Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 02:31
Static task
static1
Behavioral task
behavioral1
Sample
442fa9bbd29f397c492a7b086bde9dbf_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
442fa9bbd29f397c492a7b086bde9dbf_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
442fa9bbd29f397c492a7b086bde9dbf_JaffaCakes118.html
-
Size
68KB
-
MD5
442fa9bbd29f397c492a7b086bde9dbf
-
SHA1
f30454f7f60186b0cb86206ba7adc744532356e9
-
SHA256
6d1f76d288ed61040f3cc7722b85afeca95dc3908b3322dd29fafa59ea10d56b
-
SHA512
0df387280296469021fe6fa56bb5e964dcedcc94d6302badbe3daadf58954808d3c48487c8cf5cb9cccfd672c36d7d9bbb0d8f926b6dd917545bd40ab27e0f93
-
SSDEEP
768:JiHwgcMiR3sI2PDDnX0g68O8mNLoTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVGo:Jc7YNETcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{42CE47A1-1263-11EF-8178-52C7B7C5B073} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c018771770a6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421902168" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000d554ee504916812182cbf2f4a6fe88671ba8590a4040ece8dc0b76c73594a972000000000e80000000020000200000007f8564e5599061d9f1c189163816c06618bb63b320aa728f2d58aacc1a8de0f520000000661e85e5f5d9b421dac21878130aff5cd380563ec34eae1c642d343f601f972940000000c69a96ff3c2e6335d7a4decba15b74af57546f4f2bd598735a348377e5da9d67b3d45211c123f2818a9b2b37bf5857aaebe0ab6b15e01ead658cf524435ab63c iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2784 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2784 iexplore.exe 2784 iexplore.exe 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2784 wrote to memory of 2748 2784 iexplore.exe 28 PID 2784 wrote to memory of 2748 2784 iexplore.exe 28 PID 2784 wrote to memory of 2748 2784 iexplore.exe 28 PID 2784 wrote to memory of 2748 2784 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\442fa9bbd29f397c492a7b086bde9dbf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2784 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512b1b2f52a58e8fd8a62bdf786bde5ba
SHA19e428a60e962435b93d35e387eeca808e2c39a07
SHA2564b1189e9dd340dce9320095e4815a2e6971d5bb045503cfab532c68596d5d170
SHA51231bfa0f90595aacd02fd47617d99069d15592a5041ee9e1cb9776ada570e1ce47710e1b24bd305a9a08fb9f668970e530e6c95c752d43794958f78e69ad14b9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505984c035474ef2f7993fc69ddac6e28
SHA18999d63b15f031b432f69705fb3c9aadfec1a186
SHA2565313f9cc619a94768dbf9cee5b1807f41387332ce9b8f93bafaed31ea34de10e
SHA51229d3d1c4fd2646208f299f154d4e7763d69fe0c65a8ff8cddded7b1d78ca024a913f6c4dea90937706e9cfe4c22027fb4cc407eb558f982ede5e0cfa467102ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5afce56916a3bed52dc800abc24977a86
SHA1e222b3a8c762a0fec6d1738e4f5a752b96a53ac9
SHA256b19bed97abbddaae7b834cef85d7f1eea5ff6cb74093f3cc773c44c373cee623
SHA512ce26c5c45e5f6fb937b7fa7f06b7db8dc0f32e20a1c8f998bfdc8e71443c8fed76d16378521f6c94e1e6229a77a988e0f5ad170e1c528a86c810f81fcfab44dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6b66a7b4b0573e2d15a18b8da554f38
SHA166d2b7cf7ca6334dea9058e7547acd5c9d9d51b0
SHA2562ad5c1d8a9b11f035025ca266ca83d29393931718019aeac48253903aa4793a4
SHA512804434da6110a0567453dffdb3a66c24379400cc651424f75e4c6e03432504b6aba746fc12fdca373ef2e1fc9dde2cfbdb71b70efe7e5993f2b27e13e6599a50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599a6e5bd7f2a58818499001f41c1319d
SHA1eed8d2f39a688c141790010532bdccc28fe5ae09
SHA25639a6fe5c249afffbc6ae6db88c0ba819021a4aff5a19ad5b6cba44fe978c29ae
SHA512c57c0d625bbb0adfc65f776444cbea928bc3b4550dc633fe96775eeba3e2f47c1054ad43c8bc02842cb68a8ad1dbd3c6bc950ff3fd5eadebf6003535b191fe81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50eea00878d38ffc5ace195136c5efc97
SHA15ae17f7b6d410a682c7f5cad1ef57928c6ddf920
SHA256b61bdd1f30a8ca9d8bcb7536e681e80d866c30c3e3f0ab9e5a70d1faa76ea402
SHA5121dafe8f9973df28aa79eeba2cb4c465d0b1e9db934538a363916e0d2ef90efd0cc7a263a4534997e71caf288df0773a4d569558c81d75a930f39a7e542c79932
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570757723f7dd8900daec1ed20cc34a6e
SHA13853013c134a1409ae0a6cf10a5c3d26c0ea0533
SHA256695e593ad16aff63d67026f708cbf4756c0a44d749bee698ab2158d298663cb0
SHA5125ab732f2c8eb0cd86a2be405e6165c1adcd81375c3647d68df2cab053d15d909c6d975343f881fdcfaa0061a2b666f28643fc1e7e08aa75188cd8a7ddcc66d15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dfedaeea57de4874f5465954c01e6952
SHA12d34a982e0d8661879102b30e2ccb6c0827f0603
SHA256d9480f908f472053ff23afaf0d4b32f46cce30ea626aa115188222a9709ba066
SHA512e9e54ee28443c5a18791bc2b37e3c6822592eeb75ad7be386f04a64e31384a5e7cb5af84c24e003d981637391cc09bc8a50e0a985d15aa7ff26d11328621a7cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5029de2afbf0a8bac48c20b845144488b
SHA19eb9be1b2c3476af51ba77e9af48e697729fdb40
SHA2560ae42d894b4a86791092b6537693336455bac6fc276a4a8aebfe5bf394bf4133
SHA512a1fb724ea01d2b0fb94460dc75539f18c61d2189f80b38d8d25071dfbfcb037af0148acc1f412dee4dda368e37f4676935ca1ad902a69e79bce2d563fae66aca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56cc8fa457423cb67b17c3ece6df2a9d1
SHA110b72a55edb5766445171423c89886809a3893ef
SHA256226b4531bef4e81ff3119ed3e4d88207b96fd0fba4adf6e07a1c6911602650ae
SHA5123fcf148e71ba231c33a2dc78c4c43f603925904e33726ce3bbae01169f1f5f1ddfc90496e9715238fd4de81d0048420471a3b88956bc1c91ace2b420934d0c5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e448975dae58142a02eb50bcffb234d
SHA1b3ec34e7cad202aeabc638e45550fadce7cac4d2
SHA2564b9d108542764f7a25cbc74c7f20ac6e64473bbb9423fb1dc83322d54f8aa480
SHA51294e14df4d15893989d32da7cb35ba45ac54404c2f88afe11e4fdd9d33ca9dc22597398b2a3d74d8ae4494e1b0944f9ceaf8f6411d7cf8b52ef283192d963a441
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2d573de4afd52e41999e777942df3b1
SHA111e01910be3f96a8bd3fafd42cf8b3910f8abd49
SHA2569149e03bb450959bd622f1f2977d3a603ca5495b9d957bbab0fffd4dd1d3d2bc
SHA5121a87d4f5d99cc0690fa96be9caf34cd0503628a743dae488b066667468ce4dd3624ab53fe5d16984174475984255c33bea257a982f204ebca859182eaf415886
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5abfb07454ae8fdd22c0ddf19215a71fb
SHA177a0d8475f7ba845bf66ee1831a3f75c4ded3014
SHA256a1d8e76f7f8e87ee03f76fefcba389e1dfadbe6487f9c4b16d00dc0d91651752
SHA512b1e69f2b5b844168007b1db45fbf7315bb5119a8e4ce9acc2c7dab8eb90894ce186daadaff2808ecac09b362032dba1215d314a0db3cde3d31a213ad28b2f896
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520e8d9261337b44638752109dd120d84
SHA1079a5159815c86a801adf3e83fb6035e6595b7e4
SHA25654a3dfa8e1cdd096c59b617d909123aeb3f8a41d5e30c70c7adeaaa900269334
SHA51295be57a18cc9546213ff6075a22e459c41aab8d98499f4c0f93afbb1ad49604f697bf92981d7ebf8aca8ad7ec54ae050b499c7945af350b799abd3b44e38118c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c67a594750599261a51b1896bd7c4561
SHA19f5f3ea5819c064f63a8c603ffc788b3b35b1b61
SHA256be0bd9722acde22dcd73f6d368a70d26f723797459b2f2d5e19cec7ce64feabe
SHA512bc22e2c48f8a9b1ba9851c5b0fa04c327ffef3b76f83ad4a40d9b9ce94c011f34997171365fb86a4f2156c0d4b03e639aee6c4ba6c5ce32e6c8d55f62a7374bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b4fbc25f88668501309c7b25e660f25
SHA12dd75c02bfe1df34d4d328a270dc3dfcf020bc57
SHA256bf24d48672bc22d4b9f9dbb03e151a6b3257c304b2125a9f016c8bb2179953d0
SHA51214c8a27ba77d4c635f26862f1a2ad0a8383f28b1a5561c5290f3c6a678edc1fb836f89b8b7a0953401aed6ab8dec5bb167d7b226690bd25f82fb8457e4bee6e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc27cdcb49003f7ac8501484cfbd166c
SHA131a06e544c8883020568a29ce698b966290c5de0
SHA25607cc32ea4513bbf75bf05c1f66fc565bf66635992e5ae2b2bebff31102a14e31
SHA512ae7b882e35612e491b90b25500e31933066dd9eb0a7c0cf2e76b0154089dc016686cebb8215c61e1ce57837b619f0c049ec4ec022b2bc811b4d5a2519230682e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507a7d49ef84dddaada5ba4f2cbef6958
SHA1f132a3e77bc3bd92b6b440f9f04b171eaf892b77
SHA256409029e00d8bbb78acd9376dd85105b02d5f3241736210047f7e544896022ff1
SHA512e1dd6745cad0e8d610b69b6ddf9f40989e009f0ef8235f8a40a3af667c67cb978b998afaef3d6b9b856d8f3cd935e5dd02a474735478ddc90ef8dcf5bb1c27fa
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a