Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 17:43
Static task
static1
Behavioral task
behavioral1
Sample
605fa0b3af3e6926ba78396e97b23583_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
605fa0b3af3e6926ba78396e97b23583_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
605fa0b3af3e6926ba78396e97b23583_JaffaCakes118.html
-
Size
86KB
-
MD5
605fa0b3af3e6926ba78396e97b23583
-
SHA1
cfca294ee21ad7abaa163cb0c347fccffd9e4288
-
SHA256
6c53b2c63ebd21ba0ebc7f383da907abb91ce8f8c043962f41bb05ff6cf2c0a8
-
SHA512
f16bdfdaafb27982be7de0cddd797f39bd8c9122947af9864145a5cb9483f0402ea3ae44221a072352769c3e93c4112888b6f862bbd2fd6d3ae27d78e175d896
-
SSDEEP
1536:I+PMr0paF1YT462KacVKVlUldduu2YlLHVB4k/RshuL8B/Gx1+XdMOua2iLbeoNQ:rT462KacUusjY/
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 403a9e46ddaada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422388867" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{72009C51-16D0-11EF-A7F1-FA5112F1BCBF} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a700000000002000000000010660000000100002000000029571c92ed0483ca5826c8ac35166f9890c3bec5a96f0caf9a36db6abe8ee8f8000000000e8000000002000020000000dfce13f78b359cd09a51a0de460c6698ff8216aa80b2b6bdd828c9a596c0013c200000008b3b4ef1d0c53b59f0e1797192ea24679261a25ef678faa204c1828d954bc407400000002ed4ec7b5a30204753ecce810cb7dee994ea4583333f27b9a79d08a9b5d57705f8bdaeafaccee1a73e42351f6d4b59cdd2bd3082b28bef12073c3f7aa7758a7c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2180 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2180 iexplore.exe 2180 iexplore.exe 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2180 wrote to memory of 3040 2180 iexplore.exe 28 PID 2180 wrote to memory of 3040 2180 iexplore.exe 28 PID 2180 wrote to memory of 3040 2180 iexplore.exe 28 PID 2180 wrote to memory of 3040 2180 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\605fa0b3af3e6926ba78396e97b23583_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2180 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580a7a18d90f63d2e281b82cfc8ab857e
SHA18a6cd7039116a6aa6031108b98a40eafc980beb0
SHA25649632b003acc509f672f88a855b8ebc92e9a97a1c95be83bfb9dcc627bcd81eb
SHA512cf8836d096183cd4fffb6484f104424f6235a8120fa3cc24b5122f0a491fef175184c08b91e1ff842ca8c3adce387757b84a80b483d674e08bbf7985d90df524
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565229d499df7a397dce72264df7a51fd
SHA1ed470f874d540147e4432d21479b937cf0ef7e3a
SHA2560e5a16f7a04b68bd22691fe907ed25485652fdf25e89005b5b89735adc2161ba
SHA5122e4804171a65c792a0cbc8002164acadb981e84fed7a0120a3122e15578593cc6940ba989b1d40817eb502ef33da7b0fa90f1e9ff45ed261ef917e34272435b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f596795497a59fa651ab86ec7faae22
SHA15a5f11637688d7166fc8c39e95aacabac4532964
SHA2566f2cda5658b5abfee572235d16751608f523f44a73a93aca7e0207295d6d1ece
SHA5126aaea8c421bbdd0ca36bc0cb770b1c0a18e27aff238dbcdc5b731b2597f5d78057d7e48230288551342ca88b49b1b3bfff48d3dd0a4432c546036283135f755e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5268f09d2cced17671017f483d1074c23
SHA1756028ff23ede853b32bbdd847c73445a8762eb5
SHA2566fff9fd7bb7dc1a33e1dcf717df052756b5e6af46153dbfa8201d585abd8fe65
SHA5128c22970d418a0fa4ffe1db1519f525898498d42b85aa7a1695f5bcb6bd0e40801dd73927786520ea983db9a6b21d79c0b469b518477c50a60fa6419af2db8e14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56406197540044d916ae4bca448fc7ad0
SHA16e3d3d75ab0fe183d5fbe4ef3dad5b3aa998f1ca
SHA25622f5c41ff44754c3a6daa1d5259c16be42bf62ad89e44c0b029e05673e53c6fb
SHA512487786b748b1eb76ac7bf47f73c9a8066c6c4286ed93d29ce64e8490e1cb9193fd90309cf99556fc7b96f32a90a91ceb19103282214621370bba35cd13118f2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3f3f27cf90ed4a09a5561eecb1617c1
SHA1557bffcefb5be67a5563ca450076dea90b63ca22
SHA2562fbfe1d159ec953a4a8bebc22b84855538d74cbc51784b9d15b366095ab0833f
SHA5125dca987080267382ae8699c59630a4fa266ba1ff065b92d561088bca6383ae67e7006d978b4ad7bfcc2048b1e99c72343a8998adc6ab33607b5564023fb108a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545371ec5a116ae1a044a59c6ceef6933
SHA18299e1dc819c2901ad65e9c3b93380014ffce743
SHA256654a513b255dc30a80875c93e10b5319f40096ed44882da8104691ae353b7a29
SHA512d919a590fdb8f2093c7cbe0a6621fa5869468ef56ba456910bddfe82c0f27d9889e736bc67b28a8ab20963d3258f75c15b44ae6bf613725c2906abc43b19fa18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d507ec847a2095f4f929390ced2b8e3
SHA1c1150d4c133a15715d45435f4fe25ff2b435425e
SHA2568d916e105a199b041c2db4c23fe348b898d41b9edded5e7bea29620eb4ea4813
SHA5127e5ea6e55b7c77074b89763ef2c959394d8b8e63a4c3c0f0a56aca523ce025fbf23f5b8948e332a86723c1f03c9f8bb1e452f666bec5dd4a3edf3de77d5e4f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0412624b2d9c33387da920693ac6a93
SHA1a34c614ee83f9dffd30842f3d42d6687d2ec000d
SHA256bbe514dc6a0be2bc69871cd47a81851d5abb6237255ac70a6f5c1cbcc9894816
SHA51248325da795ef4508a77938067c6ea2359520ee5010d4d99af71326037d407820358d01015cb506b7d46b33286c0fbc6cee580cedf5f0fc0cd259fd808d649f6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f415f273032d256da2f0c470b6097715
SHA1faf311aad91268ae5b15638c0460644e31f58eb1
SHA256941973d51fcdeafde1042ac694b5858d7bfe7c975c1910e44e1cfbb493e7439c
SHA51251de49382b136c37844395519ad8d490ab31b912414e1c0507556ed1ad5a517585b4f308ab4215488a042d908c26342e91d61272cd7c13cbeb7c794c5cabf9c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fad6419667cbbeb3a4cc9d4861c17f34
SHA14e62a28fa37d74ad846da44844c175e3fedb801d
SHA256d067104232b04586aa861e6672409a55d8513c87d84f2d6b41fdb8ecd90ff035
SHA512475a8ebb14f9de5a7212f896a1d924554833bcde18108e01174a3cb39e229252bd14bb8a27ec72acb91d3b5c603ceeae234a504300f903862f7181db5aac5ba6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f6122aeb2bfc4ab4cb49146bf0020df
SHA12b6da49d7916cc7d596869f2db2fcae29f4caeb9
SHA256a27f09980f61746bf6ecda10d04d49116edc045da1ec362393a6d5a80a3059d0
SHA5126f9f33b4897594b34dbe6b3656522d92ea8fc7ebd17ca9465cc79078c25dfe39d904b57439bb572e71b959846f848e0ae46138fb2eee542545429174bde4f20a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba4e98fe3236fe5572489df12050c19d
SHA10bd26eb1a06879cb36abc0ef57465eee3778cf28
SHA256329823128989cd71bd386830c7222e8a0699ab24727928c3a594c79132423e2f
SHA512688ecaeee0ba6cfaa354fb053876413c0e1a77e81217146018b3751b4e4d17dbc5ab254f1507e9f6eec8acfe7ab9b46ccf130a8c341f25e359fcd3e82e5f5358
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517c2c0d08e6a271d81cf457d8dc076a5
SHA1cb134c223f580a5ab016beb3e9a2d2f02851d1c5
SHA2562bea2aa5cb11d33e8cc67852cba0533a4138cc0e618c36ac656d75af4c2c293f
SHA512eae8bc7caf6d6aadea8cc4d97cfff3d6d316c2645863d917773d71bdc265d4e094b40b9f44951088c116cbc66b23e30c4d41973093c89d4d4be6be19a9dbac5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539a34ec54acb3862bc9be5dc7199ed13
SHA138555facf8c4d3462aee2a7130cb653336580010
SHA2564c0a2a89b06f40671d91253977b1703e44a33390a1b56d46d5355a5fab67974a
SHA5129abe03bd11694d4a9c2784a8c9c6215246baa45fb357e785b02a000d79c38b60af08a92de7b36a0ff481941ee3cf6cac66fb4696c35d5e0a5436b8a97bfa4c0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2a700702560c268e7e673ce911638d3
SHA16935c40a81a31ecf3add82ebdcffa84745c3d0a1
SHA256891f61764e19a6414eb0c67a19c0ede2c85fc8264664679f243a95a2ffd600f7
SHA512e41673c4c00be89c2f8e5de12be6892a187bcca49e0a943ad4d475e00fbc81a8dbee1f9034ce49276a777463d5d7dde1ee7f8680e0977f141e9a02f721f92265
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58749e0c1d6ad85c44fbe130fbcecd9b4
SHA1624319f148cc8173a00b5834feedb1ad5c146be6
SHA256aecef749334966ddda073fbcb3875f716434f80e46dfd568f53c243f839d3623
SHA512d56c44361261ab5618073d8084b0200c098239b96f38cb87c246ed11cbea6d768dcee06ad281d22224bc38d9b0d1dc51346708d8df74829799b57c50d3f6437c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a