Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 07:12
Static task
static1
Behavioral task
behavioral1
Sample
40a2fd959f80abec0c2d2711cfedfa29_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
40a2fd959f80abec0c2d2711cfedfa29_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
40a2fd959f80abec0c2d2711cfedfa29_JaffaCakes118.html
-
Size
37KB
-
MD5
40a2fd959f80abec0c2d2711cfedfa29
-
SHA1
c6c9d85f20ad93a5fada668631a159ad4d70a430
-
SHA256
1a130f1108de97c10ac810be690327bc898453a179d32374f8282a8e9d2a15f0
-
SHA512
ad19e7a397d34d64c9ddc8838214f5dfdf67fede8f4112313a20414bdc5feab431d41f1287d47306e360ed968c58561bedaa69da2e65e5b667eff1df05ee0a82
-
SSDEEP
768:S+VaSHWmSVjOpRtGl+PrN+jSNYH5FJybh/RKp9AxcptmLgxt/P:S+DHW/46+9NYH5FJI/TLgxx
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{633FB2F1-11C1-11EF-BD6B-4E7248FDA7F2} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70f5ff3acea5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421832644" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000002edbb6a074b114acaeec409dc5f21f0426176e2f0b18fb0a97514718c6ff18c9000000000e800000000200002000000026d950748dad8a83ee97c347e729e85ca0a59e236a9ff040a090a5c5d3cfd84220000000154becff4b460008ad86d15e9cedc8b924b94beac3d5a9841044357cf51bd85740000000289e8b97613d6a0de804065080361f95d53502f4b2b3db7af71bd0f63f38ebbe5f0c19837203e628c909fda71462ca9c08865f77b8eaf19376eacf53d0d6725a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2068 iexplore.exe 2068 iexplore.exe 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2604 2068 iexplore.exe 28 PID 2068 wrote to memory of 2604 2068 iexplore.exe 28 PID 2068 wrote to memory of 2604 2068 iexplore.exe 28 PID 2068 wrote to memory of 2604 2068 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\40a2fd959f80abec0c2d2711cfedfa29_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2068 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4bd359ef65396c3950272a9003d4f32
SHA1fc5b2434b535908435cb592cd3343df38c9d24bc
SHA256682fd10ebf0d4a1078b977d1ed4779557478cbc5cd9d13cb2d6293e4f4dee301
SHA5125ac979626978f6e1c027a4c11ee926c690da84a41555c3d2c2189a51a942d25ca3e97295755bef8a9ceedd261033f96fcbe9d6e0a5e93ef549ddf014f0c3eab7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d3e13108fb009a1ad4dab0023e458ac
SHA16a06e1cf5ff1ab76c3651b74ecb915fd97cad378
SHA256b14d1627d6611fd48479691fa6ed694a9f93f0089fdb80e1bf7b57d153d59b1d
SHA512cd908c2d35828cac072799ec2bb2ea7cb16e5960f1ad53e04c5f7de12cf6f58981df644e40e2841a64e9c277cb8dd67cc8fe855f27b03d4b411debc9593f049e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec62771b5ccfed2e7597eb89ef223c92
SHA187a0468b899b1400f6319e8b1b4db1a601f2d2fd
SHA256845f51067eefa39d954dee9cbf53814aeeaed2a1345931e96a063e4e287cde80
SHA5120b3964f0daef973010b6f13f138a2c2ea0b9f99c6521a45277a2f426b248f375c5c16f6d9a376d8b7fcb5f9f43fb5933ee5570cc3d25adff03262591d210bcd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595e964613e1842aa7923d0fa9ccfea36
SHA14a487fdd138da52e68bf11e6cf24171ce5a3b61e
SHA256b66b947d0676c87df72df599bc5a08f0a6365ef3afcbfd6e276fa670c5707b2a
SHA512a7bf917d5d1636c479d8a010a6a37df3284d52ada41170329fe390fef55bb29222e086181528c302360dc92376c26926e57b552e5618eec67335a3d495c40585
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e59f7cd3ee5e4fcf027b29f28b8039ba
SHA196f1cf911a660b5db2de48eda00d843b2e1bee07
SHA2561de9d6a9f624647c37c6b63e3826b868468ba574308db3fe9a09db670c33d4fe
SHA512f1f9edcc3f2900fda951a509282c5b18385be9485d165a506013d6a81ee44d325fd6a52dad681fb3385c7a76886d0a71cd8c3b82b83db008a340d2f39da96dad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57bcea9f8bc0b0463955feff58249126b
SHA1f0d3746117249ad5109997616de5778ac21a98bf
SHA256e2961235baa87d1b32462063fc8c1223bb3a9a78171600327855b599b0c6d9e8
SHA512f53cbbc9ce6c8f3bf500be5127d7bf83a6a94568ba8172089a0f0ad7528d420b21ea3f9880dceb3accb9fa343a7a0a63ac74e39d7ea7cad8a6828058e895985e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a8dc5cf07e81c1c79ae31f89c24958f
SHA1308f56d784dd5d3217bfebebac02ca5ccd7b4d22
SHA25690cf6d3d2b53f8f5328a65252fa4d571f2147976188e810c37f178c861cb2b5c
SHA512050b00e1283898dcb182c207189fe23b2ab40a5f3df1d1dcee8acfca8bd33d3be2d3256286dda415a021f7f8fdfb1cdf0886359545805c79e3ad5d90b21a59b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54dd3f8063ff5ed4809b61ce4bb5a2d68
SHA1ba930d5f5641109a72c614b4c0bba8b59ca871ff
SHA25671bdf9cf9e4277bf0f1404c7f19c6876a06f0c9a20a3cabd759dd453dd08b97f
SHA512bde8123a81bd286a9c4e5dd65b4e0dd127cee0e5f3c4151b13c8e58a3cfe4e097903db58f3963f31499258e032c86cd526ea78a55ce3cef69ae1c87f18cf18db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d62dd67ce8336bc55ca864daff685b3
SHA14d4072255d89a102089d2882a9abbac06caf49e8
SHA256392ee1e4e94a6e472ff2b74d289d243c36a46ad0ebcbb6e8674ee36a131c8789
SHA5128a088e140eab7b11df347e53fdffe3e193aa92c2c1832a6a95c8c0018e1be9ee4ed1e1f1da86d6a3e05d2b5886d5c3a8891d2dd9303653bdd3eb46339afab187
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51761ad7f905fe8cbc651bf78a59652fa
SHA1cf6b8e6e44cc8b17c345d85cd0479ec15dd616a8
SHA256c9f5663892152be5e6e2632947549dbc4adea2c1d117571fdeed2512c1162e59
SHA512878b8a3341dd8745b2cdc2cbfaca3de508fe34e8c5e2dbd37aee259679dfa7c331d43417af7fb7b938c501c94b872e9d4b20cb934f873a9a04fa9d10f565f27f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542340d8a2c8106b53ca00a27124c92e0
SHA1de63b7f0cceca9b31821dfa73def8f609f63d795
SHA2568b10e2415869c30688c799f481671b0c6e2d4b61d2ec0ba2c5ad4d082a865dec
SHA5121d496f21fd1a2b6691ec49740640581631fa7a05c358a93e1b1e7e5261c40db6b3e004bb1b8c4c7db841b770693fe0cdac8167f4eb4dae3e4b96144f75e1682f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53da4e3ac4502cd5608aeffc128949dfd
SHA1c63c66c301d1599273e8f3db3647e4b232bd8bfe
SHA256e704ec08c7d69bdd910508031fa0277a09410412b3990049ec188f582dd8559f
SHA5121b4b3821f014ab0ac496722f3d094614941caaed44b85ed3b3a8653d95dac5f3461d444da51a1640140930ea2e621238837178fadca086998065e0e623dab170
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57318a5df3bdb4c949d5947be75a44285
SHA19e8a0269fa0e011076da1f9c92dbf96487c236ba
SHA2568c21a605c9aa0d7af524b1dc6597c6519e4f0ef4485d56b0d0e0056dbf296906
SHA5121e0c6bcf3346f8db25cf6fa9cd37f7de5cd4d77032e17ef8bdc4bc54386dd278ba9d0398d7efab62db34c636ec2b9e796d907401237b1a4061d30a335bc8dd5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ff0e7e52e432ee168d20f15ede37881
SHA18fc94604f087bfbdc8a0778657ec8535e0391d86
SHA256612e0d261d145fe0cc7f85c9c6573504fd69ebe41f97a048d10c4cc1d851e664
SHA512c64e050d913930dba59bc89fd64162b49a7cc4caa0cae0438b7c7103b218620faf2f373e1499bafcbbe9346e50a9d2eead0f49674bfac0c1aa680fab64c6bf39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c9509307d3dbd074418184de1e8ea51
SHA18bd2152781d3f7753c6fcbf00fb6e6d9dda1445e
SHA256f25891e8f8908af9cf91f8a7e6446f2e3473c99c24213836c9da5b2f099498d7
SHA5121cc9030347dc744bd9ccb766783b94ca51e56cd2f64a766fb654900946fd90ae29707964524a7ad472224be882a759d3f0726666d9a51d7f1f102b328d4bda2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560cd337cb1de9c1c678df1c37c66da5e
SHA1e4c6e294f84f9e851497ca921f10232620e5c0dc
SHA25650bc5bdd787c94235075310724a8ddf8df955bc61b20cbf2c9ed058204f9f3f8
SHA512284acc56df6f64d6c96bd1a2c6d69a2eb73cb40b9c123360522320b7be5ba5ef1522c9af60aee617b11e6c412e584906e9d854453d50f014a175c8956350b9eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504241e979ace4b484219f0962a090b49
SHA18c8da19b5335e6b463f953c704249af820ca27ff
SHA25601f9fdb0c68c9a7dbcf45c2c3e9802ccc2c2686113a3416042ffa00a93975435
SHA51264ccbe0a280c35595ddf39ad27c02a99b0583de536eaee2927b8e91d86957b31129f57f5d96a09afb3b19c1e9365fcf3691a8ef5105d5452628346a22f41139d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e242c03564f11b90f7d8aed0ce2887ee
SHA1cee8d38e296552a57daa3c7d42cba2b4975b9751
SHA256573a8bc4330de84fe3b198df17bae2432fb178db00f9cc57cac8e65ae609a95e
SHA512bff61a39087a2a8671bab524294e551559d56e2e62b8c6ea0718571a7d92d1a38a891b0402b964b64c9cc3d56996a109aacd8b7c3fd842bbaddc9351be19fd6d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a