Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17/05/2024, 10:18
Static task
static1
Behavioral task
behavioral1
Sample
4f8341f70a066c470d2ce19c1e72621b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4f8341f70a066c470d2ce19c1e72621b_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4f8341f70a066c470d2ce19c1e72621b_JaffaCakes118.html
-
Size
4KB
-
MD5
4f8341f70a066c470d2ce19c1e72621b
-
SHA1
264ed9181fa5d99892bfa81fe84c5e1a76b3509d
-
SHA256
e0a55144ab955707f4034bb4cbb6d0f99dcef9ec7b1d8337f701f405c0a3ce91
-
SHA512
c5d1c77e1f7ba59f6cdb502891243906cc0aa4f0e80d90abcbd2c864f0d168745aac667d336f284fbc87087d937b07353dc50eea97d8743569aebf75655cdf09
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oFY39+d:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDk
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C4BC9711-1436-11EF-83FC-5267BFD3BAD1} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422102961" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000400476d414f4fc8d30f6eb71f09bcf9dd7e26f3dab7ef37def7b5d8b22a220d3000000000e8000000002000020000000b6a108878c37c4ff1a1af08e6fe6a1e1b0af81c755800d000a92e602fef2875620000000b2c7a20617e9378224a953c7b344c7d0f1ef854e71a29034192c7e098d9716e94000000074b88db803ca53fe8ae450c6558682b22c4acc8b88769898d8978ec5c0a8d85156113bef13df19edc24f112a416860e18fc43025e79922549d6c43f219bac313 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0274a9943a8da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2696 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2696 iexplore.exe 2696 iexplore.exe 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2696 wrote to memory of 2224 2696 iexplore.exe 28 PID 2696 wrote to memory of 2224 2696 iexplore.exe 28 PID 2696 wrote to memory of 2224 2696 iexplore.exe 28 PID 2696 wrote to memory of 2224 2696 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4f8341f70a066c470d2ce19c1e72621b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2696 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2224
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c9407b0dd1d878c0af9a5094af4246d
SHA1349e5805d1f610f5564b4c702865f288d432c8a7
SHA2569cec2f855f1725e619ca3be2a5760174f9b2b126f7c9c2141777af82c2ebfd20
SHA512a549e32f705e5654dc7dd5dc4bb145144c7e7729de44863da816f58d8ed88fa70b4dce8a3912d871c909f250b3c70eac75b8a3cafa50db19e562e2bbef44104a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560292a62bf2bd83b978baf68fbda093c
SHA11d8ac8b41a5f56d8d50f2c9dabcbc7a7c4d88656
SHA256772310030aaaaa6d085a6e5c227e7faf8cd37f39db7f623abdb764159b7d4992
SHA5127d5376a8ad9f7d2bb206a7fe1e009bad01eb8ac9e169859137e1d2b41800c569b72102310b7f2342431c83e0ebda226bd45b504e83328bb323e9148408538ad5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541e9b09a782c91c01866a6472167c72c
SHA16a8764f2964f631adbedbe1ed460ae59a7a3fbd3
SHA2567447857054f36fa236f83b2014494ecde2be1e671cd045754e42961af1b77636
SHA5122eb26e4f974a1c6810d90b995f72a19e36c76e7aa54f66414c32f0cd6c497eb243254f3ed7fdcb866ccd307fa4f325423dc4615edfd2681dca86aa25c4850650
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5ae943c6319ebe45e54f8fd33613887
SHA12c48a14a833f7eb60e4245cc82335786cc866249
SHA256a181c6ca15ebe1d0f8d646428e25cac6f7fa98aff353c2dadd8a1e5c929ea3ad
SHA512bbf330f9b5589719b89e043a96c63dcb2c06ebc9655a8e6cb1d53d41dab62a139385c6f676ae50afabd0d1d14bb6c056cfa10301fa7cdd3a65dcf6ffacf93cdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b286bd691c3824859d2d10aeba81ae8d
SHA17e45c2ba67f623dd21ab9ae46e393f9dec6c6f80
SHA25659bebf65e2a7ed5745068892b1dfdff92e4fa47d18aec6f93cc36d3e4941d561
SHA5124ba8e9a99665459da6180bd2ce84c0031fa3205ef689ce349c97f9b027a14d3eaa9ecdc25cd8acc889eb4563648846a5aea517c6f945629cd3da268d2339fd42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596ee5f8dad41129bec322b61fadaa396
SHA1187837aa00a393c81b54adb75ffce0a53b17c3a8
SHA256e109ef81457f3618b4505a502035c3d17fcf6f0e0fe21c409c3a46418a939c21
SHA5121752460b12ff3c293e34f798ba409389ae7ce1421039ad159468f7e6f540697833dade2afe1b593cfc5c54c4bd951badb3db10b12fecb8909ffba393e5dc0764
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e420e05bf8ce18c7a698bbe2a09f8af0
SHA1d95a2bbb2010481ad89059154f6eba1c9c2f4ea4
SHA256c11ab8365e2f47d7097365448477929da37ebb3069bdc383f3a50e9a48e129b2
SHA5124062a7b5a95ebdd0976db25954296d3ddfaad688297c4545b70112ddf9f3179203145f8879c3efbc3d9ad3a2d3f7d259bbf6516e464a5c9928b63e41d5e5acf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e3922cd8fe738f661b5044596e9d9bf
SHA1f940f234bcbcb63bcd71dfdab26c128ec696c9a9
SHA256d877bba4c04c95863a45f155164dcda85774220d31ced7ff369fa9cc05e50680
SHA5128b518dccaea61f24da4b4fdedc904efbd111b7b93ac8f7db8577d41a391f7d0d8f081a49529b42a371e32a3389501539bdf106d8930be52a47ef64c2f2ccef0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7771e06e94a9a93ebebbf9fdfe233c5
SHA135ca4f588f05545f543449b12b966eef0e662f1c
SHA2562511b46db1cf6d36aadd67fb0ad44ecee909bb03d178a423379474b22325f5ae
SHA512aefd66219727e28f00e66d7193f46eb7f503a84342be5c96736a0f0fb6d9ae3a15e90a24ddb4648d4f759ac0454d4cb418829804119d18d3c1ea3e5c193799ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5256dfe1b822ad37b65ff612ceae596
SHA1818381b6fd4fbf0538c3a988260d4d42a2ecb3c4
SHA2564bb6cc86cb8dd04444397c4550d8e908d83343b21b6089147cde83c08c0c1b22
SHA512b005b5582dee5bd17cf9159c987562a7b34a26ae82a2ced09664a4ac4174b9af49775a72c2acdafc1faf97b50bd1ed4d5f3fc802518ba79b1f6195be08f1b188
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aaf35b4e58162a4bc15514158ece549d
SHA1b397fce9e07536631a8faae6442f4cfeeecd733b
SHA2569d266208d2b9995a9aedd3dde50116e0cbc995eb6ae63d71cd6cfb4fbc23a3d0
SHA512365e5ed953dd482fb4eafd8c585a640a3c98363f4ddc98b3036f5d3a2994d56e7ef7d8ef76cd626e655b309fd20d42f1c0920b055366b963bb2030645a43ad76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb705bf1a780d7d65b50f1406522bb7f
SHA1e42b96067dc670c4f9833d681b7203f26d806cee
SHA2569d7d2964a7ad319a27b5daa90f307e0bb2ecedd8303776bc14e0daf69613783b
SHA512317609b4fed6ab5f2d779251421b14b1af23f2674efcaeae82ce618d4a48cc71c39a28deb214d818556dfcda37daec96339f0d9bc8ae00572829afda953e2d4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1efbf450de27a6b5ccec320a145cbf4
SHA1e4d3f1702e6d89ae55289e17b92d9c87688dc631
SHA256c897dcf9c1af10fcf29b2843aba9303c877cb5c9f81da3fbc5f331ba99ea5507
SHA512a5539efffe48a1834d4fcb9e17c4434b70b7f9f7aac7155774ac783e999ba796294d1c9e568058786e0568e6bb70b235651f0c49cf4997df595617629fc1d7cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56cd1aca03fe2ad664332e80a88ed6937
SHA1fa73c45ae0d00bf0b63694561eb3ea36f3487ea8
SHA256e7b46dbfd457a6b634191a4e7a2f12297a1ddee19319673d3d0ffe495c0bcdba
SHA51285ecf7cd675a0f45e3d4c4250f10a58ab80d646244e8a2089cbf75b8cfc608cd7d185fa562e124387e9411acc87b3782b3c127f903f6a89a3c31de7fd6983421
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bab7fcb060d45cdbdbafb39fb7c3de4b
SHA18a1ff5183bc996d459286bdd6fc36f9403bd8eb4
SHA256c20cf4d0d2a0330cb52d8b805bae5aca6c8101d422de8febc865d3d8eae2f313
SHA512ccad395bfd9c28fe3501346b6a918374688191d1d4e36cb338cca8ffb11e2d10f89df893a713bcb876bd4e0330765a57ced16cb251273318dfb955fc7e7c76d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500fae0d97d14ded3ca366a52de30fdc1
SHA19554787a34b6aeac0508f94eeaa2830a9ae142aa
SHA256164d54d5b4683e86ed9684760fbb5d5dfd7defd0f13af2655d034b38a6cd0f85
SHA512a478c0059ae32cdddac13c5df773970c25c8bcfdc2ec825e8071b9e5da071f01e470e40d30d62f8c51b07b3d0de046d0150d6d56dff77a490c670510c29d0869
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535cb16cf9140d4dd521b8bd9b51f56cf
SHA108e684677ba374d02964fce9720731e41bc73016
SHA256f2f955ff2e04acaf697484e61cfe72f424f5d8ae80bdc8ebd56538290141410a
SHA512198c22f165a69d3e285fa1d43e5735fe53f6e7bf88d3022fcfa79a0a4b37f4ef408ccefa9b9c4d70acf20a5f1359a0ebbeaae230a012ab166656952c4f72af8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e48053dcd41ea196434f076e5e4118e9
SHA185993184387a68cfb03a23a9f5010f7282a4ce00
SHA2568e209967176776d63925a37b8a435c0ca2dcb5c81c84b244ac27fc22c414bfde
SHA512c87625b2c0264daf44888d286bb4e9f03707351c1a233b6e9086e1f9173ce22c37584e6c5acf44cbed3f6323666cacc9259b660b495a0bb39583da4d548351cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569b5e2f9b9d706eaab3a8e1ce1b39693
SHA12e6b74ce3b318d32fbd9bc165a5abc3e0727e30b
SHA256fb75bced1207b1df5700a13b0a1fff5f61cc7489a2aea1e30d5d962f14008e62
SHA512ffba757cf3d85c8885799c70b350d40eb86ebe3c13873d0eb8e202bb34dca342b66b1d03ad53ccdb529089401c37c695469a632c5d483f7480405fa6859cc32b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a