Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 06:25
Static task
static1
Behavioral task
behavioral1
Sample
40831ab493fa3cfb50226e403cf1f83b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
40831ab493fa3cfb50226e403cf1f83b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
40831ab493fa3cfb50226e403cf1f83b_JaffaCakes118.html
-
Size
4KB
-
MD5
40831ab493fa3cfb50226e403cf1f83b
-
SHA1
ee1c687cb945aa1f41ecd40787fb72e9211481ad
-
SHA256
ae60b340df8ad1724efb63954619d97c2ea7fa3513ac7cdb64daf435430e7296
-
SHA512
d10dbeb9f04dd9464f97ef3f9aba92e32d75fdd1dc053dcf70afb217dd6889ab2aa206358b28e1bc46b282a932baac39b8b47560325ba05555c1354902ffbb44
-
SSDEEP
96:LF5MPCZPh3/V5PhrwTS85ArUes86zM5YUeYBk5tN62qWivF7cVC3xwJSj+P0ZkvV:5mChhPVBhrwTS85ArUes86g6EOWxwJqy
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000e931c8ec2485d43e89cb90683a01d0b9bb2c880eb8ed5ba8ac510729da2db7c4000000000e800000000200002000000028f24d720eb3b2b63a81a6a8b12a222a8d85741129971a52ef9680c0e382c27020000000f260560c0d47edaf871e1b962877a05cb6f185b4b4da9aab6e39b2634f848eee4000000010dabdcd013d47838b26fb87ac81ff984de5e1a9882e69d0be88a9d53f40450b6b99eaf8553bc3006775549895f981f96773e2462784eaaf33b0e97c8e682a49 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C24F9781-11BA-11EF-8A7C-66DD11CD6629} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421829797" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0097b898c7a5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1904 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1904 iexplore.exe 1904 iexplore.exe 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1904 wrote to memory of 2508 1904 iexplore.exe 28 PID 1904 wrote to memory of 2508 1904 iexplore.exe 28 PID 1904 wrote to memory of 2508 1904 iexplore.exe 28 PID 1904 wrote to memory of 2508 1904 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\40831ab493fa3cfb50226e403cf1f83b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1904 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1a12b2dba940b6eb1813d8d66157ab0
SHA16d3f2ee0efa6d1b2767b39f26b5f1e0e87f1e8c0
SHA2568552298b75b9edd1a986b4b7e9fd003536eacd68718b4a548a5772910467d522
SHA5124bdcffc38f221ce7618e24e68fdffedccae22334f70e27d5f63039a4a88e616fdeb9401841b1892011269822fa21186e2b6b4cdce34d0a7f25ea8c2ed41b6d51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598a9ce1935b85ad59835f2d845bb216c
SHA1e407a9a2af14e3d69c2bf3730ad24a388018f805
SHA2565d86cbfaf9e202013a643c2b90b3c48bc6dd20f51991b73b7807e45ecd5a3f99
SHA512a6edb681f6c9300bf173a7c92a3d41006bf65aaf369f3af4cb5d5828412b1d152542141c07513e158c6120cf7a960bd06fe062dfb6f86766947a1075b142cdaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51803aaeee6a160e887dadb72857cd1d2
SHA1fefc307e2dec6083c417f9913fcdfd61624298f0
SHA25676d669076ba153d80dbdab5cf5f2cd346ead98dda64a80d10635f37811871e3b
SHA512aa0f27484d0f2580ff7b618fdc5a7c13c1d4fbe74033a08d4013dee5027cc711d3909993bb0cb93686eca6f558f8cf0aaa54f51cd878bd47e847cc615fc3bbe9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ada39b2f49316ad442841ff27d51fc1a
SHA1685edd44bb152f3b9e3d9be12a5469345ac3d105
SHA256fc6f842139c550aa082ae7bb8d92725132760a8106868c8c210e1d51a6197682
SHA512f77ae2e15872b3328b3cd748a06568e7274d0dc993159020d3aa21f5be136cc78bfd67b7fbfc890e4f5169df780d9ddaf52157b63bba47faa718ca539edd7113
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5888cef7419d1a21af32f06f785817006
SHA15ad479c1d687062c3feccd56d0ba28e2252ebd02
SHA2567b15812f04b264f54510bfcf175bc8a34f35c22ee458ccfefc2d22daedaa1a34
SHA512df7a2e62fa480808b19aaaca0363f39ec5f36a8a2528ebd3d786dc345f3dc3cf3c7442a5dc56d18f4e3b874a467ed88a2b164913901aba1e6f93df53bb2f993b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c2df1662631facfe28c890244016a0c
SHA189e74e83cba323839569b3833b8b241c1bda8b77
SHA2568c81c8a4622bb2a0469d06ccb8ea72a03ab5548137ce4fc3be7b8f598f251cff
SHA5120c972f460467cb14749f1f53ea2fd6d9d29b8bacf052e7344a7dfc05a50fe8e8e8641d4624dc9bd7a830c1174745ddaee851711af8f56a38dc2419cd894664ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd99b108ba707af70113485208c7ed6c
SHA1fccfa6607f40e1d07dc612f5be985bcabcf2818b
SHA25698e4cc3cd96636a4e4e3a4043a0a3d2e44380f14a776a3431e0337613fb62e00
SHA512b6dd58b1992b00b2c6085e635c26aca17089eaae2125e029db8b7e4510c25259b06f4be1a6c4613bfb430193216e4184bcee3751db9f115b4783d5aa782c75d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f8bf6ff1ebdfb2298aaf3219f340b33
SHA15321602a2cbc67bd252efbdaef89ac292ea4bcaa
SHA2561467681b9ed7b2dc9cc354dee2fd1fbe906bf1b98517e061a797612a2b1c3fc5
SHA51239c21a57dd1ad15420334aa43781d21ca1b8a7fa77f59ea299e9ec38b75fb81c8332e82d1b96ca1b864d047cc44e80972746b61cf123fada788c28a808dfdcb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b4c09b87c32fad49bb6ae246fc713ee
SHA194c4909570a5a331ded241c820951d88a0434d8d
SHA2563b748a95ebdbf93e9efc37f20b9e1099cf8d45ebaa7d93dfafce2e7d508bc54a
SHA5123909542260e1395d62a1797dd9a2fca263833ed7ed408d344dc57e2ef956939ac844a684079452bf981c6dc17d36b543739ac571a03f5ec9be230050b5db34eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf5f72d0f6ee57ff1b3ba82687f860b0
SHA1f6dd311041eb5fa59f255fea8cfabc9c71464fd6
SHA256623b0bdbd43c97937a1fed7532a76784d1b928496965a5d2be61cf37e03201b4
SHA51267675a93a5d380e3959c555a2769cfe94ddaa53cdf3433e41ae7ddef15eb1466b68b6b54d7689a1c10684ebd7ddafc3e3b1835c98e8d4a897ece250fadb47215
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9f356983cd64dc5e67beca39482a467
SHA1046ea008ae7cbe5c3af637b3a0d99ca1acc4d0c1
SHA256af81c154b6aa1755543e2a55b6dba82bf26cf7dcaeea09c7731c0abb2dd7c2e3
SHA512f56334cebaf9c4260e59f95746c2a3d0f4597f97f7393c452491c45da202e89e79e3094dbf3a1d717792aa4addb1e3e0becd54c288cd20c8bc01e6492b7bdb1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3d209f696fb402cd0145ff2ab31249d
SHA1a9cd9c7d9ee618a10fb786e7a775b4aadacb4314
SHA2568e6fd3fae3519f9e7658587e47bcecf4ec12e622c198955e675a796ac7737580
SHA5127bac25364a1d0d1b2baa36fcba735830003359faf84d687704733554a4ab111898febc81c95d4c3c464084689a12f33f79c4e3f34e02e8f9a56602b9cac06a12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b2a796d665f6c8a6f52f7768f2f2f71
SHA1cd2edab909b31960008dab058bac0f786bf6cae7
SHA256abbf3b7a740a5cbf1f33fb2d39751876b9602e96bc9a2240362061d8be0f289b
SHA512618e28e7b220814f009717c3f20a8890032b4ec5aecb7c2eb8454010b078e563fb965a4b159f19b91af5c008e9aa2afd4c9a183b7dd5942c20bc943a2ea7f517
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52da013ce3b4548f1d4c152f16c5f5167
SHA19310318f1fc55c55be66abb3ffb9a4c2aa9b44f5
SHA2561413d39d0cd70ea04b96f8a2cc8f5e39ab1399563f88517823e5089722b3b504
SHA512ff116dcb2d8d221c0f35531a80bdc31df963b1e51ecdaae0cd585f29e59101b796415194cbe80211e98d5298141a29818325b4178bb7c6496bbd0c53a4a1bcef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54aa794f03f3cd74a97a6030ead19064f
SHA11e05f84024cc094f7ff278ff49af2ee2a298f25d
SHA2565e8171cc0f6af80aef01ba24e6cdc9811989a59c6c5797dc2ad756d2a8791399
SHA5124636c903af0dd533dbbb68135cd96f2143cc67468cd6616ab63917834523189eaec44f68ee1844cd341986e2394f022958457b32012610a09d1871e7046160dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5573f54df7b7799dafca9e0a582e1cfb3
SHA1e78ba27441b6078aba24462a1dc5e5a8c441aa11
SHA256b1c934526db0252cd3963cf9f1920d805abc116e46eb7786beeecefb8ea89e29
SHA51282ef92700f455098b53670f035961dff90c612f6a2badba0e8393544943f107d9efcd1ac8ad731d20f0f093dc6eb964934e425543fd1e6fcbf87e8e7c43165ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560c304a2bb108d784a4140022de5f185
SHA102bb4c2bd2bee05a1446a0f6fef4e5f9976063e0
SHA256c5f4496c2c88d8d601921456acb44e85d710811de8105190959a4a6c15db3943
SHA512170a1d233b37b6ba8491a1a70d234d7d0287686cea68b8f2c78806791a22011512d900933c5e0cc1336e9411268213d74dd795891585e9652efb37aff1412177
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5136c7a5c6fc752ace79813170be3b4ce
SHA11fc25ccaa3c8c3f562d9abc2830f45f78aa9da1f
SHA2566443cd259653b6b608d1ce590faff7972c65e32c0277c14b0c0a916d1be19213
SHA512a7f47db79bebc8d409af42512e1a5c846673d14212a6724b1edb0cd118729291fd7c313149fa0547619005e6509366657a4fd9214c6a5e8d1292d96c0ed67952
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a