Analysis
-
max time kernel
136s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 16:41
Static task
static1
Behavioral task
behavioral1
Sample
67ea26fe7413588d8cde3699ff1600c5_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
67ea26fe7413588d8cde3699ff1600c5_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
67ea26fe7413588d8cde3699ff1600c5_JaffaCakes118.html
-
Size
458KB
-
MD5
67ea26fe7413588d8cde3699ff1600c5
-
SHA1
ba1bd4369d48c8e8a174ce48fef549d33fef16e8
-
SHA256
c0e40af89b271388d4b49ccee61889cae76f7b5878a014abe7b52a85739a4c09
-
SHA512
1fae7ec02c280c7386d9e2224210b724edc9bcfe7a2a28453d88c83c1b8accf0e45ab1335e9710b4fceac53e97203d98011c956d922e70d2ac86e500061e5546
-
SSDEEP
6144:xIsMYod+X3oI+YWsMYod+X3oI+YUP3sMYod+X3oI+YFsMYod+X3oI+YQ:k5d+X3y5d+X3y5d+X3j5d+X3+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422557946" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1A8DAB31-185A-11EF-82E1-DE62917EBCA6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000006e6769f27227a40ab66be5080e25729000000000200000000001066000000010000200000007fc39c67aa034cf889aa4242790751145bf977ea8d148afbd023dbf126d443e6000000000e800000000200002000000073e12db4453a60dfa7e7237d102d0bc652e8b3412260855912e208e423867ff220000000fba287922450c55419174263bf4f45978296a2cd4fb0bb732f722013175d0f214000000037775855c511ad7947cc581eb882e25b08df7eb37a6e6955fbfb9c7e42b46689508d18f3c18756b78a560f6c11dd9006154945b47e6fb91119a6131d97d5910c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 009c222e67acda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2168 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2168 iexplore.exe 2168 iexplore.exe 1612 IEXPLORE.EXE 1612 IEXPLORE.EXE 1612 IEXPLORE.EXE 1612 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2168 wrote to memory of 1612 2168 iexplore.exe 28 PID 2168 wrote to memory of 1612 2168 iexplore.exe 28 PID 2168 wrote to memory of 1612 2168 iexplore.exe 28 PID 2168 wrote to memory of 1612 2168 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\67ea26fe7413588d8cde3699ff1600c5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2168 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559637100daf8d331b83086dac6487811
SHA1d966966271463abb5c453e46eeef30de717ac7f1
SHA2567321545302fa025888c3fae94f86c3a5b87e4f9a8e7f91c3c272eccdc18bb2d3
SHA51213f1a7db7dd9378e06cb2c73e14298cd1b5dfccb737b11a8e99b2f530e2ca34419e1a6426b691618a7cc92d226e413208d961bab72df6f2a00ea4c4fa0303bcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2d91c1ded2364d4d84c1909f68e1e95
SHA18ff3f4bcb1be7aab28f2a5350ebe43ac0bc89d43
SHA256073b8d194ea5e9b9ab23ee5c752736a64b5a25562de426f2320a5d7c05d6b37e
SHA51293e8f0e7c231e53519899c5dce9a79a6dc28daa9a1e8880174ea1f49c64c300a4ad399b09fc5a15bf989216f43f7250ac33388e2e21113d014a45f1423a8e5b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592bb1f45c3e54c248169ae0849ebb8b4
SHA1715088054991994f02539a345cd9f9c9b2be1259
SHA2560efdd27d1253e7306bb7a1c5e962aa3c17001de5e8da093875dee5d3554b3e47
SHA5122767db86fa5dd7ae8a1af1fd20854d7b4964104c3bf4de811546b18be8292a51a6bb25aefd93b8ceee6b6f475e606e3ef5db9e230bf0c5d6db3e8e3476d33bfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59cfe8819719c59f33ed3ce6011a48922
SHA18b81a31185d88fe433de44fa23c1f47730e2db21
SHA2562618d17e30e4d472e36dee5659cc516d04eb81d6d9797c1d89c3be6329e8510b
SHA51250caf9d9a4b1735e252263b15577f6e6170763753a0aa3675fcfddbff15d8f417f99044b50e17b2b1dc72c5276155a4ed1852f8e7792ef152b6c8004a4fbf25f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0f81505bb0ca9a4252ee33d2ec4f197
SHA1f63e3ff15d1f030a62fdde785154f47395af7dd0
SHA256451a230e56a4dc0497a4e0ce63aaf14260fe79557816d27966526f0757b4dd4d
SHA512bfbf7e74bc2d3ec969b5ad00717be2c92d343e125290a7ef97ef2fd14d7bbad9a6699081e72da2050de13c231941317991781c283287ee5cefa4829dfd106448
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581933fae7453f1c6569e265f25772b58
SHA198c561ce93f3d2f1bafc8970fe5d2d460db88c70
SHA25632b82adb212124cb64c83556f035f0452b7161fea5f60b1ab4c64fa3dc7865a8
SHA5121e84356993b0f625686bd4797bdd6b886a80c26559b7a28bfc71230d2403664a0de8597f16ca6643ca97e95678a3f69d903362e5c7f470c8524e9b845a11eadf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56eabfe5e01380a6aed6ecc754fd201ae
SHA1bd7e478873426f04c1933018574fac51aa178c25
SHA2564e21dd3af60f26ea15c2b8265f008415b22ff0370d84fd691f5bb2717dc7edd3
SHA5124bea66a9b7a3f134d16c23655490732ea0c0cd755fdeccad69f6b1d53ba6400dd0c8adf3fe72bc07c9b1d1a4fd489b9aecf8a61563b90824ca7dbafa177d5aac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ee6085242310f4f2ac672dc340db590
SHA13eead69e79600c1d3bf0ef0739feece3fca9e433
SHA256a501ae7c480a6b7f3a942f9534932ce803b3fae1b2794569bd4a62d00155af25
SHA5128e38c8bb4d32db6864ccec15e5d2bced11c697915af6e9d2a81148687b8e7ac61af2c4e1eb945c4e7709070f637f3a666810a3634bab18b2719de52597a96aa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519433e80897b2b8ccbd1b2db272f5d71
SHA1f198cdb6fe9a820be1500a14e8b033e2e06cd1b7
SHA256334f32cfe93ff4aa35a2ef938c663b5f43bf3eb4e4b63db5dad2b2cac4b69569
SHA512eff418546fa1f3f586643d7cddabcd8276d67a8d2d1c64de50e65916e412a0ec08f1597fd199c7f24bb288cdc6713419a1784cc9a01995a2dee069336a903995
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d1945bfe0c613c314ae0b23d87eba32
SHA12c45bdc772daf0fa7cad23c9a92f2b56bec5eade
SHA2560e01da7526ae5c2ac054684b0bb0d16785f7cabf3b86efa5ce374e544a52c97e
SHA512fcff9754563c9000cefa45b6fcb0ad3ce3d23e8c1af9aeee6c7fdbfd5f00f5f7fb5db689bca9b88696843b9e6241952ed18f764b1a3f66456225745185574d3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5afd1fa2480299f7f5630364cfac87c8e
SHA172e567be0e469308d4f9832a5c87fcf680dfcf0a
SHA2564ac1ddd54d324815baed0cc3b26179555cab609f8e2b7674a1bf4e1a3aa1be4f
SHA512391818a0b1bd1377f8103a3921c05e041dcb2433c77c06edb0e83eb69b6396d6ca9e1848138ae55371ed6f0caef5f0e4954ef0aa5b44a7dc1e1a1a79d90003bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5403acd9055d734fd48f3d876825d4ffa
SHA16cf21e6d20ceef70976d299a8fca8189957e7555
SHA256fc7588c97ed3c6d3da83e736655a0f73c01d827e1eda0339d852662b58cf629f
SHA5126bad028afd7f8b9ee2270af4203c6c3366481a83804e99323eb4869c7975b66cb67c4d568f8ecdc7972fc6a987094306e2fff2cba56561be4e6546b4e9d55671
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529a4a0875a10a6d32584bcbd5cc9fea5
SHA1ab3a70d4a3aea66e89c9aac5f6eb022cb2415fa4
SHA2568bd388ea4faa42d78322806942da26526e204f1f25e672115da5ef4813f7432d
SHA5123cd359f5f9994c166ed390e57bd4def71f271fbf6c8ff4509c7b3184ddeb91aab676077698fd1be0ec6333c6ba61a17a678a03babc3e244818db50b00c685607
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55226e349593841f5a149737a4180ea2f
SHA10afe9165202e0a1653ba385f4f39e8ba0613ba9f
SHA256ad5fc6ec783d24b6c7496011ef153e3f30a71c4f050bd520a045fa31e548ef3e
SHA5128d6c536d04a5962e69cc2ec0c88dd9f56930892d004bd55fc42a29dcd484c4524fdc0172535dce125a8c860be7f3f1ea5f84e93c586c6fb7f14f8ebf0382c90d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576fd2bdf49ba739f0755e14751f5dbf6
SHA1937a8cd2c1ee95cbdce5e5d57bba3ccd32d55a63
SHA256e4d5144818af5be6b0ee62b7823b37714e70c98af0f7a9ebc2d435dc0d04fde9
SHA51297630b62f77fc5fc38b58e5d551707ddc8c257a3ea01d68b273dce12a112039f3ab304522638e75c7881dfce8979f720cbdf433979440cfb72aa6b1b0c6e9e59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee5f4e1384bf4bf3b0339d4d64024f02
SHA199651f22b677898e492971b64de37c35c7741023
SHA256274e8ce81e27f6f16ed1f21a0014d2b6325e65a94a076a864f79cede69e090d1
SHA51219892fe705a5c0e7f9e26e93ee88830f7745d1767bbac3ae0e19acf74372b57ab2181befa6124ceb05f621a314f495aeab73ff5176c9190fe549243d6692e162
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5750f001312035e2255e0e4d7824b13a2
SHA13b6082fdf538307b3f005ee2fa3e40ac46f9b8b3
SHA256ff50f9e4bc6ad3c49c48f77dcd2a946170d93ac1cdf96ef4f37645d0b9c9b578
SHA5120903766ed04beae769c11ac33e85ff6d6ef16a27ce56e6c7b3259de2c291daa21dffb4deedb3940212c215d84d39600448faf251873dcd7f1b5585d6bcacbf01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af589c1cdeccf1b90614c4aef80f25e4
SHA16f9a295b3976ba3e361ac2c291367578752cb409
SHA2560e5a8d439ff587e56dfebface2eb834ef307a21d3c4b735f0c791c2d8ce7a2cf
SHA5129ab3e67ce5697a571154bc20807fd4978fc8cb7ef498893634bf1419b7757c299cf6cd85672bd968bcebaaaa515bbbcf053c64328aaad6379fe07ded2acf6f06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb944103ab0dbb130266de349764b9a0
SHA16647fd4af8ac53797b232565e27d7eb469c66adf
SHA256c2da00f1effd060725bbbb32cf8bd38193a8bcff6a3c3bd82984b40724a6d26a
SHA512c6143bddc0dbd8a3ec03f8ff0fa8b18e29f557670f7224329f2fc3d0ffee52e80382be504e7bb39d4f2aca7d6e7087c197082bd9277dd44277b44ba1bfd4aa25
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a