Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 07:22
Static task
static1
Behavioral task
behavioral1
Sample
7856600d7d944bf22786330dd7ba0458_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7856600d7d944bf22786330dd7ba0458_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7856600d7d944bf22786330dd7ba0458_JaffaCakes118.html
-
Size
17KB
-
MD5
7856600d7d944bf22786330dd7ba0458
-
SHA1
6e920ff0308b431a4f90908dc2861477ea8a869f
-
SHA256
7d3072f5f1e68c0bc972e4b2026249a33a9307fef5a46fe07c7b558df2aab86f
-
SHA512
7f4478b8b808e638adc7255a437eea1e299589d77e1f40ecf2bc358795eced312a635c5bb5d6e29f9abc1831e8040c8b7c82bd4f94242a92974abf9b813d15e9
-
SSDEEP
384:ONphW/qYBbMy+Fs7s9470mDAPebR8Xou0Fu3ghiAsR/XNx6WSKLUG:OThWycd+y7s94ImDAPeuXoLyrA4/XNxJ
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000a8fd55ee4c157a109baf77bf364faaaccb3d560f4baf0f291bc0107acc062987000000000e800000000200002000000036638c3e3a1ee1d9b994dc55a52734c27e4b0c5fe6204e11d0080cb664136c2720000000245b97029923096dedd68e22c0674b06f9f3550b4858066d1a4dafdd6ff5abe24000000079acf9b240b4dd2c88676eb8a1dd26a57004233979732b120763ea5e7d0066ae414de34fd95c707163ab3a14de1d1e45ed25111db6a11a48377538c8c1b08bc6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80cefcc606b0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D7D70B81-1BF9-11EF-B27D-6A387CD8C53E} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422956402" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2848 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2848 iexplore.exe 2848 iexplore.exe 2152 IEXPLORE.EXE 2152 IEXPLORE.EXE 2152 IEXPLORE.EXE 2152 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2152 2848 iexplore.exe 28 PID 2848 wrote to memory of 2152 2848 iexplore.exe 28 PID 2848 wrote to memory of 2152 2848 iexplore.exe 28 PID 2848 wrote to memory of 2152 2848 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7856600d7d944bf22786330dd7ba0458_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2848 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2152
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe3130f00edec90264aa14b4bc74b264
SHA17c468c6b5683d62973a075cf1cb3e9367c3d1947
SHA256a0489acbd85dfde9552f234adbdbfaac0ea9a59885c553fea717ff541d9b8bbe
SHA512139a6ddf4534045c21b3a99c39668205c54cd2ca141ccf6e45ec48d5da560d8c23b93e1e5ae6aebc7e07629c2d05e422f66d8def34bad40d4274284777c5dfa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c16d8bdf64f03ded79f87faae9ab51c4
SHA1924ff849a24d229bc3aeb331be1fdeaff4b35d66
SHA256a26215e9ac7969d744615d007728ee243a994517ba4115b9ac022a72cabd8888
SHA5122b4d8fc3748a99e42d10325192532ba4bde1f903b8b2fee2c401dcbf0597de35c911eb33fdbf1c2fbe479aa2fb8106101c8b25c6146453338032b36a934a442d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a26b533d60b637c2fb795231e3a8e50f
SHA1946c530bbd6ddf42c7a68b9c68d913e18eb8618b
SHA25675eef3875bfedbab327340d19d1587cd8f970bc8ecedb0fd793abac332565eb8
SHA51267194269104f133578adcf265272c362cb738b0597fd84802a16293098e4da9153223ac31749b8977315c826eab8dc3075f3990b310ae6bb0eb8a468e89017a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d0bafec76e818a2c3f2dcea0b982091
SHA1f983fd9de6021dcb53f22b5b0a0e2b079bb7dcb0
SHA256a218cc042966cc0c3424169884ad2ecd3b4c7b8e8eba4bfd6bedb8d541433e67
SHA5123171877125f08e4d2ef8564cb47f010cad02fb8d50a7f18b5a482edd56a45d22d62a97015d92fa83e19460c916c47ef5280cf1e14cd36d656b1efe767e47d303
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed106be5ad856e6bf0c5a11faae58c51
SHA149e62fa49fda3da59835029be1c06caf3f3354e8
SHA2567a9953abfe4da61e84c3a1e085bfb4d89ec1a35b3a0be5d2775b1b633b19ddfa
SHA512329d651642e3292a61545b0024f35e0ee03572737dce9b313ef8542542b257985e1f159cf609ea3fb87782905a20d3b34a962e8520f71d7594f8a7a1332a989e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea2f5938df881be5b462b04928ad8937
SHA156d8fc6483100bcb4b202dc3a04c188e69fad898
SHA256b1681cd4f526e3665d60fe129658bdd89b60a50f4a78654dd2627dd08f1b54b5
SHA512369efae1645d8ff1fa6dec1a00b8c66db009f6238bcb032be087ec00cd41694fdb41f35178f253bdcdeedfbc51549e45d71b1d7ed6783a346a61668595ebeaf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c4886643b863de1093a53023d083cfc
SHA172b15797db5be262036608ee3fc741e4441e6094
SHA256e5ddcd7f04b113f2c273144ead161dc339c46323353005a55f0e9d682ee82711
SHA51261beeddbb1bd2e793724e60acc19168d5207ee3d6a9f0a739370a963667474033ad3136659324a1595a1de8544daf5a556633502680f578bc5e95651217a37e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1d51e8fd44afe9d2f613d5f33a8409e
SHA12b4f7e49046f503c3d110ec51f90db41b7d8b811
SHA2561f8047c0ca3c317edbac78868a2b73418c389e66c8730b41f6cc66baa6cbe364
SHA512183e28653f7a15b84d7d94d4c5cea4cd32ea55550f55593db206f89e20f3eea6c11d334b4e748bded2e8b39d34e985c460e14c592e50d7650f3ad8b6196d1752
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6530e4b5602c47fdf51d81d57ce344b
SHA1685175fb77e956ab892e4d1fdb811fdb7a708783
SHA25658bf6465ff0b6b587bced8341f82249485721d16a536d6bbd14999b79bf65675
SHA512b713c2d1fcd9f44be56b59d75c21bdf0b7b101d99d76ffc3e451f335ca0bcce08906fdab65793ddf18877515d42f9b5ce097479347c22baa5755ec54be7a7662
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b4b0914e25987581776c5964be5a5a6
SHA1c14d457e6336a1a81adc9e8ac1f2664c1104b0cb
SHA2563804bd403a586af620c98518702ac5070d22d4e0a115c677d42cc076695d111a
SHA512e73732ad85682002c9724fbab633d9ed45f0c3c2fb3f7893ceeb470760dd3688aa51fbdf658661b137a7981d6e9f9f3e06c4f47f65ad48eae2c24a42ac9152cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb37b8c5afd65ba60df8d06c81ba6e6d
SHA121f570d96ed4be97db2c47486d443e61136193db
SHA256a3f7d81f202269c5e8285e8e75cd8d383046d0777c210864b3910750340fedce
SHA512af6b898c9561b3da9e19608955f80ae82e51e594e3d325726d5a2dd915757d2fd6d522ea048f465617b261db7f95c5358542aab37895f99c992b1128e0d9e5a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5836347119f72a9faff73d967ceb1880b
SHA1f1023b92c155b2bdf6964ed874ef85c1d560ae4c
SHA25646462ec40c4d4e8c812236138a4c042d99cfac5f9c10d589eccc25ae87f7f50a
SHA512159262770ee92d2d9d31e6b75acd6f74d4c7ccf33fdd89dd0d132d41eca3deb9873d91d9a97060bbb78c1ebacf41234a20393fb4479b8428867af477bd87512d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5751dd051b0694cec746016fbd132155f
SHA1f92ada00f2ae6665a9c8e04a2a61905c8862f1a2
SHA256f877b15bac36ff1eadbf3d826def91e946f05ac629a48707eefa799f80fc0e50
SHA5125d7ada45c1dbd51db26d6f5a9cd3f25ce32802a79a084a6f59278a5e943d9c96df283037f144740a62788e7b23a44b7526e2be536d7cbb42bff6f07b5b214e51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1cd4d19ee288cfe644832901d33b0ed
SHA11ac8db32676e4eeb841f7575d31d400334500d58
SHA256a4e4664c5343e451a97854bd40ff749f8f244cb833da0f6a04e0bc1909378fae
SHA512e17b90fd99a7e577dd1987091b56eba7225d591fa532bb9133b601c05c28de4c38e63cf950f77f18607653a9a8d405bbbbd485b397c61e575aa3582d1a4a7d78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531aecdb3ddf75ad2eafb2bc6594ce103
SHA1b8f349e3c3bbf5cee6332fd3a008375eecfb7f93
SHA256203f2b9ea46d2b7600c63be7ede00584cd67e17bbd785edc5e6d66529e9c28fb
SHA5125f5a20d597e8480a5e36cfb914d7641961ad04bbf73ea8a3589cd26a61d6429523363a8d0fb06d0e38e8fd31bd418462f691c63278630057f0ac01a46568671a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f56ec521e446c53b6aaf82762e138b7
SHA1255adb519db1b0c143191fc023138b1c920c84f3
SHA256bb4eb5960eb9baa07725242766ef7eaf6cd0e68907f19c1c1f7b3b25827b65da
SHA51294723af3ceb89b47b879944d6db5d65e56ce5a7dded371c6e50c1ee1e69a26503cdeb1ca3398cb0ae678a9b6b2f8e0d0eddc93377c9ab4fb7a073532213774c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5070326d1bf9686ab9aef073147f8533a
SHA18d7dbae4994285b147b03897f5c67af2376f226a
SHA256566df7cf17032ddd39c229c3e1e3334d1d8447fd3492469641f98956b93c0d2c
SHA512b6bf55a48e6fc7285c1e55e9da1a952076cb4415f157e4e110faf11ec231cd304b201af2f531b459713b8027ddfa9fe9fb8eef07e1086d89ac216f0e872739b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d447addaab47e2067979dab3ab23a6a
SHA1ef533f50731a39d6b43a520b7f65fae1b3cece99
SHA2560371e53041d1e9071fd1526688679321c23f5b017112a6f666d73b89cbd0e337
SHA5125fe47827672e4c4c76c61ae5ff80ac746156dad826071eb3e7b0eb66e88b8d93583125981604f9ad29500f311408b1cf652985f18511b8b9c56e398b69dbc9df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55cca65946f789120e951fcaa27a36b73
SHA130bfca671b910e5016e2c48288da7e2bce626d41
SHA256336462721b8fb61e9f6921902f3a8acc3d96fbbf93c606f6b4a1a347abefd4b9
SHA512689fd474c04abceef243ae28b1f6edff655cfedf266ad03de43126e3375851eceb46fd581949f5c5b9225f9d59899d49f33ba43521ab35848dc9e15ee55b4254
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0a67012d6a6e7d4818c5a61417abd3a
SHA1ba93e5e569250873b88d48ce98ba0e467286534b
SHA25654e85c2be326cf0c72d500b9c4876475488ac7da30ae40b150a0e6d6737a8e74
SHA5124b8b1cc5e3f7c92bf5610e7f8ea6882696d9f473354581342a33667aef2e0b0b4f5bbefc22920999b9dc70bcc801af3d4c70f5193d9562253b510d7d1f0ca5ce
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a