Analysis
-
max time kernel
119s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 18:08
Static task
static1
Behavioral task
behavioral1
Sample
607aa589071018a379edcfccfa45708f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
607aa589071018a379edcfccfa45708f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
607aa589071018a379edcfccfa45708f_JaffaCakes118.html
-
Size
125KB
-
MD5
607aa589071018a379edcfccfa45708f
-
SHA1
3d98370329e0f7d50e58f49111d61a445fd479c4
-
SHA256
4821bc07d18432355021708ee2782e2e397ee8120802dccef4a6751d29af691b
-
SHA512
5ccc6a60b6ba63aa9fcd89220ed2398199997104f59797b2188560d975a0f7aad17cb8d74629bf9e35028149311329421f9f92c81500e6f5d3c26d18304c77cf
-
SSDEEP
1536:SKECCCCC22222ZZZhhh22277777OOOOOi3mANVSuKArYin8AVFX722NMNQRmNBye:SbcOV
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0538E7E1-16D4-11EF-8859-DE62917EBCA6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b0000000002000000000010660000000100002000000030069a70bb19a4bd5689ad9711f44d3d1bbf7921136da9e7b589e941383a4e6c000000000e80000000020000200000004b890aeda927656953bd44cacfd63078b86b2c7319077a0aff4ab53244880bdc20000000aa1142856f3b46e6e914864f1d706fcffbc8f6c2cff3f488bf791eef32c1e96c400000007582dd24932c3ec9d047652b70628bb42d97a1732051f52750e97789f82a84c082c4a54fb0a3167786a87a071440b319f996f139c4d32a9f91867b2a1ba3c963 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422390403" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b064fbdce0aada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2504 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2504 iexplore.exe 2504 iexplore.exe 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2812 2504 iexplore.exe 28 PID 2504 wrote to memory of 2812 2504 iexplore.exe 28 PID 2504 wrote to memory of 2812 2504 iexplore.exe 28 PID 2504 wrote to memory of 2812 2504 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\607aa589071018a379edcfccfa45708f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2504 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557af035eca3ec38d179df2b3a8579407
SHA17f2ff90c9df229817e84900bc1bfe1f0043771c7
SHA256a07e8ad08e94565fe3ebcbb2d3414fdac9318c505c8fdeb5c1d2021e7ca20e54
SHA51282cc3de169c952820f436939471af7f5949c6c0dda6803280eb98f60595e0ec014e8bdb1902149dc910bcc982e21846c6d26033b2ab62dc7010e0879b2493aa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3dd4bad779eaa52f2cd33814131752e
SHA14f0585a23331f6c9ac6ac8ee572983765405cd40
SHA256ff888b3263c1ab2fafa418ee777e56333be1d5573c9ca6b682fdc2a0b1183243
SHA51259cad33778afa017d78b9b95a214a5a0441032cf108229918e42bdecd848b7f1e27cbd71c6aadfcb4147935212fb0e792b064a3fe1064bae853016f02744a90d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544a7ba94c8e61776808a9aca322a20d0
SHA1729fa61161c3138c48ac740e3853a45e24cb616e
SHA256d348b765634fdac4e4796ad92adc6c27a539971e0df4e32ac1cee97242d9bd5c
SHA512b4d48d4b0cc6b27355c91743d49ba9d80d3f7c5cd1ba9c5653122fb8d37da4e0f6c77658af485cdf7f5bfa73dbbb99e4ad31bac79ce6b0082336155b3b315c4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b14133074909b6c21b03e0ca16c162b7
SHA1c7a74f75f96884b6247b50b8ebb39b43ed3c014e
SHA25699067ffc03761aba318b0893fbd82130a19bdaeecabaa57f636066b70f5af98e
SHA512a3dcf9ac9caf309606feb1e9609a7f73288f39b79bcc39b6c68871fe30ae9fb6ed52f5ff0cbfef6376b6eba9f035daca6ee3995dda0b4ced1d12eefe4bf5909b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592d5c1a5cc689812b1139c7a8e27e8df
SHA1f46ab8eb4604858a27109f657dd4ca99efc150c4
SHA256bb850d90d0e7972aa8967bf4acad57e677217b9298eec38efd37960c91f0b518
SHA512949088df92a1c954022b71365d89725470a7a9137a929b9643a94bf87e094ffe604109410e7386efafc9aeac290e06afb6e406bf796fa5a3c49a17278a3c93e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575c88867eab06ff49f6b7dee28dd41f1
SHA1b62cd53d0597ebd67d56b56561a6712a3357b06d
SHA2561b0f692892f91a19a88e892ad156df1402dad39f8fac4ca78745e5ef4675d003
SHA51224c86444f01294e9de3d59828bb0601c93e7a088963ba31e94941079d50af3362c1483b2c9ed3a9c8ddb833b0c7d15e6b79023ca9eccf7ad9002cee07459f1a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58cf9c23e3aefbe95144900c321235f9d
SHA115ef830d22180cbbec183aa5428344d757bda215
SHA25690108d5d8e280bafc4d8af8f81caf18cd662595893bc7f2e2dc5fa3aa91e8021
SHA51210e88d51a14a420d17d576c1b173dd2f4b555a1a31e7cccf6f56b39ec54361df41af4598b58a762ee7be26293fd9fb86f9c26097b1c1eb2d7f8434c456857f37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599a1feefda806a6fe700e660a3230c44
SHA18cb5404697f9837bef73a484f37243392d26dd1a
SHA256866308fa87c7ec2e433125325922645eded2dec522dea863694b594f1e445727
SHA5125594a177c6da9ea2ea6258bbaeaa3c4cdaffbe0c1b3eb9b60a7bb98e9a47e6367d35a7b5f8ffa97302d1a85cfe69ead8fb4514483abc34c85ad05bbc97f018fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5353b8d2932242c5c6677ca2dd20dadbd
SHA15809b5dcaf5b6a2213d2412821f14fc259d21b8a
SHA2560bb198f0c0cd3fb6ba83eecdded5e0e834f66cf7006521f2f27fc3c6ed6beb48
SHA51264d7bf1383f7b3933bdb57ff6863b08516952f3965176d269d60902da09b1ce3b0f9d28d9ee0f1e7d9ff870bb1a5b7adfe839385cd8c9fd35c340f40ee01e2fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb7721870daec118c433e7a841497a4b
SHA1b75a215b6e05264c17acdbeab114e054df3484d7
SHA256a088eb8b8637b51bb36959674b8f98f959261fbac93eabfd70d57a4a5b81d2de
SHA51299939b031f0e3bccd269098d5442bea3e659ccabfafc239f28c4997e84f9c308511cd790366f708c1e8d0ef1c614ed1a05d2aee388dd8eb57eeee8579f80109b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5662b4d459dbc51a93cc48753a3e614ae
SHA1371cab5fba42a1556df25a4cb9e025e30eac1365
SHA2561d4da2f64d5af005810134a98c54b0ce19dc09f92eabe612a2cbbb7fdd9bc15d
SHA5127aa30c24b3936aca1a97923bc03cdf5a8a99b480649e5ba4dc1842e7fb275f0f8cd493bf803932dd2fc0fc3c06473127c350fddac27a0882025a7451acf86a42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a01952a12289ba51e3c5d4255e53e3b6
SHA114f3d6c44f35ca9802cb6284392cf59c103dab19
SHA25679f3b6bc801c5ff41bdc53245e59c1e93c700e71a683680943c2066fade3a010
SHA512b4fb71de1c8ff1d00e2276ce94c808331c35c63dbd6019aaee4429565a2bd1bb32d42137d9c574abda38dfef75be600c033954c354f274835da561ecf7180719
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cfc78be4e3c51e7943961ae1b30f9bff
SHA189c3f9a00168994b996cd2bb0d5d787539171d22
SHA2568553758f9716335f50f22b20f8577dffa6a7b7daf01b0429958e22a1f728f46a
SHA512148ce67f8d82627c8b9a102d24833090e42c07a1b3522c6b787f2dec9ff1bd3e796f94bc2f17e7fc60e66f4565768fa6b10732e1ce74ff62046ebd69352611b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56de8a5784b651f346a8321d6bb8c6433
SHA16c4d9e51967f0d4a150c88fcb0ce5f05af1a0382
SHA256e89c8150370cb0f90076bdbaae6efb5f5a8429b3244e150872ffa217b4d20fe4
SHA51216f7a9b9bce4f2a2bc0295a5125338dd52ebb8018767f8b221125a23fd22e0882d8d088bbb953bd064e8d1ce54cdff0513356f5821676aae7b92edaa40876969
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56723150860de7b805c473c8e7dae54f0
SHA14249e95f5dd7d45f18aac971a3b0f5ca14cc018b
SHA2564c55e961a96dc6e10ec97c9f80e7c4e04e194933075fcf167e3ca782d9cffba8
SHA512daddedba78d7ba5b8be0294d9051b250b6d2cbdb2bfec7b5d88a22f53deee1d48c1cb4f233d534b37e2d6aa3cdb1759f5a979deb760a223de852e5c4e784eea9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0cf4705e6aea98e32aa0d20a19ffbb2
SHA19a405c7e053ee170235fc462e28b9811ee567ebc
SHA25644fbfe6f5f99ccf4cb00e98cac6529d4ce6b7886540d0213a9796a596d330295
SHA51275210371cdd7a07bd72b1f4161811a81071c28b6e065b840044f8e2ed03ce966047da3e57b8dac1ccd591807ca852317905f83eb60f34764d0cf5b52c9af0d35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538af076c10ff64715a1245ee3e716145
SHA1dfe339f49783a06ec931ca653ffddcdee833ff6a
SHA2561dddd0974889e2a75604ec1a7ea2022789688c3d7d2dbcb23408af0681013072
SHA5128a9e01fe27cdb2d390acebf9403e43cf166fccae9baf7ceb0061ad227f75a59b955eb3b0d2d22d188a32b67197ea6cce7b5efb7f866082281647cb4831e38174
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545edf7431add56264c0228cfec485116
SHA1b2f427a79e947a3c6fb6a1280494b3a16d72c986
SHA256beeca3ed5be3e70cfb683303730f481c7e89547a37ef93f41674ea6db61c6410
SHA512fe6007909d8c5e79a5d1a7265182bc61c7ccab37dc8c13e1247c78736b17e30ed9c6fecfa657c0013d54fcdee98fffee941f21b292d4e7bd31199137a5c728d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5895bc5b617d9b75358bbd4f7b7d0a3
SHA10f96f4bba3ed01eae6092dc9584dcc40cc26b444
SHA25648223066906a8ff704f56a736ad28dda1db3e710295b92da518a46e70c5601ee
SHA512095806b8e5cf1b655acd26d3f1dcc32460c262007b6a2dabecdb0124254043f8cad01ce1afe366b5d2f0342cbbdf147adb342160170af1635507f0b4bcf03f71
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a