Analysis
-
max time kernel
135s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 20:47
Static task
static1
Behavioral task
behavioral1
Sample
30fc58b055d65efb3edd790f3172843d_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
30fc58b055d65efb3edd790f3172843d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
30fc58b055d65efb3edd790f3172843d_JaffaCakes118.html
-
Size
4KB
-
MD5
30fc58b055d65efb3edd790f3172843d
-
SHA1
17e50fb84c5f9f6c6bcf05237201eb5b60d8943b
-
SHA256
a00104a10a6e840e487b74ed55faf189dcfb32a9d035d44c3ad2498f55f7dddd
-
SHA512
eb37b958afa652823f08dc0941fba96fa983ea8ac0fa63a10a42716e9ac160d0ccec60d9558b8c540b3d3d2ee2c49ab72fb8613af3b3d2666f70931f2d90d1a2
-
SSDEEP
96:UGjmQU+lgNddddVB7PqddzVddddddddddddddddddddlOqPqddt1g6vsbddddddg:UzB+PMf3xxIg1Saf
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c60000000002000000000010660000000100002000000002de13e534c232f14b5773dca319db7fa5ed1553289bc32462853b2021fe7f82000000000e8000000002000020000000a688f334d0aef2f5af583e8d9e07df3dd74bceca4b8380de33d7b306178fafb720000000b43b827dd8b44c6812ca00be9232547dd2333817dfd4f7388a70299435db7d87400000000a03fb0228dba975329ca6494123ce04acfaf0e2525a0e7604e64452926377804320422ec40682c8a4e2ce3ef0c81569de018d471743ee0bdcac2722c27d874a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8C147B31-0F0E-11EF-8B6F-CA05972DBE1D} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421535932" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40fabf791ba3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1956 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1956 iexplore.exe 1956 iexplore.exe 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1956 wrote to memory of 2712 1956 iexplore.exe 28 PID 1956 wrote to memory of 2712 1956 iexplore.exe 28 PID 1956 wrote to memory of 2712 1956 iexplore.exe 28 PID 1956 wrote to memory of 2712 1956 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\30fc58b055d65efb3edd790f3172843d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1956 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5343e9fd071454f6d0afa1b0a37842b47
SHA128b46759a319a0c38db9f7005f991b9ecaf8c9a3
SHA2567bc4d9b18eeaedf6dbb89e57c9802b4545b4e6279cc97f3258ee4d86ae48340a
SHA512c6461d07e101f80321860082683427a2f9ab239c6ef36ad6c3ea0b822d162abbb2cb06b753eb4501cc3b00e3ad2d3a90bc57c82c8c2a112da73bd36b73238564
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520fd4744ae3f7761c1cf77bd01303064
SHA10fa45cdcb2bce7c8931a575c855a9a72a170b4d5
SHA256d3bcf702250b7c4d5b80b773198e42a8f2576402bb0d37c639f1e28180859ac3
SHA512e5441cce9187445adda08731b4815ffae40a57336e26b493be912967689ce95ccd44f1204ac0a3823ae7d7458c5fbd55367624b7f79dd2bc753e5d419ce820fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590463ea01656e79080307bb494376b96
SHA15d7ee869ff6836d3b617e6f4f0cc28d0f3d0df2a
SHA256ddef29b0e01343fba51393c868b576c12b46c0a55df22258aaf0fd918d8652e3
SHA51243181d15b28c8b1892d7bc88fe4577941be6bb2cb9bc4ec5c79255bf8eedb3373eb3f0b599cc9419cbeb7ed01311051dade1f28be69c4e765683c35d3e9bfab8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5708825121b17b7c7768237fc64305c82
SHA1d6f3b88daa9b3b7f4be257986b85f11d2501cdfb
SHA2563429d308c6bce346002752fbc460f1dc32648aaf747894e6917af060f63c2e00
SHA512e1f48fc0e9cfd24be28e0d66fe5b94085afe10f565462bd427cfdebbddd6ece9b2caf039150f6e9496b4a67e126d556ff160f8640656fa8cb694be6e478bbc36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59067ded9a5d467af26f6c622326c037e
SHA19c1b5766e410f4700bfdf46f64171619301b64ff
SHA25602d9bb7042ba9961506e904c1804cb71d37193aa05649eabf6b9a1d6a4101790
SHA512f901a4f9f3d5bafdbd93f55769a0e83f319882111d42535c3b3e399ace5f986bd74e7499efd4c715e45262c6b753b2f61d6487ff0538677558e1da8cfdfe73b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1e043f1f2a92013cdd2240d86824544
SHA1143f22ba1fe66341edfde71810275c9a59558dff
SHA256ff2a743c5e9658d543c12aabd7f8d7fa577b6856b01a2e426daf5f9df60d9dfb
SHA512e2339f66f72b3aacfba74df4beb056bde46457dba783c074de108113bfee9c24e0da1a14dedf71b97dd9645e25586530b25fbe90d21dba2639933f6a65850242
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5988f88bd789e3322db762003bd96b9df
SHA10abe1b3860555be2bb8a61c30baae621883de17c
SHA2563bb10d05e41beb1efd5fa711864f58e27298c46286b9f3ea5b7b4665c283080f
SHA512a8811d776924caa20daf10c4b59cf7f638611d0d61d46439134d4cb3a4d26424be44bad7b3e95a9ab8f3f0f8bd95c20e46ed14f12d79174e67a5930f2f51b58a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bfd6e3d2b758f60f24b52cc6c1f23b09
SHA15922dd7be02a519ec065e2dce34948eb68e5ed0b
SHA2565f309616687412ce9dabd7b17f6965351263761e355f731e47af27a89d64e729
SHA512df42eac9a2bbb8f4ce6e8c3cd0a95fc45d23193e5c89a9485fa64da147c0834b13f8982c7620c686099a35f3c94f0959272b07b789594eaad0fab420b3756476
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59984d1a2ed688afea17c924a96ff5ec4
SHA131c83a3c66122e2778d555337900c9752223a87d
SHA256b38055557f6d101a3227ea42226d054bb8a30d91a1cb9dab4db77b270e8d1c7f
SHA5122106284d8a597347e91794921f45887ff7428dbc2058a7be0d7960df206917ee9711f55c12b9f8d904151f61f7ebf019bd2290e83f4206c987f9f2d0508a5847
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9b3db8138dfc565d475411bcd455e4d
SHA12ecd9bc0118e8b3afc83326ddc2cdc592da170f1
SHA256e0edfd4ea156eb6d41d252c2b02930faf5e0fe17f3127ea16d51096632875b9f
SHA512e476c834c2ab01d3c7729e332cadbd2d102ba10fd9b5a1a29b8e49d555f7b76cac5793310a2873dbae7180ce51f60216c21f1570135b27e6e6b235ecdab13cfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5009a8a93da4716d287deb2a187ebf865
SHA1b45e35df6e32b38b620e730764d855841c1aee91
SHA256a23735b875769ba01785306e246a3ffea910c924601d05fc2ae82b74b1433f00
SHA5128401bbc3ba8f6ebba437eab4521c1062e403f5104513f87af5f8a62c101bf89592fb7332f5a8c6beaf9971dc3c263c68c7d929477b733c46052537590f07e7ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5a399fbd13ff90515612c8de07ecad180
SHA1e472d05bbce686cf57cf3cf11317cd224cef5b95
SHA25686bf829b94853954fe49369997b828dddef5ce74a05ec9f63a7a862e5169914a
SHA512f3d975932ab4e590cdc6e2c2eca3d3b1dc9a30e2b70627cf23e48585f68287539bb0259d3ba31abe88faf0766a77cfe6209799bf0346ed537f5d9fb687a66745
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5eb274eea0b9690865057e9c85cacb0a0
SHA16b26ce6b493f7b0df45ee61b94e2245d41fb5c0d
SHA256aab9a06ae1d5e89fb3b52156a897e6b41d684d9e6cf5b20ac0fca1e3c963b65f
SHA512ec28ac27919bdaec8980b01a259a7a4dfb2796ae8158b8ebd5d071e40bdb3d52ec2d4d28a18e2f19222c93be16f99880f39784e5eb6efac15e5177b4dc05d1c4
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a