Analysis
-
max time kernel
120s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 00:45
Static task
static1
Behavioral task
behavioral1
Sample
775bc5d3ac7ea089af4266b494cf716c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
775bc5d3ac7ea089af4266b494cf716c_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
775bc5d3ac7ea089af4266b494cf716c_JaffaCakes118.html
-
Size
149KB
-
MD5
775bc5d3ac7ea089af4266b494cf716c
-
SHA1
a4b4f87be507ae8e06755148dd71cb5309812c07
-
SHA256
26f782d15adb6b04dd74b0c37e68eef444e94202619c79907a5841594464b4e8
-
SHA512
4a6b47e8a43d746da18789799656c9c301afa7f06bd597e73601422dfe7cf503b3611840193d4886e93b043eb11c5a8ae188721c18a123fd9aba7542aaeac820
-
SSDEEP
1536:kDNG8E16hC16hvS1L7w/JuKvpxKOqwQ0tDE3yLi+rffMxqNisaQx4V5roEIfGJZI:Y4p1FmhsyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422932630" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000121d19ccdb1875459d5578ae0ba27425000000000200000000001066000000010000200000009929ca275fbc90b130685de65e5697ae2180aaa2e9885756429cac7959fb020c000000000e8000000002000020000000b387bf5e9f0455720a530ef5d69fb18316450b52f8c8f87d56b4ac3e52cadcb5200000001b7c4abe1743df9cc3acc8f36298a8b5bef2a3ad82a1fec659838493ad8ba4024000000076c8536b126e07b12cb5c8dee56aa16c75e570ab5f066ab105e1a1bab5d67aa4542d55e20042007337176e32231f38bc0dab75c238696418b5b1f1aca3858609 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0833a79cfafda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7DC5A931-1BC2-11EF-9FA2-EA483E0BCDAF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2192 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2192 iexplore.exe 2192 iexplore.exe 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2352 2192 iexplore.exe 28 PID 2192 wrote to memory of 2352 2192 iexplore.exe 28 PID 2192 wrote to memory of 2352 2192 iexplore.exe 28 PID 2192 wrote to memory of 2352 2192 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\775bc5d3ac7ea089af4266b494cf716c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2192 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553575bfe64cded1c39886634e9f162d0
SHA1d640824af2b00c3a093966e7724b76dcea0970b7
SHA256c518238bf889b9bcff54e056ae675805e7abea7d7a8c53357bb633f019d4aba2
SHA51217904ac427978cbb5586656686653ae26011c134d38b3c3a5972a9ecb07ec19523d55a226e48adbb49d31111444bf5745687e40d2abd0890b439cc25709b5ccf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5106ae33fc8f72520254300a69f6cd481
SHA168c68657e538649bfe5e9a17aa68a969ac47299e
SHA256bd76b9069ae6ec3258e25c20a9c2a1f349c7a6d80078e3328a359ec167e05b2f
SHA5120767b25b393f2cfceba984cf084cd9c62906b040d9fea2928bf19e179f9380c9a9072aa5e55b160fb3fdaecc76a4578a226eafe73c3a9bc273b587680f8d2894
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0eedee2e5757231b3b3099625ee5d28
SHA1039719b86958afccde8a6cb7650f9c2b19fd7827
SHA2562597ad5ebe8bd70b00c5b3a2edd67f4256ca29049ddd856c0ea28e6afbacf39f
SHA512c71e7c2a4eafeeead06b6830a1eff5a9765cda694008b18084f9b5a55346fd2327e202df866260685aecf2a69ecf4491600b2a07fffe9070f77d694353ec367a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac5f394f031bfb867ae73d844d393576
SHA14fb2b42e9889da57915635a22f10f4889054f3b6
SHA25630dd6c297d01223f365c68f219ad1f1e0b66c81e539af419a9b3b28a118fdc78
SHA5122520454c4ae9fa6bffeb5421e265304e08dc608a852aa1c6b3431eb2c6573dd91311f74ba6979088e96e93204132b95efc7388029853d1eb849ca8dd2aababf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5274ce0cf81062201f2e31841f2986ef5
SHA1b42521cc4aaf44702e30d96ce4beadf839fd912e
SHA2568c75b4b5a1e207c2ab3ca91a3c12de1dfe3e9c1f1eb104e52e4064444ff58bef
SHA512c46f23c3b29275ae11b9340f61c63e3343a12d5f249560296ae0fdb5258b9c15cf0620a426c2f9eb169c8d384c744ee07ee9a3d1a0f5b1045c86869339d98c87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59019e350705d7ffe5f8865f8d7f5c627
SHA127597d1dd69d894817827d0588d12cb4eb9a18cb
SHA256363539b98d0770a2f0432037660198d81a163951b3a435a3f61aa8f3eb846091
SHA51271d97fc9fc695509596ec3790a12a4b4e81ed1473108a7ff763e8b954b15f92ae742021262f6b2ceddcae38282c6ebcb67459bab5b23f53bbd1228cc358d5d85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d637e8b1ec0d41005dd6340f8a2fddcc
SHA16be8f4a11f98c21cd5c63d549393335904bc6633
SHA25635c39612788147c629ce214297f6dafe5b6ba5facc62d466d66c4c448bb08f36
SHA5126d141d732c8d6d3d3849486035e159d3c7952c5da348aa9119c91b3206fadab4ac983e5cef47000abfc09f66eb0a933ab417a7f0619cc01708b78f26523a9d59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc5e3e7cd3f3434b61bfcd8a4e1299b9
SHA11ab508dead261106dfd4d58162b50daf71391c60
SHA256f4c6cf1db02faddf0a1159c3ddcfe06966c899efd895bfb1439714ff6d5d146d
SHA51257db0bb516ffada60bc11852bb150ae4d6d40bb7297ca8f3030cad8b00a61cb63bb720e07bf00af9b97ed5296050ef1b9de49acab21e0741b81358f2eaa5fbbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c10604aea8a22aa5fc488d07ef44074d
SHA1256cc2944c0ad0a1302977fc472085bd6079d049
SHA2562dcab459eb89ba2857d7522165d1950eaec8b30ffac0921a23d42219b4f68022
SHA51276240871f9cd0ae34fa3fb1a91e1efe2862dd2b4d3f14417bb126c5774c9bf9b5158c52fde6538b0ba1e92acb13ad4af843bf9ed42aca0f629b7c5dd1bc0812c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53eae3319fbf192ec64ac420d7cd35ba7
SHA10a913596b61d93e99c06953471722091a15eb7d8
SHA256177036f1346dbc90176e9e8b2a6037be33c7b00711e444164d27708ae37c4ebb
SHA512053b7d124ac2069340ece0c34b3849f09642310c23ea7e376e72f7fb305cf9064b70a4338a49846f0e4a12de4a8e68b7510c72956a31a19b200b16a9aac74b7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9a8306eb5f365142805d98569475853
SHA1cc77eff7ab0d6b8767448cd9c9f02a055a77a8b7
SHA25683229352b90e8bcbe02eb6186abf15e6ffc1dfb8f2ee2535c2eb7490143466f1
SHA51266c3a218ab70b0c2acf3983feb4c648bcb9d9415b037263b869acf36c14396ba617134375394675af79cced43f0ca271c1b3b9479539cf75c0f8fddef44db903
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c661cd1e4f0f3b1d5a6005b97af2c6e4
SHA100eb4a94682b267601aa5782777959986ff1ee9a
SHA2567e5ecb770719044504bc5e1cfcc6ea7a159dec6085082a0e19461a2e231d3c3a
SHA512dc9023015c886661625e1e4778affe0b7210251b29c041ddfdd7b21a87922756dacf42850c53432f2eee430189ca1c5ffbcfd481f1cbad022cf7f2932ceaf71f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5863784d1fa4c290357d56f80767dfa39
SHA1fe0f9fff48e9ddd55ae1f3dc487461d5b8b2aff3
SHA25633e2762c4c30544c3178f335e71607bdff4252088773e5e7f63e6d4cd9ca4c6c
SHA51258b8bd47f88e4178c822ed56723ee3799878dd96f5e340fc3bb96ff286d80c6cfefcccb51e56615c386cbeabb5eb59e5bca275f91dfe86ad5935ce019fd29951
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a673b7088020d8a55b082ea6976abb02
SHA1a51292dd49dbf532a84efd5e89a6f058fd591db5
SHA2563b1e004d70bb733a3ce6755b05102dabec12324c6352819955c24e56bd6e61e7
SHA5125e421d80cb0668e7e3901cd12790fe53aa4d80e7d5917232770d435e915ef3aea37fcdc562ddab0b84fcb540ad527c5c49979fe764b600717eaa5381979e10e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5071a3bbb75800ada038f9d1e7d6fcc69
SHA18c14bdece7f64e9a708106e2ca05d556709ad625
SHA256e638a3c60b17291f6a094080b222bcbe6d2aa138fc7b746b4a7563a1c3d1cd65
SHA5120a8e116b20f2fa2c9de44aedb7a26d68e1c96e3c335cfa2e851b985be53ba496945518c1130a3854607c57e7d7e1318443599ebd4a4accec8b5039d1955b9244
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5201c6b2d5340c3badb5bb9350d9c006f
SHA1eee14ca95fa7777a09a4f0062d7e805396f08c0b
SHA256ff1c71e60e0d5a09fb3ca495ee4b0a21972c81b86a4805758ea7af41b3ef94f6
SHA512f562df87208729018102215f018a6d13a60d4982d708b5e0f61399b13ff66b03246a09877d01e58a93c491142bdb87cc727e0386f4d789d7bc9cd5fc35b49c6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bdf91165fb061b1bbae81c1895ee84d2
SHA1f77959bc853ef6ce329c83f1a1ae29b7aebd4288
SHA25610dc2c648f3c6ec0d277fc20b88118f2387c0df5030fd7117d7191c03fe9908d
SHA512df6f532f9fa81271931ccdc96705f36551775c5b1ae2c99748244796cf242ad4aafd26e21403e4da1b2a2139113d54b6f7757f9cf2ec1926de10acc4d6953e03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fcec4f990fea5b51ab9796b366100f79
SHA1996851788e240580bef2287effc5464148f0db83
SHA25653c804734d61b925b44ec9d3a367aa6f504fc62726c57d2aace0d410afec8d87
SHA512386e67798b93785c84bd99a4dd42da85de9a169115d4e5a661704a7a3745af4af442ba4d11d90b97d940e925847ee5006b1a20a1198161408a5537bcd3adc9a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56135f8d2fa1fd64bae762f19ae46ef87
SHA1c674d2f88d1dfbb88e3be6bfceb20efbbfae9aeb
SHA2565fbaa1063ec78edb2830601c7c7540aba4ea43acd2181b23eb3e5b502089cbe6
SHA5121f1a998b93c09e56417ab97dc22aa60e1dc997e445fb772bb199e3b680e9dbcf1e2ad58a1164d3844dcecdb64ab86b644af22ecd8466a82d7a99a6d4787cd421
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a