Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
22/05/2024, 16:06
Static task
static1
Behavioral task
behavioral1
Sample
67d64add5fa73fa1b1bfb80b665f3514_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
67d64add5fa73fa1b1bfb80b665f3514_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
67d64add5fa73fa1b1bfb80b665f3514_JaffaCakes118.html
-
Size
8KB
-
MD5
67d64add5fa73fa1b1bfb80b665f3514
-
SHA1
c57dd9f614cb167f4965596a7511bfcb2223e16e
-
SHA256
247d7a15f2d2470529199db2ea3ad83dd18b16a3bddbcce9ae451d1d184d2bba
-
SHA512
3f459d375531adc391f06bf1f16605032855139c5e5864009b68849ea5cde58e35f9bb031bfdd2fd54391b169c0dd8cc14f0c3a65850c495d758f689ac3bf649
-
SSDEEP
192:b0oeccBxZ7U7CkJny5BMCLx7uCF+VLalGTRhbzOoX:eBL7U7a5BMQ1uCF+VLaYRVqoX
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3F2A6321-1855-11EF-A499-62A279F6AF31} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c038172d62acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422555856" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d2c9d2f195c6214390d0eb4d8e91907100000000020000000000106600000001000020000000d0b9a77b82b5313559a993818a1ddb144393d7697b8e1cf3d787b4186ae43180000000000e8000000002000020000000742a2ada1b92b831bd9966bd0c4f488bb98b82a178166e77925626a273c1ce04200000005df14545903240bd8bf13a0f6b1b23d2bce99492545e517e7b97215174afbe344000000054ada6997b93031ca606140b3e16a1cc82a15251dfba1bb809697abc4134f84df1f0a4852d603d94eed8195b54537fb1833c0dcd41df5cdb86c3a30387207da9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2644 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2644 iexplore.exe 2644 iexplore.exe 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2556 2644 iexplore.exe 28 PID 2644 wrote to memory of 2556 2644 iexplore.exe 28 PID 2644 wrote to memory of 2556 2644 iexplore.exe 28 PID 2644 wrote to memory of 2556 2644 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\67d64add5fa73fa1b1bfb80b665f3514_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2644 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2cbfa3aa0a606528595232ccfa7cfb4
SHA1940fa733216623a444480a9319de646b1459bd2a
SHA2562ce4058b8df244a68762d4ecd76d0e348d4d1734425086ea994021d7298000b3
SHA512389167dd72f8cd02d1eeb48bf6805ed808556234ba937ee2ccdc8411541800876327e10c9b26fcb9aac407236438f1ed0e067c65034ff0d1d3b23c79414e1417
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b27873328afaf26377cffca252403b5
SHA1ab6eb84523427c2e1ab9ad88b82701bcff93671f
SHA2560708875e2fc07ae7610c4b16714bb99131a2c14181b066b3ad75b53e8403d688
SHA512e1c999417a054bde03ed3271b6bb3ef108f96fa0b7730ac52fb4b6c32ca6bae3f8d826b48b3beb277a24631fd58514e913d57e4c74e9acd1cb906c408bd0d27e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f78885cf9e952e9719042823352ca83
SHA16267a243e26cfc9dfe69e791283aaaf4e9e38c40
SHA2567c292109cb656d32684c719f5fd0254945c9bf05f28c72f0c337f0d4cbca5e65
SHA512f802fdbdec77015d97dbe8b7a8c5ed9e84a57d61446a2df7764033e3e664cb9a70e8c379e74ca0772c2bea994dc3d59c5e3c81d40356c3bd57a0d4ba91d6a98c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2d383351c929a3075ae3277b16baa5b
SHA1012e850a48fe6d77fcda7f0d76ecf310cbf40616
SHA256b826f70b039063a2e6c941d436b61bc6e9d8c93b5ff672d45e56cf92ff302145
SHA5125dd8bf108f2b800d5413c3fd4eca9448d5697e8802a1cf9d11c39f05af3ffaef7cc4547461ef3bd15d5ef6a0befd91b2f40b67f5f058588dfb43c23d810f6185
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595186733e3dba82aa48f5e4ef578ba7f
SHA1c55a616374743ad5d94e7a5028fdb4ee8e937d81
SHA2566b140fd51bae76c76056b48eea003a43ec613f64028f5a4028772fafc86f64fe
SHA512d32afe6fe7e3fa112cb7bb2b34c87dcd98d9642b77d65ecb3ae565e373b7b0c9f39f180c0ba09591201dc393981acb0f5c2c0449cbc9867fd254a16626a375fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d05baab10db8f1cbd61c1897c0e8583f
SHA1d016eab657180e287aa616b72bce223076ea72ca
SHA256ce6d89488d30445b188f69810c2021740275bc1081d8578a84e00e232573a54e
SHA5123bb3681e828afe6a8aa73f88bbb9e681ec842cfae14f6ba82b8c8426784d4f53b0a5240fb86d377c86972000336a1302e544b364d68ff60c0ecd543e555c0f8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b59483f7c3004c96886e7dff4be25f12
SHA100de1919472963ce427a867ad01e607acf910c9c
SHA2561aa2dc6fa25066a23750a1df3433a043d89f943612aa0135bc41674807c41060
SHA51241fa4c17536f2fe829fce10b783f834ed4548f10f25d71ce6547a7d094315a4652006b460a247dcc15bc2a20f14c410b61a61620fdf5bc52aa20d3010448442c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f30d27e594a19a2c01a8e62f435e9599
SHA1cc87c81ee3a7f25add1abc11fb83025734f26f72
SHA256c945a13c7784b1e4702015d3932adc2c0e5093e7acbbb6f1f701a2776f0637a8
SHA512e571ebe070e1029b2fc427dccd23a54282cc752bf244d78b553268a8530cfc02cfce5f17be0d0d3f49f5023b5884a8e821297f0d7c9b05a9f4389f448a490e08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591bb1ea6784acd8ec82e12785efac0ee
SHA1ec3401a6e78793ef0a25fb86dea36b8124c0bf96
SHA25696fedeb4cf76836fba7d70d15f418cc30067e7e94d72e48305da15d7a29be262
SHA51251e90d4abb0bd3fe0a148778e00a4d4782248d9097f6644e6e9a51dcbdeb6f4bbd3fee512e350c108dd82e29cd0d54ef1e8f32e0e4c1b51a3e4a82194aa77f8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5156ec6c512cf80127d8923ae8d168ee6
SHA12fe35c8c5b26d56e518abfd6fdf522788949abab
SHA2566569477f29dd9c05e02f1fa38df8c395dc6730aff439daf92df2806fd0d886b7
SHA5125e57692d589d872577d13b9dd67b1920b403911873856d1fe026c48a601f1a6dd279a39a96ce97c5c3752379c3912a4a4b018d78c51884ca5dc78c7d3ccd4bb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564a465eb90c09a67957fd8954a5276a1
SHA174b460e86d14cc25293136e02085aef200ae9915
SHA2568ede491514014f48a9af54f8da349671d10e648f41ac61f55c6ca92434f99a17
SHA512b4f3683aa8ce0bd9af39a2eb02255e300bec56a27307a6150a8e1be28d6599e414d96a93cb78a5d9ed8abf51fcb2eff0f10286ec7b7a2684b94730e0ba633f56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551b62f4f3569e364ce7c1cdfbb988e58
SHA1d5fed754723f9bf240bc504ace44afa3033d879e
SHA256c7863b044d208c94028747002e8dc9f79652c1dcd08f5e848ba11ce7c055c4be
SHA512eea3c2644a50ec17425c1498e6d819e90da27bcbbbee0b6175276024ab0de2ca643bcd66edb2dddcd89dedb3d3bcd516604e06876196d2fb9f04fa82319d2327
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537e3c2eab25dd4cf2e524a341e542f13
SHA1f0fbd9c45337e327079724700609c0648637dd9c
SHA256e936f48babd1b182e1b2d48bd157c628f9fd8bd077559bbe5e13c4427cb3b966
SHA5121e96b3777f9ff7eea05e1c80f3d71d7430f959a898fa2f797433b6938800b71ec2781e8fc03d8b62fff0f1b54b73022c53bfe31c54c6d6b582d7534f6af11280
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5934722bf15f9f14647e32887e57b2bcd
SHA138b0a5aeb36bdc7512931868565074ff1bb8ee4a
SHA256c299e49115d9cb5fb74afba5143448c17c32791fd99a29a752f5c3b916f57fc5
SHA512a9101ecf2e308be205365d0c1f33c9257447f55fe72a4b342ea7c9c80b5f00de4b01d48e8e0a28ebcccd0a2debdeefc911c89c369704a0295faf951b258e6c95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519577b157d01be25eb2bf482641598c8
SHA1c56d522086da597439c420b526af953adacc3b60
SHA256ff1d3bf8fdf8b920a5d30d081878e11d9584f652a08d0857c981d4236cdbaf13
SHA512100e08c38c6c15b6b9fe69586c03d818db0bd9a3e91d39237ec338603b048eb31301e4286845ecd035b29e932d1c92884700fefc937bcf0939b8356b484940c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbf3f5a1f0b898fb1765687112d1b831
SHA1a7fa29c6d483c514b4910674d1047c55ef722e67
SHA256961ec70414f84730924ebc245073cbb18343ee81702f98697f1df8cd826c09af
SHA5121b8d28191be0661c59ca34cdd465d4f4c7691edecf0d211d26a299da476515f441ad1401078093897b96b5821da9171d8781988f5d5c6a43b6dc143473936f6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e85c0a085e948c537aa001dda5df48b
SHA1d9bd75f639ea657c3573677c2d06804eff565be6
SHA2562dc9fe562bc4868950fb221b3b91d90d0a8481d599f2bf336468589b1793c210
SHA5128743c2ba0054127451a273d25e64a0f472952707ace12b5c18656e3f2714b4e9a031b447f77c8e40d58e34ec5f17e019046641554233e5e3faa752d79610a99e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e69449b78f1fc19265efd75edf460f7
SHA1fdb837399a425a103b2bbb3b3a579cf4192e5637
SHA2569254781f31094de58894ba9f24f0b4a3e87d8fddef98368bff5899955df73d01
SHA512b1a2e39686644b7fa7440e09263f58df21914aa9f4f27912c98db396363e289501b05aeb9dcf5122612448bb5106280c4f5f391c60abf40feef34326d574669e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5086692ee77d91a5de66fe53049ff5f77
SHA120e3ad44d508934fc96bdb457fa80925569ec5db
SHA2560cbededefb25645d9571ad8451abcd89a9ec28e83f0ca84fa3ed533fb871207e
SHA51224b19d5712d8e4359d38b85fe8a2942cacf8d80a73fb600755a39c53c3c73173ceb76f5326b8449490f10d48fb3e83c0effbd77a711f96cf5746a34aff36541a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a