Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 00:23
Static task
static1
Behavioral task
behavioral1
Sample
43c295890ad640d53b8024ec084d1fbd_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
43c295890ad640d53b8024ec084d1fbd_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
43c295890ad640d53b8024ec084d1fbd_JaffaCakes118.html
-
Size
28KB
-
MD5
43c295890ad640d53b8024ec084d1fbd
-
SHA1
1fe6436de8c67c9c72a55422e19a11eb8374af28
-
SHA256
2d94cee5c9ad5d189a95890befc0b87620c5622e0809cdb40c4dc0e383af57e4
-
SHA512
642b919828aa9d932ae853a2036bac4d56ba22dbde1b478cc4bb99c880d1dc1ffaab66afad46cc4a667543699126552fd42d8d4bf20dffc1bb5a47f9ca7b4c07
-
SSDEEP
768:Wp2pUnvTe5hoT9gWrg1MluebWSIPdSRSdHza2oundKaL3bk7swd9WzpXeqBO:VpUnbePT+lM1Sczx3oD0eiO
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e0000000002000000000010660000000100002000000021418ead90c34da87c2a02662845baafcce6853c294990c1ec2d4ac079734658000000000e80000000020000200000000ba685705ec9e09cf41efc53acdad35583733c40d3351e86425ca8f8cf9e4126200000005d01ac7ec358f27530963a9a2846461f69a0e0ce1053411c39c5410addc575a04000000043f6dcdbd9f01231fec1427269e1146fd83e3fedc5354db887d2b63b5808a7cbad8c1959ab5f182c52432c9e2b488832c4c3ce8995e811d2a278fb9e5e5851a9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{59FADB31-1251-11EF-93E2-EEF45767FDFF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421894476" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 807c802e5ea6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2664 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2664 iexplore.exe 2664 iexplore.exe 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2664 wrote to memory of 2832 2664 iexplore.exe 28 PID 2664 wrote to memory of 2832 2664 iexplore.exe 28 PID 2664 wrote to memory of 2832 2664 iexplore.exe 28 PID 2664 wrote to memory of 2832 2664 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\43c295890ad640d53b8024ec084d1fbd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2664 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a55501e94d6fe4c15ee3720d9fa333fb
SHA1cae6c9b4c59e1bb110bd619f66657c50bc20563d
SHA256199b83f4eac450bd96cd1ec5edc730b32985a10db782b15aef6e2820d8a42c09
SHA512bf1c0bc7a827564589dcb27dc5e337d4fde8a767c77854154019efb376bb115444fbce98f0a816c8f96a30a6172ac89a5f8279fee0405beed6d84f7e505cffb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d2602802893145ede09e8d64fa018dd
SHA18c0e5e0db0baa526c1442f1f104469afa0773c24
SHA256d89886c74ba9db52863e4726c87ca824e8f1ab88defb0878da2d973270b3b13c
SHA512bc4c1ae6c64632883df7d832ae104007befac17355deff841f4640d19de6fdb4a4d781ae6c405e716e34f1ae4497910af4b38a8a2d50f8e82344cd9a6904b32c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aefe6d2256e4913b644fdb4ec5d8f4bb
SHA1efb4117ebee5b90dbcf6ef27497456dc44576a71
SHA2568721d6e94f4ddb5c51bf4ea2e00762654e3c2f31fa2983fcfb8cf18e33938f4f
SHA512d67547882b2d33ac3622cba4042a2ce7d3238437fc11cd644431cfd2c3847793c1736a4e76549f9046a958807cb093ed61b42690c1f958addf9ea0d7e84c1fb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5d72c4cca19b57e82023b63d157c484
SHA164f3f11900b0f95d69291362b03c0b62acf5f06a
SHA2562a5bec362a7609ed9653967bdb64a41ba82f71cd29cd8e97a71d287a1fa0f9ac
SHA512826ac90b0af555804666a4d01c2f061e2573fbc1cabb6a7ce3948a0cb58eb4c443ff93a783dd3c7f61e4d06c207dabeafde3c56d608d460d403437f9f0b6c788
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b87530d353ee7919d352b209954453dd
SHA1816e4ca948ab0e529900122c4d06d4afe4cc2b0f
SHA2566129385e6aca4d4d1c00e8eb92b2ecd6b4fba93165da5b7ca735fc4b45bb3b40
SHA512d9ce4500df68ffa446d97c4bf7add91db72fe5c4406c516e3186f6746cbd2e39363b2e37bf4fb9a8ab8b1e95dcb0002ef32357b96d576f1404e5d69642472490
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3e777bdd04989a653b11bd601465c89
SHA1ca610f6a96583b9f04e0bb5c2270ed46d8dd9ea2
SHA256d8d5457ff4504615fbe1ba9bb0a0cff52756ac2d0751325e95491827baf54858
SHA51221807887214c13b3f761e14fb77cfe35e87b512d92368afd7afecb1532ae2616cfb368b2848d30df59e66fb208e794ae5eb7b10b864289e66311895cae694500
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0250c55bb1d9178cec361de519cd44b
SHA1231747302facef4d6b3bff38aaacd875814285e1
SHA2561e6158bcf9d78a0f969205a2f694c838f16b6893393d52bcd80086a2b1aee8fd
SHA5124f0935ccef6190e53819dab1d4d36c0c749c8c02a6d0df25289b7163e58fddd8e45f4995e8fc6ebebd58d104f575c4779ff351ec45866d5053705d1b238257ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528322ece8054aa311a38ba64bcdf0f8c
SHA1a5bc126dae09810f7a4180cf162f0414d1385973
SHA256baf69a7de4ca4549bcda602bb79bbd3c22b415c8950862da0bdb30cbfae6fc16
SHA5120bb5c9219a59841cf2ab0af465946d7a324d0ae9890046d0792153174312fc38f9854350ccdd096418eb64f746efc7c266086fd150317042547160cabe84621a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58582e1f319dc54bf209186ac05e17ff1
SHA13c4c30baa682458ea76ccda0d15ab9646c90b131
SHA2565e8346eef3ee2339fa75be3fad07e69baa115ced855d1b0df7a76e1c96425391
SHA512ff16459a3a34170230cf2b725920dbef6e5b5f80e4eca8aa70e21c57cb906a21435551eb419704d8a709ee24c585233ebcfc23a644d26d2ab11afea6c12724d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e8fbdc142229a36e5b4ef39afd8f8d1
SHA147983530f19c071e1734872f40cd98863219a3eb
SHA256261da961c689035649278da72a31f5058562660c09cb9b04ef7a861085de59d8
SHA512866ed225de62a5c8cf873f3449ea1adcc7c60e1f20dc475107ffb8455ee6bd5cd58abd7851096d6d64f241f09db6dbf0ac85ffa2e17577153744880ef674cc81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5175221cb895d99570f75cc53572a9182
SHA116e8f5cbf00f10b3a31815fee31592905bb528d0
SHA256a38c4fe6d8b2b029bd6cf95384f1d7b6ba62d0bd72a64e33d63cd6390dbad13c
SHA512c4a556294be6ca44aae50f2fed1bd1ae27b7ff61a0d89d30b02b86bbd4bd69f596e93f3099e8a3cc12766d2accdae05340e1fb2b779db82749cae541b5c54f2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d58eefa54ae673d1ddd2732abb47e5e
SHA17dd8ce0451f77922011fe48fa85ecb4ab10b5635
SHA2560d37be4e8ecb02d469545ae634441ddeb350f1ff34daa8fe1737487b64c03a8d
SHA512633ef09ec372ccd574fb4cfdb25e9a1229c85810ad0c4c273354c65a9c324ae8cbc2b4a0860df70ece61a909118cabea2df46b24582d7c197c8b54106c7458de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58addea8b07f2d08b33c5646965d72aa0
SHA1d0a3eee4b45626c7e6a81cdb5ac4d29bc034c18f
SHA25607dde89ecdaca6b796ccd5594c09b7d54ba2706c68884c6e6be3c4ff66b0fea8
SHA5124c855c6ff457e9e3c1ec759ca6c204b933a21ad1aa15af109a23b1b3a958ae903ab08633d6eed1d8098004df4c8bd1afd4563530848db37b4f583ebe60f29e6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541b07ba09e0f1b9df5ea4f1110c30aea
SHA1cf702de5c76ebc4dd90ca92eaeb41180492020fd
SHA256036905aea2a6321c62f76df6f8d7975cdbbf04c42abce11e544dd6d3e4748fec
SHA51222baaf9afebe13965144090073f478ede8cdcaac568d7a98ce4c46557aae84ee6c9b9953a868b31c89666e8f4d6ce9f744659bcedc2827beacb2ee77aae7e361
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55fc5c83a64eff57d60318a1d1c869bcf
SHA18c62db729d1b56f51f7149f2580c493e7e316958
SHA25617bb6e02117757c0d2e90d565e64d8dee7fd2815b8f03df08b4d4cc6437f3250
SHA51216f9db1dc18a382f2fba04302623c539c50ff0d4408dad17d0760a87408571942a95c11c8c39fbeaf08b41420b5d5fdfffbcdd53d24ae73cc763690aa28b7de1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597bab62d5a4e030c8093b03f0517afc7
SHA11eb64d8eae704faa02d6cb316b8ae4dfbebc40ab
SHA25606872f3490fee94376422e47af2b4187840d15ef97eace916222ba6fdb99b07e
SHA512428ccb3b542222acce14eb11b2d7665aba9b9baf69684b48df78cd8352625efa5ce0f64d4e4dc25b9b6017afe0e607089f0bede7d9fd2d4b6d8e6f6339e2e882
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2b9a677aedd58a95474fc820a71ef3d
SHA1bf4b053ac0309c369ccd19dfbae9655574a1ae60
SHA256f63d46079d5195d44d0408cb44f0f07c474bdc2781edd2371cbb061a85b8401e
SHA51269458c6cabff2faa17a062db4abdcadf6333856d571a195037009ffd91555f7f187a6ebe979542d1d3262ead1be76ef6a37e13a34e0b25d4d9005fdc315188cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586d5725d82d2772f980f81fb1f9c570d
SHA1ba90cb3523eb392dbcf1d99a6bb31c18f9e626c0
SHA256f1a685076cac84c68f04069cc579a0a54fb458b6231fd12f758d41fac28e5006
SHA51275bf22be2da917f3c27f1a18fc55a683ce1035bd2f8ddce570c65ed05e5492067117754847b238fb5e5d5bea673cb36ce2046bed7833108fb7d969a954cebafc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523266ca36594584befd31b37e8b2ffbc
SHA1698cefeab4a8b5984d29d85f01829ee064f7e857
SHA256b4068be8a2f90bbcf2a40ceaf08580a30c696c91c5259aaa4f4cc4335ed35063
SHA5127da1278ad60c0f7b73dbe0dbc1925de99f2c06d3234ec8d3b948b30e18c24220145bb96aaa5c5e7747e400aae58b4fb7186144184e9e6071fe04b3df394ee04b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a