Analysis
-
max time kernel
138s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
10-05-2024 19:14
Static task
static1
Behavioral task
behavioral1
Sample
309d4f9db829bc0025962e3a51878b58_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
309d4f9db829bc0025962e3a51878b58_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
309d4f9db829bc0025962e3a51878b58_JaffaCakes118.html
-
Size
23KB
-
MD5
309d4f9db829bc0025962e3a51878b58
-
SHA1
01e533b98546c122f7ea7748d277a7398f028636
-
SHA256
b403451abc08dd4bfcc09dee7d46cc9b18098a1d0195fdd2919a5376ad398706
-
SHA512
5fbfd88125701d1c8fb6acc045de166e40719ee1637bd76f6639b716e5ce4797da90c85c7aa208e3d59be9fa8702e4b5fb35a0f2b11d0481263a93e776c96d60
-
SSDEEP
384:GtNScIe6rQpLki8o4E4oXNScI1f5YqqTFfK5eHs5I55eHs5IL5eHs5R/wUw94nZi:0NScIeZ9Pf4E4iNScID1WTkIUw94nZSN
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000000e6f26288b1a9ee53917a07ed57a1a895d4483a6011e9899a5f80abaff785113000000000e800000000200002000000019182f35b473a06e54da25016f403ee3fe3d823f8303c4396035f62da1dfc53f20000000cbb7e20c1d01b4faa9cef4b9f9d9fda8aa1a9b116b4eb764f75e4249290fc067400000009fb61d3d5436a8ea40a30f53bca1520195d63cf73dc2771e20458d9944e9e6466da959902e436ed94ac9fbb878994bf35374b864e5ddfbe0ebc0a7e91e999a61 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{85A35AD1-0F01-11EF-8D12-66A5A0AB388F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1067645a0ea3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421530337" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 836 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 836 iexplore.exe 836 iexplore.exe 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 836 wrote to memory of 2372 836 iexplore.exe 28 PID 836 wrote to memory of 2372 836 iexplore.exe 28 PID 836 wrote to memory of 2372 836 iexplore.exe 28 PID 836 wrote to memory of 2372 836 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\309d4f9db829bc0025962e3a51878b58_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:836 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a59fc4ea3e786e988313a9b99c5628d8
SHA1150e9d67d40e188d13e6b78535b86d7f07c80ec9
SHA256e482f311d47b5e77f9d2ef3bfeff16b281f08695827d2dd4a15ae398fa61c7de
SHA51278c63b85e19baa7fd13d5c3bdfeb31a61b250e66dac838ba3eb652db8d250220edec5e6b7773ae5b051763b693d06402df3d1b40481e12ab47f375ad0e1e9c67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50411dcb2501006a1c9ee49065de90158
SHA17f3330a854452402041f8e3ea9a437378c2da56d
SHA2561a4cab119235bcc444b24eae7e522606ecfe833d794e3c0268832a5fabb924e4
SHA512ab1102f7164bc5bfd0c25ef7e5129655bbb78e262f8f71e8d802b269598205d04b77d20fc2819bfdeca43e5d9e04af1320d2150045d6c751e64a630410ad5404
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528d102f5f6ac682c485105356cb7bdaa
SHA1535af8da7a307b552cdf6f6f28dd00c4ca19d663
SHA2563d33253c626599c626327fa86ec04f5fb188929c9dda7bff00dd6c497e8059cf
SHA5125c5c701483faebbbfecc9bb1a488c5318530c027c1bf11360c6c83c9cafc5b106f52e1a90f41d2efd8fd0a13c5a8cba84f1bfed5ab334315720a2afd1e3ac8c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5362d2f7c3f89bf58a92ab2721001a577
SHA198886b287d882ed736c5d8872ed45eb58f7e9858
SHA256eba891db700a06a9811173031d26469bb721f8fdbccf4c17c68de0e5765020af
SHA512eb66679f73c0068ff96c3098e37ad05e51e522cd2ae2e18b52ef93e3c351aa0fbaf9fc7c63b395240489beb8b4e85f6387614e25366a94ef422c9f9f6dcca3ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c1b8f6a68886b8ef6d319d9f32315c8
SHA1e90cc650800e5b8eb6c33847dc36cd98c7b90ce0
SHA256142d5dadedf378718a4c96545a9bef9560216df5d14225e7c2a453a7067f96ae
SHA512740332f3cac7e0ca1e31888b517294c3c0a28791d2e61f266264942d51a78606c2fe208381d105c3fe669044752bcbf962ee917bb72c62dfecbaccb4504b89ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c844176eb5f0908caf368e9c922b1b73
SHA15949d60f18eb50a62089e81c8400a73a126cb9f0
SHA256a52592c268d52abd2d86bd78807665c6bc31240d9ea84b5a981701f060f21060
SHA5125d8fe6ac0f7f2a66b625ff6bcf5184d06d27221c060ab223af90d3f1883b6f5d2a548e3e581e698d15baba438a42220e18fc3204aa97d3802c6d06d697aaa4b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c26422b608caddb605316ecd0d3d3a76
SHA1753ce28b7d33a795567033563726fdc7bc2d46bc
SHA2565573e3532bc44a671ad63bb4ea8155929104449a8599e5c49ed80ff93daf8085
SHA51217e7f4daa73c26fb0a4b8708e6bc57cd638c9fd2260e7d107269265836f4a58d5c904b1ac69c47fb08b517e37d813d2709b73ec9e13be86f276ebd929419cd4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5773dab0c0eb6a7450da0ea9bb7fa27b9
SHA1088a5f414ccce983dbb20915b4bf6bc9b0fe72f8
SHA256de3b131f607a959269ebe7ce54e38699ba8dfb354fcbd46386c2618ed7c2dadc
SHA512b5ba04f046e16b5fa6d6e366fb5c7bbdf97f178917fc94e1e14a9b079e57451a621a26498158cc31e90b1c6d23ff449d13db0c3af1c0ac13eaf3be489dc043be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58229be6b67ca1e5e460d16cfe0fd65b6
SHA11c32b7d21544b6e0e83d6805f15d06874b76ad9a
SHA256d0c5270f0b1f230065f9edfac1f82472cd8fff1a99670073837529aa3fccfc9a
SHA5128d94c225072ea29fcf7a12693866ee2825cff2c0d80fedab8f45d25a073cfb7a1b6d5f08543e6dde5ee0ca07bcc06899b2786fd5ad055678f912d6c5898d7515
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c9a922f43779c3fcb89ebbf46c89cff
SHA17e75eb4ef79ed15636453eeda3faefe887a055ef
SHA25673ee4d0eb783f5c217fa66c6e8b42553a3bfd61fd06d91521efab72ab4c5fcde
SHA5120cc8662782e0a7fa28db3d0da076823bef9be2a69a803284c0fe62b7b72396fe3e2e8f6afbeee41ad236f188d8c66146cc697a5204c1400347420986068d02f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d86500df817466d5e9c5f0a9bd307fc2
SHA11fa903428ee82f45a6ffd9f6f6977f98557e717d
SHA256c584af04d31372ec9d279dff8d79b02765ff24a2cf1e626ec52f8de264f6b0f0
SHA5127d6c767d94cf9fd4f8fe735d07f0542c7d4dd2e5920641e7b26d5ebd70e522d6cfdcf4e8a1670cf38c05de8fd79f60912e2e0ffcf2061f28db6c29d8fadec16f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5782aaa63c2629303af09843d0d6e8944
SHA11a4709de7d7b8f6eeed49f51860dda52c9cd95f1
SHA2565811aabd6e2af880b2176df2a1dbfa894a33c796b16a0385b3f78522396a486b
SHA51209bcfb796384c797e6a8cfb9334bb84e3aec1791b2dd5ef70275b7965bfd583fe8474fbb7b32bf824eb8d2659c5e6463987018e9a64548b53470cf63ec963a07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53478b800b3a655a2b6628bd6eba97be3
SHA1b46db8bc2ab1326f6f8868fe53f2a47dce07e4a2
SHA25698d68e75f5763c2485724736f00d3f450783e82c83a750eb9fba75347f4d64a9
SHA512665522a3fe6a665eba6de47b08c13e2eefe0c2fa72574649a5e7a05e4a8917c83753d85109360d4fee8aaf405a7db250ee781abfa3ade7e8f3e1e84bd26eee70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a1f10e3098a8a60abc314763dc9bf20
SHA1cd9e440b4871fe6bee52a6ecc9979cf26b4af5c1
SHA256793ce875174b8081ef2a5bcf302efedd6a158e4783563d434727fcf6affa71f3
SHA512de36bdfd8b744a65341af8a6c91747bf8a558cd5405def56a58de1c5b69913b05b8d6c8623c50815693198a1c473562d66e28dda1433c80b84450c01c31e28c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ab1b10cbc356f425d1d9930fca45608
SHA19965abc150fb69dcb7260a087f18625c2b805992
SHA256d6833fe55ade1e1a06c6fcc907e4d3b054dd397e6e12c4507193ad86f1885c76
SHA51266e43ab62623889dc4f83a58480a1b8ab86c18a339f554a8184ccf43f233ad366bfeef0369decd9cd12813afc2523b121dea6512c29847118b8da12370ba08cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526cc946cc7c573e7e8d6d825bcfdad50
SHA160f2cef4db160b04b5ec18c66dca42daf339373b
SHA256bc5dbdbdeb046a8e96f40df788dc33ba4e9f3e141780db14a4e784b88a2ac6b0
SHA512f10ef7906604b13dfa6bf5710ab1eef12e71c5f27ad1454b7db82bff37268b6b9dfd23d30f7820843694bb6ac9f5f459b212d4647dc5fd5bc139fcc9c2233492
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b25ee3875ddb9323a6cb532f838a56a
SHA1563746d1cd6790e9f7dbe1835aebbce9862a7fe3
SHA25618137635f4ed49dfd314b56bdf7891103e94f55769e40c1052c8a1120f9278c7
SHA512e803598d3789429c8fe3dbae88f309395137827a0eac9960885b4b4efca3853c72d7d3cc6d46660032e4cc35aadc11243687c39394a8d6ed4fac1b93f2f20ad6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a70b4b7f9b0f90227b676a9a0e0790d4
SHA170db6a0f3e06f2d1401319e3e6bbeb9755d8b47a
SHA256399dca8014ad5f7aa83cd8331d109a5269590bb0bb88c321efeaac9f6f8d3191
SHA51242c4b9dfa68d8d2027d5957822a77caafcaf39d40caba75667dbf7246cfb81be1bf6390d516863a9a1584a53c460e17fbf2f70bf80810ffee2e61a2be6937e11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f259e57a96193817417d8a99b81768a
SHA14f4d4f2a0dfde1e5d937b4274af70c712254c28a
SHA2563c4bdf1e951a769fa99b3911b73cb169537a76a8124d6d3fd894cb194f0e7c2f
SHA512dea1a48a79b048853c51ba458929dead143955af665d2c1836b6968ff9242fd83d7a9fac2b6be99c1b11d47d28dfbcda0906e174479fc4489aa97079e8b7473f
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a