Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 01:55
Static task
static1
Behavioral task
behavioral1
Sample
7786a00ae3b5689e97f8849156a7427b_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7786a00ae3b5689e97f8849156a7427b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7786a00ae3b5689e97f8849156a7427b_JaffaCakes118.html
-
Size
461KB
-
MD5
7786a00ae3b5689e97f8849156a7427b
-
SHA1
46fc19aba376be3b70c8f51aa5d0e8b4f71c3a06
-
SHA256
e2776269eeab240a21440262a0738c07c3d544d4c7b4c3a60a3b5c9e90071a95
-
SHA512
f1e45e3f9429e16e84f1705541878eca24262afe9bbd5140cbe00fb76bf8a9112abaf685f9100b1ef898cf6bb1fef546be74873211064e7a68419280d7828218
-
SSDEEP
6144:S8sMYod+X3oI+YtQNsMYod+X3oI+Y60sMYod+X3oI+YLsMYod+X3oI+YQ:h5d+X3m5d+X3Z5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d05130fdd8afda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000a8295bce2a0d2e519745b0522de37717d603dbeb7822fba1c4f2f2f1414541fe000000000e8000000002000020000000c06d6efec880319321c0b5c3fb40c3605ab51811c8f4b825e74e2ed9a5e6dbd9200000005cb7552b911a2286ea1afa4e7ba8d1f69bbe305059451a86b01daa2f9788dd9a400000004bdbef1bb18f99e819cdf7ac47d693212f00d7466b76f6f6360bc788aed72ef8b64f7c885fc75d69b77a9a83140fadd6dd8b3947133559c26245a2d8faf37d76 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422936774" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{24A341A1-1BCC-11EF-89B4-66A5A0AB388F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2956 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2956 iexplore.exe 2956 iexplore.exe 1672 IEXPLORE.EXE 1672 IEXPLORE.EXE 1672 IEXPLORE.EXE 1672 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2956 wrote to memory of 1672 2956 iexplore.exe 28 PID 2956 wrote to memory of 1672 2956 iexplore.exe 28 PID 2956 wrote to memory of 1672 2956 iexplore.exe 28 PID 2956 wrote to memory of 1672 2956 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7786a00ae3b5689e97f8849156a7427b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2956 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554fe013fb0c103583bdd80a3e8115a4e
SHA1edee07244ce98106f1a25383dac63b72b4ba6e15
SHA256f0814b1ad6dfeb6f2b73ec95cbc75196c784a7895a894b4e91970516e78e602d
SHA512ba11b250db01028d62c252eb8fd3ebff2c894b97ca204e2f23134f567c9a7891faf3c31955a4800b89da983455c49bb873056132c0ca88fc5d54f1b0edd1ede8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5553e2aabd85f5245093942004497d742
SHA1fb31375c6b26e6d6afc3664c900fef9880c569b7
SHA25657326baa4729c36858bc5b6b8889b22845a7bfc041ea16b5ea1ec7d61cb37bc4
SHA512a17b6195ba983bf2a43a6c0d879b976e1993e788cee52a112e78aedb749aeb955941a29557b63182be4e43548b93ee211917508d888106cee9b4a762b4db1a71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7012a1f5f91299b8bb1e9c8bdcafc0f
SHA1203702e7cabd7145f1cc919cb9a6a329e0cefd4d
SHA25611c1e71d05c78d8c9204b612b4ff77a1cd6ab26853d27595cacd1cc1c3e12db1
SHA5128929d5dfa25347e5a1e41e696a3b64045f68b2a38601a09bf5caf52d08d26d3b88ece73e7f4e611c6666a6862f4919f2df36b02582f9648a87c1fc73385606f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50499e55d1f0db8dacbfe9844c4835ea0
SHA15eb5c4eb25be24f662d02ea756cbcd928962bb58
SHA256f46ae4bf4df7b7c875c48ab96d5972f4457ca4379382a8e3df2214d58beabcc9
SHA51264277b86b2a65ae55726b97c8617ff22412bf85041984f29fd5abdd221215a0b7576f3bd21cbe924b0706114e25d05561d0db804943581467f518bcc457893ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e3b5d20e879cfe9fda2fecd60376cb7
SHA1e1304d787aae50af188f2264867cb7ecbbff8387
SHA256354271d6adb2c3f41132ffa01730c3fbea326053afcb237e50af667885b9163f
SHA512db8d1ebca70dba0d58eb6151e4d33d25b8135f693cc2773c00f8afb6265563d633dab9d5088ba077d1eb8a29d1ec2fe07ffd2d84c943098a76873713ec104531
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffbb2a035447fef5aec9a5a2598ab0fb
SHA1c7160ede2eb03a1c4e07193102024c52d66c390a
SHA2563d9dc8b9355463b148dbbcef65078bcf473e9ce9b0141254dfb6174cf882753c
SHA512669a27e6c7e3724293d0bd7dde0623a9f5eb7c98c112f81de4ecb78430aa39316000f7eac917ca4ce29312bdef9e7399b559f2cd2811f3be0bf2fcc5d62e8449
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a0af63f6280338ed4ff1c54548ae161
SHA1fb75f4ba0403b032838a850319df16d1a128c80c
SHA256b57bc0a8b6c6c406bdab54f77f238b8769e3272e5aab7ead81ad0d64919f17de
SHA512ed56b91f81c002f093f1121a1b813fbb32110e23d2ed0b37ead0cf5ea36dd37fb1c00d2a1f50b4fa8ca3b89aa717867e2cb7e934c466c67df83a14a62e5d0952
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56fabd74cb673f5bff682f39b466ff56c
SHA1a567a15bdb786ef422fe6dc694ca105a6c4ae280
SHA2561960727c9cbe86773ce3a79561c054498ca4697c6e02b875a72b02c29370d7cf
SHA5129b3a86da5072d76011c1c6ce64f3d9a78ea818a1b7d4cd323777bcdad171c4411cf1c3e9d3ad2a1ef5d875525a33277a727a48127055d1407c873958358e6221
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f10668453e602ef1e4065378a326a98
SHA14f6b9b8d418f0dcaab00aa236d725145fc136b91
SHA2565654de792e59c68525e11edfbe7e729b8240dde18d0a9070d3caf32ff504caf4
SHA51298146d4a5ce35cc647b64e16d03b9735f245abb6ea0ddd58ecc78dbf870d6229fa33a126ec8980d4e1416b497ece08c18c3b5cb658d7683411190bbef74a7cef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559235cc440356ad52d7dfbc14dfb0ddd
SHA1b42b1065f0b9e90b0d1b17971b7f5878bc87a973
SHA256b41b3a0f74621e10ce36a49f55a78b03acfbf9bad4077e7ea76b4f9401a453eb
SHA512e7bfc61bc6053e5426909ee277c472733c56a9b44df04cf18a4b58b0ada76eed4ed5a5460f0b95359ffb582ff2004e4e3e16ee254c2cf92576092cab8d7d6af2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f08ba28bb04ef9152aa15b28cf15be9
SHA1dc19ae7ae55ddfc9c575e833e0bb40dd8973070f
SHA256503a835c94e7b955a3c96c4e8c66d5bb02a1065efe92b13c4bb56eb0ab7bf729
SHA51272dad1b606a79a2ba762dc86f59c3c374c5096ba9a807d7f331fec85a3869e32d86bbef6eeaf04ac408c66477602236bf4bb1183b455ccdc66697fc849ef3959
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502457316be5e3dda8c5dd51de1e608e8
SHA17a4153de39f12516dbf002283c6a9052cc163e6c
SHA2567cecc8f21ca73d266362514c4359ce1d28e08f902c12d750dce10c2e1eac1b82
SHA5126c8f3dd1de036ff38620556134a25cd4b3913d81d250d9ad41540e779012aacc9f3d16717e0971376587d18597d2d78aca5861f4690235e37caca0537141d125
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5f3df85f797a18713a5337ed1ceb881
SHA1722bb41829d61b8f6c0aca48649b7f079fc24759
SHA2565877694c47062e3acc4edbee116cd5bf1687bd6d69f8107c61ea92786ea752e2
SHA51234f4f1b39c338ae2b6bacfa6cce7785c5aba4adf7712c9377925da54cacce0483ca871323dc78902d4bed598acc568333d1783ffe4b06e0fa873cce69550fc8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e52773b3d397f993b5e8ff850f9f0cc9
SHA19fbc9c26a402e471f14a420ca48734f26beb356f
SHA256aec7d6d4e1da8ad560bab06523a0addf4480f320a98d20a4a7350e79b5ab7d77
SHA51224b0b2146baa4f4c7a5648a80a731b70643b7640fde236b0bdf6e90f57fb22bb0521eb107c0f96d735bab4ce5d7d0dab1d0a8547d2bcb73237017d45c2603573
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563949f7ee55bdd749c26083e9efca63a
SHA1b22d2bfb265e14551198dfbe217119a4ccded4c7
SHA256fd324345ebb4aaa06cf9868e266c82521a7229cfdcf036535601d10d284e1973
SHA5121692658c2ff4dd5b0ce242b6102407fcd079ea7e6c591f5bf0aafe51d93bbc3181b0bf31b4aa27e1191d861c5f1c4a42da6259ce910cd2e131329a20d03c5198
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539a3dc01acdbdbed75de11e5a990496c
SHA126b9517c4f12a43a5a965142d6ff9c946e981077
SHA2560768728df56710023a447e60849e9654a9f2a18aa65068b990c0ce4fc3d9137a
SHA51295cee268c7c0c7211f9c42b65a8938696622e6e71c16a254e75942585dfb2b6b41802bbd5d65a6d9c06345016004f4a457b3a7ea08a66826d68ef7b486014090
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f65ca74e9c81e95e9361efbedf078569
SHA1085636f397020d6921fc303f5bf73c40e67498ad
SHA25616d7d627541c808796bbc1b37df167c6cae1517c87d57c1ba767fe0bc2543b70
SHA512a6ecc0a3bbcd795e09820f77de6e0fc9d13d974020250388338c02d0507a326bb5d7842d16735ea219ff30bf99b373f7afd1f41ba8798c95d62b739754f0d886
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5069b39344c96c0fea14ee85f9718df1c
SHA1fc298f0a0ee73586dd78284b6710773f0cb7f0be
SHA2565fea0017689dd7f5322d40a3cab06880f88a9215013655a4173cff515435d143
SHA512b7f5496527870ed2f4e97ed61b9107d192bcf164502d04ed7724c5a2ec48c531102663403f241f475de4f6459703b3e6ba3819ae51b75637d16036817d809830
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8fa11f9b2c06572356f4e36d639731a
SHA12e9f981d32f26d47bcfd9673334ec0c951cbe903
SHA256ef592570fb63651d735b765c1830a74989ed55082488db946e57604e1f4505b6
SHA5120c2cc1a5d8e02d431f85670106719619b2a98df7a2bf23cb444f8685b5b4cd34998b9c310b808bc87cae93fd662568eb7fe319212228bd5f08d9cdfe22b9a6b3
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a