Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 12:11
Static task
static1
Behavioral task
behavioral1
Sample
71e8e252366ff94d15f13304506cbe38_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
71e8e252366ff94d15f13304506cbe38_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
71e8e252366ff94d15f13304506cbe38_JaffaCakes118.html
-
Size
460KB
-
MD5
71e8e252366ff94d15f13304506cbe38
-
SHA1
6617635dae1ebe9bf2981735b25705866e3713f9
-
SHA256
251556f45b3cfc4d212f7f07a782f5148d00daf50ec89a925370ef8cb448a8a1
-
SHA512
55b8b20d40239cd7c93bc0d0fe02116b307a409f511272496fc74094b2ee9a233f766739b2a7cc9cb346f10a76918cfd1d665e01bb05b1d7110f157db13ddfb8
-
SSDEEP
6144:SFsMYod+X3oI+YDQ2sMYod+X3oI+YAsMYod+X3oI+YLsMYod+X3oI+YQ:I5d+X3R5d+X385d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005b185e5bf409b940b7732c8b3532bc8f000000000200000000001066000000010000200000000fbf4505242792ea68592008a8e0c29e1ccedc4eec4a9c388d187564fdf9d2e8000000000e80000000020000200000007d2b167f2aedac6497e47dd463ffd2811f147f8206e4203f0719746addb79f1520000000b4480dcbf290031e7c691552e4bd10381359eadafd4ff45b60c440a72955281c400000007fbaae952b0a2d00a498312f0327183d22a109f9ae70c74f68d148a447f7b7c453f8d627c6b40a0172d25d8406570b0dc7c778a0dc88f650249d7c4fb9d870ce iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ED304D91-1A8F-11EF-9371-CAFA5A0A62FD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0071bfc59caeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422800961" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2100 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2100 iexplore.exe 2100 iexplore.exe 2512 IEXPLORE.EXE 2512 IEXPLORE.EXE 2512 IEXPLORE.EXE 2512 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2512 2100 iexplore.exe 28 PID 2100 wrote to memory of 2512 2100 iexplore.exe 28 PID 2100 wrote to memory of 2512 2100 iexplore.exe 28 PID 2100 wrote to memory of 2512 2100 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\71e8e252366ff94d15f13304506cbe38_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2100 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545ebeeecbb39f556ee6695d759ad47ce
SHA17e4e9f35a3cff2058a884646cce620c52b74b0d7
SHA2567c91563a00c31b23fb077bc3f3a208b36fec851eacfc729f4447190353dceb63
SHA512322c952b48bd43b2094422bb3fa758f44f8c460191a1dd8a9d06a63c69befd6a31f3a8a772e834ba44ef31c4b29a6ad4341533f72ad9cdf71c3fb5fd29950c74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536f68dcc35a808aa92b76bc7e67f1a34
SHA1b610c2c1f86df1dc9736978934c73619c53e7a30
SHA2563482310c2799b0462de7fb21d2faba36c63c4cbc658ece909f83e43cd82c3f55
SHA5129ddc0e06a20b84c3687b8b9cbdd6810aefb5ca25b42107a9c8d112d56357616729863e724283a74609823740d21ed53c4ade10f05c104c2f10db93b831499235
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1618f5b96fda8d1515cf6284fad686b
SHA18c92979ce0741651654b78ae979207003333211e
SHA256bb850216139ee95f3410fdcc8c31b2e80619bac2882c095645819bf44105c143
SHA51205826d21325fe5cb7568a5e5a8d37adfc184d186aa28df866d5c5430efeeab8cae8eae1757f3ad3e48df96adc39035db64f8a8fc4020828b6795ef84468d16e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9342316bd0b8853324c6341ec076964
SHA1fc4758646e4ae386569f38b0fae281b61c6294ee
SHA25647788bfa2df5b6d13f64161e1cf0bac484f785041382d98729e3129b893e829a
SHA512e3fe1125960ce60c7435c90f8990218bc79376174d36207ec481ae914264e36c55645002bb00601506476604242bd0feffb4c5a43d43c922933a1feefa0cff80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58062ad9eaf8a6ba1a1cef80ea1787dc2
SHA185c6e1a23e42cfde31095bc35ab25f403882bf9c
SHA256e29aa2902805a0087050ff88c19e161e77df20651c1a06241dffbfb4b15c3ef2
SHA512c2659ac763ece4021cd7b7ca9d04eb7d07d3e5b195135e4a2dfd3cd6ea987258c0eaf04c6ee68db66c6c9f488d42e3e0eb97cdae3621e429e5f6df449592ff5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533d6887aeb29c625f944673d6720e116
SHA1849ee827be634db3bde735b0dcbf8b3e9bc58345
SHA25680c01633fbfb9761fba835c3716a633fb617213860b560ebdd5f7a8bf1e6879e
SHA5124966eed9cfeeeaa2f4a4dbe1d6d6ca9107510d50b35c7169efe427f398d4404a68c4b7a5fe5749e09cd2bc3ddf1aceff92f91e15473a033b83f0e3ef76ce70d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5268b22db726285546e3a9a171559a1
SHA1bcc0283ebe95917640e06f9044391e2066ec9ad8
SHA25676d36999f988d8e0a4639d8dc23f2626fc598137387391180823b184ad8c921f
SHA512ab49505cdc0122e52cfe3af1f5968290e0703b3947b0f7aa22b31e535a9ee213c6644aebc225b6ddd4c7966da7c3e3dbcbbf159b24b630ab9e6f8939e18e14e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1ea29c7d765a5ed1e46e6ff75fd8bf2
SHA1e593ded6150574d94a3bf13c484b1fe64d38f76d
SHA256277defb2cb0d2b12858af147c9be29ad46bd98ee2e50744468e490d62381502d
SHA51229e033058d85e2e7ab16b62898ff10e2ab7eff426a9dfa269b4012abad78ad75841c8c2f43cb24ac6e896c4c5859a4ed724d4e2cc8a397861150aac11be9d58d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ced07475a656a0d1390e38ff84ffb10
SHA1a834472cee7ce0fe0fa83857ca5c8e9383c9ed4d
SHA2565aa7f92307aaaf29d9d01748c8b1b6a1c15c664eaac9f23453e171a603c4cdc1
SHA5123858607dd740979191856c5ec9ac58b8d2fcef1772cb9aa395303497e0d05236c8e418290f0bc1d5e36e70b5eb53005ecf4e632d4de59ac74f9bea10d0d2d5bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5470e728942edc3305d80c7ed75da6199
SHA1cfb7d5f742f313c1fa5c3a0a3e9f80d04c0c58be
SHA256e0855c584ef9de510d9a908ed84fd39f2275f292fe079a6bec61969961b1c59d
SHA51281771565eab81586e06ff31467ffc47c548e4f742d0cc63c3520a91604e510381b2441f33cb78f090eb18f1dec54d40d3e6d856cadaf9a3092b3d9f1f15910c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5062af6256b15ff6efda62669d13d5413
SHA1ba58d4f25d6f1e2d464249b3c43bb70ad0f0557f
SHA256125e612d7412aa3f9a906365a9b1f341aab8c256ea924f8e66f616c7471526b1
SHA5120b20b63c4771972cf0024788f6cb014b2c884a837717850ab267ea585e51c73a218cd8421d5f76ebace6989f8f76cfd711d272f66c784e118468e9d1d1ad63ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f771b110bbb50927b33af9452a28e6f
SHA11adac94aba091e190142e4bd283039f8e19474cf
SHA256156d25aa6ff520106e33b755b0d4e64247f172c459155509f51eaba27234b5bb
SHA512d64b5429dcf491fe3a26e2149b35608fe8897ad49c8508bc82b26d2a366f135986bdc899aa7c7eceb03f5e664e728f45b1e2b1b18ff431a85e5f4a7e6f931fb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f92b2dcef8d4a065c896da29188f56d2
SHA1bba4433b0287b359d70654fc6c6839712556bc10
SHA2565ffe68a329d1c0a0ccb32edf29fa62db8b34ef7614d053c2a780a2d97b77e89e
SHA512dbf2fc13a9bae0264f67ee631db1f561291a58c572c31a2a11c2fb980d41146189c153e01e3d82d6ec2e182614cde319d674f109bbdcdd1a097bdc58ed66ffe3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d3de8b9c19a02a7fa068921de76147b
SHA1e74198d6dac74a348595b8701bb46afe3d930c9b
SHA256b104e07df4fa243b309990cadcfc969a91b8ca06e80a1fc294f8f8442afbdbcc
SHA512ae8f59ed5c22bca5835d0b6daca8304426e721ab5045b826e6a5e022588e7239956b8fbcce194aa02b1b0e0fbce9df076f72406204a76dbd2b5472cc57dad885
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4f48128e3e96a50a579d036570066ce
SHA1d4c631dc70171de8ae9bf03aa3c95084ac824987
SHA256b3ee2be6ed0b89780fce5afa7c948cbad66d40950668ccfb3a0d1ca02f6d0862
SHA512fb5ee5dec5c0cd7b58df22df162ae348c74c8316153c98997c1f449bfdc20d9861c36f36160c32e2f6092b7ed0a403f12f636afcb8ec14055caf637894470b52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56acd7d16a3c667194a86e8fdfe948a89
SHA1155206aef790b7d023aaf4b3b118ecc8b843ccd0
SHA2564f95e783bdda64d001dc9eeb7b0024bc9d15214ce49ba968a447168a64b4d65d
SHA51228e32b01d6d9ebfa16bd60574e25d36a4a46492c2e8ffcfd9d9c3ef45d9781d93d171cd5171254315ed98c49a932a78d32c56c46e09c8418387b7a006b4c5cc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5f0c1464876dc5273677a17659277a5
SHA112174cbb50caab7d984d11085bb95f167be09079
SHA256ec410a6b306ccda8d203fd2756413402c6dd93b295a0d5dbe9c3434839d0eed9
SHA512ca0acbda43aa851b2e266083ca6788f6633436bdc0b28155d43aba9d776f3747ffb66f9670fea6b5c5673bfa46d6e7e0df9347738ffbe88deed41c6bdcde37e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56cbf776048452564da0d8fca77490f0e
SHA187a950dd19427ed67bae3e2833ee2e30c9c8c654
SHA256b1484f070ef2c51324068dd6c6720a8842b7363a34e64beb39cf23183bcec9f3
SHA512ba8f7e8dadbeca34acbb354215a672d84bda8eaeb7e541fdf7defb163b855ccfa6768bf60c1defc82a54a2a105d3446c541fb98be83894cd95625ac4ddd5ebd6
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a