Analysis
-
max time kernel
136s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 08:02
Static task
static1
Behavioral task
behavioral1
Sample
7871f23911b249921cb42ce5aeb72fdc_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7871f23911b249921cb42ce5aeb72fdc_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7871f23911b249921cb42ce5aeb72fdc_JaffaCakes118.html
-
Size
67KB
-
MD5
7871f23911b249921cb42ce5aeb72fdc
-
SHA1
17ac3b1af562a9baeee683f8eb2088eb9bbbfd73
-
SHA256
91a998f93a4ed2fe9a1242239baf7dc6cfe1b28ed87361c46bbee97cabbd83b0
-
SHA512
10ba32f931cfa5f6e4a68f02704127092790a453b43ddcaff8f196fc8f0caed89169a430811b6f278b0936c604acfd0e90d3ccbbbb5a1767fd5d2bdf80849ed5
-
SSDEEP
768:JiogcMiR3sI2PDDnX0g6fTB/oTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVG8s/k:J8/TzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 401cfe480cb0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ea020e5f6079a9469ea1dd31ed3923cb0000000002000000000010660000000100002000000003f76fd6c083fa7f57133a66f3e2a52e2e57384051f2d2e16bd9e7e0ad2bb7dd000000000e800000000200002000000038e7e45f7ec111f690f776cd526b288290f86f112071b08cdc3f9b7c4b88ff0620000000583b9918f6fb0b545b0ecf54df37de75bc939e044fe33ea3470aaa1783acd78e4000000032c1924c9f20f37006b42e640780c6b29b9f73e6a165835181c87cf583fe19aa672faae5c2f07090be90f9ef98b64144c7f8291740a61183d03d1394cf47082a iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422958813" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{744787B1-1BFF-11EF-B937-729E5AF85804} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1720 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1720 iexplore.exe 1720 iexplore.exe 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2780 1720 iexplore.exe 28 PID 1720 wrote to memory of 2780 1720 iexplore.exe 28 PID 1720 wrote to memory of 2780 1720 iexplore.exe 28 PID 1720 wrote to memory of 2780 1720 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7871f23911b249921cb42ce5aeb72fdc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1720 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a11b4403222f7b498e11c681566acd7
SHA1cf8b1839032e8295c8b42fe0cf2b97152c15d3b1
SHA256c78b33de9901e27a9d3baa58e42f435df4b79605a5a06143270ee381c75db79c
SHA512c5ecf1d6f9abfa373caeaf865c53ad65a822b6351239779107d752fc6403680188e773711936011263810a8f0eab01f2a5a5012ec248e609620c2ccafca9ac72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a688a8bdeb6a736984d57803b9a06f97
SHA132155871f2397e8397b37d70af61951962e9657e
SHA2561bee98cf171f92ff0781610d3bc5c8fe3556df0d167b432ed917f44702d16010
SHA512d9c32ca0f27f5bc9a9040a0b351fa8ffa6edbbbba3c33d836fb10ef5a9b48969097f6a47f5c389523efd0c83751a518e78101b44caa09aade96dadf8290458b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8cfc069b6fb1506b339126027415f1f
SHA19633d177442353457a7c188ab0e6f7b19cdc944b
SHA2563eb7d091ab9b62b0680e250dbf1db0f2c54f0450430a728d474c1ddf111d1d23
SHA5126107945e3e4b5876aef41ed5044099398bd38eb72fb99cb234da33599a3d02d327a5db31951db36197c5482808265175020e0cab641f2951d06e55708ef56c78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527c5eb7916206b1c450ca31bc395dd94
SHA1c00b0fb1f97b4add47b8cf5565723acd356e274e
SHA2568b9e4ae6134a07a0a40c173d6160275494e99afd08c5cf55b4f7d86e2abfb4af
SHA5126ea07ed4c6560d6fd24dd54e7d5270120023bdc9267173af3a21860cf57fa39ca7f05fa8d61836a715312fd2036c52f393974bd42d7291dd6f09140b67a7f37f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513a533b4bed75cc46b598973a5c5844d
SHA1cf10607deeaed8cdce0479637b00b31067e9a617
SHA2565316bd87cb987c9b288e2825d5742a790f74cd3d287826242b417fc9d01a4afa
SHA51286dc4b1a40f017dbc4f9a6c0c8315bd9c395b617f2c034a249b43eddecc83040e57469c809db8243e44078e4f306095a5c10f78f4d52798483f487a3a3648335
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5a850bd45d54da69745d00872e0afa0
SHA1725aa4571a086062088750553afb5365b73ec392
SHA256211ba7a397b13287d0cdcd0eb5678da7dda81c1e2652bc89b2c530d5c6072783
SHA512b0ea4f49ba0ea12d789fa2a3f00626e69a1ee417a48b6cd8af8c541945c8672f23c141e9436a28598f76149689015d5a3cb0eeb548d8a6cd58b4b207e04f45b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586a25e2035a639297b2fa81122ca5f44
SHA1657ff9f28ec3241f58a81f497e517a6c7da4a18e
SHA2564e3ceebd88a893f278518002dcecdda0e7fb8215c37b62d0668d9616c9989e03
SHA5121c8473a74e19aa229b6caa1e9126e739d8242933ccb26780d2cb95a9b559da40be05373118b5685949f2aae98bdf2155032b490ba8f3912932009e451b3e1772
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d2418d2504201397ec2b3780f6076d6
SHA1fbfb80701dd4f57af34302d83401e17277734734
SHA256a0efd41749335a26c33c37f1b2851189f95c3dc5c82239f9ca5e780d288e84ab
SHA5124f7e0de9bc3d321337a016c79060df56d52e5d43cf69f6a97e8b405e17d4d7c76c7d841ee66ae56367dca073ef329af8f95460f276151ff4c20d90438192bcaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e18d82c37d66604cd2ad924363d8a50
SHA16cc59dfc58274ee14e925d28ed2dab06726a5d06
SHA256b1a0f667d07b0e79f970b63ba6d5c75f10d0fdabd52049623547c4d0e1711aca
SHA512691c43768ff9e05beb5b08e8fe2c852b719da79d3f260f6691f60ac66f36fa23a20cdd9c6f813be27d0b7ed0d7e79a05b43a16b768e1a8967e2421cab6cb54ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5805e67b737d6f19224dd0cbf693cc520
SHA15ce175a5321251274671f84cd3474450ba94d69f
SHA2565a9c5c11eccb68479da6f884ac0f1d944c969b14545a74c9409a3e408e908da8
SHA51291dba0ced7551b75a2c5e40c28eb3f13f9182fc85613f71b54a808b3aae195ad6fc1f7cdb5ab6e02107c33ba8a8480a7f7b53f73509864776da86b198e2485c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5c204dc9c78e98b888f199ae8e2c67d
SHA1fe437ea3e64d76a006000acc50672aa941adf42f
SHA2569cadccc0b31c873f2737e8f43080e5da3f16b8d9a0a2d0b995fe9e154bfa2062
SHA51240cea7e9dde2d5f653e26188d5275a15becb9dd425dcd1f73ba32ac712fb30b422404db906265cfbdaf28829ae136b9e33fc78f505c31fe527b72677e804a5ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da77d16d3006a20bb346511f7f0c883e
SHA183e3013e2524ba085ee8893d479b10d0d639b4c9
SHA25670e0250ba1b551c765d0d7380fb050e25e7ef2d921cdb79b739569956d120732
SHA5128d32d47843b8aeaf94449b4fc4ce74bd708b89add6b3c0823c21894803ecf6acb3144aa6e79faec427cc40fa68a9d6bb6a21a01c11e17d79c925ac8fd88b98a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518c578016d11517cff12db59fd3f7acd
SHA11b37f30fc8561caf7a98c9a2a7d78c39c5fc9adf
SHA256abd0339ae3e59a6c472ce333a6bfd9900e7f9274eeaf1fa14af7d54228cc9a80
SHA5124789a5484727d92216c1f1d73c4420bc7ce33ee2e7ead396e29512a59b79ae057ee3481c8341232d21f68d84a130f5f20e9461f6aedd6cc419506f100ba625d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ea53bf18c84f5fb2a2843a0ff3be742
SHA148d0872ba4420b31fe23769dce8d3b34486a8024
SHA2560a6e9175b5dd1d691919ceecba087f936d5f8acdd8ad0448ee06d3199156fca6
SHA51240a8414a658afa680c6b1102da48f586c977a03d6868ef27eca1ddfc3495216f20379b6595e539fc1d7a57ab30a51f7b13449ff6a8a594de8f1cf7bf9d3ed3d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9b43d26863ce05a635fa39dd166bb2e
SHA1af7d93d04bc36f49897b31973882daee3b89cfaf
SHA25624391d6e085a345dea77fb0102f4b4e16395d743c85c289b5db1ae68968d61dc
SHA51209fc6c02dc02608bcabe58139e52e0c2f489925ea038fa1a4a166c396ccf43824cec799b43f247cee560271291987a6dc9ea0f77da3b3f9a66d93d55e658f864
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5399447a373c077d3940a6a3b5ffbcb5d
SHA16555a3e56e3add2c79018f0d69e816fd305083c5
SHA2567023a50c5c8b6385769ae97b82b41c52c9e49241f0f5e16482bf0d2c95fff01c
SHA512dda4795327d8c5a0bcb94f693f8c1f2fd39feac46dffadcea70dad91322dff17a4291267ffa336497b4a6296ac576157e00f1ffcb7e44322f647ba7209fbc29b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56929cd32c9a543e85855b82ec833b12f
SHA161ff0ab55db91207a061010ae00eb5293293ff0c
SHA256f46fc6e83927b40d0870070d42790c6dfebc495404fd869be3ceb51a9c7ae209
SHA5129087dabaa4aec4fe6a4fc83b0c21cede251e8e4e491973cd838d41ecf7a4dd6e1c5495ae0c56dfcd9b4a0abe2b7add9871093ce3a22e1a7134f63cdea9980e94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0429d477c044650e4b5bc7438f8c73d
SHA14aec28d1af7a070e97ff9e1f28e55004e69255b6
SHA256a9654076f0cda7d1023714cdd43f5f5a196f7772447de5a603573d7a9422b039
SHA5122a010e58c08c53eb54af878548947b933765628436d6aeae5a7e865e83ff2f999f6eb363401845a953b6919ade6af36d0f85a4d8bcdf245441a9923282cbd830
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509067a1b30156e4c8258c2f05a4a0282
SHA13f952d1964bee5c32c7816fa6b7daf19d27fe3cb
SHA256530139792824d76c1d10f021889a71781f7e3cae5b7f37e09eae860d535212a6
SHA51279ec9a68b3fa8396c436913be3eee0b2f06a3dbb7a85f383724e62b8fb40eaf17dd1253097002b4ce6a780a5235d362d06b1e60adae7bbbe0d337467075f0993
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a