Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 11:28
Static task
static1
Behavioral task
behavioral1
Sample
7554cee205576930c9873999f3ca8d3e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7554cee205576930c9873999f3ca8d3e_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7554cee205576930c9873999f3ca8d3e_JaffaCakes118.html
-
Size
67KB
-
MD5
7554cee205576930c9873999f3ca8d3e
-
SHA1
f356948872548217462eddbaf32d4ed0ac11e9fe
-
SHA256
aa21f359f05705b68325c1f9e4a58b9ff9ee0fac27decbe742c84b896b239bcc
-
SHA512
118e8c5aa275bb455efba95ed00a80d4ead6a4950d8c531154afda9889442339854187c5bd21fb71acf30ed4668234d7c726d3da356ddc959204bd8c7d6dd62d
-
SSDEEP
768:Ji/gcMiR3sI2PDDnX0g6s56cDeoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVG8X:Jd9PTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422884748" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ba2bc1491ed22f4c8c5702ab6a11d18800000000020000000000106600000001000020000000279825970f6d6a1ae156c76ddda5be630ac166a3d1f62247cbdda6f8de2d0d08000000000e800000000200002000000032f152883fe2b9dd73cf00fd4f3d2793aba9c96d545c32a949ebbedeef4ebcb920000000a3b09c5725d258da1ffbf19db2185bf17185120c5a301be38f2b54bbbaec925740000000e2ae63fbeee8a0eb3c0d1452417e89311a8c90e10194c8364ab57f346ef45f1c86ed2275031d3153c0d9cee2d9d219075eb241ded7da184ca9ac90784091d27f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{02AE4E61-1B53-11EF-9E38-E60682B688C9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 708155d75fafda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2864 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2864 iexplore.exe 2864 iexplore.exe 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2864 wrote to memory of 2504 2864 iexplore.exe 28 PID 2864 wrote to memory of 2504 2864 iexplore.exe 28 PID 2864 wrote to memory of 2504 2864 iexplore.exe 28 PID 2864 wrote to memory of 2504 2864 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7554cee205576930c9873999f3ca8d3e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2864 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589598e12f6704dbb573882597cd54599
SHA1f50dcec0eaae3d183b2f2094d873be4e2f87f8a8
SHA256f39702b36da8dff6b35a2c99784840d925c3e5d446cb20d6338614ce005025a8
SHA5128a57381ac26b22ac1ff7c410afff737792e25cff8701a88568c3450443767283ffeaa042dc3be6ff73902c991e98ff8247efd4f72eab8efc0e349ccba51d086d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538ad8669bac7ef4653ddeb2e7c53aa4d
SHA19ebd9a41c7973e99753c20e89bdadcd0eba5ce75
SHA2567fec567c177c1955ce009df65fb074c4946459457ee8d6c7021da748eaa4a8ce
SHA5120ba9881f22488bb1d272ca322f61a5103cbf5c0fa77be0834c3f9d0697283f78622f22756caa583a1b4bf5b1f605da52a8c2c84249e8c1e544df7e19b78d6752
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b40eb60efae6f03e1f59572c332a2ecb
SHA1fe9e368f3920da8b417da59ad71d35d0f4616d86
SHA2565091f0084024b9e2a9af842503717beed206add6504d3fc2c613ec501e54f6b9
SHA512a67a45f2fdc606243b43f159e023b454558587c6b98ed5fdc3fd3e94693d02ee4c937b1f645b613b38f608612f29117ba47906aca41c07fdaf9c8956f64b6934
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8bdb076321e3b136fa042baeacd201f
SHA18d7a9e480852cadad180c347d53a7259c464914a
SHA2562b66ad720aec12c21881636bb31ddc9a1110fd6c246a4113d25480c2fcb38ea3
SHA5129f8e7f2964c246d5fde05d07fc526c19bf0eee15bc872ffcc84fd07cc745010c8bd5603415c603b81bea2e31dbea3787b616b408197918aeb90999e12b36d18c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cfe3a9b0deaea79bb3a21e17361d7de5
SHA13b1eb3d8fed7aa1929c9b61a8f9fda5565e27846
SHA2565dd4cadbff1f2275f44dd0978de0c36ac930532f358a55cba706e35f74f54249
SHA512c4f1cc621e177e98ac631891a0bb3c3158ab8cbbad3c632d9ff3e0eaeb7518a055272e65576e5b0a1fabbe25ffef12805a2a8d0930ec81fcce8fda47477b79a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5d9d7eed65be72ead18eb56fd1b3ecb
SHA1d0a5ebaa1465174bb926e8bf3d0fdac8d96f3a22
SHA25680f6fc4c52c3620e49774c6384c691f9de899c47a87fed929ed1fb17a421d4b2
SHA512a6d0725b795e25a41aca2c9c0d65876e3f45ae59144d7834dd78b3bb1a7333fae2625d40c940b3305077b88c94d872c5964c9249b6598e9540f86c8670927a16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558122e9270cae0719dbc8a130c06de14
SHA1874982c1e6c7b4d6beb66e3beaccd17e3ef9f8ed
SHA256860255cfbd942a9d7ed4651fc9266148eb488841db17627800016cd529f0057a
SHA512a4d5551c929aad4fdef92dcae0c550b6ea005889268e48fc7b78ecebeed69b6196d15abfea55d9f25f47f26a14595e4755115617f6e51c73a5c93518f1cc0761
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd7176262df8626fa45d1435d78a925e
SHA167a5cba7f5eabe271c71209bdef38feacd6aff59
SHA2567a5cb1fe4af89fce5984115fa286bbc5cccc6875fbbcc7fd751ca7d6a2eac8a6
SHA5122a5727845d30452a89597f70b400d26375378fc12156526295a7756aef6c7a0e9329be1ed93ebb5a7e53184b6a357458b770bd173f60f3eeb6fe3a9c6c532c24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bca5f222a75c52b3e22a4a2597ffecd8
SHA1037bf19c932e0dc00e210ddcd91701b42b28e62a
SHA256a001bfc69642539f103d60c9b37c4f09aafd6866fbf172243fac33340f05c22d
SHA5122511c1f6a4d1a3366630ec02a5fa1508d1926c5d920b7400f7a7329f7154fb196a5c01ac13bced9d685777cc221173f023983b1238918bd0bd668d8dafaa37e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b0296655a4ae8bd2552ad10e0b01a9f
SHA113de90c0135bb0adb8d5ec1280ae25173f04467f
SHA256bf96646b805d8cfe886b52ac3319f631aa38cf3077693eacbbc75a2d27dbcb72
SHA512dd1eadb03c767644c7cb4162b21bb24fd47deb3f09baf7814ae7c3cd550c403783a03c207f1347e7182cc9a4551d68337077c0bce2e5809891546fe085ac060c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f7587898f6aef061c1f606598011dbb
SHA1fd30b9887697a2e958ce57e47b4ac106d6d6b51c
SHA256088712169a3e5c74e1b302645eb214cdd59efc1be34c655a19bad338d28e4cdb
SHA512c5a5651385dfa21ac290971a4cab96914544ba021fd01b86ed6786faa846fc2a997796091c03ff885d35d679ef097b08f1ed6ae1af3f10c64443bff11ab9e9be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d037abada28e570b1a8949ccb6c0e315
SHA1fe929d3786c046d0efad0914211cc2cc4767eb11
SHA256d0a37b17855e2cd5ccca4fbff34a67902f5fd5dfe70b8caa823645f8da85fd5b
SHA5121f916f0df20782da54a1ff37b177eb0dd64ab770dced488e0dcfd1d8c9c0c766b3ca58a27f0e26ebf0ab0fc66c1294f1a9b14ec0b183e33896dc5c62224e6cbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563856e50b0456ec55ce2962d57dfaef2
SHA1280337faa6cde9087fbc9a5d5db66dc7273d2a3a
SHA256ef2957115b6aa35ffdf49d92eff2f7cb364827152e6f15f5d90821e24c3f6ca3
SHA512e2fcb5be7d836bf82121680eb2cf42ddea6112025cb3e0fcea8c7fe21295fe7fee724ee0867d4c44f430361ab650b8a25bf1cdc0efd92af4ad55292e01b6caf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0612c337604efbe257fe308546c078c
SHA141cd7e636020478bd74053b47532088f3374dc84
SHA256886ee2126022ce8f1a01beaa272bc2cc8c501aa3f3f4ef3fe67aad2eaecb589f
SHA512a12b4633c9e102003495b98d60b93cfe01839a9915a964c067cb610acae575868ab43b33cf3fdbb6c7087a9e771e87cfa956b681ae0abb80de50de7acfcb3894
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ebbaf26abc9ce313a373e5b5601fc7bb
SHA1f9c9e2fb971ac2e5c21211a3ad93445ef5042492
SHA256a0501c2d60b5dec6c911360348aa49a60f5708b1effbe05ffea3ac80c0b84120
SHA512923244c1b6d9acc9a19bf6b88e1cc2a777e3b21d7f133c28df84555bde3090bfb907ce4cac0195b6d006d275a68a2dd28c30601ae0b5a531fc84cc4a5b1c0d43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d34f426465969e759ac0b6a55bad19b
SHA1db4f07a05a468920841e3abdb52f41f6a9efbc61
SHA256b7d34faca75e9e87708afd1fe300bb6d4c453004a8d210b67f34f154d4eaad21
SHA5124997f6582711ab34f5ba56e78bda440550d26eb078eb780f5579bae0a0cf8429480b870de9826071c224a6be7e012bdbadd249095bac6811f8ed00025f166e95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5197f463487879d67e275ad06bbcc5936
SHA1fa14b6f82ff83c1500d092362b05334e766d3613
SHA256d819f44007c8b9d9fdedd3f8fdba528846df4fc2529d734dc4afa2233c0f0b0b
SHA512a2d12272d40765a1f9051ce0a9e61b597cbc8bb1b8b6543757953f7bf0410a694550af19a916baede8b383305109e80658ddf3d862eb14473f71991e847b2f92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59323e9a8ef0eac8b997202b5d0ae1328
SHA183dbdbebac04d636a061e205a992edfa31a95b01
SHA256e3f9c19a0b4552687e106e9f1a00cd0fa7b51e522132ba1bd834fe579907279c
SHA512f773529e569e68bab93f88b9d99359e14909ce4663b77c5fb0e1e277176426d84755ceab2dcdfba4fe3ebad5bb04417e2081a2c92bbebe0a212d20d99bf3d490
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2e04f06395de7c45e48ffd5462d4c05
SHA104aff85d268c5ad01875e25e3b86d3b4742dc31d
SHA2566bbbaf402d3542ef8a355053c42eb6b523148802cff21675728ca58b4aa2d16d
SHA5122850cfeaa9a1bbcb4ec429a32de9a4a83bb399fc75874af97c56b91519c88cf2bc1ad24d7d82a6ac3c92517af45e819c853200b5ba07349fa53a21633662f673
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a