Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-05-2024 12:11
Static task
static1
Behavioral task
behavioral1
Sample
791c12262d152150e6b167304eb17614_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
791c12262d152150e6b167304eb17614_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
791c12262d152150e6b167304eb17614_JaffaCakes118.html
-
Size
461KB
-
MD5
791c12262d152150e6b167304eb17614
-
SHA1
a84b3d5c237a83094d322337be66054e7a75cc13
-
SHA256
2ba6f93312ddd35670c7588397e707c3704e7725932f48ec269d533871b76d09
-
SHA512
b7b71f1aa7dfae551518fbb7d036125cd20cae9da38999b2b6af37aa45ec965846632bf4f8345d2cc669f4845f91c0dbcd28fdef213674edf238ab41f58dc1a3
-
SSDEEP
6144:SnsMYod+X3oI+Y9ksMYod+X3oI+YkzsMYod+X3oI+YLsMYod+X3oI+YQ:E5d+X365d+X3Q5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{458DBF71-1C22-11EF-93E2-EEF45767FDFF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000128b8c2ff75ec74faaf9efa3a24ee79600000000020000000000106600000001000020000000229c04b424359ae1d0bcf643b5053dcfbe312390ddf8343384c763856c67dc58000000000e8000000002000020000000647a43213725833b81a76868182d74d34c01442d8f5a12068f7fd3390c2298a02000000070278dfcc930426659f7765b7f080a506f8b3540b20f4c410187475b3a53d3b94000000083b03a394b44e5b25dd44facff855437f824b52cf936558d291661e290ca1779ca333d78c5492b0a90232976fd02eb59d0e262385223406ee7ea58d3b4f35a27 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422973767" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20021d1e2fb0da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2664 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2664 iexplore.exe 2664 iexplore.exe 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2664 wrote to memory of 2440 2664 iexplore.exe 28 PID 2664 wrote to memory of 2440 2664 iexplore.exe 28 PID 2664 wrote to memory of 2440 2664 iexplore.exe 28 PID 2664 wrote to memory of 2440 2664 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\791c12262d152150e6b167304eb17614_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2664 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5136e5e00b4f0dfef232ec277e1a400d7
SHA14aea68b6d10800e72dde910f464b3216e056cedb
SHA2561c30ee2a7036325c5dda4da03fe75c5c87f057ffec82ffb5cddafaed52e75d89
SHA512e7277cea21db9a4928a29d3e1bca837eb2eadc2ebe8ece04a01b8af9ac9561275fe31e9a9fe5ab376c0e69576661052a51ef879d6f5225211bb3a35ec687d375
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517204db337f904ed037c1283e6da2192
SHA1616b87f755be578e3dd0426dfd269ba201c7f40e
SHA25656063a7d068ef7e1192095331ebc86a5bac0d424f0d2239464366a848a5235c3
SHA512759d6d9bace987e5f6ddc3b9d2700b7dc729fb4b9e7516d8b26b21379eea92f0ba96b21fb3174dd6ef0449d6d863939b956d51bbc3b6a021c0ae3e5b659d535c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1db8da525522a32973d4cad842425f6
SHA1598906b0730baec8f01be1214f8e89c2b76b30fb
SHA256de8c948db123422d6cb6678fafdc5e14feaa2a23d32c18cec821c5e804c54ee5
SHA512fb4901826d17a3ce3c4571b38b99f01aeda45d9248f9d14925de86c9f3b7b0b7b8f97a9002ac27728540833cc0cb4a1c6befd9a565628bc3fa2499ab67e68003
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5776e8f7ff3ba6e0de8073e78b9bf44a6
SHA1d5c129996788cfeb90b2e37beaa0bbada724e23f
SHA2565e98084e78b52dc97a4c6acd2f4fedb2110446a116181b8cc4406ecb7bb70b63
SHA5124fb1c7eec60020baf7bf660ef3c6055e07a4213e3ff51ebf79947f35b8bf4e028fb28e8691b077e2fb8a16bae829190cef62cfc05479b4bd1801be561fb86651
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53eb254b365db6e3e8b49133934f84da2
SHA17853778bd35bfcc2e123b2927012cdb75799f1f5
SHA25612a0acf17499767a47514b374576e8bfa2096836d80e158414b000f8224fc5c4
SHA512a4aded7c029656be589665d4d8013e6bc0828e5234335996da60d62246c1c6a274e02820667315670f66a77c772a18c2d930295898b643d26392ba7d9b80650f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b3c1f452e524cf6b6e3ce0b04e98421
SHA12cc104eeda40ae9873e4be959610e2687109bc67
SHA256fd56d5c60b123e2599bff704d6b67365df88941e06b2b3275d4b0c3997d2c7fe
SHA51275a1615dc068312058abdf9a1bd4ebda473da2e5825532959d2e9721e3a59fe6167352186bd65cd19b1748ebc50049be753f374c8d3a7386ed1ffc60a40839b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549239271564aa302f3a41eac9980ba20
SHA1bce630b80e2b4703d8e0aa5902765454f4473387
SHA25677fbcf3aaae42d3edb63f800e2eaa1542b79cacebf5e712f2e6cebad5484943c
SHA51212766fa45182d4a931bd2265515eefbbf5e9603df52ab649e122328478263d38271e0a88516297a242d1707ad4309872f025342a8bb92b7ff13da4721b578acd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5287ad9aedd433775096187e1daa5315c
SHA197fec01919808e634575eaf6972203d7ab84f00a
SHA2560d80afe9af81a6992f4b52719c4cd3ea29a658ac308ccf58f5dace10237c1f94
SHA51288c2090cb25203a70abce0b073acf632ccb961ea985a71af79941852bb790038744c28fa9c21badc7c44d3b5607d54da6e2eea2213dc3f58d48c6f9a2d0462bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5248e520df1d7bcb125a09f9f1a1a3bc0
SHA1dbafcb6dd4098c5019fa07d8cb9b2d68f210b0ff
SHA25688c0a3fdfea2c9573efd66367bfa04297ccc509545d6b75b9267514cbf624413
SHA5129c7565186fce55beb33d79f517eb1ca9796a3255bddfa14c6af7aae14c185eca2136ffb76260d3acd00eabe322f9607b9fcdd7bade397de56d23acf4e95a3322
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c8b2a813e4cf97c30ab5f8fe136e866
SHA18486eaa6a73cf062c28bca6076956c8998e60d02
SHA25625fa3edb056801b1abb92d1add8bcfc2a1e4e9916b745b0d2b9953b656a3da19
SHA512c4907b9df232de1da20055ec69184d9245a83101c04a7232525c9830944368065fec9d9e3abae0562727a91753b322821e4a80843d8bbf6f0b5de7a53a8073e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589f2c68a017b94c7f75e2d84dda1e661
SHA168cec0886b26381066353fb8f0748b4e113f2da4
SHA256590a42520e59d665841700ea8b308fe25d0536b6c17d2808505c15d96c7135d8
SHA5122410357ae663d0516c4d2ad2b3b8290419ae0b0a8aebedb6b2eebd8ba6ed0656cd9b16aec6221e0970c8dfe127bd6c906d974b8343020efc53c0b93f3eba39be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db3035b59f82e5c8f6a25b8d6166ca33
SHA18df031723b8c8243f1a7bb5ebff08762f86d3e05
SHA256290e16a415ee4968660df169a3898a6f2b111584ff404ab2d64462de965c16cd
SHA512711e7765d343caef640e346ba486c746751b60ec68ee02a0f036eab3fef4055447f38e411086080ec8c9325e3940381b51e13a25d7d363fa3143f799503fe16d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6bda3464ddfac476f3926e7c2a2fc8d
SHA1e74044a87ba85f5e425da93f6e18a805fbd5ec25
SHA256835d37cb0f1902c15f519a823d3f5081284574fd4fa37fcc54a13a9786796df5
SHA512d7df3745e84bd37e37061933e606b5e0a32e46574ca32c756377b5fb852ec836a8ec356035f3eb75e46d6b329e06442671531f808004076ffb14d7e83357506d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5276788a6b8d99b053882ab32bf170bd8
SHA12fe665804955dcaa4a789245d93a9533928b6948
SHA256a4281348607abfa7bd087b1442da8538b9de0c6b1808341f30c44bd26bf6087b
SHA5127b8855d716df245b099b7e62320fb4702958a5c7e11c2420c6a28d2e9b54407905dfd666f96978e87f32ad722e7830d42c8cc72dabb35f3b89171cafeb2c4a1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505ae29436df9fad0e18defc5b5ae29ec
SHA1b8f877b4b00fb0fbb7f80f082081fe8e6d864a46
SHA2568766998439b6b1a222664798c3e346e37f302c7e20202a34506a90a9dd12f561
SHA5120ce183946e262766d6b561cc0324b449b0baa68486c43b85858c7a68b355515ad4e8be3622911947ca6c4913ee58fa05d3c6f5ce5706be2de461f1aad9d718d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542d110a56267f5ae0e991fecb38cbb8a
SHA128b89f1117a8b70d6e1c71d8d8f07e794c0c76a7
SHA256345eb60dc098a31d94418942041f8247df5b59d3e731c27ea936283f7495da22
SHA51228df0adc56c9b5303a80a94f8e8f02db1026873885f8f36133164754f00e6174d5047e5c80d6b12f64de91bc1ac7f6215afcef853643193370dc0f74c9bc3369
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517582ec5b852ebf805f9e309c7999399
SHA15fbc6e1c74529ef476663a6d7c62b2fed6bcd5d6
SHA256311b9aa85c91e67719d05043471a49d793ca4b887fa56a3305a6c72795acb420
SHA512274ef45956fc26df937dafab9bba7137cb7cbbe852a57c47b54a5488dc91365c5595f6db710e1f5ecc45ede646d34cb8337fde0547ea510169b4b7f4b3f3e8da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cfff84959d2883aa885d3ae3c97d1a00
SHA13a18076b289eb08952d8ac6bef48ae0f783fc5b0
SHA256dd99802b4a7c4efb23751be83a77113a1ce4c3d119e5bdfc5dbc514d8c7fbafc
SHA512b7fd137b3394c2f8f22df2cd5e30d023ebddeeee35b1ac23a64774a68864f37333b48a1b7229913fd4a44207f959e615bc088a6537860fbf1e967f3f493a9d30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522a9da2c12fde07575ceb3abca8e46b8
SHA1248248d16568975a47f0c9d457be8cd5b6c31ddf
SHA256a5b8d0ce9df5c1bb7e70af21b18dac4584d9ea73384b84c5364762b7405f3c65
SHA5121d40de69a7ec2cdb845c47cd8de77d8d3abda1ec32f30a7d69bc9787c60da48161d7a099680beef0271686e46de81f11e530abd530aaa0b86c1dc9857136842e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a