Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 21:51
Static task
static1
Behavioral task
behavioral1
Sample
735cac0e869bda5e11a064176d7208f4_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
735cac0e869bda5e11a064176d7208f4_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
735cac0e869bda5e11a064176d7208f4_JaffaCakes118.html
-
Size
70KB
-
MD5
735cac0e869bda5e11a064176d7208f4
-
SHA1
ce5f84124c99cae1f1c4935be1c0eca0938c5675
-
SHA256
7512f7cffd9bd10caf1b2b0c4a4d850cb69e3cf0b7a137d4945000062f69ffe5
-
SHA512
88a535a22122883e09f62f6dbc3fcd56ff34a8749f14fe3dacca4271f254da2d6df1e62b998ed97b68d5624fb633e991ca4e61a84fc8c20e108ce51a4c64b0de
-
SSDEEP
768:JiLgcMWR3sI2PDDnd0g6kEmjKzjMMzoT2e1wCZkoTyMdtbBnfBgN8/lboiGhcRfW:JfEmuzjMMMTTNen0tbrga90hc+NnhVJ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000bb40b906c055a9e2c9bb6eeefd33e9a3e836a5dc88ae0f5196d125be1354088d000000000e80000000020000200000006ebb2bb42ebdf6415fb5a35320d320b2a84e9fa1afb6f9607de1f94bc711deb12000000042ce5e6a61c06b3c78c73eb4581c17be3ce95753ed3e09a4c98f7ab42b9d3a84400000000cde785825e40682f83e998946ff663f14fda2d9b0b290256e5615494f83ef0295dfeaf93f04057b5778c5d812b517ee707286a27b754e0c9ab3f1cd3eb0c932 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422835754" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F001D881-1AE0-11EF-BDA8-6EB0E89E4FD1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b088b6c4edaeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2372 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2372 iexplore.exe 2372 iexplore.exe 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2072 2372 iexplore.exe 28 PID 2372 wrote to memory of 2072 2372 iexplore.exe 28 PID 2372 wrote to memory of 2072 2372 iexplore.exe 28 PID 2372 wrote to memory of 2072 2372 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\735cac0e869bda5e11a064176d7208f4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2072
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f25f4819589ae8627b9576bf612758e
SHA1de957d138e6c0204ef59393cf5387f56410b7eb8
SHA2567b85983714f30ea4b694b4b17f29fcfab4436a1c7075bcf6f38d4be9abc87da1
SHA5127533d3ba27a5fd1da74f3c53290308f26af73c885df1b3991c777d5b4fde945c1212b65564a77df2a4f766e6e401194340ce10fb3f6c47762fbce4fb68436993
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad8517e488a3ed87d41f38fc0a11f109
SHA1c28a911ad2a72bd325e0a045183a5a68f23b590a
SHA2561af6a564a57c0e694f73c663dcbca0cc684ba4001297ae66d50fb9e111191951
SHA512a092cac16074be7cc2a4188103634ab45248526c2dde80f5d93046a0f47ebcc75ea1616b9fbc53716f7b70db699f2257e54565d5c9774522da6408baee29a11a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be9a5988e86b988261fd115085f96ea7
SHA12a54f77ed9c752ae3c0f3bbd503132a3ce7c3a0f
SHA25689df2294ced621dede5f638aa53db990a90d801c3755f15bd65ba3a9e33b6ac5
SHA51217d8c69d3126337023aefb6f56003030aa5904e65b6dbc1f410b4c6fcda31472cb6778f38ff2352068e6adcd6c1674650eab55527b628a7b36aa4c1b260df5ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5019adaa3ecf1bd5449d3c3b06340043e
SHA1674387571f5b170ac1c4e9a99bd30d354b78c921
SHA25692fe419ab81de28b829dfdff4aaf839093c4cadfe435a92adf8f0aa3cafad167
SHA512b7db9ed148521db9127e90a9ba81d4bf930c3599883063d06d9a6409c85fca61e237b826d2e9e87519aa70f56bb6bcc1c24a3eeeda22ad05f2ac12f8a65190a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8bee023fac4b30a37227f131a86ab44
SHA1834fb07655dd3672100cd17f3b6c9a097ff168c9
SHA2569752c6881056bfb4b97ef32072c2bb7a80ca0e6bc79aea3b984670c6f1d8aade
SHA5123bdb01b81a66aac0a64e8b2361f4fae37565cec361bc132d11d2b4842cdfec0c29a290ae51957e8dcef62784f0fa3560472d80504b3e37df0574b5d20f06a0d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511fad4c4213481a3991554bf798af219
SHA1fd42a7c4f14ed54c06779d9bb287104473a0915c
SHA25680df8005f1add95515dcac52954661610ef8a678415a75e41f8944536d689428
SHA512878d7af006eb6558ff8617075f4f783e9c02be55c056647e1567efb65e3207f4704684530707d0a858ca516f158df407d2616336763661780184a73edc339c2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f478c17d5748be549a4c41ea8889be8
SHA17fab22194cc183fb8211dcdadfc7f05ec4cf4be6
SHA2566e8cab3a10e6409f3e0ba508d407ef2fc6b6a5322bd01b784e391375ca8eee34
SHA512aa0a8adbf73bcf49eaa54983c723a9d99454dba82182483bb3b687292356995455914d388a9f76455c869a1d6baef2274ff115009e1234c6be736a1cdd0b4c66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6b93617dfff2db01339a2cb3401099f
SHA16f9ed7a903327c943ca646b96e5249245f2675db
SHA256e6ea0b66817326f129c973a87f5d5b6bf5ccf65d36ee66cb8cafb5400dbc8e08
SHA512cac01918de20099214f688bf4fe4caf57685916212870d400981e802cf83412ac4effe81bd11681df0003be27441e246d29236208e6b837ff236b577beccd763
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51664d64293155e475a6b762e2cc90a23
SHA1d7b0551f5ef1523871b955cac5ac689f877198d7
SHA2560a3ceae7b99928be80fbe446549b187a01a1e8a2bb6bb423eefd9de9a12e3a41
SHA5124983c338dbf892dbc1d9bef0a7b4fe124d61d6bea389f004847ee9a9fc65a22c488a970b654431bb5f8255a9d588d25b754a5431205f2e9cf998cb85254fd920
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599c41f721e99b2e32a99a98710ccbe9e
SHA1271a0162b6d8a3a3718c225e19cfe1f84bc998a4
SHA2561a1681f5456e8561168e69b1065090e6156dbb14a1dbf8f79817988889fba620
SHA512042c627eb443f1f12382f6f0666f701df0c32445f63bd9bdceac62b265bafc766b2f24d44058d8fcd4e7a0b995a7c93ceecccd7f98cead30cfe00cc3bdbe2e50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e258b09bce61ea8087c4cdc64c0c977b
SHA12aca40843168538476e27a33af8a8790b044e40f
SHA256e5e0d71b021db2ab05c697cbaa90b88442a692c3d4f3bf1d1a3f0093f87f7f72
SHA512936befa1004bc39b484d01aadee4475202fceff8a7cece3a32edfa65cca572e6fdacbc17928011e6faf213668732239ff02f69d4db795c66877da751fd46fd8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5134388d5ff7c7b942519388ac55e5a9d
SHA17538f581e8f7e405b1085bfe8c3bea6e854e538c
SHA256b9f8124edbc5e099dce5ee91249703e6328954dd60ec1ee70c15613c42b3a94b
SHA512ece13aed3fda9befecbc837f34c216d4c266ca08a46e495dfc1cbf05fc74bb7f90bce67147becc8d80fa3694853d42a164bea99bcfeedf4f989c58cb90ec82c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1eb98168f077096de9907e41911f757
SHA1486a9f37dad714ca0c9610fefb88060f42f34c93
SHA256129af484468fc992f8d92509077805f785bc857684473d50cc7591b22c3311f8
SHA5121af4ebdd2f74338b276ae1b680dfdf86dce3514d3ccf18fbe5b571f640b207246d262925a233cff157cec7e8e372595a357d64f6e465ad9bd5f4d406786cd409
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7c7902d27135ca3c3a996ada4d7dd3e
SHA1963eea054bdd40249686085e8387eeb7b6730b77
SHA2563f96afbc71d6676bf0b67d72833c2513fe5022344694c6a1f3bde892b96fa822
SHA5127631af3ea594a057c2533b098ab3ccb8efda9b782da90c7760169cf054fe2cd84cbd4c8bd0806e9a453d989497a2dac7ec58b8cf6ffc0670ac47eb3a02a40d19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be0893b17bbdf4da4e9169362f55e44f
SHA12f5c2142efd7ae3ddcb5fb8405a7c887cf216529
SHA256c0f4eb31a49a55ee9b46f7225d37919569a38e4ad9768c7b05e4e7f14aa448b2
SHA5128ed7d0ef2c2b780055b5503816cfd3958a184cfc45bab210bb244f186df069e1ffa1a31dafbb4f19106a3a717fcc61f92c50499cb78189c7419184dea048eb41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4261186a65513e37d0ca9ed7238fa51
SHA154925984bf99b245311b6345f37d14218b0fe0af
SHA25646d22a0dfac695809e28551960fb24e51637f4fa9d6221d73bf9b4f0a7804189
SHA5129dcc68068e47bbfb30c639e1283020b78f1f52b24e2f014d1cf9512efe40a57bc69ca956ab84a9ba16937c48d8e872b44947903978a8a7118dfecca9cfc5d5e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aeb9d73daaa09d54fb084cf6da7ca5aa
SHA1724b0618b3ce18f4b6c0488f60a9de6259f43e06
SHA256c250f1e3ca352f1eac08bb3a4311db045960e5f2f0db8fbc7d31cff30b1160ed
SHA51233cd90fa280ba9f31ed4a6f08c5e1eac3b5bf4d8bfc7bd11b456a4d617e2387fe17309cce29feb6c8900df4838f5b47edbf2d68b040066756ef117387edcecae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5870302d03da792c2c0693c172567fc1f
SHA1716383e7ad205585f01ab69b60d448e6b8be7f47
SHA256f73e11197aaf90acf95fff98e11861b946ebffdbc916d76e86908caee8e0deba
SHA512cf002ef4e48818896e62405d1a7c7493c8801ab684d14887a50a5541cf4c1f6ec515513e900ab7629262073887a0d1493fa5d87a2b1843b933458a57eb8d6c97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574d2a296063698fd4aae07add869aad0
SHA18a37d902c081b57bbf3e3d9b597b6cecacade205
SHA2569b14f022ac20534d4ae1cbc15e8b159c129a8e25969bcc66a82ebd9e46ec2131
SHA5125eeb33472447caa8fd8814a68cbc404e7a54ce8d2523c3e823972e3cab303ba924c519479f28ddf6de034bb6f1a90256ab408813e76ff3e05406fa25b29ec58c
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a