Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 03:00
Static task
static1
Behavioral task
behavioral1
Sample
7421ccfbbf6d5ea95771675a0679e441_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7421ccfbbf6d5ea95771675a0679e441_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7421ccfbbf6d5ea95771675a0679e441_JaffaCakes118.html
-
Size
461KB
-
MD5
7421ccfbbf6d5ea95771675a0679e441
-
SHA1
9ca352879348764c6ddedc4b3c71563c5f7a9150
-
SHA256
4ea63a8b9a6e261d13c1baf3e8c0d5463d8e6ea82c7396d65de746ddf09287ea
-
SHA512
9af51c1cf7880acd21415124df9e568c2c84148645611a0ff975dc4f9ad3751909e057913e0546bc3c4fad75d97e4319cc4d3a8c2b6adb486032ccfe5d1388f8
-
SSDEEP
6144:SEsMYod+X3oI+YFsMYod+X3oI+YHsMYod+X3oI+YLsMYod+X3oI+YQ:p5d+X3P5d+X3J5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422854323" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008fb22c532607c34ebb43809da6eb424800000000020000000000106600000001000020000000cb3476e9d7417b3cfb7d872862d17b654436c0148f2fbc0ba7c928f5c9e58822000000000e8000000002000020000000fb5ca4c3ae492e6ccbdbe13eb3c129e0d1e7b274479bd41f842b59f835a354712000000049ba7e6325fdca0fddf3ccd2c5fe70dade486fefaf21d33cbb5df4246509d6db40000000f810e7f96af17ce6f2958bf797ba22a110fcbd8014238216aef712cdf6b1a4e150ee7db3c8d498b8d2f55c12e7884b354e83e19ea765f8fff3aee4019d3ffb6c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2B611191-1B0C-11EF-B5E8-DE62917EBCA6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8008ed0319afda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2200 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2200 iexplore.exe 2200 iexplore.exe 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2384 2200 iexplore.exe 28 PID 2200 wrote to memory of 2384 2200 iexplore.exe 28 PID 2200 wrote to memory of 2384 2200 iexplore.exe 28 PID 2200 wrote to memory of 2384 2200 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7421ccfbbf6d5ea95771675a0679e441_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2200 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2384
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527caad5c73a6a9768591e05d23d98fd2
SHA1dc050d6270b9f6af2b422f8ff5cfe47938eef54a
SHA256cda35b5931b2981fcdcea908baf2789f8396860394d27b2e3fa61094c17b3d01
SHA512e401c683f880a58f3a9de490277ecde143dba33b95ce677e0b68c2b7668b162d06ce85149877391798fe4187a5611361ce427b852c48fb449c2bdf2a5602536a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5767e1d8831bded12dc5ab6f76e595d0c
SHA10d7c8322963043bbc33286ada3a8ae2fee32d308
SHA256d25eb2ce3291dfdd0352d0ee570be537538e7657abc89cd51a23ebd158514391
SHA512b036e0bf910315329a69b6d8496701742b5557e7e187999416db7dc3b4e8eb70674943aecf3c641f4396778f6fc666582f2b63e06e6b4c11888974d743f76d81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c26448ffbfa886830116c8b54050fac
SHA12b37356cc514dba262c6262faf866123de8225d5
SHA256e8f2bd8240efa7a07fab1d96383891f2efd7b9b8122190cf6ec8df5224871320
SHA5128c383aeaa40cfc818a5706ae5ecd31dcc421689e2dfb2ca72eda6b16cfcd534b610a34aa4c592c7462a6ac61e241543673136061913957ca4771a7c1e49d9a10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e722e6da27f7b3e688fc981b58fa3c3
SHA1533bfcfdc9168432be867c3d416ffe1ff654543a
SHA25679fcb3647bf0131e1bc4bc1504d9f7fad750f74b073263f0cb377a5eaf6cac16
SHA51275a0796d8f295201d5aefe87b8ca8a8d36f25f9658ec8f6ac5531a98703fbac1bfbe47d201daf90b99dac807a9ae57029d2f90eb5b3015eb8cf2ff6b343763af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd9ef70100e86318d8378a2f158723aa
SHA127a600b619f2d5fb238296fe6b8e9aae4682efcf
SHA256551aed1e16107596fbe7b5cf045ed65239e097b9c293fee6885503316325c00e
SHA51234491e9a9e6572a1785a7f9ade85519b1ec5403f4ab75acd1063248de75d0778526168b9c7843b8036a168c94c1cfb6e3e02ef3cdc74feff784c484e929b051c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b44b3bfc640d63184790f768b5d6f19
SHA1b97ceeafa78eb23fc4f8e4385832492fd3a667ac
SHA2569be38d9b780fb0c82db357645b3351b8a9b13fa02157c158258fdf08e0d80478
SHA5128a5be7cd3d11e47983ceb875c8fdd90e3c037475cc801acc209aea74a010e341e121de0dd226c43dfa8a5cc735a039a235b9351e4ceb563b185afd6d4a0e2d52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc9ffcdbc111dba925e32e9b21109a78
SHA1b685ed2506be5cbc8af7fc5a18bea62374d0f262
SHA25629d346fa6592a2dd1a8883706ed3b1b16a11c96d1594c6bd335ee0ac43b95267
SHA512bd4831693e3b42a0091f9a75da94410d76199ad5539b1130e03152681f1a9198dc0a4e2d44991acc16a154f9e618c96a8cde68d222f8f3a1af70054d9e6c43a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7fecac025e0a56932b69700e888104c
SHA1e6758117e0d8701175b61d12fa8019e081349064
SHA2561da6686b03d02b049c0a7f69118559dbdc4e60d84ad6028904b5440e07e1637c
SHA512c34904aaf34546c8ddee38da753339d580789d99517a2f4f44be72bdb4657fdccd5e027d0b99e7cd634ecdca4f3b5ef1eaaded38d3b6b8e75962db1d41322b8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d80b9b89e4fd7308d3102a776f920938
SHA10f10c33baf77425afaaac3650169a8d0698bafe4
SHA256fe5bab8f6bd3ee610e2d6fa38fd07e1b4d974be13953e792c7d36249bbeb7707
SHA5129901d5388297cc721e166ed43ac033c27e327c08297f338c8f23ccc89642edc9e823d682d72d7c0cf28f13fbebcd6bdeae3d191165ce95f5ea6c0401cb3a07ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc69f5538e8ad52412d18922dde42dfb
SHA1a0c38b9d04703580a96de619268efbe1d88cf564
SHA256fd12051fee57328cc9412f2267cf437ca965573f405a024d2c9e80d7db6f5474
SHA51289ceb1a48b75a33e8843fd952f27434c876cfa6090754b6930e50ffcbab5576a8e7169d7d0a503e0e3849604b99da695d0286e1fdaeeefe03c5f008d9fc798f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524a04f20aaed514bb189c8d1692e39a2
SHA17ea58c0e6fb86a98ae6fd2ecf721ab67370440b0
SHA256589e4575d0a3e8d15364d569ecbfd942b686d2c96fb4f1b276bf4b7c561e43d0
SHA512eb9d65944073cfbaa1463c72e3249f3e23246b30509a20ebb9fb43feee06f38f74b6209999536c2af4ea472e2bdcf3a98f4c250d7a8b07c4455d832473d0b0eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f020acaface4e7e43709362ee78aebab
SHA1346a9d459ce39daea20cb007a682207efc935d4d
SHA256b9b1ef9945d7e5714418c43c5a306ece1a137aebcd912ade36426e0ede788689
SHA5120bff31e5243f6f3efcca4cf174c20f1f20f5205caee4edcc9e8866a492d8a8a1032cea11b0f4e355b91eb7a220b50dcce2988f80944c2fd50674b92804547508
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3a7e15d4a8894b2cb43724ba2fdbf90
SHA1a8f9d140d00bea922d3615fcbd23ee60d0d4f87f
SHA25605de7357cdef3f8f6af13fa12ecf99cb1f0463cc57f60e1b61c0c16f67a6ca84
SHA512cd0369531e505ed293d6cfdd3c1df630a01824f3b53ea49c4517041b47dbbd7ae427a9820946af39c3104e91f3401a4b08eb738d8eb661da2dd43759b91a77e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6b9b6ea3a043aac4311c854ede14028
SHA16891bdc2ff4636c5819c0553fbb252f9994ea505
SHA256d385e5f19ed64b7ac53debe3c533ebe18a7de6225a549659d5b6dbb1903410e6
SHA512d7e1a1a581e51cb7c2fd9b7a6e2b181a9fa72b1446937ca73e40f07b713e67e47b0153d8ec097efa5f6201856edbb2afad59748a935954c52e14044e95b51c62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58408d53f1c2add7fb1b8323d8267c510
SHA1b43d3f4dc3049e046223e423c3edf95edba503eb
SHA25607282e6373465660de3e597ace0db2778d786b428fb28ea011760014e2946f25
SHA51285c2316d70bb62bf5944b25d79056558fad5fea1792567f799503363fe3b8891719846c26abc11593a44267fea3cf942b7776c69c283f86fca3d89f6a3237e6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536d0f2dd0eeefddc9fc966110a647f59
SHA1ce95716678582711e33a5f8e2a7b72ed765f67f3
SHA256b6ee0caf22014003899515d9edc976e4038b9f3a1de4d5dfd75f836d32998a4a
SHA5120f613cfdae19599a1ea432860fae21be0e71deedff69738a4d73248475104434501fa305ee52c7b246bb76f0a0cd768ab711ff960590bfb66ad7e9d14fb7d39a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577f47b2c263d092cb4067a770b7703a3
SHA110fbdb20abb185b7b81d3bfca421ed3aed0bd664
SHA256cd47cec8c61de328424cc7f6832da1ffc6a4c9ee407b1f7da499be813328e867
SHA5128de873134392028a8191e5af68506034cbaf423c15816f4f99ff7afc9767fb5dc4125496154c681bb3a6213636e52ecc203ee637f00a74fed78010c6ad02f061
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544b6c30ed3e1ce8d7a53c8877820f6de
SHA1b6cd5da66d0de537fe556350c6cb1444c4b6953c
SHA256854eb9d0905cf817703cc47eae277a29195f169db7c719c63e6d621b26f7ed17
SHA512ee427f0e24813a0c9d9e88d0ac0f7b3a1f2f2cfcf145ad808f5414d823c69e93ce5c715d7ceb92955702fdc37bb6c1e3e5a026433526146d5698eec8b4b19e67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500938ea88b54a0ce2994971f86f19f77
SHA15d6300f965917bf0d716bbd40ca28c8306f28e86
SHA25659acf96a2be01c26fa684a0a539bb81eddc07d34b34ee2d1c0364be15a41b6b7
SHA512cdc571d3477fec93ec1da30fe88699fb3a3fb48ba2e58434984067d0d8568a717835e4eb9c5c349aaf5c8a75bfdd6b1dc5976b7e8d5497f8f70de432735de04e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a