Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 17:04
Static task
static1
Behavioral task
behavioral1
Sample
72a665db2761f460f32b334ddfc4e833_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
72a665db2761f460f32b334ddfc4e833_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
72a665db2761f460f32b334ddfc4e833_JaffaCakes118.html
-
Size
26KB
-
MD5
72a665db2761f460f32b334ddfc4e833
-
SHA1
fa1415c436d573cad7a823daaba370fad9125cfd
-
SHA256
c45999d7246b2cb408c6c3ba6c211dd824c2eae064c0adbfa38c0ef591954461
-
SHA512
1cbf6984e0150d7914b45ed3c0c268362de86ed196d4250521a78fdcad0173af6d9c2abe263a0d95553067b671c483705f3146b660a5e471865c8b09911d2a0e
-
SSDEEP
768:H7DXhs9F0v9oY5EYq3oCL6CXqJlWFNHvDCyIiTWG:H7DXhs9F0v9oY5Hq4YXXq7WFNHvDCy8G
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0bdfba5c5aeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CF2202C1-1AB8-11EF-805B-F637117826CF} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422818520" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000cc1fc28eee210ae37d33896cef038d6cdfe5c09ded053e366fa1ed26a3fadeec000000000e8000000002000020000000f38571eaa1a52696c817d3e48af8e571335183d5fc90ea1c22dbc1778b138cbc20000000cdd2b8d3f258a463356607dcfe76c351d217798b73333c1cac0c2e9ba97ed1934000000071323cd4fa9605c89741c38fca8b0087ae60d67916307ed8996933b2f2f98b0f737ec0b7140c7203dd19e3c5324594c547b7919e19185b8baf0a0a0b1afc2428 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2420 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2420 iexplore.exe 2420 iexplore.exe 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2356 2420 iexplore.exe 28 PID 2420 wrote to memory of 2356 2420 iexplore.exe 28 PID 2420 wrote to memory of 2356 2420 iexplore.exe 28 PID 2420 wrote to memory of 2356 2420 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\72a665db2761f460f32b334ddfc4e833_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2356
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ab44118c67c6be963e7322c03164c0e
SHA114fd0389a9df12feb5f3e1ae14f4bdf660a5c42f
SHA25608d6629a10a4a78c21ccc628e39a57be459dc8bace60aff3779a37d4c06edc25
SHA512c4e6dde6d9c0dabe726f50870fc5a4da75ff98b6856e875deecb4bcb567048034c005a8a9e86020fd43be81a2ebeb6d2b4a80d980e61c78b478e0b98c6a553ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc59eff09da35d3da86c18cb5ef57474
SHA12f206be592b91a5843404167aaee1cf5a6c6eda3
SHA256439476e8a530b352450da58d725c4a695151ace6cfaff5d8aaad6e8ae3ae66a5
SHA5125a0767b8ad64d9b29ede84ee19b726d756f4fd427f6e5000773213e589c21a3e9015f245ed454a1b56b487590a6e6692cc05e54b86e91e6da46cc526deb6ca46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf0a3bd97df24a2c8dc4c88f26714fd9
SHA1d8b237e6d8e08304d4c678ca5d0467366c482c63
SHA25617922e01b97ba949342d76dfcc826a56b2c3eadf773d0b7a2c8991a816416251
SHA51243415d1be3d954e4af86577886fd9a9888b3cca56c061bbaa2ece3de93da9ea24db94e3aa585ce16c8d848cefc5856c79bf643d905e7b4531f3e042a7e067b2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5349366346b4bc0d2a3899836cefee6df
SHA14103e24c80c46c4e6bfb4b16a5499f7c19acad6d
SHA2563bc3eb9dd093cc1518b3002dbe6bc64b1b5655def1c10be4aa282c6a6e0f8d0b
SHA51263f5514606de662711c20605240e27c20f863fa8ee40ce9240cdfb94b336f0e0bdaf7c9a530c5326c39626d5829379faeba2c4ddc1c988834d45d80343c07abe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a31f100b2843de2b89fff8f27d0b3b2f
SHA104e9c5513f96799805fe263a8619ebc7323d86f2
SHA256a53f73777c048a5e136c341b823f47e627589a1469eaf06b2fa5c0c5ca4b0478
SHA51272b0833e68d34ad444c9c07d6949af045a16a5bd29d7549aec896aadfa91b4706e9d4c00e64da271bf48be4a7399c279f143ef0570c5df194357382852e056cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9989faa79e80a61e28a8d097f5c071f
SHA12273ed252ef1a859a43f39e3d13612abfe34f88c
SHA25656fe3ffec007593adf6ac9ffa937cc52f8048546163b367fc1efbcd6c34f69d6
SHA512a108067429b0b17004f3bd2130d14dd404ebfe6f717d2633ac4d18e85ca144a906fd9e0d7e1eec9024ee6924486cdc0cc630ceb87a694cbdf5d52539809bf744
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e3960f2eae5e04efbbf3474ecc9a496
SHA13978328848f70680236d4ebc8bfee521ce0d4a3d
SHA2569bfc16a7cae18c9fb3499695a53878688c20f3ff76cddb1b631826d2d81b18f7
SHA512b03ee84be5fb332470a848d7a1c4175dfcc5cc0ab85de066f7d97af32108ad75288c4241267f619ff8b2038db7c25d2e41803289b6c3578282ddff274a9fc620
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50bd507eaaeeab39b105039cb4e823427
SHA12a250bd92772c22527b377089192d091ef8335c2
SHA256448f58c772cd9e564518aaf215c97934003789c1ff4c64c976ea3d92ba45d9ba
SHA512697576b322ef9161d226f1bf630b545f60798168aac09ecb32e7ffecbf0caaba70824c3be4a89910519fcb86018cd0e040848414c0881aa88b8147d04e46b080
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4579e22cb1db55d4801aed92a1f94b6
SHA10ffb2a1c3b583dfb3da6ef9078f5962ed50ec15d
SHA2569c91c591023ccfa5fb4615d57332a4522645f6e98dd5500e8b3f6826c29c02d1
SHA512e43a28453a503af6b10c6ed30122642176d786c0b70a22e01742cc21a6270c682a985625c08970757b67a6bd706d4d611e19b693484edd851672b83ad2ff699a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd9796c6a8f01daf0eb0fb1797941cb7
SHA1a52dc064ab7015e8baa128686baac5101cdcf218
SHA256748567c9d9421a9d748a5f63c74f1af981d97c11b8a86b71b26b720b26c81c79
SHA512a2d81f8836b48aa3c0f86bfc5258d181bdd31a1904bcf307a66065e8d4a60776765737259314a52e7786b944acd5c28300ffbcdcf5ffd81de4e1686d3c5f31c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb3f9a042df3b284a1be48847b7d621b
SHA1f5b705c830d740c3fcbd578294a0bc377ca1ef6c
SHA2568bc724495dada9af069f835373a6fe026687eacaf332b1f41791a43ae59dacf4
SHA51241bbb461876d085c1aceb1c398f1ae6c6f9cf81bf697be2d49b8c31dc1d922970d812f2789faae460299343028257b025193bc0096ffe7bccad2f0d2a9c7f94e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af162c1b291c725792a786530492d939
SHA1c00d3c45441ed6fe854cd197e081f2482fd1814a
SHA25660609343a2ac74f48af1581356af08e0aa838475300c0d9911c233bfead04f61
SHA5125592bac4fa01f0f2a279c38d9580a4431c940dadff86b108b02daf177fce5cf77f1602e509ddd191cbf383df3441555dd943c246bef5120dcb07e713d4411827
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6831726a243685b4dbb0c5d3510d6f7
SHA132ded54f255b54b366c4704b8245f18932ad66eb
SHA256d89e01bade0f41e79855e0c798c6190d3e16b9a025bfc01046882e87bd3e1bd9
SHA512fda11ecdb6cc7fdc578072ef75defa82c83062cc81b0ad681b2b8bfef2f09d926b5867ec3c778480c9e0c8cdfae7a77ca9c87a6ce25f7eb812015452f113dad2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54169e9b1d1c208f27b6b8618265ecdde
SHA1e00a4c14fadc518b4231fb3225e18c565a226505
SHA25611e2ceb6d25515c3b601569497d5bed73a220d105e693b9d6c089c6efe458a71
SHA512672c3b9bf9561d6cd7c0d340f2ade8bd6df7d470481885a4b5520a3faae0e78c7f59221548e1b3dd399bbeff0fc76c88044a24faff7cc1f5f215ce6e2dbf9420
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a58df3e60c2e40c62cc081649791477
SHA10cdaf9ed1d29afd70def678c1097f191151a510b
SHA256ec5d43282de26660277595257c672c63175f8806cb94a2e5703ddb5c168347ca
SHA51247ee833fabacb4f43ce9ce49a9952362e8cb26bb797a37cf743cdc6d9db4a918d47aa39d7e78ec0348d2cd941685fafbdfe6e5aec7587a154942627752e2e369
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5658f6283ab31c3137015a0e40023a5fb
SHA1997da41bf82e2790d0d9d82981f1931eb465dd45
SHA2563a587b374f116e166dcca7ea0266bff1800f06f3d571704bbd4b881a076e73b5
SHA512ff04270f90babb58906aa77c62c9aeb28978f5c7e6b4592cfa528e0fe799a8d0086b48d0aec6ace6260dc1b5039063aedb06238b9763f62c9da41f2c7769c7dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51494b975409ee9043eaef93306e9d1f9
SHA1694adce2f3993194ae3b4ec66f7c3018174378c9
SHA2569632a9d4b2ff0f9072b58a6acbc9cd02b931a1e1d4dad125bb9ea9a8dc13dd48
SHA51256fea0ea29d42288cac3475e7f0b5df9bdd9fab38677d7322dcfb53eca1fe2d7d98ca8c343c5b4c31d092951f2a6235a985378f72888ab50430c1766bb4fc100
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511f0ec2143709228ba0b17a385d8fb9b
SHA1110cccc629cc27c68fdd9a438abe68e14fd67263
SHA2564a110ce2bf263d1422a86272ef026734156041b2593e9828fecc167efd3aa0f5
SHA512eab191b75a3afa9e9d71e9d78e87c2a7fe2f4f49d4816c00ed44a7c338ed8f29020cae5b3646acdb24e473c9d39c2f3c4cf7f7e85db8a35679075ab8f6b65c60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4b4c3be21ee11c89fd0ad59af140079
SHA133dceccde119ac5f731665e20bef06c0b0417b4b
SHA256bf20c1b2995b03892f8fa25bbc6e204a2fe7b101c5bcd486dafcbe75bb685445
SHA512fd8ca92aff626ea86ee2e45de333d8acc5c7dc86387fc0f4ea853c53bcdfd0eb0bbad49d4f46c0d07c37b4fa779ab79c7277997de8b34c44e297ae32ef2de95c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bef5a9da4cf725424a33ff08daf5a514
SHA1553ca79885f06360077786c6e0f20fdc2ecd43e2
SHA2564f321060f1938c9fba7da371d1ffb908ccfffe6a06d2f205899dca78acb0c2dc
SHA512bc90fbac0ad9de320807308905687b5654581ea70b853c28ba9109bc80967315d268c0a997ea66cfa18c7d590b849b77e140c8e09823544cfac2559b7f2637ac
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a