Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 02:49
Static task
static1
Behavioral task
behavioral1
Sample
70a058b8c4ca0cdd6fe6051f27a1ae34_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
70a058b8c4ca0cdd6fe6051f27a1ae34_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
70a058b8c4ca0cdd6fe6051f27a1ae34_JaffaCakes118.html
-
Size
4KB
-
MD5
70a058b8c4ca0cdd6fe6051f27a1ae34
-
SHA1
a57260388d0151fa07a7c4bd84f3356531500914
-
SHA256
7f5227f2ec270f0077e50b2860b1eb2413e4b229bf66a04be93e66f3bd888732
-
SHA512
de040ea49876de8952471d0d7391b8d611af16c6ce3a3c47040138a9dacb27233db83c60c44cd33ed4d43eaf397fb7f68b2111f39f127a6d8c0b32fdae438072
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8ovfd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDc
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422767238" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{68B8A331-1A41-11EF-B0F7-6EC840ECE01E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0753b3d4eaeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006e2ee448d71a5949ab5d2786ad761c6100000000020000000000106600000001000020000000eccb347079185aacd057823a6fdbbf48355bde7cc828b6535b5b6ab99f7267e6000000000e80000000020000200000004d9ab8fad24b965414b4e7a2e2a76b20553ece519e9bc5a81b1211614115a4da200000000a710c3ec96630e6b9e6c26f8e8bd4759aaf66872135dd3c581bd6bf04b81e1f400000005a5fdcef89d030235b14e1a4118635b86b2c9ee6c9f72a9e876b62fb3afc7d4682edfdd9176e83ee70693e8ca004d355a83e6fd9635dc60cfb9c05356fab4efd iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2312 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2312 iexplore.exe 2312 iexplore.exe 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2312 wrote to memory of 2508 2312 iexplore.exe 28 PID 2312 wrote to memory of 2508 2312 iexplore.exe 28 PID 2312 wrote to memory of 2508 2312 iexplore.exe 28 PID 2312 wrote to memory of 2508 2312 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\70a058b8c4ca0cdd6fe6051f27a1ae34_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2312 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541872e58c6d8c0dbe435d1a0e09984b2
SHA192d7c72bcc13eaf0b0189cba9b040a3d8744c08f
SHA2565e94ed382d42a4cd67bd2f86dc54c37b753f3488134f7b1379a9b5b116cc51c2
SHA512f770bd56169966072c4534f077f07fcaedaf142aa0da8037b4af7222d299c43c252da5bd7e9991f63a40ddc70b1ffa2b1c65f3af3c2d18a6bf388f0e1264a580
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597456a35fffacc1638885a0621e97185
SHA12850b81a5421184503d6d4d13d8b6a8e64ad2113
SHA256affcf0b83dd6630360830057fad3977809b7fff5a9c2fa3605ebc11fee98cdff
SHA5128408bb822c9ca3ba6051764ad040fedffacf7946c5754172ffdff6b61dc0a9808723f5ce9bcfc2f63bb35ba22d04c06848755475d53c51b20982747198de08f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55457ca44f7488510dc8db178b74b536b
SHA1a6e6297859aef40866c02ffc5eeadc1d2a8d9982
SHA256502ad4cb0c8a318c43da649d92c7e0a75067a0a717bd844dc022179d871d065f
SHA5122c253d16d9c22886b5ae66f8172b9434d86972660f13aaa8a90a717d6b4d5aad77fc19212fdee37f1c6fedc9a303f6d5ea8c2231c55304e42e199c80a249bd86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528a01cf2d9821c06b43e2f7c76437b16
SHA1277b28419d7ccdaef56d03cf7b479ce3185b9601
SHA25656f04b5aca1a9b9a99c93320da93d7d3eb7c24ebc98c565e630845bec5a62bde
SHA5129eee86c7e4ad50c3f242e3337933695b3cb9640ebff32150805def2d9e84a20f55cc3175d9bbe324a0d0852b038fe7ec8a554c37dd1cccc1b4852260295661d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541e70fc556d4b5e2a0ef0feac0018f42
SHA167d44183e1f9d5d77bd8e4e42f9a670591f822a7
SHA256da2d37327035914bad26b1e40b3340b76e4e87aedfca8e46a4c23124537787f6
SHA512e75807d3ec6be85403e4bc614ba7f8edbc22dd1fa1970552649577e68c011b05416348943ffc277359ad149946ad58257279f7500c4151921fcfb2f5a044230c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5b1e1615e2a1b01acd473bd03671a8d
SHA16c5693b8757e183ad0cc973d26669d2b9529bf77
SHA25665c28d59ac66f64c0cbcc6c8914d850397c891302456ad05d9dcd47c6ac60ed0
SHA51205f91291fa0b632e1249ae1a3e5c3c3f1c8c8c6e3c327e1396c443666b514c10d647434949f9833477f8f8eb3380cde9cdfb0f7e825992ee386229edd03a7b77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d761f9439762b5dd7612bfe1b5e80c2b
SHA1910cdeeaf8fc2ed1e56e457e4483e7a10795ea67
SHA256b16a4e057834d83fb88063a30b323690ffc1b4a3f7648b59094b18ffa00330f4
SHA5128d08c7fa8fd4ace40055f1636d9802e8891757fadfef669c834f0217380435a51787bb2bb09d1300431f3f248a522d063ee75322edce7ea03a2b51be415d4580
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d0e63dc6d173f47846f690695d98a57
SHA1a9219491b624c484d21b6613286c1223cd6ea30a
SHA25661bfe8bbb14a90b4206e64cfcaa35a7eb7714e8003d3339c0c96fd120011bd86
SHA512460c45316190d028dcc5f27a922e0696e030d9853937687eedc7a1dd3f51f04c95045183e915dadd7d4bcf1dc04403089960c0da1a50a485f9fa8b60f9e7cf78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c386feb2c140b4092390ac19d5dbb399
SHA158fc50d9e711c899f63e7158dce6faa1a515f861
SHA25639a5aaca41da9499ed679da3ad77a66e9f71d24d3a9225b47d8563086f61beec
SHA512755723f96865cd356466fae83e80db46f47f19f3e9a2b236d5f4e742666dfc3919d0fe5814ef6739858ade775f1b0bdeaf622eff298ca077a6205aa7cfa3e08c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524b6bdc4262454a7c5a6617210f43b3e
SHA1a0ae70cad37530bd4fa555bd5c7c2822c14be283
SHA256472c1e586111132c63c1c6c827ef9f4ef6dfd2f243d3b6a86da6e5f5eb90c99b
SHA5120ab90e19aa8e6181a5818df4961e040d84e7f500372d8c2eb74cd692ca24d9df5aa598656387ba5de2a1eca6084670bab4104e2bc5d161fc1433893aae4ea0d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f92686235e301b6c0013637a1bf6309d
SHA1b3cbe51becd5c0a6fe82643d137242d2ceed06e0
SHA256c197791029d26370178b73e9834ec646c57c1f4b73b85c36aaf9d3b252037a20
SHA5122ec7488c0a8c2f0f2012d8421c37b75f1fa830532348a74575d7e1890091d2f39eb8031c5d155ac49dfe8def844b71cca7527584def1e09bcddb1be956f9223e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7c1330ac4b21f026c50995b0fcc3201
SHA1055867eea78eb064feb9ed7475f2bb6d08c23463
SHA256a91930636e58a3f050ad3a62644fcf0c2e0abc02210164c438feaaafdfad9a54
SHA512174f6d34005ab9603dedb91e38cb90cbb7eed436da66673c248e2283e81a606684d87d68513e58f42025a530e9a8560273082dacde791c79f210b56400b42394
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3eb127ebf38cd6eb86456715b751c63
SHA17c14c151f4c33701e916b2c741e0bcb1ff38d5be
SHA2567acdec99302eb7a22d0c05a3a3136b998fe0d35a02a2a0f3ad6fb75b7e9c3c52
SHA5120a978f15cd5669634eb4f4ea0471db27ebc1a133e7f941b80d63c9b6b3d4fba9f294c495af11f7f4b271f9e9ad0befdcd138969a75cd11c732e2fb204f1adc2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f69a0e74a72e8c9d81dc2c5bfc46bc85
SHA196ece343c1de9ef762d9a3fc78fcdb6fbda37518
SHA25647a96c2419dffff6863293e7fabfdc93760492c7ec2d417dad064d8a14582cd8
SHA512bd56029ead873c478995f47b04316320dabc86768cfefd07939014074abdbfbdba24ac205a763f4508622573f285c11a2217cb4c9c21dfc8f26ec812cd68cbb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff094dc34c9a1b398f9fa5b84b8df2cb
SHA1dc2a97fd129d18561d7bf5f939a249a4c350c783
SHA2569004623155f1a40542bdbfb0459dc72ad7f5bae44b75c04b464a4c136572ce94
SHA512bc851bf1f7bd973e78ee6160152a630d6c180db73fdb1e0dcbf6290e90e59c429f5c2f6e62a9fc4d774ca191e04459b25885506fd0b941b026ba8d30d7f4a73a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c996a647bcb442ad8c0694417716c14b
SHA13dffd244d77f864cf4d398c024aaaebb9b263ba8
SHA25666efd02f2fdfe911cd3633b5435ab8a1d7ed5b56793feda75f9ac3407e026066
SHA5129f0c30c61524d7bdaaf0206eb30914a7fdcad8662ae784b603c90b19471b47d014271596014cc24d7c83a81d8250fc85ccf1ff327316a8fadc30a496895a82d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f111c81dbe0634dfc7ac3cd4d69e0786
SHA14946244f2e6d38baa218901f7af4d4038d9cb72b
SHA2566259b2cf5aee5d73e7466e9345dc8ec49c0ce03b4fa8846e88ac82168c1d5a9f
SHA512ce4a0a53b84d2deaadc01e0a63c73cee4d1ea92b20cfde85b7a5de9ed0ac758fa4d3bb7f2167350cdccda0a540b08e8f95f14805a7ef5829e4f6cf0cee7491ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e35da5980e8e852dcd9e554fbfc18d4b
SHA12492e15e0390fb699735147f314a60bb163f9b0e
SHA256dee0dee7927abbedf06d81a88ce228e74a22ee935355053b66b7748fffb9b950
SHA5122777e07192ec17f9b4744f47f5f6927f2b5657b02a4d2931c5ce2179aca685db062380dba73c42fcd73e6c49efca2342d75475e72d6ff0721ee5bcd1f900aa98
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a