Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21/05/2024, 19:38
Static task
static1
Behavioral task
behavioral1
Sample
64838813f851430929b01337b4b716ac_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
64838813f851430929b01337b4b716ac_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
64838813f851430929b01337b4b716ac_JaffaCakes118.html
-
Size
37KB
-
MD5
64838813f851430929b01337b4b716ac
-
SHA1
a203e589cc16a2114e124e61d513d11368cbb417
-
SHA256
70841b0e357d30d9b699240a2880de031af41e877b67d6701a6e70bcc2e3fd2c
-
SHA512
c6681019b7cd4aede783b5b209c069730e8455ff07ada50a6e4035d98eba96f009bf75f0210ec97d9443c46fa4041df74fc0589de9d5170fe36d77f3e7f129c6
-
SSDEEP
768:+o4POOOOkXcT9BpEkNfoxZYq5bqOWoVlGb:+o4POOOOkXcRBpzN6yklGb
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000238326c47a86ab4fa34d10fc0dde339000000000020000000000106600000001000020000000d075e38003f97420ef2fd2b32554650aadf23eb714b5e7e670c719fc80374bbb000000000e8000000002000020000000611c577a8b8e5ef8ca73b0d16238005dd7fc15f8be69c76e8c76bf640d42619320000000357d1b7119b5a76975a9a811ae6fb1b1ed81105076ecc0aa9e8bc0d84569694d40000000a871d0f14869a0f265ce1debc7bbb7d7c53a1252d457565491e3247ac651c5e19d6282ebc5ce5efcd9b46b6c64184001337e5299c3cb52d906ff7d436d6de68d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00e5d088b6abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B444C3A1-17A9-11EF-8745-52ADCDCA366E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422482178" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1952 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1952 iexplore.exe 1952 iexplore.exe 2036 IEXPLORE.EXE 2036 IEXPLORE.EXE 2036 IEXPLORE.EXE 2036 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1952 wrote to memory of 2036 1952 iexplore.exe 28 PID 1952 wrote to memory of 2036 1952 iexplore.exe 28 PID 1952 wrote to memory of 2036 1952 iexplore.exe 28 PID 1952 wrote to memory of 2036 1952 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\64838813f851430929b01337b4b716ac_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1952 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc607faa2ce28ba41a440bef79b11b1b
SHA15e944d71278d8dc95ef56ec6033e557a0f4d70f1
SHA256612b55b4b77a8161e7f11233762c57b5c1d4f8afbcdb44ca4db0804e1529492f
SHA5122ccb160c13a77abed695a2ca24a1d2f82afa2d95eaed8140f86d1d23c222a54ed49bab7b61d51fdca94b922a80c5c70eccdd6d42ece8251d1d7e37ec0edc245d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad2deb43153ceab4908efbd88c219d82
SHA110bce534f025fc8507663f5dbe1b583179a579d7
SHA2564256df568ef25820068de7b502aa5dd2c54ca740eb1bf73bb0ba3ac2493c9c69
SHA51241591aca1e16532143f45d1cd4b6af6e7fd67c18f9a6bba23c50ebac40081e0b6a29b24d79cf701f4f0fbe0494ee46037c1310cf6f3eb90682385f27cd27f3f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c663041e3cdb20a5914072df005c615
SHA1cddd1ef34d4b592ebcb70e44e179a7cb8f5a681d
SHA256c9495a4432f3716b33316e65d3e0aaf7f8312e6c0d1b5f4527259ce6e07d66dc
SHA5122a0cc83ccebe7df186cfcf67b65230680da661b4bdebe6d84feaa9978165fc7c04d44c4e559f7fd3cc170cd111120cbfbe531bf06d4e784ec115c28edadc34a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508f33ff5f282b934e7405cdaaf191e34
SHA11bf1f6670a8f3970fe66f251a93f086f37135af9
SHA2566e521eb500734f9b70455abed935284c5b73ad66f64be98f290e2e7939a87c3a
SHA51243de320225c7d0701923832361811b258c317ed48d562b08ab8e82fc7f5fe98d41a2ad227c2b59b40c46a3d9cbc738332cb2e1e12ee230c0c10f99210f0a5c1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4a0bcdcb7ac20f6696191c5f1e06375
SHA1423f99f6a70927b1be0691d8af2b3613ee929ef9
SHA256d96d1c94f86bb19a2a885253aa59b0198d4ddbdcc7f2b974f8c4e4729d869c2c
SHA512d997249c73bd8d8d3e09b18f942c0507aa8c243dab81136de2bb41e56255ecbdfbaf34961ad4f611b395b593f71fd1ec26a42b68e4e0c75ec02f1c9f5c4e1006
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f62412abb4fe94b691d4a23b46ccd2f
SHA1f2f6a9a413eb39ad545b6f0bf257f5715ba3a3a7
SHA256bf846e5f8cdbc035843cc375942566e968ab04ceda487ea60e251488bd7d9e33
SHA512c3284a9aaa2342667bac53d81cb3d46fe4677237f04963c764bffde5d1acd9de8a598d30262d7b83f2803efc2e35f74b490c4e6ab3a0bd658d6a4f70b348df86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52de701beb353caa95a36de2eb92d8217
SHA177f3a81775c8699b6133bfefdf94c81beb8bfd11
SHA25612e06ff92e52ca033293860d90d3ab79c710d980437b38c835df3e3aeb648c0a
SHA512421085b66539288b64de2fea284df04bde24757a1aadef789807754437b724693e4b881064322418c127d88d4a102f5b17056ae05cea1063daf121c65d28f45c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b95ef193d76ca7daec0d1100023c49e
SHA18fcb8d274856714eb3d8a6ee8dc1e94f253ede1d
SHA256328a2473f43f39f2a3904358f21640729148f13a5419b27caad821c5c64ff9ad
SHA512ebc676dd2377cec5f0c9641fdac1c8df0e549496b305fed54610977641f018e5027c48af3febde577e436abe2946de87633c865b9c8f377338a63dfe103533c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5547ef2a740adaf3cb36bf295cb0a8218
SHA1da0702b6bff0ec01decb0425ef1828dfeec79f72
SHA256da398d84cab5ecdb626d9cf4d14ca407335eee8d8d7c9982947f2782a73e1c8f
SHA512ce90ae0d3d6dc193fef846a6094fd1a4c5fd05e486fe24607ca35b8633d383707a37d7f201c2349b69ac9e8b6cd1fda8317d45e9d507554a40d3d06e541534cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ea771a1617834a1607f8e95df46ddc7
SHA1c8f1d72596ae7b34d59c08850f72970867bff117
SHA256ded4afbffaba9c877afa9374b7216e8453bdc530473e69ebc786b2df6d13487d
SHA51262762552876cf595c278521911b85856e38b25187643308ba5f15baca1bfff7f5e8507a6142b96f7d7e17f79bf6469e5f62d04fb0f3cfe76fbecb59d358e6d9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e420529b3f890b645bc068b22bcc7272
SHA16dc9f8b40d9d9b2738819103e323aea2d6a60742
SHA2567783d4fab2cc3b38a1c634994516f0cadd0b829d69de3e498edcfde3044287a9
SHA512e2b1332228a03b9e0f680b96785e9b42772a0ed35e7e1fae65e1daf198f999d737c7dea38830db67c7f72b5a6c6115078b594e5e3f712908c0d2903ef6eb2a6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544a0bb27cb6fc0deaa49d46a36f17202
SHA194b79baad0fa8445a67b7c1a79b817631b7fa29d
SHA256bb55e8ae2279858e1713daf0f31402d7466de5ef7a3b3e7181502b3a26b22d68
SHA512d6748d293bb8f971d59fcc4dd315a28cb3015183b162b06120fd6668ec1c5d899cefaaa653f084487e68479a6eaca75aaf414acab2c7f5f553cb070485d63773
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538b9bbbbfa0b1fecaa1b4d5282a58f66
SHA1a0eb89d20de085541ba6bfaa0d825a6ebcf84cc2
SHA256efacf785d5626e3deda48c3ef28d1acde399faa89f940a0c2406e121d0cbb7e6
SHA51211151a168a42881b60ffd6cb7d0c466551c0e4f7a36c211702025e23a857e6c28cf8d2f034ab82e7dcfe9a280b1856ee3d689eafbd35044c5fc6ba8c9ad06d55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab8d1061f39a7e469ebb933d3d51baa0
SHA1a6d3850e2053ef316a61fd9eccf132900ba30359
SHA256ba8fe1c833d2f00a0d6de645750cbc46c282ffcea8fa719e537a615e7e170593
SHA5129218fa223c555dd156ca16f32e9b7d0250d979ba9357f561fa81546aea1014dec62aa366ae2e5fe88c5acf10aff5f7c1737a56c91f15b0de99cc853fe6ad8969
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad46458e0ece64a910436539da9adcb0
SHA14c27b761b283476f60455a3d925acbea3733e207
SHA25675ffe89efa0debd366a3aaaca5eca2291d1ae3af124201ef780ce6437ac53cda
SHA5120de67a58d5ac9e86e40f88c87f8817e09f44cc8b7812e1aff7b0820f9ae84da144d42f682ccfb382f52a5c6e70ad7e57262bbf182109914cf33fe836a54d0dd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5787b75f9511c72b553abc32b1da86d
SHA16fc890db40c052cd7c6e15403f0a75d51b525a78
SHA25623e43bd4cf5c8b2180b317b5be6a1499c5a09232de8b2de99f763f072d0fa2a8
SHA512328d8aeec025d0e0a96d8d72880fd2489fb9e6919e3565c62b13bb90da9b7816ea531a757956fe0464995b9e1cd65e3f9816ba0915026786d5b49b2d43a5fd46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549656fb3b5264fe2d2e73689aa1fee17
SHA1f3428581c27f97b711a42061182150b4d3a537b1
SHA25623f6487f67c807a7559018a58fe94dab5b4e1a8563a42c015d86650e385daa5f
SHA51282f0c8c1ce57bb6b66be47aafbc9bd787bcab719d99188f4ae28181c39b8f7ed8b47b0a4a73b827a20e371b2794ba3998f8ea9142d02e8920e99d0425ac912a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5697a2b6eed3cd3b1c08b4669eca34192
SHA14f8e169d9bfaa196a0deeee4b0048bf8ea5dec60
SHA256324a2511fc7aa27f2cf952a67ff54f4dd5d05d1d22c110545790ae85017c8dbe
SHA51210485f89f2da8393322acd2c0c798894b6e6803c4544df11ee842609d4893f8e23bd4704b576ee4c5e04c7440edd4949a792d8d890363424dec3f636330ee5d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a45facb4eb14a0b0ffb4181e5cfcd4cc
SHA102a0e1e18b6bc6436cf5915410b260124bac36dc
SHA2568cefbb666a9ddcfc13ce3cdceae5c1f93a38ccd680d41df7859b597ea5740a52
SHA512cc8010960b6f3e7e497458c4385d0405b7395621d1605f06de1d9d57ac0fbc6679204b0bf99de9e24a30b1ba01dbc50f89e51a9672fbe30a8e800f8adb1f31df
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a