Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 07:20
Static task
static1
Behavioral task
behavioral1
Sample
40a91ab5395abc4e99fa0c568d973e61_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
40a91ab5395abc4e99fa0c568d973e61_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
40a91ab5395abc4e99fa0c568d973e61_JaffaCakes118.html
-
Size
4KB
-
MD5
40a91ab5395abc4e99fa0c568d973e61
-
SHA1
7961f0b6d8847a1ecf5cc68ac75c3d89c39b5f20
-
SHA256
3fccb30fd197c7554e61f4d9b0c6d4e370c4854f6a623cc691054fd54a01dfbd
-
SHA512
f5b5f175811727189050043c1ab29e5004dc01a83602cd95b18d98032b45d20d0cf40de8ef5882e17362fb5de427ce525f874499765d83a13d51fd051287aff5
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8ofIfcVfs:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDH
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e09b2b57cfa5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421833126" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8290BD11-11C2-11EF-90CD-4A18CE615B84} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000e14efcd7b9479ce37b44868659b5c9a23b3f105ab0135db8cb8149fd2ecefa60000000000e8000000002000020000000a5b45325b0ac7cb190853227cb7f194eaec53dadf2e464deb0274b9da93a641320000000fa45067fe4c89175e544219d544f117c00a731dd76581bec267a4e5cbc5161fa400000000fd1b76b85d6a2779ebf9071e82dcb6933c3ef1ddf044674818f2eeef85ca053d86d20119507f661ac3a397bd14398e58b8288c2ad7af5065dd514c876444058 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2280 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2280 iexplore.exe 2280 iexplore.exe 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2592 2280 iexplore.exe 28 PID 2280 wrote to memory of 2592 2280 iexplore.exe 28 PID 2280 wrote to memory of 2592 2280 iexplore.exe 28 PID 2280 wrote to memory of 2592 2280 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\40a91ab5395abc4e99fa0c568d973e61_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2280 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2592
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a4166a9dfc0560f7b0fb8368243364d
SHA19917a7924968e971ce26030fcf500c64755a5625
SHA256904788db7944c9682ae10ee12e25253c18745c0fbb172041e7b8f6acda5a03b5
SHA512bc22e5bc3a772216682a504cba1be0e59d9d3b326bc5d123288c65ce47b0c09cc61cc73f25dcd287b3bae295148144d9a2051a458d2cf75eb7eb3f603a0e6ab4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f0aa5b01bf020daf60ab97eabbdcffa
SHA12db05775d9fe919d72396ac086e5fa02daa90454
SHA256cf5c97dc25f014bcb8b9dd1711cb4b185bc1a6e71ec686252cd58fddbc0874b9
SHA512d3f63b2e07a2f033bba20c795f60711c167cbd19db0fc8686110cf8b30409eb7df8fa7c35af5c067e3792ffa0195ad97c9d42d5aaf55be7f54cd29401e400fc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8d1c404fc04c71bef028cd587abb627
SHA1f56dd356208e34ac2ed2749aaf3fb2dce72026c7
SHA256ed29f7cf75f740cda73ce2edeae83330aec570aca3222f5f01eb6c10ae210aa2
SHA512f47c42281f2a06a2a9e5fcecf0b650d22317e9a628a59ff9ef1d9a0aac710e2fb479608f4766c14e5ce59c1039c862a935f724dadf35bf5226306fcb9c4c881c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d40a720c7566faa621fb2951df96520c
SHA17e30e0ee9178da7d9c25628df07b53cf19cf0685
SHA256f0667d6d6a7b4fa066bd5821d398a13a39432d4d626c54277ed65bd266a39946
SHA512c5b4bec054d08aae0b62e05f86e6111ac86a0810089383cff5ab29dd9cd1ac15094ba8ef2cb2482fb46221ac697ac1c03dbeb1bdb4e0d581be3f9431d7bc7a83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a52992bbf5e9ade03f9afd88275bee5c
SHA1231701fec2c7f1693952094eaaf46249fae4e82c
SHA256b0117dac687c8fee595ecaac9c0ff62890bc28b3647524b07295161f34508845
SHA5126ca19a675a799dbd451c0c94ddaf76793b9f7116e75cbfdcbc59e32ea6c101751a60d9d67fd263dc8ac512672d696037645344de976e9cedb32cf0c0c288d7c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a17f921c1f1a465b3cf765e5241aa3a3
SHA19a011f4f63a49c47b7ccc92f1b88f75b2523125f
SHA256524a6a036212e128fd99b13fd84182c12ba0798317cee7fc96cd94dcb590a52b
SHA512983627784ed0af058cb541bf50f7071d489659cbe3ca551cb778e9079e1c0b10a8e490c2d747ffdc0a60875b4a7ece89351f348a7ac82c95075cfa2d1c96ca1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e83954356b94defeae2f2eaac9d234e9
SHA18cf5bcd60997a832a9503b237199a1de37a5a4ba
SHA256dbc2de6d7704994b4a91e79a926c388e018e4911b709838a1b44f497f38c3678
SHA5126c5221bb2ec57303a6ef058cfa5aa99ec59cd66fb0be02e90b210ab0be608ea16e3a8273654057e1901d83d27f955218227ea16aa23448a9ca47751acfc47a30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5113e1df780eac29ec13375cde33978b8
SHA1974b243de194cffcc08079c1b8b3c2977f101704
SHA256b2a253d4d7536f20d39fcb0c960c1997b0252a98877e10b40d73aa42186b4dfb
SHA5125e6b413b2a12233c6e53ee06e4647512db4ed85f98a8d72dc22f3746296a5d0276aa7a1afc48b1ac8a54da6d2719355c38a6c0c3d7f91461ee7a15dc6c06fbb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545389d01137f3cb17e0ea0c8231a9fb9
SHA1f74926aa9e8d60a7c0217ebc96ca7fada84ecd94
SHA256315c1777696852e04b5597757d8cb58dd1f9c59c0f72979d4ac444936ced2e4f
SHA5120e5a176f9f580940c8ce5bb3707b6547e53f0c560ecad143404c2bd90f64340bc9fd5a7d4720e299a2a18344a9d700586d7441b729c1125371e253b0727adb44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3676712fb190fbd765e876336a95c9c
SHA1eac41711aabaf4995f10caaf68aa7d73cc9bc331
SHA256ef34f517e372904bdb230d3a01f250c926e3da601ccdea483826d0fcc10e2949
SHA512bd2badcde9467a5c6f867e4256d22823a5a973ec2c25c534d72f6d94c74e61b16014a3ff4c58bd7e7187abd3d3687bc15b4e5000bcaf3fdca2dddc51777eec6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597eac1886750a1ce9e613070a92d8a36
SHA18beaf0b8f2610a13ac23f56656403aba3724b61d
SHA2563e770515fd9b15855b748007704030b7961772c84f3f18cb1b537817182dc5be
SHA512c98e5a30e6dd1e46849242ce3b841db69058880be87bc3b26d6c194b4d71a41d2f43605932360533da2dd8c8852639e16928ccb7b3dd1df759773900dc423c96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d4c6b0589edb19910261c56e45c7c7b
SHA164102f8d8c62b8ceb893f1395ab58c67fc142208
SHA2560028cc719fc6d85b518e21a63f4aff5363233879b45f9ecbd65a577dede52a56
SHA512d137caf26bfe022383538631d0038f0ae1bf46f4ade07bf6a57303563845602ed6c30524d0c29d2caef7173298a435c3819939faa5d72dc9181426eb43e8ab02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5938ca580b0bb19b90268bc746f7f0c12
SHA167ffeddc95ffbfc06e16c921b534bf987730e422
SHA256e23dfe7c6f1f68fa5439f621c31e709c6f093d743204478c08e907fec9f04889
SHA5120bbb172476d1b97269a07e50cbd17ce3107e3e80826bb996320373c0a4f0b40c6232dcfd7634aa576d14699b6ddf7f3fa3eb192d302c8d7b55b046228017fa17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e00c06d17a8a2430f623f83acc4b83cd
SHA197d1ec3b01f2c9bcddc493ac69ff952b8c7ed86c
SHA256fbaa1fbc6456f87d03a53223a30aacd215ec062d53883a91c290b2d56d010ac3
SHA5121a1d96892d52850967b1b4ddb0c7d98657c807379aff03ee7bef0a8f9d66dac74d1bc829d15324206d6e3dff6bac6ed28fe0b60b0559c162c3fa71ac85a640dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512c7040e14cf03248b017428c3716996
SHA1247b94002dff8e5698d133d077046a20c4f90381
SHA25697cd7bf8871b528025ab1fc94ff0058612f49c8b1ce1c0c044ac361bed0b060f
SHA5120a6aecaff23d38c3b976c6d289e85069f6203457751e5914bcfbb1fc7a6c25ab593ddbee786740a11b2b2f39d83a5fa8c838a222f745c5763d824aa8dec52837
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554da42ceb7a955a87f31defcc6885236
SHA14a7bf148277a2f60e0b8fc356e8125ca2b4dfa80
SHA25631a3daf312497c34c1f78e3e941f4db2c85138a90a33ab81264f9b7fd015b789
SHA512c3e5d02b3267e3df2a8b53d7e0bc31c0a77e64d015d01119cd850571a6ad37a86b98cd990a8a33e714e7eac8c2f253fec228942c9be715f5f17feb423c3f8203
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5044d5d0d706ff55cdd7a5b0db68a37aa
SHA14ae1d6e3f11ac9305e335be98b9834c4550c7036
SHA256077e97732475057ac1482a97700de434d9ae1be2eff82fbadcfbb871f05f96e6
SHA5120753bd1eee3f624dcb67f448c1e650782b0c14386ff1e91bb95259c8cfe7022e86269b0828fa9ea061123505660c8b2692c4dad6f8ceeb8e0676a1ce118fac34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512f7f19fa6978b296b6e5520f4059b0c
SHA15b562300b0540190b7fd1f47c845bae6a0025982
SHA2565de7897bb91510279c107259995fd1e6c27be5ff5161a5b9e581fa7fbe1af716
SHA5121996c174a01e76400ca9e3921b15311e605092b501b19869e86ad331dc1f22303284c2bce21bfa2a1e91d01e21d517143b37b3d45c455d3d85b71ae3f19c71ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b739a7983a7e359bc9ba455f503a61b
SHA13bbbf321400ed98fead6aba82805842e22a9c822
SHA2563477578684ad2fcfa0027aca94f4c0b5f0d77394c1e3c43bca2aeeb3a0984428
SHA5120c4ecb2a619feb9da96919559fc0ccb390de465bc4581e02a3c216ee07b2e549a4dd27fb07d56cc3e84ba3236df88095c3fb98de9deb2f5ba7cf63cad49565cc
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a