Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 02:20
Static task
static1
Behavioral task
behavioral1
Sample
7796e235f9209e2827a783df3a4ed611_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7796e235f9209e2827a783df3a4ed611_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7796e235f9209e2827a783df3a4ed611_JaffaCakes118.html
-
Size
68KB
-
MD5
7796e235f9209e2827a783df3a4ed611
-
SHA1
2377dac3c741cd33da8be93a272d59c80f1bcd14
-
SHA256
ef27e8b90c50a18b1417c195b2e4d47f19fd6263a1094f2b073f9bbad7e41a5e
-
SHA512
4185e55bfc8732836517c417d39018f493dffd14856463a91778c371f6187c769fdc09480b6f335b0a134e293f8508742eaf967d8578d06ec568b82fc49665ba
-
SSDEEP
768:JiMgc8nX9z+rbXTxWN3vpmLmtvoTyvC8koTnMdzbBnfBgN8ZYyxoogQFAG/sy/Ix:JANNzTN/IatQTbpc0zbrga5TNnGx
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BE190651-1BCF-11EF-B826-EA483E0BCDAF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90d8b992dcafda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000cf86f84ffe0d7a42a759def7d816f68600000000020000000000106600000001000020000000c9f158bf5c44158be6013ce23dd44379c9daef69fe6527856627a21e096fc47f000000000e8000000002000020000000408b37d2997951d5051583d7340d395bb0596292e7700c8e3d28992d5f7dab3620000000d08d829f63d0b792b1113038ba10aaf921e15c2723a838108ef09300f916652b40000000edebf0dd6609445d73a1c07610541b19d4a219bf63dd2517f53498d3e3fa3deb55c1a14d866d4d3fe8a4803f5b090696d782dc2919f8b586e1bb0c7ec0b89a77 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422938321" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2968 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2968 iexplore.exe 2968 iexplore.exe 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2968 wrote to memory of 2144 2968 iexplore.exe 28 PID 2968 wrote to memory of 2144 2968 iexplore.exe 28 PID 2968 wrote to memory of 2144 2968 iexplore.exe 28 PID 2968 wrote to memory of 2144 2968 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7796e235f9209e2827a783df3a4ed611_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2968 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2144
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c543e770fee1e0ed0517e1bd09fb013
SHA1c36dfd9874fb9fc09ab488dbc9172c15d58ec992
SHA256cd3c7e284d159ec948b236b23b178373708f029a5c6488ea972ae8f882efd38b
SHA5127148ea3255b17e958f53a6a63721af4231d621e525e45bb496aa0b8d526c0fafca6c8fd460882b1eda84c216536b65a6ee7676a190a63f357fb25b14d58ceab4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51302e8857eb1941e3a921102ff5ede68
SHA1416376b67e7489ea2ac51a8bb1c4aaf1f5041352
SHA256bc6ded56e8f3a29f5d42f73ea447794321f7098a40fa2b5fa2847ead7a7fffc1
SHA512ad2c6a310f279a1f55b372bee82c3ddb6bd560005a7c1112c3936d11e5cc1834539fa73cbe8c26cc66e830c7bc5fd021202965a3e89d34700202a9f27f15230f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5baf56e8ce65138bafc2350e5bc3609fa
SHA1a70fa3761162af7b848a85371625e5d50dcbbb28
SHA25650a3447c69108d7540cee31d98db521971323c6e9d65e5d0a24ee8c0f508e0a2
SHA512db41edad314a588b3bc46fa28f64e1e7164c4733665981ab98c358ee8ed00fcb961e073eee1f14c7122c93a04ff8f97207a78191875b548a86a858e6083ccc78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c08c44b36022f213740e737afe3eebf
SHA1bf7d6c8c8254c9842e95ecb8738d524f66c3850d
SHA256e5cce8ce36fbd2177268656ac1b18eed258d002904515fef91e647000f450306
SHA512a25ed5b1694279d83988ed2579b9cac6fecdb8689888228cc26ed13bd1c7389a5e2cca1095b0b9d40031dfd8874e462374effef9ebf7fa18a74b7608fa547ee8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5629bb8e55e322ad7357a5cbb04bdb646
SHA148fb303b3fea34abc984b98292bc0c399302af6a
SHA256926432ecab3c583691ba60e143371bf94c6b276cd0d60c05d26024bf5fe1c058
SHA512ec9c7a8a7d957c4041e4130c2df7a3a5b4400b8606d248e0d7ca9185d71e0c9e082099df9dba4698b16c6acff513f3413a4b28f125966d4932270c6b6f946052
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a60528051e915dbff40316622a70ba1
SHA1fca32aab75b323f603ed3cc56eb5d8a15a9a1e5f
SHA256f2fa0a4ff7c526eb5d49811948291806b322f0e98f24b3ad2ffe8779048039d2
SHA512bef93ad90ed92f18158f25d9692b132c675acdf1bee9b488ee0a3c417eb032e29d111aedfb8920fc2d09a3e7320bd8099c4fbbc8d53df93a33afc533fec397d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab5e3f9c1bfa171c283f4ec1b30ed23d
SHA1c22da00c926efb977e83984e8e55c5ba9e1cb029
SHA256a7867b4183e2ce7f3da92deeaa0aad19890737694dfe252b5a72df3561749677
SHA512d857d16c5ed9a0d9ad997647c68d7a0b0085940768aea111c0bcd58023d49447d20a96e7c76153031de00ffa11df7841a7c1894981bf0b19291c0a301fa5ef7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b674b47a7535ce2c8a8b64d6339ef48
SHA11a9a404135f18236e25d78fea3a2d8193fb690b3
SHA256d772b3b52e62e1999a82129841c6b04b9e36d01af039ef610ee3c5395dca80a4
SHA51291a9c0d7d403f417ed274df06e8725d9906cdf028d032e0e7d3c974d2b678c271ad34e397744888a5c482f8efbbe6e527659f5c6720ac9061b394f0a26306856
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517e361741be94448558df279835b94ec
SHA16e63b9f27c02dad8a5e9016182cc84bc70900eff
SHA25667a44d42a97ceb7f6559a572333e88dee16084adc83d63162eb3acb80a6e7fe1
SHA512db9f378c70002d69099164e8ab3ab280cecd37078a9d429f7825d498b8ea4f64454289216aaa07f996abf0b4c8dc9fb7182b42165c0af572b4219dabb573e97b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59fc6fc50cb9296117f66bf6e375e5a98
SHA194a9dbb4b12c45aee58b2cde9a84fbd2a0e1a112
SHA2568b8e1f5e613c190c4879cb1cad5a66d65559f5769793ed00e5109bdbe0d92c78
SHA512ae523e4bab27a6302b7adbc0fa57aa7d3a21f021f4adaa8e2943cbdf76823aac5bdf922d21fcd97eb46841b80694078d0e8698d841388863fccdddd39d18f74c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a33f238ecd26b3db174788c8c5a37374
SHA1c25ccd277236c1afe2262a5fa00aea99bcb99e3f
SHA256f7d9cd35c42a596a10bc9abad69e7dac63a8283c119253699458aabcad9d0582
SHA512c780b4a2572f829453b5f31899c13899a8f5d760f36ee5e7357fa584f786fcefe0dc8fd6c89a8307ea7cd498d0b2a22def23b3b626ba170ce459cc12b4b9d40c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd677ae148c91903d3f6ea7e5140c662
SHA19e40ecfb78887c4c815329545000abdc7650b1ba
SHA256c3fb3a406f612959a9f540216c372c03d1926dce691bb950a0c6e3a36d5699ad
SHA5126c3b53c23e2f353ed16a5caa892f09b4297d833ca4fafd5275fae65ffee94d75728eef64dfe27961799129b2cd5f692ff69df5d0189fdfcfd5ea1d67cb034305
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5376d6063800cb95a72a090cf3a2a9a06
SHA1f6699dc730fe1ad09491b36a46e3af83c9a19d65
SHA256440b503ef4a7eb7318cc54b95adef90fcefc1ee84017ceba3d18d79a2229a037
SHA512651956c79c19f7f1d48f07a2a9542c96e09e150fdec7dd64234a5019f308959a23e02f68ae5884a74562fa9408d3d322ccca05044adf658bec087bcbc6988823
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58604e9c2b3581e5ecd4c142a873151e1
SHA1ae9de4b7c28a90239da582db9a7debe1ff1c3bdb
SHA25638f2a5b2ad9271a9c5413fa8e0d28abc3aede627d1c8d93b71430333ffa87598
SHA512857abaf7bbc9bcaad6e97ca06c321900f340b5cc9e36fec7af3388c21e885ecad2b7bdb868271fbc70a1df3b7820e8d80c245a89aae42ef2886259470e3f39c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580197a6b8044d4dc533313bac1a0f2c2
SHA1690c4b4934adcebb7410be9387e139383fd663d0
SHA256217d1bd071a89c71e3b2b82a4bbea4a561903b1964b6a46d6a119f453f9bacee
SHA5129f3774d927b52fbcef2aa744e11d9d2362a5d62df777f6a66981ff5dbe92250f5638434b25b34b4be5ce280643d97a5da90f55dd51d31073bf0e598e5583e996
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e44a8242ef905cb404f3fa7f4f5296cf
SHA1a87a731d31b0f505f926fd6878cd46142461734f
SHA25621b636b724af5d84332e7b94d38414bcd55054ba7a92710037589745f5807a91
SHA5123f17b4357ca06eba2f089d24eca4f493a1517ee2a116e55973806edb4bd34ed4fb4480e1eda39501a94d1cb9a1eedbd75941a61727a6f544bc227e72ddf0aff5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e4b9f88081474ffc887660dc1b3345a
SHA17d860b5feee083092c4327b0153a5afb0f89c744
SHA256d4e39018cda9c5ad591ed0ebee80e750bdac9823ac6cf0ced4dbac2bcd1a72ef
SHA512e0207083599f85ffcaf908a2d73d9455f31441c4f39e76bfcc3eb3d1b64c530d1ddefd3415211ee1e6c137a23d280bdef750c4d2f23974f24e03c929f24e8461
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9d9de54a2023c834b7774c7c9805217
SHA13d3cf49843abf319f965cfe0e4c38b12b5864109
SHA2563cda64ae11c9289b42a37e2344ac4a020eccd26e1ea1beb846be9291e1f2e180
SHA512fcc951d77a9a751dbba24ef103bed9165c6e421929d4deb3359d866f31627d7f71e5be9208e813e1f743ef4da2005f38a48b4d47b44b8c21609dfc129f6d40f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9fdebc1104cf74f7b9f57f431d05428
SHA16a32dce932b8cb584d190c3ed58a8e258247e64d
SHA256b711d563ea2484a2676332b370edf1c05f5a969155420b532d0ae59b38c67115
SHA512478ce2f6f612e77b4edd975c9802929a30e55935268b7bf903198f92482f30799d811b5fd60ec68a9e5f43ca2a4bfd3b707655b66a949c9c5b6043ef7718efeb
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a