Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 20:10
Static task
static1
Behavioral task
behavioral1
Sample
731b9aceb98bc782f8356e0833c8bc5e_JaffaCakes118.html
Resource
win7-20240508-en
General
-
Target
731b9aceb98bc782f8356e0833c8bc5e_JaffaCakes118.html
-
Size
50KB
-
MD5
731b9aceb98bc782f8356e0833c8bc5e
-
SHA1
ce9f74154e9483bddfb935966332877aeea5dd18
-
SHA256
a8e9cd084afdfdb370b28f34f84c23767f2e14222dc5147d49341f3500759c15
-
SHA512
9c8d199a3c7568f5c9e473de66188d7d5d3e6346791ea6c7461726a81ea0f46d3c1cf4f3dfd90b83a43cfe132dc3fee413c59c52930ac2fa86fef9933e6d9562
-
SSDEEP
1536:bLJNyYrlbSqyMx3w1z8E+9T4vvEj6F6tX45/n4nBb:ffvH45/41
Malware Config
Signatures
-
Mark of the Web detected: This indicates that the page was originally saved or cloned. 1 IoCs
Processes:
flow ioc 42 http://hawahome.com/ -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422829728" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000000ce9a9e2eb5e0e1d1dc99c247660295948c619737ce48541a03e970ac01acabb000000000e80000000020000200000002243e7441fd2b74adb73878ec11059767576bf9cbb30b5cb07a6ad6f965cf5c9200000003df3962b7efa72031e0c6b989e7ecc6a401a3e8527f26b0a5a99d4b1d5e5db77400000004d8374b25ed5dfa32e338a6acb01d3a8befc07c7620147a2fddaa1b7d611da0b3c2832c969eb93f08cbd2a8afd40e25a155d9b21bb7b0bd3b2a90dc6af80aade iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E83D98E1-1AD2-11EF-B8F6-D6B84878A518} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f041e3c0dfaeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 3016 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 3016 iexplore.exe 3016 iexplore.exe 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 3016 wrote to memory of 2932 3016 iexplore.exe IEXPLORE.EXE PID 3016 wrote to memory of 2932 3016 iexplore.exe IEXPLORE.EXE PID 3016 wrote to memory of 2932 3016 iexplore.exe IEXPLORE.EXE PID 3016 wrote to memory of 2932 3016 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\731b9aceb98bc782f8356e0833c8bc5e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3016 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAFilesize
410B
MD592555ad7a64e87b93230469c3ed85343
SHA155c966a900776be0fe798b1e50444f3e77d9923f
SHA25630573d37794dcd2a52a7c91615a69bb48e14c11a776f4bfad9c5e1ab1834a199
SHA51284cc99a3f80939651e47a88f49a27222cd70f3153466b7860dd50453cb65dcf0763d463a50cb22a23b15e05ceecba9b08576e1aab141048dea4d5d207cb90063
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5a2d354cf330bff51386dc353cc586968
SHA165bdc395404132051adb7f78db19988b8abf7082
SHA2564a9fb648b32bbf3b768d49a47cdf81076c8596f879924427fbc3c3439fdbd2b1
SHA51265f54c71d94ad3999158804b790a4f56b30d0243150045131f30abd1c6fa5c8e3668957292851fd7f993a3faf90348122b8d4e4ff17e75a62a9b2f78bad33c7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD57b02761b9b1d27c4187a3b60491bf621
SHA19e6ecf1703061a0e84c73114d2afaac3c870414d
SHA2565ad84d6c3db371c3a78e46c7c6f423bec97563522549152aed03db3f04ba16cb
SHA512aea361cee246625b2988d4458bf8f96d82794b4ed8cfa8edd28c1e7be32b0f29ee17c97d9957be9d81e7d52608b8d23579ee46cb386e5e225f1ad14fa08bf428
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD507ad1742151591c8a1deab5ab47f11cd
SHA176a211c97017e0b6868c3b5b24da56a9fa7d39cd
SHA256526db8497cfbec3482fffd28e422e46aff265687b31780650150d0a211ca47a7
SHA512fc69686e3932d6b08d39444f1c1e4e30b95e95267c7185dbd0be0f7f76c4e44ecd3e415b82f9e5d5b4e79d2bcb4956b5cf3c807e0a8b97d330c3ecc74c5d39a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD59a1acb4755e085bb222eab65a7b89251
SHA14799123d7137215934bfd5c6cb98ce7253f1173a
SHA256700b4bacaa9eedd7c5e1a481dd0c4c0660cf68350df99ae0f30b700cc9c0bcde
SHA5120a9ed250ec8c14092b2fc2904a67e75b4afb5d1ff41f7a00ba2488bf7fabf0e97b0554adba758ca4d5a84992d7cfbc1125a0d5bcc30b9130ee3bb16eeee5ca94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5aba96c0b9a5183a92348fb8daa1d8c82
SHA1153d66e91f9b2cf3a0e2be3a39d763cd58d0428c
SHA2560d3355e66ce13945298a269c4eeec3e95cc3d80915fe7c4e4c664293b441b7c2
SHA51240aa0684bd6a1eab9a55a15093cb38a90fd0049712cbbdb7537ad69ff3f7c2a16847c23a5d4786d3da30a418a7aa116d4283d1353f14cda7d6e574d4f4ce8ad3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5eec98ad3cd31832b5aea176bf6f9b475
SHA157b437c3dc78bcd8a3df9f756c4e50a944762392
SHA25657f2f65efa2c764c4b750189a7e5cf3a8b1fa6691c0f277f2f7566e670f24e33
SHA512c5ff33c9f2873ac3154cb31e6ea7bc68010d4e433cfb4fbbc6de1037c3e5f36c74e89d0bdb7e9b11e6065bb28f9fdeefc42509a84f5d246b0525fd3049eeaa89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD53b6658c0c0e48bd84ff80eff64eb7534
SHA1490108ba144b7091a708d6c76ed910eebcd40676
SHA256ed21e09a5ac863d554cb12e0a2cb6cbf28a6ed78c1386023e2fe4301766caa11
SHA512912dca476715b28ecd64dec24703f16847aa13537493821ef0e30a681046b63695afd63a87a4996d692d077c2b8dd44b9f0014306fc3ec6a1b645d6caeae491b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d80540a56f41fbcb0490e35f22a17c19
SHA1dd078aae3a214e9820b3a8d599be73df6fe1c4db
SHA256683c92d7abf85ccc0cb739bbbdb8a8574d4ded390114012949471dce6bd73496
SHA5122de4164b19b14fdf53358f3f021740f2fd24dca91cfb4daba8e3834c29c9ba8957b2d4e6a1b952581638256c5b471d28d9b75cd8fb34e52246621524b2e082aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD54c2882b931e93436387eadac21ecad31
SHA1841c517e1e3d31f0375b5a76e9366bdcb08165e1
SHA256b5c507786a09e16e7e854f9c3ab4868a89efbb85c20ac0b07f1248c99ce1be31
SHA51233147ff67e76c5bfcc6008f04c3f8d3be404ad3ed37b6e2074bf4104ef01555f87b62966dfae43d97ad86da4152409117544337a04cc702e062baa06a5fa5bdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD503aecb0c8d1d64b356e7faace9f8ed5a
SHA118e93dbc831ee6896d99812bf4e474a9412d4563
SHA256d391a0c9957cf6f6d435828142e809faf098a791c95372cf91cc69ed7677aabf
SHA512049c370d4491ee6846f9cb3865902a4807b7a6be5fe84d5fdc89902510afa1c623c42d257f88f6ec85b3031ec68f218ce6085be9f6ba2dad7a2d2c3730bf461b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD57d179b2866710e8795249f54ab4c14d3
SHA12d24882c9b517d65c25a26513119efde369fdbe7
SHA25637e514f6002cdcb2baa19311cf4aff763f3b166914b0e55c473f71ca50c78692
SHA51232d3a8285b519753eb47f8a7c1df772b5bd2b887f0ccb25e395e04f1b43e595fef85c4e474d44dfeb1f6a05922ebdbc9271bd3cfc553cbfe367dce91c84aa281
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5484d8430bf5f903db0b8cef60ee1aac5
SHA14125628131666367ba78e81d69ce4e6c48367465
SHA25623902f29b245f6a1a1d195e91a52e6e7be36156cc2c4bbe2b1c42f4a266b39ba
SHA5126f7f0b92c9397c9918ab8c0b267bb434ee9b1e5529afa32718792b4ca1f881c560ebdae62bb29aed55612dfec174452a5a189b2f6ba06f8727882152a35b2c85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5be5a67787417758ca82700cb73019764
SHA1a199ffcfdd107198fbed08272a2d440d50782d46
SHA2561c0c6391c7f8389a52f6d316c87126b2639259ad42203c40dc776c6e09d954e3
SHA512669bb1ea467c849a6c6c25db919978d538e458dd8a518185c83ab1356bd63d492623fadb36a276215f9a73c016f7683a07db3a721344266b6c393d52d504c676
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD59339dbc61c6e7b4d20bd6d7965391185
SHA1953510d3f0a0190d8d91792b216d4adaa4c94eda
SHA256a7088da989addc6844253f21098c4f54fee8a45184d4f121aee2515e089ff62d
SHA512cd70aaf2eb96e648c6753fcd051e2011552dc695254e7289d94e9724c1003edea269076cb0e29c8df7a19e6797e8904940f291fe1f97f061af198bf8632bf953
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5017024e1290dce7419b5039e1ece6b60
SHA1c6d936e6479883bcd706f3859f6a2c86e261af06
SHA2564c7ab5e5ba061028be39db0c761f0da2d297372edad90ec07beedfbf844d4e2d
SHA5122f395d4acf369e225d08e15660cc8f5ed679dabb67d89212a82e21cee65ab47c1f3be4ec01911bb5f8f0f983d95b3c0f33ec6dea69dd6237f8e85851993f1a66
-
C:\Users\Admin\AppData\Local\Temp\Cab2399.tmpFilesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\Local\Temp\Tar239C.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a