Analysis
-
max time kernel
148s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 15:49
Static task
static1
Behavioral task
behavioral1
Sample
75fbbdbd20c9559a1457b58d3f9a7310_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
75fbbdbd20c9559a1457b58d3f9a7310_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
75fbbdbd20c9559a1457b58d3f9a7310_JaffaCakes118.html
-
Size
25KB
-
MD5
75fbbdbd20c9559a1457b58d3f9a7310
-
SHA1
e4cac66cfee7cc1557b711f171ee4bc85b291236
-
SHA256
a9ba3929bd590f9343253e83f698cc73770448c4f911c4bd69043b4ccbd97283
-
SHA512
2bb6cc1e349f9ed1a746e6a44484c12b6036852d3f0217515dde521ef283de393cbaa5d379b9291938b8da82f82ef5b35de23ab2def1b58dda87cfd1e69193ae
-
SSDEEP
768:YEFG/MRRYMRJtdZ602XrVZloqd5QboFmne5S:9G/MRRYMRJtdZ604VZlb5QboFmne5S
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e025828a84afda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422900426" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000a9c52dfaee43ad88b03fa0270191ce8572e246484287a62e6835869827a87b0a000000000e80000000020000200000003e7e91a26ae985f3f80a76a336a807b8d1f3a262997a04b3ae53ee37abd22b9420000000628e6c13068e00fef0107dbda623b2cd2d3e5ab22fca94fdd2392e6d89a7fbbd400000004222e325da1f588bd5128c563ecd05642ae983c4db4444136d2ee57b170d454578df126af6becb251ee0341a5f2a0a8334355d7c0d066743d816dd226a11293f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{82E85891-1B77-11EF-AA6D-D62CE60191A1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3016 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3016 iexplore.exe 3016 iexplore.exe 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2700 3016 iexplore.exe 28 PID 3016 wrote to memory of 2700 3016 iexplore.exe 28 PID 3016 wrote to memory of 2700 3016 iexplore.exe 28 PID 3016 wrote to memory of 2700 3016 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\75fbbdbd20c9559a1457b58d3f9a7310_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3016 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b5ec38cb71a7655985b79e88737a712
SHA1745ccdf91d9ea8e063e09075281fb08104fa71f0
SHA256c02eeb94c64113a17e46c28cf0c98fa63968bfc185ea6cd0a37376e59325ac5e
SHA512e919e48fb88a7a57265cf5dfdb96ec786eed590c0a68a8cf3ba310cd412689e8ae204b98579c9772c032b97d34b33b85dbabb22226129e44688c632b4aa49254
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59061fc71f29e974efcdb0d3618c46d8d
SHA1f6af0fb5f5736ceb792468e7243bea1585b76406
SHA256a11de7ae32493bfe824db8600dabd72c7f28cebd6f951f14ecd9948b85a152b2
SHA512c32fb1e9aec31af2cdd3d8bc389562910ecf59bad3efa4323f9fd9f9fda0aace4dba01d32b4f8fb4f7500bfc6895de41b54c7cc9816cc2fe97bb9538c5d2385a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51bf31199de38a3f4182c166263876c2f
SHA1e0c7d62e21afbe0866bcda8263195800d3c42f8b
SHA256ede46808114f787204be2107899cfd8ad76bf73f6faa22fdba627cdac64bdcf3
SHA512fd9e4a9c8ec08864ba57cf81fdae20192793c79eba0e647d0604b8625a30522a9aab0257b6c045728708b76ea06c6bb7c7fc624543514fa98d070f89ed506ecf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6645c9641ec425cc66cd6b7d454ce55
SHA18c2755dd56f9a7a1eb9a3bdad9384c8a016e03f1
SHA256b73a264703f16c9acc5dd8485b4a885ed5b5200c2e302704190511a80bd4c8b5
SHA512809fba25213ab6a53cb73cc0eacccc8570e42984e3744123f1a1e0f877dfbb7150aacb5d1e3dfaa8d4fc9128438e4846e9d745645a8e3cb69ae2366e2c98a2f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557907603b43b70fd68c0b6939f617af8
SHA15e84e7e070543386c8a0d6535e04c25e81657708
SHA25606304350c5cf6672c45309fe4c6de5f2f9dce9393f7be0d6362511451720cd4f
SHA51289fbfa3c7fd34dc9852c7fdbb4cf5f31950c4efd7984983709db41b962d535ba49c1dadfa5e03d657eae2c051e8e34974eede32c5f315b9d380c6906480e38ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6a7e4f4183e2d3e3b519eed6b4e3be2
SHA11ef7785241e4b6b636dae4f6208855c5963495f6
SHA2568a7ec242a57ad762c73e8244950196861dbe69b8d73233eaad5ce895bc3ff136
SHA512cc041ba1f2bb1b7426231116f3d62ed1975b3fe29c107b25ec043c349114b959795a984b727bf90e3b61f0216fc3ea36ad154c06eb4c46fb71c2ab370154f6dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e05a29f231f44096be5846f1f18e84a
SHA1834889de775717e0dc8e4be6121d9f92a8ce2e9e
SHA2564dea81d115dbf24958d927e1a5925c2ef6646fd54310756c738b5c2192c958f6
SHA512848e5bed13897095f946d94be0e7cd4394624e9958ca79e69b2fffd453288376b74003f34cde5477a7ae69315b910ad447b67693df3b719ee3a91c711e53e647
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5494bbe932d4616b5c669c8084e080e75
SHA1b66ae3f27a7110084d3a36312fb952738fb478aa
SHA256673d544badb5d2cdfc6337733861c8c4dc238c4005ff49f6174a3f2fc3fef40f
SHA512cabc8b6e3eb8aa2430b81be6a29d58c3bcbfb604b0f0218a61ace8d60fee8f8bd0a51dcce94d07e495f9277dfd2c51063550d2cb64f616bdcf3fc52dc32d1fea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5090611782f1d006811c30fe875aec08c
SHA1ea1ef60f881e2763e25cfc318808523f1e970699
SHA2563299efeaa8ea0df05825438ad25ba6e23da739f567701781b21bb01524a3b868
SHA5120dafbefb1ced9681f8a5521b0875d8f9f98bcfa1a5d7fa620a33d90df46371c6ec1a92d7f2f732f8c7258435779a43d8c5363ed89c050a7f093075853868ca61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ecb6947a8affb4ff55b93c2465c74f5
SHA1a992d256ebf698eeff191ddfa9217f8a4aefb00c
SHA2562f3f99a7e6e0e9300b2372e62ee44577c965839249d941a228e63235cc6736ff
SHA5129edd075a65bceda4086590899093789f0d0b9391a9f388da99c86616346a6f47c24e65d5d41b9b180ce2203676f34a17b8241638c04ef111d2df74be8fbeea29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c55e833bdc0be38dff34d72d623f3f6
SHA18f5c9c3070240a6e8907c4706df9791449f6c5f9
SHA256f2cfb75c2e33317035842274c1dcf94aa592b46df296ab4b21854cfc60a395dc
SHA512d0505c4c05233ece4219ce569acc01da42af75c52c18866486732ca1f5d22c94b874cea04b75f346c7b23d37a7fda9288062d32f8374533bfac6e62b470dcba5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c9597194a1069e0e4be56b3c1a1d60f
SHA150a33b7099d904af6d20150643e7e0c17fdefa3e
SHA2568f44baee8fa729debc0bcbce0abbc82f5fcd534f6becab13ae61f011bbbdf3ff
SHA5124c9826414a81dbc9450f493866b5141a0025d3256564893929455c53c9b7b1610a5d6ad669300b5cf26d54d7f0921cc96c82437cbea3293a8311980704441f2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a7712c2ea7d1988833beb8e2d8335fb
SHA16de108829d8777fdd1d09f1dcf52ab08e0a48e2b
SHA256399a1bf5b56a717c96140a161d576766ad4ed1688837789d373aead943d1171a
SHA51216903dfbf6c7096cfae05f62a934a9a3171337580c52aef2defde41261ab832167e65fef3d2615915a99b3d635aed592c8af3eefe7bfd33c5b03b2417dea1f74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537d4700fe548efe0f701f5093041c356
SHA1b1fd93b8e7b6ce1bbd6303a6bbb2c9667b082522
SHA2565ca50d88e16a446029e8ab35aff95d3a23dbfeb86c9b8fc8ce29db3c868f44a3
SHA512e258b7f89c9bfdec04949cb0781d689700a144cd25874f30c2793b1eb372215a4b8cd7f217e48a777d41c31f4931f40778c86ee5629d8f795679a8e4422a8c8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578caa676fc19ff9b6af50e4ec7c9088e
SHA11a3fa5910b4a2feb4e07ceb4afb7660b15f238b6
SHA256aa12c975a60c97753f08417478d7bca04a04722b550c1bb45a67e4a334480d6b
SHA51278b749e68d8b58cecd359792abb82c70722f0f602d734a91a71438c9391a7e9348b992574046abbd4a4d43c6ab245cd3e1177ebdd627f38bb4acacf2e4c604e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df66bf42df96ba3b9828e1486aac6c02
SHA17c69519e301ff1b0e649f1a8b269e7a144e85ad4
SHA25642500c92b42e3bb08be0cf0336708dfcdf906c2cd83a6fc8b31958e8b8b5a119
SHA51247d1a7fbcd2bb17bb20f6bae024b7e58c3549edc93a7239bfde920e073399bec8d3b433e540cc431bee43f9346fd2af7ed4b391f3091218885f257b9d76d9434
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e422296b5b4f6fb0a857f25fbedad20
SHA1fc2d7f95b67eca36626dca537d72edf54c2b1388
SHA256302df18e71d691c49be9764b3906483874cdfeeed14844bc64eddea4c16cf623
SHA512b31e6f3a586569ec1f6784defe5f3a02aace5cf7accc6d95b83f771fd38e6463a3c8f2b47bdbcef37edd4ed7ebe8047b74cdc99a99bad74b4b26ba105d866935
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f3c3442b92b7cc98d77d96486d22080
SHA1a8fa9a2752c4af6d3f0609401d4c23ab05d68683
SHA2563aa60931e880dbe8aa22c18de197faa0c6ba3fc8219ff4e71a69193c523afdd3
SHA51204cf5147fa7ef02804dd7b84165e1c614a44e3e2b9714c019e21a17a7dbc9be87f55913926a61a2ad396a66bcea3a48845db01d887e2993790d049b5584cdba3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52216840812c337a7d3e4f626aeaaa8e2
SHA11527273e6b3a20bf2d9d73456096b1487ea85bda
SHA256ef4d9497400e007aea7b0a7f192779b62ba05e11e5194fa54ebb923f364f64f9
SHA5125ac080c96379d3b7b0a2205ee98daef7c8d426b6b37d87d3d628382825e5d9740717b568311bb9652cdea817ecb5bdb9c6aaf5c81099c44f004374ac65fc2679
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a