Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 06:55
Static task
static1
Behavioral task
behavioral1
Sample
74aa5b3b55d28234669086b802eb1418_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
74aa5b3b55d28234669086b802eb1418_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
74aa5b3b55d28234669086b802eb1418_JaffaCakes118.html
-
Size
125KB
-
MD5
74aa5b3b55d28234669086b802eb1418
-
SHA1
ec364c15591faff4abcf1520de4108874317b07e
-
SHA256
50697d98f0a8d31e20e327eff9ab762581707d5966dd026d4761b48c895ce7c7
-
SHA512
f3ccd75aa853b3213907e5c3088e32e41fd7e4c1dc920fb8a79ce47ae9e0fdb020909da36abfdd0c63ba23adfdd60a420493436dc16e40c016062ede97123aa7
-
SSDEEP
1536:StlfX+yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9df:Sv+yfkMY+BES09JXAnyrZalI+YV+G
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002a974a0db1fc0d4abafc0ab364af10d500000000020000000000106600000001000020000000d1909c37063e71dc63ea0d0b12d8747bb2c896ccc2a70e27d7e821e41af439cd000000000e80000000020000200000009d4c2399fcd50cefa5997f046a7d64eb8c254b05e9146ec0ac976b06a9c640c320000000edfee2574546fc5ba783287ba8d98f83b03fc83bc810bd90000e92d3096c27ac40000000b73bcee51112a958e97a659f0179521964cf65338e15393a3634eb2a588aec1f0cc5b472d856304a27b5b7406e029b16a771bbb2143b1c16639891ffcec0cec0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422868381" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E7335A21-1B2C-11EF-B20D-42D1C15895C4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d02283bf39afda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2220 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2220 iexplore.exe 2220 iexplore.exe 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2216 2220 iexplore.exe 28 PID 2220 wrote to memory of 2216 2220 iexplore.exe 28 PID 2220 wrote to memory of 2216 2220 iexplore.exe 28 PID 2220 wrote to memory of 2216 2220 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\74aa5b3b55d28234669086b802eb1418_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f33e11bf7bce45181084f366bf8d863c
SHA11cdb506733d579158d17f2060f492ceea1394e1c
SHA25666b7a5a772c2aed3dc4ae27af532ee53681a223a9e2baf9d1f8e141ce967d5bf
SHA5128ef675a2a1aee8042db63aa3bcf3de986cb149e838b15e67cfa36ea787eac186f1f276d1a5c2121312df64777cd9cea5369c5791ec68a8d922c58175d4770d47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a5b73657be11fac57ae8983fdf4ca3e
SHA1177897a8701d222fefa59dc06afda29faff0e084
SHA256af45de2d00acd0561dac584687f210b128b466fdd875c1a145dd6732e5c3cf44
SHA51284d55fcb4de2ed31756c4d701bcbd79ea6daff000848435bc0e30c54274630fcf1cac419a76652af5e6d267f621d0c45bbb5f8aa1368ecde6f20cdb7f131570a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5932140cd5d23505cf9bccf28399c5e92
SHA11a2a0e1090cbba381a83a4f25aba90b2d1eb7a22
SHA2560170bbaf475de9f903e839812c3e1b72197f5e59378a6cae1a891d49e6fc54b2
SHA51226a59f516ac2a037e8f6f37d77436492c0021f753523f8f8651e2fa6f4d6c2a03fb4c695dedf41c000201762cb0db7487bb6e45274421423f439c5ccf0820900
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a71d702bf9d7060db49426740ad58eac
SHA1bc34e7cdc4e6cddf649d83a1ec9a56eb310c88af
SHA256e6ed4aa0c8bed835e4fd635ca441ce2b6e65016855f856717bc620a7d84de6cc
SHA5127d66a8bbc56429297adeb84f15755c6b75a3c3e7bb9c8ea82972f3ca562f5efa7ec89b51d27a178ebb8d912ced5f3e21e08a470c2dbbfe03c91a52e3984399cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e02f90a29e6455db7c07f648cc0322a
SHA120c9fe843aee5e8d97158181f1a91dbe85649986
SHA256003a2bf86a7401a5d0b1e7a8b7a1d1c872d16dad7cfbd32f1bbb941039c54a7a
SHA512a6010572dd203df4826c3d1a4e258d31d3f81333a2ae01985a9f2d7f9e46b52f6c1a950447590ad51525fba17e1523a604664ff2b1da4f86b9a40420ff2698cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57295afe0eb702504866c9e5e3e243a57
SHA190b8a68c8a8a8e76494d0642e11f8fab5e37812c
SHA256479d780f07e48bf93328d88e573bbabbbc0749ed82762e90966055b881e95fa1
SHA512e7ba0730d4e5cd14a8ae340b6f5461f1981f43666cef6f0e8f03eeca7196168a17d5d47a72a7aaa7221b88d4fd769ce2f6079642b8a44323f36317eff5596b3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d428e72d69b8e6e26c8affbe104b92f8
SHA1ea6c066214b2ceec6ec2833e5b8fcff42155d787
SHA256a397160fbb6609cd10d853c41aef85473ff001690fefe958ee617f86afa84221
SHA51265d36a9e4b8b0353d0e81b833d5688efc364841a71de93e180f0d384f60173534a74d1c049aa349263f7da347fc8f62d2bdc445ae5140ad5ed22a260c02245a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5528c42f86baa280b3efdd60838e2d006
SHA1a24842f097665fa877800da77aeb302e800d762e
SHA25688c870e489108f4ea26b1dab1c39baf8f49ee7e420ba2d221f13ee283961b234
SHA5129843b6c51f42ba32d0d605867011be03438a31824acabd97f40afcdff007a2dc37b05960f267e4e30b2d70931acacf0d6741de5b0412104450523bb04569062a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b38ec5e5816e62be4c6051aac31c4ee5
SHA1d8dc81a9ab390513468febc0889283f38306e9a6
SHA2567e00cff0b78f11f9e3a0662ba85eb341cd3bf7326089c5a8e63480bbdaaacb1e
SHA5123a3993ea5d395fc11cdf0483cf94331e710fb39290d173a2bc21a6d9fc61f51a9d87c21973ac953b8c8b2c38821df310c11947fffdeeefe3f1bae30b97a845bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d86beba7dd2bc22405a0e53a39ebe87
SHA16aaca76712759e32d84b8aec8f03cb14d0a431ad
SHA2567669753609aa9fc41a6b8438f2955afbfbef63bda164a76ae36b63846b3c599e
SHA512c4ccc0fe89599c63b9f62089e05a78ebf91c9a9ff51c4d1d71ffe3507443c32410cc921339b816e5931ada3498664599e87f8921524e71032e309b6db2e6ca7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553d52f27bc56b36a8055a6dddb6a37bb
SHA152a8b10efdf66ffbc05f80f6c205e537bfeb1a1a
SHA2569c0a236dc5896221ccf0e2ee30623b6035d9f92318dce121b40c7485cdae7845
SHA512c36f78887d1970c68782e171c3efbb841801343ae085d9ac370382ccba9f529c0cd367fa3543dca7b4be520e56313b2f0046c09b0f17ff0a55277a533aa5bcad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d28ffe6da8b7280f0aed72a844bfb05a
SHA10989bef2d247b9c965efc46c0491967297488e0e
SHA2568dcd7232a36a3e54db2cfb376d50f0390650927572b896d3f061a32180804b40
SHA5121b25577ed975d5ad204432d2155c581a39d013054426faef0ede3556d1458c7a8ec02b0aedb5a9070a902130806fe931010f62c2ce3777322686fe81de93d65c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d14ece94ada6fe5e84e2b2939c1b84f4
SHA1540f11b830c1c3332205984342ac7524f9becbde
SHA2562fc1777f1e1a0113fdb22e82f95683b18474b30a93f1b1e10e178c2039225599
SHA512e0fd4fd033487f6118aec1baefe8542db771313565d7e6c78ef2210c123d9f5b78d63c994eefca5220f9b2d9326a70b85eeed06e7e0a18e82ee5f36383bdf761
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c070e407c517eddb367d4be050b3061
SHA16ea7eb8e3f06d4dc2fc1567e1b60eebaab36fae2
SHA2562f893380e23b74429c8c0579e8b0650aaece5a254ba240d22f16121820db288b
SHA5122171a3c4f30a4923059098d9d946c4517f47b6c7cdb7005cce73356680df9817bf5a1994bc567684b25d971c149f34b501c72a9f0e2a2127fd4156e586552323
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574f65992554bc78c2b224584d42264cf
SHA14f9582a8dc93d8807319a29adaf9ce55d92aad04
SHA256358a2d8318bac1182831f1b3ebd7e0c9d3139577ceb02db1d924d8850f165a4a
SHA5121b55c17500e2b4e1b4b76373ab88a1ca645d301ba30c24e41c355114bce840f41f17fa0714e76c75158c275df0db8d341ceba01578e35701f7315b5361f38e4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ae343a5038d32b31f3e95d028cab374
SHA17e8de9b00fc2293af2cc527177a2b28c1dbc7c07
SHA256d982f8274db07720aac764523ce84e3f14a9399c2a7fd9fd8dc33ce97e9e6dbb
SHA5122ce4abf9355c75ebb56fbcd2d07168e4f04eaf2133f172ed633268b5a9a999aca7dda85144d57042b320e4decc5a8930151a602c7706fe67631e2d4831d794d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b75a2c12b52e9d1f6cb799dafe3e6bed
SHA1f2601ced355ebe3561c2d8daedc56f1723279b5c
SHA2565d2f9026043cbc1f5f084bfb6fa47d32d942057fa2d7582edbb82c7d6a30a1e4
SHA5122ba7cadb4546fae1d9a2680d123f10dfdc4e0843f251833986a2ac1668f9d85ef8e96d5d83d086885632784ecf2ba6c1e333104675e978e8db69da48b74b7603
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5882af17c4fa0195627eede6280c83e9d
SHA1a9fa273f5dd7b84deffaa42846fe98a4e9cdee2d
SHA25645585c37e4142e1ab9f059dec1f280a3c81633c7b0a9984908d566855b21004a
SHA51266024f4fe7c8bfd224602b6098a09e6562635594d01cc6b2db8cf5881ac1bad344e5c8627626d1615ea546b17399c7f090ee176ff020265557f2760ce4d18999
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5075351cacd48041e15cb8e0cbc313111
SHA1bb75b61af304ad2ab9166b230d2cd9214a325a2f
SHA2566a44cc8acb106c46009494454810770fb572b637b9a769be930eb70c61e02654
SHA512142fc82f9e1cee4d04bb6ed9a01f3882a62aef57648ac3aaaeb025ed15c0ab677c6111633b320ea36ad83a1ac7121abbae53444e3243a6ab973358c9de02bca2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a