Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 07:32
Static task
static1
Behavioral task
behavioral1
Sample
7143f4f0d7c9f3f4c661334988a66a28_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7143f4f0d7c9f3f4c661334988a66a28_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7143f4f0d7c9f3f4c661334988a66a28_JaffaCakes118.html
-
Size
4KB
-
MD5
7143f4f0d7c9f3f4c661334988a66a28
-
SHA1
c6a3af81dfb9cc3b098a16435a55a9a91ae7446c
-
SHA256
cdfda66cb086766c6099236409a6e910d4fdfdec39b218094656f110a363deb4
-
SHA512
11b926a3f718bd8304c2ebd29f37a9661707438b27acd71fad836ea3fd51dcafdd872d8edd6572eea331487d54f64a80149e72f0f4b509e5d2cf1eae572c4056
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oywgXTlf:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDX
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F221A191-1A68-11EF-BAE0-E64BF8A7A69F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f08cb6c675aeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422784218" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000da957ac09c944af6afb1ad6e8d16887e68d418ad687e9c6cad5811a3447af58b000000000e80000000020000200000008a5399df6e1a31fd96c9c55648257b7dcf6006c529694756e1182f3570da49462000000066dda282222385127629c09965225f449f849a8e642ef55933ff2b13e1dece834000000083263b9d92ff645e5f3bf8d7950c192444b4cd9e2c30e78921f217447740e907ed26d99583b1e8b959bd4b8c1b7b97a1e6b288f434c35bc571d71a5678ae95b0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1612 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1612 iexplore.exe 1612 iexplore.exe 2996 IEXPLORE.EXE 2996 IEXPLORE.EXE 2996 IEXPLORE.EXE 2996 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1612 wrote to memory of 2996 1612 iexplore.exe 28 PID 1612 wrote to memory of 2996 1612 iexplore.exe 28 PID 1612 wrote to memory of 2996 1612 iexplore.exe 28 PID 1612 wrote to memory of 2996 1612 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7143f4f0d7c9f3f4c661334988a66a28_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1612 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528943ae8d2cc515e98ee721c96ae7939
SHA10e7ee05989cba674a0056ccf7d0fe1c1a0ebb979
SHA25686ef1f42af709f3e588b51b5e3caee92afbcb7e2cfd4b80a560ac22e50249060
SHA51239e6cd5ee09e607d116bc5b85bf353c997aa4c10ea2bba76d804fbbaadb90a512409489d039f283fa069bf10d56c3f40acd01b274809b22565c03ce561b924f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56dad7fb35e87623da65a642d2e057639
SHA13ef490e6bc1da3a2d5969742076e99dbd48b9e7e
SHA256631be89847fe0f42141b4d30070ac2fe46a5ffa44801424b565d3e02028940e9
SHA512b20c241d0def6059ccf01329bf9bbd354682b925cfeea57b5bcd486ea91fa4c8adef4c2748ed053ad7cb68a1591dd1986bdde254d491885863f090b9967791f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575dd8a2062858eda4c207669a02de526
SHA155bb978bef804c8c78c139e37b472135c92dc159
SHA25634cf9c1a872a56abdd7940426e0cfefd6fd6e42ff54207436b8fc025060a165e
SHA512561c2cb8f5dd9e07a22f9f54882dff8c9de3a08da3568fb3785ab4fda35b901ef6840479283f7fd588396caf6e63692a0e86890c56313bddcb53283e7d87b138
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505e6e66aa74647edec1550fd2e234cd7
SHA19b756ced41f8b77ef9850413c7484bfaf2e8598b
SHA256d4aeed4fdad97d82a1243c8af2e6450eb2956e73e08ed228c8e98a9326c49578
SHA512cd1903779510d3785030635de05540523b1bd93ece155e46f133da6280870cc9b3c5901dff4ec36f09ee41594f61b3ef923313f82b76446e5a01e207a5df1e65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50366658e0f37f5728112782d848acff6
SHA1efb837c9012f8152de0fe26d0ef7f504dd8efbf7
SHA256deec46d0309663b42d05ce124200568486020a26917e01239fe4c607b91a7d92
SHA512ffeeba2b2a3cb1696388abb486db85d0b34046415da149a0182f965ec9dbfc74a6923ddda7e56f8ac18135bdcb2a7417454e65db1fba691b6088858fbb28a291
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cee542e8580f1003f0d4a82637850659
SHA196debcdac960045306a20a2eda41eac598c57839
SHA2568e663c3e26e7c21f05ef23a9a33c7ead2e2a9baf975603ff3af2b2bea7a93389
SHA512149db201db518f58c545a43efaac243acb68ddb1c6bfc1793734e6fef78bbbebfed2185d97171f9475ed47239e6af20ac69045f4d25fc1aa41ef0941c0f4bd74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5300a09646318d78aeed4a0f5d3e5cae1
SHA1b1b923f974cd574c332119fce5b45421bc4e5496
SHA25606fd612259a17aefaccd24b05025852c0996c765859726e48765629162ce8335
SHA512333e122e1108820a3926f32e4cf0db7eb72c4e5158a86ed51800c39823b70a6cd1383c220fbe844b53f3e9d07be0df886c8482ac7be200c1cd1ec342cc2c24d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ff59f766fa5b2c89b9d3fc015276794
SHA1fc2a926c933e3ca4a1089873877fab3bdbbcee12
SHA256a933e3b3924a50db49f3feb303d4cdf36c107bcf8d9a1af97583a3f0cabeb410
SHA512db7e1f196df970fb2948d79b825075cb1af70fe034d59cb79f85bf2c2833195ddf14ef1bcc343494bc5d210083726e781622d295455ee59e5bbf44473b872772
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52090ec44573270389a387eb636a1fdbb
SHA1bb5218765e08ac1c41463c3a41583dcb93175854
SHA2568e18d3c5640c3e7f26c0a2f550744a4b456b99cb3fb5ef3138dc754200cc3246
SHA512c0a8303da4548f5318d7e8d4f2d821e0919dc09d77068dee965db91a9e58e58ec0387f89ff3fd8b59e1ebfd881dde7f07fbc5439bca9e8122b344cf352ff8bc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bfe026c8a9ff1a6e3ececa64505414a4
SHA1c421bb34352633219e1c3dca40e28b857388d505
SHA25659840a3130d5fa6a0a5ddf203605345474101a72d7a3bd84c979b08d4cd047ae
SHA5124e492420ec8ecdf4359a853eb0f2ce08609830f28681918ab3d63b92d44f089d55111ab2b910bb95575018c6bf50b11894a25198e71003bd613a3fcaf3f7be89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5976630d86b5441238cea1ade035f7c34
SHA1cbffa977aa9fc61af499f64900fa804988807fa8
SHA2567716146cabdd5e116379e2e328eb0e1b9eec1ae4142f05f2840674a385e99be8
SHA512d413a0dda0823618942d9fdcc52198ef1a1d766c038c90b4d8b8971a5ee8b1060486c37222aca4494603b631da0816cc7132c4e9dbd181781c2a4d4401c9c29a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a5e04a66bee50d0e2bced778309a3a3
SHA188ef02ff1a6ce3c40cd4fc4919e65e166b1f8bd7
SHA256215b78c1a90589385691cd44ec53931d40601fa4233e07c384d859642ab81c26
SHA512b2ab4cc4ef123210472b99689a7746229afb392cbb20ae7819febdadcdcd6f3a138fd0e0c01c0ffd4903e82ca8538700d72990bb57e7bf26fc468dfacddd4458
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53867ca127933317172302a907794ead4
SHA171ca3256e06d4282c67f5d41c42b41af52d40c98
SHA256be13420d8d2b5520373eeb33007a83784a4c232846a2bdb80977c57be23b10fa
SHA5121104b7634e4797830e907a51de636f655355c7abc4b6dacca4995f0340d9b9eac72464ce8b9819b463b5f315a4bd3f5ddc7604f5b1d1a8f72c1764fc011a1aff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57249f597a13f9f15e2cf9c88f81f0d63
SHA1bcfbbdeea30e9060aa05a59d7334384429c74481
SHA256727f64412c7515b22e545bd8d1356fb20638a9f80b740c4f58bc510336a7aa93
SHA512e6e6bbbd314d61354282175ccec9dd4f47474d126a3527483fe205216ec57134fcff3fda8df1e844b7b6054feb0f4e35ed8045030234219e535384a1dea23637
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55372a5c7be0e779aef9fcd86a02ef8b3
SHA175e430610d776a7aaca6ed8cf749a122ea0312df
SHA2567bfcaa63b4aa3e27c85deb9ddb1aad552e1065ec06064288c149367b8860f903
SHA512e85b0da00eb193e8652949d3b6f63e94bec8cf838ebbfed308c4647bc0ba233cff2d5314fccd3cd13603da46da3c11cd0cc248e6a89082f6e7e48da17544abbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55312435e2dafc0a266d9dc500d90bc7e
SHA101881de6b9eeee6454dceab43271418fa4134374
SHA25641ab21436c29640f4efa9cb4f36f5cd7c3342a744f22f1d0c29b6aa68963d262
SHA5128d7a0ad51ba1e5c0794448ecb8de187360bb6a7884033beac70b48a979f87fe5d9c480940fad1fd84c02d9cb1cc1b12663d2a6d700594410013bcc31d2083846
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53615f8d27d78eda6ad5a4e7dab1dc45e
SHA1fd0b09f550f5b876d36478d6f4482b80db566756
SHA25618e7fff542f7d2348952416be558453b77a930fdad46709048abb5ab50b16a84
SHA512eeccb008d4966b1789ec1d53ed2544873d11abd5394c01beeb03e731c694d4787889b44def874eda074a1eb587a36c2316992d63ac64bcfd168952258a577b92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5340003a0085ac7d6bbcf7a9c50ad7cf2
SHA19594499177071e765fb21863a7a9a34f6cbc58d6
SHA2564b142a0bd8a33cab66eb3318e96c5c1aaf0e78d58363128f18a58e3c7f7a25a5
SHA512f2cc9b08075492fc81b446fe4edf52eb475d1e925a5c84d447bd397c2dd8172585547a3eb80c0887fbe0277fa799cf246bf20ecb84bda9cf61dd6dedad1d0685
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eeb81efb2b4c8d35b52951f91ac926e9
SHA1f3d168e1b767d31d9bc14c35ef28db80d94e763c
SHA256956eee6116906a4af67960f37eb12929f0c339a25642bc6df9d7af10470300be
SHA51205b79d89a910c700d7bb02fd166a3ab0e25c5b8f78f669f166f7d3a7a4d8b794b37ce6568542d3b3fe6d6ff3449e749fa6eabc2c5ca02374b2abb0b2b2c2a737
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a