Analysis
-
max time kernel
119s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21/05/2024, 21:45
Static task
static1
Behavioral task
behavioral1
Sample
64decd4e57b91dcbb3823d2ff49e8153_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
64decd4e57b91dcbb3823d2ff49e8153_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
64decd4e57b91dcbb3823d2ff49e8153_JaffaCakes118.html
-
Size
461KB
-
MD5
64decd4e57b91dcbb3823d2ff49e8153
-
SHA1
aa59873be8c03a8a3cded4e5fb618e175136d7ce
-
SHA256
f0286d0c98c33a70b0cd5cc781f05c589517dd3dd93bfb4c9f4e8b7322f050df
-
SHA512
573f2592fa4e6560be0a41a04085b5e94f88829a81eb1ecba161db58322b30504b8619422b3b7f1adef2091a799619e92c35c761656584ad0c2b1047c66a159b
-
SSDEEP
6144:SfsMYod+X3oI+YasMYod+X3oI+YwLsMYod+X3oI+YLsMYod+X3oI+YQ:w5d+X3K5d+X3a5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c00d903c68e57640b6a8d9a04dca73d7000000000200000000001066000000010000200000006217a77f4fbb97225a3fa304f6c6f2fcbbaf6cefa08903bd94b7e37c16a1fdea000000000e80000000020000200000008bc68e1582efea76fa022ce64d9e127d544664d594231709de11470edb4dfdcc200000000eafa7b9332b6651ba266367ade0f0767b30f781ad77a725a5c87cf787e3831640000000cc3c345a3b782e6bd1e0ab7b254cdeb46fee99e898012fc2961cc80d55df6f294bb8e7f07eca49f99f38c696ce768346eadc480e7c704cf1706036794ebd1aba iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f085313fc8abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422489781" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{66544A51-17BB-11EF-8706-CEEE273A2359} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1152 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1152 iexplore.exe 1152 iexplore.exe 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1152 wrote to memory of 2088 1152 iexplore.exe 28 PID 1152 wrote to memory of 2088 1152 iexplore.exe 28 PID 1152 wrote to memory of 2088 1152 iexplore.exe 28 PID 1152 wrote to memory of 2088 1152 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\64decd4e57b91dcbb3823d2ff49e8153_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1152 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2088
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5edbf9c81b7a26afe6e12299b1b9ee417
SHA12b0e190c28c8829a22a1e2fe436d2c8a3b33efad
SHA256294e668f2709217ea5e6c0d64fb61eae32e885faecdb06c5b0c2cfa4846cd775
SHA51239ff3b295530f17b12c82e3047ccbc67600de68d7a92f9b6c59559d988fd29376f593b1cfdba4222db3217d52bbe2c235dbbc853e47c0f2cb7837c2e123fc5fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5adea17fd4855d71405ef36d6575c82e7
SHA1b94234899ec40dc18d815cf15a9e00618e681935
SHA256c2e1d7953e5347f20491fbb1372b152610c57dbe21432968e83f5c0f682d4c5e
SHA512d77ae3546730dcee872ecadfdd18925cffe6090316c8bc03f0fc4253c9e8483bc8f8ddd710f5d7d0bd9594e67e1673354eebad8ef2da8e7550c3b3a97b6704a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5139f7dbef364227c7c22aab24a605ec5
SHA14cd9a981cbacbb583a46d5c09c700e37aa006d20
SHA256109a9fff76dbd7edec6eae9aa7935874048565e4d6e0d16795b1bf317457f0d9
SHA51218126d85e3c9c23b10a9670f3ccd016650e59419622a5e6cf30b3d64d3c8b54ff2186b32f5a12f51e7073e78e6af86bd0656950a3acca048e22769999318089e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595dadd73fbca47aeee1d5759bf427999
SHA1b525311c49b01f8cdeefb771d8315dd80c90fddd
SHA2564ef8ca7e9d857cd467ff1224e45e8a3e41ed4245d8c02134ff45694db6da8055
SHA512b2dfd03038d7bdef7e467f02c5c78e68f250379b5a21b6d596379b42d7505ce8878d96dd90bb97c9f8864da0db31749d7b750e614d74864571aa50f37b9368e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b100cfa46033f7ddeacd0871a07c8e4c
SHA11f6ab1451b82c60f7ad3960ea4528b2b223ced65
SHA256592692a10f11f9f9fe30a31478a52b38fdcd925ecbd1c979a37563cacde9a222
SHA512f43d925c2af6184660ac569b026b8ee2f3cf8d9826c68253bb4cf8bd1c7d99fc766d0ea5a0789a517add7b10bac2ee4b5e072568e11476861d9acccd6b3f208a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef43ce7ec01d2e73862be1d7a3ca35b9
SHA174a5fc3eb52ce7b683dd730d0117d7ae0ac53496
SHA256c219be85590ff3aa2202ad62e061990eb88594deca96608375a68b31270f3ffb
SHA5120dcb2dc03709bc19ee213e9d75efc0c9cfc44a0b4502b2593fa8d262e549b4618c9e486838708acbd306b82066d956cd1a9876c0cff3e0d1b8c88d63f98b89a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5edb1799a521b1b6d143dc197541af10b
SHA1feb638a7967429a7bd2fb83d4ea8e5fa8dc91a1b
SHA256dc59f6c638060571a91021594f515a088352785782d71f10e8ffa771614a442c
SHA512b816a603e55695152c8ddf553a64649fa01b780c40a59c87132dd3463acb78a7ac1bab2fc8d3332a68645e9d4cba3b70161834c716dcb45e5bd80f01d313664d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d05da0d6c1f89363046c753034c69c58
SHA14b892aaad635d64d19091a16707bf1cfdc29e2ab
SHA256c26ad9ecb4bcfc7ec751a4d6fe763484194451420f8a2bf2712e794159bbbe2d
SHA51244dfef12b8ee641b0a105ae089286852ab1d0651cc4f9334907769f242dba0f3361a791d9167f474f6acfd2f6e786467b47de6369eda59d2634946a8f820e446
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e7add019832add7dce7a9b2ebef0424
SHA1165fce1c2d445f3cae4166f5d8e7e6609e822e31
SHA2565166e490f64e65e25bb95b0bf27016d8208c57912bf3a32fb2d9a4509abe38c5
SHA5125add35bf10f2669e3154f87670d659b93b792ec88546dffbc52ca28f68b9a33bdb7fb8823ef99cce036a6f149c2a6b0df7dfc4e280a3b585aafe0a47c54f8922
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b34b2da3f4e82aeabd9572e8f09e86f1
SHA17e68447830def4d6fff063bb4d22bf688d78c0a3
SHA256674259c0daf73e60433ef156ad024183eb1502b5d645a09f025e6d56e325004f
SHA512412f58a55d2025a0494e1ad1d398e560bdfd15f9cefa02184026f6af068888fdf3c3d957cbe06170b47a256634ffdd139bf96b39c04e38c47cfb1b6727474899
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5124d6b98d6db97548450aed7cfdaee07
SHA186bd40dc90bb4db208d3ab3c3581944899208e5f
SHA256944daf05b89b43d692b2cf2cca99a0ac26fb2b6409857119e1728dec4448f2a8
SHA5125c9a36ae38142ee7ac9b13e955f8ae2ba35cd7366a9ab6deae3258052dfb8366e4097af2da87913686df6de8fef47d2370ba1bd6af6e4555c3b5733d0b5c4176
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8c7fcbcbf9f326a4b21ea5d649db335
SHA18a94bc73db938e42072a942c08631e271f340e91
SHA2561b5fcec72253e27145acc326d8fd32b0b3bce0d78b1eebd2535adc4c58e54725
SHA512fac47229a3a14adc1e7be500638372ac857cb633cffc47f1db015864f27df1d443a59c58add1087ad786fe8710a47d03d5cbc0a1e4d4d609347f21b88c2e7ef9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c3a281f1a2291b61249a9db79239ccd
SHA1ab23cf21cb709e4c4d995e5072d1710837676ec4
SHA25602ff5335cf2e171a4ae365de7136eddde628b4704fa732a4a5407c3369d83b9b
SHA5123517072b5956f84b2034d1ede9a81951497c120bb2a9fa9e9adff583f4523120aee877b95209c1ecbc51e989786d6b2174c95f0083934419c5e5c76a96189616
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a7807d45653339deaa1398d26e8e9de
SHA1b1d6eaedc1c0b3b22ed3a22f8861117322f19d5f
SHA256a6cbff0a44d8c7c048205bafc991e64f4dbc28ece116b77dbbe69e6093d0e034
SHA5125c734195f603ef70a54197b226daf22f264f83acc5c817429596d706264335f5a0c8af3b5dfc9794c228678084b01f49aeab1f324d3965e0936218b747a51ac0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9e3ff843d657c5093e0f010d12a2674
SHA1e357de90239a180d6d43a31d1fca0122ecb450b1
SHA2560c614ce5379090d5ba62b8697f0b9270228ffb42f72c9632b0ab31c4cbdbd052
SHA5121beb13617507572741c2331c39e965810f2a1f1746f40c96e21af641d2e3d14aec77d6a816cfc4bd2a8d73bf5413f015e64c2b0ace98a147b6a969bd6cce6ad8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c721c3ed91624a80daf529cf3093bb32
SHA1e1212f57298081d3ea0c821044dcc3451a401bb7
SHA25654b75618d292837254d566a10742e9022644ac978fcd380d680fdc2969d36f20
SHA512e93a92eb6c100cc0fa086669a0f4bd6cdb15b6a49749b396d512566895ac7d62fc4030a11d4e31a1d14426b25d7fc621dacfcd80e90c88c9d6d735e5afc9eb7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5938e45b88418b1ca648085462938bdf4
SHA1242de1bebe030aa8afe344a2208cfb624186ec6d
SHA2567f926138d0c69f03686d4a14e0380e4185f4fd017fe1be617982f7c91d8af91a
SHA51220519ce33adb8b313263237641cda61ca6008dfe3e87fb10a1114a43e020c852d1f83332cc20f22c03c5601efec9c77d82e7137bfb88a86db22b1217dabae6b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a83329b2ad7dd1abf6ab00e173944dc3
SHA135859e0003e4646483f588e833d9e5f8e478da93
SHA256dc060a288af124b6af62fc90fa649a75487571381e95cc6f90bf7a03c2d63c5f
SHA512b9a5ebc57e3f7a7bc54e5f664ef294056ffcc8c77a0962286608a9bb50f45aa68dd6ebe4d8bc1d0c47163cc7affbe2464e3bf30e00ccb17f90216cc1c5572a86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1447a0f42e219a56feba8e344613f4e
SHA1bb13c4b225c689f621e4aa2fff0cd5022017b18f
SHA256928f28eadb9fa75d5682397f71c8dba06f7ec52b38a5ad108f2923e991efa656
SHA5127d3f24957b0a3349510642b203bcccec73837fd99295df58a67d06b2ffb118a0dd23daba97292cbfa504022e0e637e868d597fdea7a59aaa219c148d0d2c8dd7
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a