Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
10-05-2024 20:02
Static task
static1
Behavioral task
behavioral1
Sample
30ce44e09f49f28bf778fb2db52d96ba_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
30ce44e09f49f28bf778fb2db52d96ba_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
30ce44e09f49f28bf778fb2db52d96ba_JaffaCakes118.html
-
Size
127KB
-
MD5
30ce44e09f49f28bf778fb2db52d96ba
-
SHA1
cbf9d442f34cf1f42b207f6d1580437b55c85113
-
SHA256
6fa7fc271de7c72d564f85db6ec7443259e50e8179a339555f937a8d25efc143
-
SHA512
4446f9a709fadfc17dfd7039bdaacc8daf8289cc9e558051ccbc738fc3dc71b3bfdba7e79e966d0ae49f3f17754dbc1691448197a0df981c03007bdf20d13722
-
SSDEEP
1536:aQIRW+4z1yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOZ:vl1yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c6000000000200000000001066000000010000200000006a9f77b907d6c8a278daa760b4cc46035c17bf14e76ae3cf985d6a996a95e458000000000e80000000020000200000002546f7fe59efa04ff056af44d95e92ff775e2787145f7cd387737e3a6c0904ad20000000536e2d1cf9bc76f14e9939708d8a5c98e339dec7cbb84cbfc96136e9002e760840000000912dae7fb800d54e30b1194d0b25cf74cb1f620fd5fb72ce08da2a67e9195028bc8219ab18014183144e0e498d30b30ceb0a7fbca8c43cf0530f4f880afd3bd9 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421533242" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{49C25411-0F08-11EF-9001-CA5596DD87F4} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80ac751e15a3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2896 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2896 iexplore.exe 2896 iexplore.exe 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2896 wrote to memory of 2948 2896 iexplore.exe 28 PID 2896 wrote to memory of 2948 2896 iexplore.exe 28 PID 2896 wrote to memory of 2948 2896 iexplore.exe 28 PID 2896 wrote to memory of 2948 2896 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\30ce44e09f49f28bf778fb2db52d96ba_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2896 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50adebc63944637d714615c8028dd980f
SHA1335e933dbaab7ef2ce660021e8b67dc6bb6bb7df
SHA256382de0306b8a4396efc5b2b42daee6e10d7618e8d478b7bf734e09a0fc7ee901
SHA51276562a4b772d80eb2e8e657329504a2cc4388561154415f1690befc6173ad884e9ee3b1767379e6de0383e8afb20f8f58a5f7f44967b8caaf837d6731e5706be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52439b10fa5f76293305768837e6b7cdc
SHA1e9ae48754963da08f3a518f9180b6a1b83881c28
SHA256eed61e887352b1882848626eac7c5160b47977c3cc0d6f80a58e5b00381e5bc8
SHA512d57bbc7514a5bb3797dbbe65af2716b122c86298ea850ff02ddeb821dba16b3a44c2dd9319502ef798179712b46662e60a3943ff49384e48857edecc0a5f29fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f49674d7afe7c2e157a602ab2e8c71d2
SHA15ef482d8b30ef92ca0b5904e2989d685f214ad6d
SHA2563fe04844e488170e651e0aac34a9477d770cc90f1c6f7170cfb8d3a529ee9756
SHA512900cf8f3923df9ea5b5381bd127fdf95e4afcac5b722bc7e9b2fd3a522fcc04a7109894838b1779fa3a68831ae07f58b2e876fe1ddcc7b48419bf79f684b3012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522313f079f58e29e26af45dfa221ed99
SHA1221946f071e458c19c27fcec7a132df2973892db
SHA256028642f66bd7983386814d41d9839b01d55633abbf6b9c517b8e279b3d581767
SHA512a6d6ab6ac7cb7969231444a81d2c4536d0a3b1b2e988abd3173887da592a2a191d0e11cb6b355041fbbe97c217c7a0cd32ecbb52af61211c5a17ef0fdedba053
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d3e525772a7e4e1fbc9b2b6962aa6f2
SHA1bb357dc4bcc410293075e88b19cb98aa195aed01
SHA256237cff114c3842c05b87b182af458d530abdc9d996a8d667422656b9ddd54e39
SHA512e760208645f75e08d8732e26975d6ece2378ca76ae79881535dc9070dea1eca014dc1f77862432ace388155c49a33c064c40166b68769041f4f3ff5fc079ecb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0a6f2e14cbd8d7df10d43c03e3923f4
SHA153ec75a01308b32b5e558c06f6eae8722e68caf2
SHA2561c16c8950e4e99ceb323346b5d01f1f8d86a8d3f7b29d583565729b57fd09b12
SHA5122990878d7d439c63ff18fe4b551d77b4b1ff0be5161eb4ad35d4f85ef4d1e5ead4627f23041ad4a18fe18f4369f2d3d7294c64dfa620c417d5c09b15c3d854e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53cf3ea703efd04a743e3c1661e3ce1fb
SHA1faae7e5be540a20d1456f9a965ec3a557713b92e
SHA25628b78d179218df0fb9c2b95cbd9d493eccd19d68705ca562c66ba28dee881c25
SHA5129c75e56f0d0b46ad24257675b48b87ae705158640b6b2c76cab0ede6590478c17adf8025ce890d819a2537946c0e350f3a3b4f36ea8e1bb00a02743c68ea5cbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580f271a43b87207bea687d83ccb4fad0
SHA154738559d181f9e928380a070be76a7c5209ca7c
SHA25676b55b7caebf3a8b3e4f223ca54078da139865aa25acd0a284f49f6a547c692f
SHA512b42150c25cf713a600020034354873b0f9816d347ccf3c1df2f56f0e7653605e69af95f27c3278c43139c437c1461a93e9fccb94a5815c04af94dcacadf617d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a7648fdf7a54110d1ba614f4b1cdb58
SHA139f4e8b702e5e0ee54d2f187ed81926276a7f838
SHA256956948ebd2e50a6267add808ace4b1ab2e44b7aca392559abc4b192fb621990a
SHA51247577e61eee74201f506da9e729317f0693cfcaaeb7f68de86b74123813e8e9c82d84bc4f58a68bb41bd408b085d8342aeb79369df28fd73eb50bb8a1b830f13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57cc24d8e8eb4dba1f6a7022b28162883
SHA13b2a708434f0ff591f8956a2b8a5b21497290c3e
SHA256e46f5eede7cf87c03249758367a6a4f50da0f559f45caebf4503088b385130d5
SHA5129ca24448b83a365c3032d5cb5174babb3396e03505775bf5f85ad9ef5d04d0948d168b15172b4027ed85086f109ebc15ee9a7d44a3a2748b66ab172685dd9f55
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a