Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 01:27
Static task
static1
Behavioral task
behavioral1
Sample
73e935ecc6701bad13a202eb66e0ea5d_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
73e935ecc6701bad13a202eb66e0ea5d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
73e935ecc6701bad13a202eb66e0ea5d_JaffaCakes118.html
-
Size
6KB
-
MD5
73e935ecc6701bad13a202eb66e0ea5d
-
SHA1
9d619f02adccbf635d9b9ab058155b40430cb43e
-
SHA256
4c1d73e9e2916e260384b2f284b7d7c95be43bc8a5223d48429e7804d35596d8
-
SHA512
226c1377fdea555de2e1c91416401c17f7f0db31cd52ff0404e7e8e85735aca96c64a20907d0b9e63d9fb2dc95ad13518d8cac0db7637ac08bca432d052dc67e
-
SSDEEP
96:gFM3sHfnuNwZ+vahytWd8KOGCImVJKIjXN9Db3:gFM32mika0tSCfDjXHb3
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000002aa1d5f4c2ca82c9644c902672cf7024195bdf427ebe70027c72a87760efa801000000000e80000000020000200000001a1c58307224119813f82abc5ff479b55c5949a3d3ead831a4908d209fc903d220000000b98d937bf1e91b1dce46f2df2b0ac963c925d8d0b02cab3db725b04f164d177340000000bb8300a8011ed3cc13a543562a79f92fff83fcb21664c1fb8350e1869d7d015611c27472d18170c2ab91bd34867ee81e2251d561ee114e7d931b394cdef64c13 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422848723" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{221F9AF1-1AFF-11EF-B904-5A22F41CCA2C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0daa2f60bafda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2432 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2432 iexplore.exe 2432 iexplore.exe 2416 IEXPLORE.EXE 2416 IEXPLORE.EXE 2416 IEXPLORE.EXE 2416 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2416 2432 iexplore.exe 28 PID 2432 wrote to memory of 2416 2432 iexplore.exe 28 PID 2432 wrote to memory of 2416 2432 iexplore.exe 28 PID 2432 wrote to memory of 2416 2432 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\73e935ecc6701bad13a202eb66e0ea5d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2432 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2416
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5473e8679a7c67e8768630589a7960441
SHA155cc55dd482aa9f3f7c6ef189178ad1cfb32e65f
SHA256fd396a47c267366c830aae11d0fc3b8d3ed395dd83be1d8b7c21c1fd55557e4b
SHA51218e4bf3c3ddc89b0809e754435b51daacc460da59c4898f0149f62f47f203f7799b097d2b1f51424eaaa7f5efe78f05d5c6361f1da4d470e4d821c4c0468b2ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e5c62209f50f44f690949403c1cd6e6
SHA1db3f7988fef32c2881386a37445f1f92c902b6b8
SHA2568942bf8691c92a3ee0c59a734293489d880e7654d1e5430ee787dfb0717d9362
SHA5123e1722b6378c5433850d4fc60c14309f164542fae58a46b1d702d5eb7c8de1c2f52dbf2d819ed28d005107a6158edfd88aa7b8b88fecfef986263ef5afdfcbc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524e6db4c012d72966abafcaba92ffadd
SHA12d586ee0802f4fa692069b6b93e4fefbd81f7496
SHA256e9cb577d3e9d8266a40c82323f05dc032ef60f633bf3b7dea48c363bf7d30d04
SHA51292670df20d2684e951ed0c1d636710d82d2de4a7744d430784fa45561fadf350ec2ac5d2f599222dce25e503a6d73af9aa535779d59cc6254065b7d853b48652
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cee7ed9e2f684a7997c01caaa9eb76e7
SHA12dd3add585400b6eb03dc493cf8732b6ef64743e
SHA256bba9a4a32010773836c98a0e5193b144e79a17df8d4f01ab7218291983442d78
SHA512a81780a28a0eabf0e3d36d42c01fc904344a3c41c9b34c8e7a54e924f4e48f2f5cdbe492496f3941378a08ba4b48a3f28d7a3bc82ff85a9d13b3e0acba041596
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503d42867f47c0dc6dbfaee1a5c7ddff6
SHA18deb8f0670e44ae6b0332bdaab89e19c83b618e2
SHA256fa0de227b9bce5e3c5f607877d5e470fc90a50fad76b9a2cd8e440d9ad8d2c94
SHA51258027a1fce627012af56647340c4b487fe1b65706f48e6c43a75b83875d589ab78b472304a85d4a12109ac13bf8fa50198c76b7ecd67cf3b71f4d8386a50277b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531f4cfe38e7c63a13ee7c9d7206a9bfe
SHA1e31cc62ad76cd285b26c4105130b2e9fb423b459
SHA256b3b09e3ffd2a94bf240290309e32ee0e74aa4815942fa84654d20d65a27f214d
SHA512799f88c5540835b4a8c6cd24e99b9587086327f92ab63ec43a453a0581fc8bbea365d659c3288d94d7930644492db195d6042f001bcb8f052384dd6adc4d51f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56fe82034153e38d2d9ba01b3628f2588
SHA1913118e2f81d4f26f18dd06ad766a211bab5884f
SHA256c1c09af2e4c8dddb317ad867867c85ea2910b08b0398cfae359da8388b5cb769
SHA512e675111de55f50b65308cdaee75393f7037987cba39713130c1a055a5a53fcd9a37a0ab1680bf02cdaf2f5977b85538adf37fbd7cf391e188909bb4089e14539
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543277cbd0db7c84482f5be7e1bdaaf10
SHA157ab1ae4f1357626785de8d83b9f111356544da3
SHA25641de3940ae0f7dc256e22871847278604be0af49bb9df0a151411f4b8a0fdae5
SHA512285adcc374635cdb6201d395ba7067357b86430b1c60e06d56f272704f45c7d2f649707252ac3f308a9616885dd422ed01b39127b139964ed8ee832777d3a95c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56dbbc6ab65b3b9707d1ef288b9774338
SHA1fc172b82dff6b8aeacb6f28832bb0addab2ecbdb
SHA25657e97e90bfa55ec9059df0075fb555c16acb46f69f921668257c5104b281d38d
SHA512b771b0ec45e4850a6ee5a7eadd45df9cbaec7ebf06ed853139cc975b79f923c89602cbd81e173047a11fc0102413611ab8f1126ce67ffb1042b29b1008c5da7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fea7dc45b0476a675c21ebc9a404412
SHA17106ffc4f16f8fbe547632121e056505627f2e4c
SHA2567cefd1ff4cd29e0115202022ced779e4909eae6bb0efe67f4a1207c7e2673324
SHA51296e120763602e339464e8be5027f167a88ffe9309b52dfacaef311177aa9a61a347539bf52ad5f62eed388cd99d8553823c8ef39ecb0d4b72ab25fd50e9ddcb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b73f9f43c0c4e742d6dee15b2e62df6
SHA148bd003d37c0ac937bc87f4674ab33a65186e4b8
SHA256714f49cefefb4928d79e8bb0567345f14882209c1901236ec94a41d3a4c00665
SHA5121c7d55eb102dc4b12a3164c4a8e07f4bde2d12ce2498ffe8061926265f5037257a7c058e8255a4025751e8d53bd2fa4a44cbd191bc99ddb997df672c7ffd99dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505969b445dc3b1f9aee5c7b72c29eebe
SHA11a5252e7a1899abc25c4235005a9faa63d0d2a65
SHA256772dc76125c0be39a121b3a25cda9a427ee244d3d5692886d75e70eb51d24069
SHA51258680fa4fcdada5061275dcc675467489cb00d37c0d1f7c1bbb97a0faac7396691524c044c83c318c7be324070b689a93acd9195eb56f97d926ef3c57c2025e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51027986c0f812d5274f547d946aef7ff
SHA1d1f65628291ee444af5959f07f267142a73ac643
SHA25632e7ebd2dcf33073e0255a94f5a6a2a5c4f883ff2e57a8844788d94a7d357848
SHA512d7a10f5efd04e1a775f225fb35bf08c7e98499c5143b3716f60931ae9c6af77fdd37880b6947955a290dedc52233325c36badf7aa1b218d73bca8de0165d86d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6b6aeb78dd890d85e2aed84b8a1cd86
SHA115868cfb2dee43008cc848d7829e46215e75a34b
SHA256363e2ca9326060dc3c30204ed0471e358f38128d556a96454833572ee061e016
SHA51264d165e329194e1530d9b71c5202e0a768eb02bcbafca8198411d5de04f3b95a306143020f713d74187c292384e332c47527ab8d30593c681fb2f8e19811f1b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5948fba0b75e68fdfbcda232c4b3388ae
SHA15f72730aaed4c993b134b4fa26a2655d0f400325
SHA2564bf3b4083608a791ddfb624802a418d0c19b3b62ba98e69a0c265d904039e40e
SHA5125ef50380428615af5d641d0726bac49a2f38cebc91e1e09cb2e7f89fb5757f18afab4c9b5fc67c22cb230fc2b02b316bd1233786aab670fa172d89badd3cf433
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f1503a082a058b00f5c6e7c81173a05
SHA10e86beaccdb040b5d29b8c1e131a37d771497514
SHA25668523c0db9b4233e5884440e035a5755d0aeea74f3818f06efd47319652f80ef
SHA512d3a546c53d14ab1b9f9652dc564efdad5cd99a69269492e07dbbc4335107743ce23080c41c630fc3e76be53f6fcc82b10f93076522b37b3c842786e070cc2796
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4007a07c701bd2daf872664caf497b3
SHA15b5723265e4c9db27a6b0964117847eadee722c6
SHA2568c255688b0d4c27176623560cdde30c3b5ed60ef88315b899aa518ff395aeb9a
SHA51234673efb69b7024738d612e8703a480c8165da802de7a093b54b8f36848ae4daa1baf5a57372f839062c45f4234a3e85a015eff3b4ed05fb303f0c1e24fd4b08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b1ca4f39053da6a3620f828ccee817c
SHA1a83697b714532f5e71cb7a2cde263e52b1d4a375
SHA2569128bb8201398fae6443931025811c995b4314e396e8660c70a8fb4ba4abb1e1
SHA512dd557368a82ec47028b8c4bfcbe3242fbf85eaa829c140404c062f84397356fec2d58df571be796ada28568b73a346217f7f612cf75b66bb65ea51485a220b7f
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a