c5d74d2c49b263a7da5099b4820ba7776cc17ef6b5308660c1e6e0580fc
SHA512fff06b29676241ce5a0b2964ecd1afe9fe1193f18457899ccb4571d4efa61d114450ab94eb862fa2dc6a2bb2d8183d3a2d3ab6af428e2b0bf170b456253e7828
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b37720503c4d67ab8ef89a3a391df23f
SHA14a1c23452d2a8787f182269b84c4b926d19730c3
SHA256899085b20c4bd34cb6a0d82f28c15a0a1e96d672dde3a980fb6f635cfcfaada9
SHA51257bd1545a2d64d4e12bd88b4d3ca98c5cd1b92ad50d173f162ec74ddd8d1f3c3428bafada7cb28172a985097bf4ec2587cc4487b0542f43541409ae967191138
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3e31c7db2b99fff4e657828b7d072da
SHA1173afb4a6ac4c17232857b6ceff440dd34894c84
SHA256579e0a0b72b0214cbd2f7a0e8db2dd36ea49a59cd10961423819492f9539251d
SHA512e60fd483d650e6fc0f33150ed6f2982c9c650c86e0973cd2e849b4718fac6060e274dcf8b03dceb74c79b560e801d16706b422b37921ef0224be2e6a0e0abdc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df24f368c71959d948dc966bfa77484b
SHA110fc676ec418501eb13228ad2ca87c4ed933e070
SHA256b79229c5f1ec8faea6599d3c726c8bc580b05add473c78daafdb6269ac7a12ab
SHA512e007f6f97278775f71ba8e09479732ed7cccd2a8110b4f2f40ac8d4c063826cb6514221a642b54505577de2fada722bbfaf7c96843136751d416c32c3ad0ef2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ebfad6859ca9969bf0fce0fd4c82db9c
SHA1f1c39b9f56520274aec3c1938cbacefca52290bb
SHA256488d375ad936c0edd9277a3bea22e1828e3398b4e5cb41afc94d5096cf967c58
SHA512ac6b277aac05cdb339ad40ab20691a8e3443bacd4193fb5e41f1e7e51d17a170a0b4a069bcf430b6989f1ca64fc6c605e0d09a92f8b0299f915057d4e3cbb93f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535e1e1a5b021a7de3e02bc1648db54e2
SHA1d3caffd021c486d937d9dbaebaac3bf9f77b5437
SHA256706a8c080b8200741c6bfb6c9a967f117c562bab33fbbb0ce94910c7c9a0ba60
SHA512e73f3922419d8adbb306280e05f4870e3308ef022694d31dc938afa044f8c73028a99123ced5f0fb875ee6f4a266aa065e218c141dd695381e8ece42c7df37ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dbcbafabfbaf9ced427c5ab0b2035615
SHA117a77910c20e417f6d3890d215b6fe6fe3e614b5
SHA256a115322973833c30aba81a52f603212afd720b550fdf0fd81bdba2400a83e56c
SHA5123f4baddbde997a3d6901c52aaa33e4d88f029c25a7c13b8533f9e6eb22a2f4f3089e0fffb3de121756cba00685d09d832340af036584785cb01355947bae6b66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5569c27a169a8ee3c99bca38f86befc48
SHA1ae1719af790642cf4e6e8ba1808a5302ac507946
SHA2563586c3297c6b5927b6048397fecdf9e73f75ea15fa6f3d5bfe1a0d673f674e97
SHA5129ae6008360fe9a8bff4019ad0bca6ea191161ae76a43755cc59cd0b61e0209c71052632d8773f39687c45045aee5759dbfcd7da2c54cdd2c921616d46c935233
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540bd370c23e91aecc6d6603aff669b27
SHA1333a9b72c3c246511a0a876e216d5cb2e220d147
SHA256d9e3a17949ba2681dfbedb049b588d373ba980748b2024bc2f8930e68ffee086
SHA512d0e749bbba92eeac205e0a94026854f148fd8d2f831591892a10b8f201499395ad409691520302e3bc35919003a0c8e70cb1485667ae39e4f3fd8110514854a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57661b82635226996971529ee4e3c0e4b
SHA13b80dd04ff6bb896a7a5e0a7aee4b3a064f5d2d0
SHA256d89b2fd5a34c62cf30d7fd234b611f2c4e96603f86a3837169a04628991b3413
SHA512108f33b555f22ba474b34e377f3c89689cf1eea815eaeb2e1639a2de4fb85c2c458af62c9d84b5dd3b7023402bda0506d5fb071ee549ffbfb45bf0e5d68033e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6fbe9630df03f50d702f2fb4f528568
SHA19dec526e67a265ffa5e963044841d8f6e9ccb2c7
SHA25695ccc1494b38be90dd08a7ad9b4a629b6568f740ca2944406e08b331a2c6da83
SHA51227f458309230196725df8fc7a6611b11a0d17c5ec3306e85d7dd64b2df002773ebce154aac6d2921b6beffae37865e89562a3d706e0de3d9c114c767a1034049
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506483abe3632a459d640ecb073c13749
SHA186856c61e0efb8306415cdca726cc04eaecae1c9
SHA25628686fc944e1fcf852c3c539ae92440e7b5d345ce9c2d96a3e0778205b6419f0
SHA512a953187f26b5279465afc602846c29f503330dc0e1643778b233d9fb0cd3a0db74431d80dad70cca9ebe959f2e30a3c91d5ad7ac879c0a1ad46c56a5e67a1976
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aba16ca0898fb3846797a2819166b3ff
SHA17946b3b94548bc6294fc6e00690b70e5478431ca
SHA256d299f6e595887dde8385ce665ca253686514d6f83ebfe4bb30c15376a68b7f20
SHA51216ba43d337334b6923adbfd35e4f8ccc292cbb73dc6788ce09eb9b6688b19bd136905c1fa4ae4bd185436cd8f935f0c412e56a33512851d38d34773571f9e2ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fce7f175e6885b4047bd44dd24992ba
SHA12d4f4b9689ab15faa65248613f617ba98b425f3d
SHA256d08eecd768e9dd69ef2b7e60e4b4057f3e3b8b9ee16beb49afcf4698404419af
SHA512ed05e25a9c49d1b03a07f1a3c8137906c72747d41d7f0abe5efb08e73f6ed0f8b4adc66eaa833c631fd0bd541baf8f9de800e27dc2607d581fafad678ea8d278
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571ffe02b00adb1500c7fdb31f512429d
SHA1f24699bd5d3be08b2fd83212cc71a2c13007076a
SHA2561c818ee73fa36abe4a0cbe884b16805130dbe2f6f303a5d04ba1380ed5fd9d98
SHA51264fd2bec97369ce0e832c426efd6952066a7974c65c9713918b2871f681bafa3607e7f628916671b198c568749a6911a752d176c7137042c4a61661c9fcdbf72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54aadd4ae55e7dad77c515f624e20ccfc
SHA18996302cc4bb02b3d2b6a3ad29bfb96b501875e7
SHA25617e9a2b232d73b189a2faa7635c076330290458dd063bc0aef8aa85257c41f5c
SHA512448b7074ca4507fdaaded6de813a936a1a836993023604ee3afc1eba069eeca0b09eb15630a5518536b112de87ff6890728956cde84cd28a5ebfd8afdef8caaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1f294fcc9fceefadc57e17bd31705a4
SHA1904e2ac475cdcb219894e6dfc7bc489ec622ab5d
SHA2564263831a0a184870d7b760d2c734996dfef888641fd159e59ce91e3bfcc8a722
SHA512a62595bb68bbe584cffaa4c0f0f2481a926e26d806413b8e654a9061807c8530feb02847d78bac0acc6d2584e6a0bafe00321b4d20c42298c56cca61bc65243e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5203063ab6c04ce2d21a084f56936d6df
SHA17b29631ec932cf31dd5d8308cc3b2dee94706cf0
SHA256b4370da229640f315b5ebea6bc3a4c06d98ff6bb7afa936746bbc8eb37d99180
SHA51227667c4ef78c4e4a6b3cce0c0381c9a6d335cdce46b33cf89975180d667733dc00db2dc549fa06b3e94dc6d4f9e3bf63c3acf0217f04c4e3598e0e8d109d45be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524c121b05c51ff66c63bbb2ed123124b
SHA10d932de6cf31eededf93183cfd5479e36d794a52
SHA256d9c3a590cec47b83f9102871a8761ba58da2c24488b9359feb0ec8b548b104f1
SHA512810ef891ed7757c3e59fd1c85eafe3d237e10d865d271e99811377d171bdb9d9b50ec6ffc50c9d5ac83d36cd5a562a232cf75c93e218e37288a8fb3e4499aef5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a