Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 15:00
Static task
static1
Behavioral task
behavioral1
Sample
4ba9fc7c26d864446b13e3ca03af1656_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4ba9fc7c26d864446b13e3ca03af1656_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4ba9fc7c26d864446b13e3ca03af1656_JaffaCakes118.html
-
Size
461KB
-
MD5
4ba9fc7c26d864446b13e3ca03af1656
-
SHA1
2d11516d780051b2a09d0ffabdd9c5f43680ec71
-
SHA256
d5862095b54f96395df0b609f37a3ca3a8f63fad1897f29df9c7391372689522
-
SHA512
06016b774085e48a485093bbfa4fd0d5839e1d58718cd66df5f07e177ca29a588155cc75bc0cf04c551b44ff3e27e189f0b005a2c8ef4beadaf64c0f145930d8
-
SSDEEP
6144:SFsMYod+X3oI+YtsMYod+X3oI+Y0sMYod+X3oI+YLsMYod+X3oI+YQ:E5d+X3L5d+X3A5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{11F38EA1-1395-11EF-86DB-FA8378BF1C4A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a96069000000000200000000001066000000010000200000000f8e9df83c9fa8fe687a5fa7555df910433d6a904f0ebbf9fcbdd5d59639529a000000000e80000000020000200000007c7dd08ebf720c4bb1bbaea36b256aa8a0aa0e6d7b8ceb179e6ab8b4f24aac582000000030ea3a5f8a8494a76c21a67b90f29cc97b6652d0c29f90da0b19f0985655f854400000009453779cb91858bf013e5f2e3c276909632f523b74969f914deb60c40ba53d67865883336fb3565cf71c5eee52a3037f26b64d1313d64e06330a67dc76f4dd84 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 800b78eaa1a7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422033512" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2080 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2080 iexplore.exe 2080 iexplore.exe 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2544 2080 iexplore.exe 28 PID 2080 wrote to memory of 2544 2080 iexplore.exe 28 PID 2080 wrote to memory of 2544 2080 iexplore.exe 28 PID 2080 wrote to memory of 2544 2080 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4ba9fc7c26d864446b13e3ca03af1656_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2080 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56409151622527758c7e0343aefdaa64e
SHA1dba156a5080188f8d397434a04d748912be04a40
SHA2564908ffc476c13aefab1a425cb2c5c307a143d98c84abd58eda640a9507475530
SHA5128c916ecd3085802a668052daedff13cbf284e816a3b4d58524c387744aaab12098ec3f602781c340383ae949df46c4dd8654990da49f355eef5a4f512b2e9c36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543cc8fda719b9c6ef57f0640ea3613cb
SHA13717ea9bb9efff0e5ee3188a2fc520f9e9502c29
SHA256201140da11c939f7c2e95c3251aedbfdc11c8a74e1603d30dd4b59eddfe555ee
SHA512fbd3f7c0b3e5d6f891a6ecbacccbb0df1000c1755b0f3b227e19a8fbf0dd321ab9c062dbc23fd09ab4638b42d31c60f7ac456f0d88d3a3f53caaf53dc432319e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5034435fa5a76bbd00fb9dbb9cac1a63f
SHA14369eabe1d9d26eda837c3346c88d89d9f0b9275
SHA25667d56b3b6c157dca8f902a0973f820912ca3b92d91481d4df550a824d0ece071
SHA5128489a9f98ba2c8cf00b69fadf3450fa25132d456574aa91d342fc2c3a2ac8c1552846f2211df5960c9ddd85a2b56a2716370211d6cb0eed030dffa0331bd2eaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b351c911b7c10ba173764bf06ed7962
SHA13de66a2ac8a1dcd6fdb209556e3d471192907f0d
SHA2567eea0104d97be845dfc11d9ee39c2ba696ab8f85b41d3ae88ec95d9a1ee3a303
SHA512a3cd9078dde165e2b2aea31ef9f8a9f7d0c4cd22608b7529eb64d58393e2c1966ad4b6f48cb4b76ed3310d367cd3e6cc2e1162624555a3d9c04aaf2e5dc32a23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522ff6de8cb73bb7e671978505eacedac
SHA158a96dcac7862c75f745ae26ddf7b8fa6dcd5422
SHA2564ae24f4b3cb15633702d096096baecab3f23380ec321d3eb8293ac07fdbb0616
SHA51293d206900344b9fbb6ee28c53e167ab66ba898ff7b28aa8353f5e977dcf2a15fc120bdc4736c70ed1d9446a87dfaf4a10479b9b79088b6f7047ffd28eb1fa758
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cbe8eb79826ea8d9bdcd9297c26adce6
SHA19cff1c338e6b4b131ffffeb34a73e00feb0bc93e
SHA2564f727f140a8229603943b56555ff01ef40355d54211af5781bb2daef4cc223d8
SHA512ca0c69ca5d18f5cf5262d0a08189ebdb1676db20d85525ba2f2362db4db5105529e810c4d3ed9190eff2d9db9d2886daeea58cd8a739daa228ba204e84766e74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff069913fd36125d0a8820932c3b6506
SHA163e7956c2f44a6b8794dfccf8e65e7bd5c7978a3
SHA2565006db0be588cf3ff42af40b6375eb782f71eedb4dc7252b33c144a49cec236c
SHA5129b757545cd0eee7051e35543eee572e5b807a3b2ea2c2de0be439b8f23c659bdbd115cacd2168c426ebec7c3b59e178a92814c6b2aefc35aeba611cd268e2c3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca53a70f8221d77ea7fd0586bdde82da
SHA12d8cc2c8206b83faba930e9fb929af716432d67d
SHA2565811528cd8da3d154a2badbd941bc6d57e41aa771269aac605cb36a7ce9673ed
SHA5128733318a45903727fd93a7179ab7a3af4e34fff556e13308c8d0186e13b362247aaa1002ebb247b9b1f01d5fc8873657c4bd02732d0fc688f384034ec24177a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5216467337aad0b071bee17bd588bb9a9
SHA1953c49cf4b7ba3ffa205533e3687acbd1b2293fc
SHA256f4811b3e6b62208d6aafbaf5fd9e61c06beb1536f9560b74b0d2541dbd25ce6a
SHA512093fe54c110714166027955ad6a064ac6d95bbb098441cbe10e96f9c8d9615f4d50e428c4dec15588a84169e6d3b8efef3cc5765dd7fdc47955c096406fbb2b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590098955ebcb5ca02fccc62c884f757d
SHA101c0d413d6990185cd3bcbcf596a1fa028483315
SHA256ea9eabb9fa53e3b3ec10813a4515a90b194baf4e12325230a7ee5dcf40f93a98
SHA512bf2cdfad0a48ff0ceef62f2c9950ab7e2dc2b0166eb171bffe7d8b6d98a41f6ace0eb7768e4b35ef99b2595fa610ab142a9ff8f148f76ba05620435d4bbdf70c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eaa5f7ea36046293595db8004912b27d
SHA10df249c3a7b53113a7afe2f31040cca1eafc1413
SHA2560400986f80ffd75b9f68e544ce71d172f6c75fea06723164edf5b3ecf437baf2
SHA51285ae1e22a323e5b9c33dab6872eeec7a96a12d1eb297ef52f295c1936684cdc19170bbab03a1337ed149dcf333fedcd06ed32aaa11a0cdd57313e8feed5dcf1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae612be4174bf27f16167e890534fc99
SHA165be7489a5e5b9fe4628c182c5f2e3cf3c80bb0c
SHA256c1f5bfef7068b8967015fe258f50318f45459b6f9bbff0137bce62b507c8fb65
SHA51231fd2abca837dc0e3da8d4c11ce53a1224e480b31e4288e0894872e5ca5598dcdc0e7c8a39f87bc27bd036072453df15a41faf0fcf71f0f2047587c21aa9ba03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501e5f624f80a2d1e4ec9e295774c4b05
SHA1de4a2f6624ebb393ec06bba723e41f7f1baa63a9
SHA25648aa71b65916fbf5953da49d4f4c0757fd4b52c0e6f3f11d217f6a777ca43342
SHA5124d82d06d3606d794358457eb0bcdb146d953c8784b516b4c03dd7052a7488f098d62d122ee0e97b970a80107977c85c94b2a406d5dd6e2ed5ce9616815c894e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dca35747e695ac6656e8dc555b96b8aa
SHA1b0b96edd76ca4c4f49c2bba0d1e241617c20708a
SHA25602eb5f74b0ba834dfbe9706e4bcbb2a6e4ed5a2f3627ff7af5d2a6b18310a41c
SHA512485c1b20d064ba2739eccec73722e05d81e5f6cc795e6b70cc24ff47000285db4216b34929769230f2376219ac605a14d918d38b186d13981c7ddb5aaddc8cb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd9a128d1e1e372bfa74f09d28cf2870
SHA1875eec2aa1e0cdff5d7257c25ea06c1f39c4e476
SHA256663b9c87c9d108dcb5dce1a0a6869e88f902c7e5253ee40334fa76c4b8362e4a
SHA512ea78ff9118ab6d4e8a408396dfa5d8b992e868db189b2a36772ea0737e51427be3c41b0f7981523ac2f510f87a723623cd6b1a065709d5d94c7858addb91aa7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522d4692207b6c8dfb4e44c30c5733e5e
SHA195055e6a5f5e1f63ae9d32266cb5ef63d07a9056
SHA256c4de77f13882f2b129749a03ea85fb87360752e7659cc04f5b4cff2169299069
SHA51248fbf2c5eae8bea70dce9f1cb10f03aa1c01fadd03da60ad930816eb3a9aff4c879bb9236cfb6489c438d96a602f6abf3731cf6409b4a3d8be232a834ba690d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd4738dcbd42fbf0e5cdf0cb94d980c9
SHA180f9f201022658a509bb55a61fcec85d90cf4f70
SHA2561826e3eab6b8958cf54bd35520e44513eb22246d83d48eddcfac25beca5f7893
SHA512a222240b68f625c857e3dc1a76dd64fe8965438861692312527d5cf5a89c3212a726c2983bbb39d819ffc919e1f2065a9cf7e678d0b5ddf915f24253556ead30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e976d0fc2c2fcdd2b3aa54723d0a346d
SHA13a44962e44e881336298210539a558b03432ea9e
SHA256686c3196a476e6607f256cb2ee290d2e291123fc2bbb25f693278c7e10c81018
SHA5129bcaa72f0586ad6535806afe84460d6d79282cc5799ff266e2332da93e36b4e56de148f61d5801753b6ae94f5a4385eccb0697b680ac539437638c7a7e4ec069
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590e1a13c7ab3ec714206fb46585d86e7
SHA18fcc845e47edd53db8af4d530f49b7051bbac507
SHA256bd70b5b8de0dc4ec744b6a5b6036772d4eb355f7f00f7d4ce9590a95f5965c61
SHA5123a3cf5e0b826fdaacbc0adcba2e24699812c25348901cbe3c6d24252340891e9a7ed9ac5cbbc1289605d6d724f0c0d8f08203b724add855f627697b8e461c2eb
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a