Analysis
-
max time kernel
142s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21/05/2024, 12:28
Static task
static1
Behavioral task
behavioral1
Sample
634b0ccd6f63ca5880f0067967fa1f4a_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
634b0ccd6f63ca5880f0067967fa1f4a_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
634b0ccd6f63ca5880f0067967fa1f4a_JaffaCakes118.html
-
Size
20KB
-
MD5
634b0ccd6f63ca5880f0067967fa1f4a
-
SHA1
d216bf5b25d2cf51481f71ecc0b8b1451b8d4d58
-
SHA256
638dae33741c9e3cd25c75a25e924cebfa300e055cc21fe8ffb345c4390d4aa3
-
SHA512
3f8e788e62a682ccf46880cfdc06f01131b05108a17decb9d4e90273afcc6890bbeb10f577255efac3920a6486f78545f79a44ec49c6642e96fc68bf2c0dd051
-
SSDEEP
384:CanlVBbjPqoV+zji0Ft0LOzTQTzT+TCTGmvTG8LYqnJTydoBkUjv:nlVBbjik+zxPKPg0GmrGEJTydoeU7
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422456352" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8006b0677aabda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000e2d517706c70f1b88fc75691670510391434859d9235a0c50e8a4a9c94aeb0dd000000000e80000000020000200000006f15c23fa65275aeaeefa5870ef8cc42e0166b0dc56ac85d9040c734b0ae5d1d2000000044cb7e5fa8c6fcb4d42845072f8625051c53489a438008a74fc8e098b15309b340000000e97189d09d2c7ae9b7080f0b482bd5126a81e82e9a23f2407f4fd0565c3d3d5cc82cd835d1da6e4836f13233bdbb605db81eddd01c0d624f4dae76eb2b7acd35 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{922D6791-176D-11EF-BF51-4E559C6B32B6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2992 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2992 iexplore.exe 2992 iexplore.exe 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2992 wrote to memory of 2924 2992 iexplore.exe 28 PID 2992 wrote to memory of 2924 2992 iexplore.exe 28 PID 2992 wrote to memory of 2924 2992 iexplore.exe 28 PID 2992 wrote to memory of 2924 2992 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\634b0ccd6f63ca5880f0067967fa1f4a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2992 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba475d798ea3eaced690280daf1f2b29
SHA109b36bf4bf54fd57388b19977f81f00e85ed719f
SHA2566a650ca2d248e2ba08bc4727d7b33154a0af1652e26351ca3b8e9092659c52fd
SHA5123e78de7bd619c31e296abf3529c80e3e5e05b6038657aefc4085e85517ec6fab1069376b05c67fcc597da745008d886e9adb191df7edf4e58f682dcf2b61308f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc8eacc73e3d86a1eedad3d9201b8c80
SHA1a7ed8441ea9f69682836c169ce9bed2d4b4a282a
SHA2563b1ca7b66e900d088987eb06ccb49ff18285230350727f317a73bb15e877c77e
SHA5122d0dfd64f627cb13dbbe76ea38defc699a08f0b0cb11e4ee4e87ca149fc4af3f806591bd4715e9c4e4792f379031fb5c035e35a973c4a74f72900ec039a123a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a084a9ec190bd04b028fb6beaf543a21
SHA1303c89f66b42af821675dc61bb77a5d4503c781c
SHA25678304bf56945bc51d0443c620eed78d47f659fe742cb9d413c9d49be7c2cdcba
SHA512cfc1dd7dcf1ad259c0905a706005b7cef17ede5416b9dec94a5c834f91855d8cec446628a4cce7d056d49268a4aa212c74cdfde58df9a9271c656f19b80229e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f7f0be5c7f72e262fa2408d25620529
SHA13a0304854f85b53da876c5807a163ff1e3e5c9f7
SHA256b7ba61a401224f9f5fdb8fa744e752f8d979e8f5201889d45b2cb432c977f63d
SHA512bcafc3de9a6480c683979959ed7bb7bcf49a2ae9c1027b0d1d2604a40b06b5b6d3f98be1614d63806cde52a892474020b92f9fa8f59b6f20b0b0088bae6fae9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5deeb8d37dda927faadbdac7aee25fa9c
SHA1cb69373fb267967bda6459302bcb674e6312e01d
SHA256055ed0418acdf38b899e49d88455d70136a825cb7dd3bd648a23817f21d72e3d
SHA512bc6d636d79e783b4ad1319adf04c467b0341baa4bde7bb99b5dd968e0f53d3da7016e384699d3c63f36626b5bf2c265e0075459385d80287aea5bdc57aa30cd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e023fb6f860d9ac4623494112bcb418
SHA1b17c6afe5e72c4605bc3753e2bb968defdf36c43
SHA256542eb092c99d99eab2e7cbd560b39fa805cdfb08676b8c8aef75f1ada2c1cd49
SHA512904b5ed0ed101ebbfd0a76042629ce0e412973b2a967ecbb0b5271e5d1c7a1942ee53294ce0f78522e49c255d83edd1b61985b3509420c833d327b392d376185
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5650ec14eae1e53618119c6271f06bc70
SHA170bfbc5fa93e7e7857dff559ceed6b2be33befaf
SHA256b9be69af5d72af42d0d43e5e26c0cc0f4d11a9475f0680cd28872de180da342d
SHA5128f4be619f05dfc56d67f41878427e939e15d75ab2198ca8a7449a074f9a86fd9b1b9ec18cd4bbd972b65222ec1f5fe35ad3ab6ce78dda76a9c4af41185e5eae9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3fb3d8068ba3dd0ebb6cf74b8bbe1b5
SHA1ff879383b749a65c284113064c43b41ebde8779e
SHA256a5395543c1ff5539d52d815d6018575831132264708c0b3d891578501150edf3
SHA512dffd9c975b320b2837903bb5d9b00bdf1f1215d4c29c5908405a8611dc78ede457b3820f9a0e1e08d043a9fddd6a5e89cf621cb70ee5a33c57a3f991157ef63c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532d1b7a7bcaa3ca075ff0d08831d71fe
SHA17c48b904af09349e3fb8fcbd419cbe060cf353b8
SHA2567dd3078523d4b802632eb8eae36d3daf2c3cc2b10071d9cab1d4aff5508a020d
SHA512da0e691330d4bfa48c50fc43ce95917cc446ab72fbb0170e03c12dab3ad97dfc432c8127a262e5d553444b86b2784ab26e7e173190f56243579a2b509981b592
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57915626842b4930a884d0c9ed874d949
SHA1eb445ed47ebf98d8b6f563e67df39b0765530d29
SHA256c4fead9bd9fd2c30f760f1e055ea900f42a0303eeea66e75d0836c4fca82b079
SHA512662fe6e863f5fe297aab24514fc221b1e05502b5ca6140fb4867b7448dd82f63b5355c36879e7db6107c35672a4affef2c540d5e6ed0170329bea8629b4f1bcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b97e456a7fa4edc4e16d1b788bdec1df
SHA1da55beb6759713d181501aa952a27b61cbea07a9
SHA2563248d986a2ba4fd5c219e827cded6849ea309d420724deaa55046ae08f46fe56
SHA512e7d5ede7ef4fc3994fd8f28f58ab25030c166dc77902db82305197745600524ff29ffa2aaf1df93b4c29f8400291e6cc6ec06518a9923fdf197babd51a815037
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5621f14d01c594d44cb78c7028871a73a
SHA1af3fcd74816fe08bbefea2de5863c33d5c79468c
SHA256c4cc7cec5358007d5d25b566820a1276b12366eae6254a2ca4bd0abef062aa36
SHA512794cbb272d236084ae429ec0b11b0167f8792026281365ed1e34c47a2da2c82edd75fed51476a53288d39e304c93f9ab0c243b89ea64d4a354d6a9c9f9e9b98a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551b94743ae36b39eb30b06ac6c86b9bc
SHA1832ab80e07fc85c685d392311dd0bdd077b8e7b2
SHA25642f0a347b4b919b07ae575ce408a320cb54a25773d7bfabb499750761f5af541
SHA5129b9c2f9eee237c11d2c8b9ebd233ad4ff52bd33b9c7e48bfc9b4e69b3851dc8aa86118c1834372bae85b4a23fffd45eb2f5ceaf7081d662358ecf919a6245798
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515cf64ff6dfb8929642817394c2fdcc5
SHA1713b0f58688c77c46eba62673304be57eab31616
SHA256e9b01e317e773a8d9a4c7932b13ec556ccc50c9164679f906c743eacc4e86b95
SHA5122b091bac5fabc90fce5304bcd18c0ee6c4cb57f4f93e06a19f8ffdb29531e78113c6dfc3787d8e7524eec42a9a404367d771ccb230f8be39b43dc58f1bbc3bb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd555daf5d0b1da4e52ce37121f338f2
SHA131318deb93aa8110e1517c22cea9892277a8715f
SHA2563432a7f96ca206d1dddb5e5caa50d9b044866829e69162f42a9c7d81fc1bbbd1
SHA5128bbbad66002ef57d66949e6b705597b8b05df7f62dbe21d1fca7ce57fbdba00c8a5b73173d261266dc5191fb0d8b7d64dd005c81eae3da209d9399c9be654b48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a11e0e11bc8bcde34c276b81fa126ea
SHA1ae1847f356879b822bb89febc715c745ce01420e
SHA2566286029ea97f91441c5a05987505a7411128ca20b7d1f243a5e50e309060b479
SHA51243745629af7377e0631e30e8d170672014821add9f0e577cb249244cffaa3f468eee4f93ff64e873c31ed3f6f7da6f6bef0759180c3ca3c8e7e6909808c8327a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5948e5ba249232e9e6ef4670ef2937f8e
SHA118c5f1f2b625fdf8a050e723ca8d34c1c14f2015
SHA2565374d57ff723b61ad698f9fa1d4d38cdc7cce194ba757b185cc2a870d82c0f88
SHA5123db7c116cf1efc26d7b4416ce2350c4c9ff837cd9c37e2c3cf6620a73a216e7fc58731f5de9c66f41b580d0350477c016cbd7a229bce0d0cb84e47c78c773da4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57652981fc602bf50e9c2a24e9269a167
SHA199660b4dcac8d74ad5d8f20aa50c6a6899338915
SHA2563ddf8a60aec1d0c97444eb386d83b348cd5317f56636a49a50a2f401f5336a6c
SHA512f5ed94b5904e7bb1e0df1891d09f49f15b5448dd6c3f21d32936fc08edf7689ab27c658de1aa898ad3bda06d1913cf4fecae56f51acb8a699dcbac8bc10bbbfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de8ee1051af0dc406563db20347d58ee
SHA15075fb3275801b6d168d06b07864f144cc4f340e
SHA25681b51e27d7ce65a4ddda503887986ac0c9170298db8dc85f23a6019db6b5a63c
SHA512446f282d5a5df808bfae3f3ed1a63ef58eb30f05e19f32fab8a57abf1d2b469d73da5b59c8852f56479b5850d3b7b406b42e2b6119961608c827647acb4447dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f1410b497bdbbf1a6106f447d87cf8c
SHA1bdff069f1adecfe8072fa37bcb3b2bbc820a5536
SHA256df689b2bf2b4c395c5ebb59a96c00e655b67a2ae20883b73a4d955f3fd108f7f
SHA5127764979b89c13906870b71c68614dc5c32eb7bc562a463ef91cb6339f7e238fe868ab43ddcd6a09d849eda33e850e6091609bd4ca07822275f1ff929572420f2
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a