Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 12:47
Static task
static1
Behavioral task
behavioral1
Sample
79354ec63c6463bde6f09d470ae26aba_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
79354ec63c6463bde6f09d470ae26aba_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
79354ec63c6463bde6f09d470ae26aba_JaffaCakes118.html
-
Size
90KB
-
MD5
79354ec63c6463bde6f09d470ae26aba
-
SHA1
7845723d4a75372ad62e1e4ebb506c84556a2021
-
SHA256
267f7bc2d094bb33865685bacc27ec81d4aad8aaef793b15d210669d2b64f0e0
-
SHA512
9fde5b22b5b5552edf0fabfb22c6731d483a4236f8bfea4d194a8c2ecff8fbee337f778b543bd8f8d8f712f8b6e801d03010b799acb486a415acc155b39865d3
-
SSDEEP
1536:UdfH9rA+Y5TzCAA99xxllAAppxx99ttDRLrsrdMlrNrxQzlwbw+US:YH9E5aaS
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60983b1034b0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ec6b25a844c31a4f9f417d08ef349d8800000000020000000000106600000001000020000000afb081f98815ca50ea4218fdcb0a5702c2cad9ccebf569c49b3bfd9bf72bf1fc000000000e8000000002000020000000aa0130a2e2207067c093061453c9ad53f06e03aa16c3889d326e3fe7cd1bf4af20000000f2549600b385d98e7db14559805712d66f3cfc9b037560ac098824c4459c0ac140000000377db777101b60cd95cf85e35232fde1c3b5edda4eea7e1c74907acf69334f0365c438b29bc85cfa91c1a2509e63f79d609a46ea6fe06568f6ea051c8e2157bd iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422975893" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{38C18E71-1C27-11EF-9F86-7EEA931DE775} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2156 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2156 iexplore.exe 2156 iexplore.exe 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2156 wrote to memory of 3068 2156 iexplore.exe 28 PID 2156 wrote to memory of 3068 2156 iexplore.exe 28 PID 2156 wrote to memory of 3068 2156 iexplore.exe 28 PID 2156 wrote to memory of 3068 2156 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\79354ec63c6463bde6f09d470ae26aba_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2156 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55473b5dbaddb28d582f7658a934bf9f4
SHA1c0d4942e23585d87a893be755fd07a5e4fcf75c6
SHA256b6480da88b1894c4e85545dee689e9b161fada80ffc12b4db135f8f05af2d8f5
SHA51241f8a473b78035a1b14d6459c8ef45967920894d3861ce1d8eda072ac80193f92d6a8e45407b00e6a8c0862cf06de1e01cb70dffdb1ca87394c985d8d444dc33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8b6e8cfa18b696cea0fdf62334bbdee
SHA13dc6bae58183e7c798b104868de3ceeecb5601b8
SHA256956657e8a981dec2b6fe294953e45c0232f5e02870531f5cfe53b73231cde347
SHA5121e18becb67bbec4945b2fa6ff6634d9ccccd1d365dd247993d975060af8542b30ae236a5c7777e2e51cc238d8f1cfd7edb2d35aedc1c67a0a796eb87f1102710
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d2d55471e3c0ff67f1fb467307607bd
SHA17f8eb6b8eaeaa320fa730065c66e8822f88657e0
SHA25621f2c78126398885a66abd99b76211b7a33ac09e1ba38220cc8d58de880a8be8
SHA512be1b4f38c0a433857ccfad35c71850452f4c0f4a5544d34b61f70878e98704fa00a83bfd22be0baf9f5e36e5e4e6608d52ccaae77c1142ca1416cab4d60097be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fafc4b2bfba3e1904c296e5bd3477959
SHA12882125eaf8d9a57d8a3a617e141db48b69be3a5
SHA25605d4ddefa1c93af39a8e84bca54b0ed0a9c7d63b0f617506b7125f4d6edde8a2
SHA512b0b2b73a6003256e84c4c12a72181cc870ddfeda600c4751cbdc0251ef66f03056fff49dc92ab7b79a6545c82e046b432f0b8ba7277e2085f3a56ba27cf23089
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5caef86fa70aa4dc04668e5a0415a8c03
SHA1be9ec7912ba5c3325954bdd6014209a6247592a1
SHA2568ea6a1ae7643dc396dc4b4d53039313a9d5f78f28399b3b7a7e364a550889891
SHA5125125aef8c01f9be4b7818f0a7c84f43771b0ab1319e002756a7871ca66707a09ec63cb34fbb89c486da5146845d959a6fe150621472c5d856e3195c456add3f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5237446dbde38885b59be90819527ba98
SHA183e1aaf71357c94a4061274671e7ff0f455a3acf
SHA25694a5add9181919398c5860ce6bba8f8faa430f38b3985f107710e30860bbeffb
SHA5124f79d4f572af444acb217a3d9f6d477ae52aafc3ba1493d8ff4bb3d6d3d72e40c6688cb0f3fdcff619cb95bfc8a9d31303be0d5f26992a5d40d1f9d944cb8f39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e86c27922396f0629248af6d0c494977
SHA1626a4e1eae171de980dd4981eacf25ad38bf331c
SHA256d796363a79a7a369334358f67331850e3fa594e75aeefa644edf52aa108bb4a3
SHA512c4fac7b490894bf0f2330a38400d43e46404e7cf29963be5509cde1dea8f845b3612b71cf3c86ead7e6522f45c4e9f913ba46db92a25ec2d4c081e437d033f81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f43b08f9f7b84ea2ba67d9b84d69476b
SHA1e8fbac8bf6e5fa50dedc8faf8c8937a04b17c8fc
SHA25652d68fbbd975679b378b5c3053ec5c11d786e547e31a6f24fe808ee3403a619e
SHA512424fb8af74d315d30666d86ecd229592fe770da328f7b553d06cb92791c8614f305991c59f166ed6dfb4701ed6568cec1a0f49c95c7dbe0de52f71b188526b7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8ccabf2c92e0bea90e77250e80d0e02
SHA1fa7a0d224e534dde447383dec715af70e21ecd42
SHA2564cd3a9ec5ddd60a0fecf2b7009bc6e2e4a377687a3575dd0b6444d1667067fdd
SHA512ce3fb749a8196ab1355cfee1638485013920a5b52acde5d2e09b4002c788811b20208deeab5bdc775c978289b4329a7dac437e83254ae454599f072ac4b766d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe441e1b5c96440ba790580f1bae817b
SHA17d3f3f009a310d933a8df4b94ec4b9ea40b2c6c4
SHA256df6fc51b0ac0fa2c241763f22cc05255b8a07008562ac821cfd40e0ec5604b0c
SHA51269c61be7c070a85df19c38b8f78097b1ecd58b57256c44c76336f4ad82e6237e08f806c99d3922de9bb99a57a3da88f040b29cfbba24c0cea1f9a1f7ba795c63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5840db5f9b857dc933e63e14c70d0cf9b
SHA1f37f37c81b9bb8507893ea977ea3abf23d284ed3
SHA2560c719f55e8d0c8dfb5a9cd47c15aa3c8e6db117201f82459a1343bb5977f55be
SHA512457b863b93fcb18b70f006c8287da31970d2cbfd2ba5bfb907ad2e1c4418b61f5e1f684dfb779b820ed9f95deb182e84cd4fe99f0aeec710f338f85613546102
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f33caf2226b71014c8aa6e15e0d7dfd
SHA13ac066ee4a01888bfb9d0c2725f8d34f37410e58
SHA256ca934694d7bc75d647d311b248a4bdded67cb1aac1ca543aca37e6e703f40cb7
SHA512e413a5f1ebbd09dd144bfbe2ed85476456b685c9e7d1ffadc92ecc3c3843231e0a881641d90fab3925a1e601d73b8ccdc2845f777f508dd391639ba50b319159
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5821d90f42ca819865164d086d227ac6d
SHA149e24e8592c86becd0940dceb9f6a3a1f9c52245
SHA256afc36dd5a35fea67ce69148f5bb2d69ecb95f541d3cf57fbf7369a2db659424c
SHA512ec39084426f9e4c8550622be4e5efd66774ded46e113d55832d6ae88da801b33dce177d51878579eaad7571fe43394e53534382fac2b7465d718c5e6805a4217
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4b627b79417aa5079d22f533fdaf581
SHA12fc4be436f8f27e4c4df7de56b6a230ba4ced2d3
SHA256f298009bc91d3428ae8212222e23b34b4474551f3bfe6bc257c8fb896c0ac3a8
SHA512efc82bd82c13aa80d3ffb8af5b97d01a6915e93bfba986964e09b29fa5ecb85880399fbe44c42ec4ab2c33847841f2d6c5aee7f9383e30a35ede1ce5290d0e2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f97bbee8f0adc9e1d0ac04456ec12180
SHA123e36c5f918dcced5a0f0864525f5851d3dbde71
SHA256723d48caff53af529acc976bf7a1bfa18683faee962bc099919c7a40a0c765d4
SHA5127c2849e3bff9acd4e640c14627dae070ee8adf142ece30429c3810e30956486d4db4fe704db8977d2b423afb8b7df6fac6629443258f449b5c573878cb788232
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530ab71244a7cad8f142a5c1bdc1c5064
SHA1fed1e7790b60ce87aad0a83e9c7af2e15debe092
SHA256a62bb8cf900e0ae7687248d54af05300278e1dda88cd0d1a698e52ef4b5e870f
SHA512d46fcf33e0053aa4f54877cd36c1d8fee124e1406942204bd6b9aa9678b519f9c5e1297c36f5edf370d1780a0405ec3a521d8b68f87ddb792505bd59b3680afa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e86a974473f343495df3411367b739cb
SHA1e52a2c30c2c122d455cb876827732709b6ef1af7
SHA256da21bab5c08f6ddff3e2b2ffbff994699b742287911a02b2b2ce3fb7a8c494d3
SHA512b89395bc70afba13557f88a4a57eaeae1110ada98306b7c135aa09f8585461c03e1a1f3d79e7bb929e01a8a43c525ad522f7685119b7d0e1460f4fbb5d7c01b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e2e1fbe525f428a53eba1feee992c13
SHA1b1d30e7b97b2ff2095bd804f5d0cd8a85abdda03
SHA25693743e06188e5f667ec28b0a57d65765b5be480de1f02bcf546acc7871035407
SHA5126af4db98f1035845683e7356eda05425965af4fafde68b56ea1e9ced1c0ecd044b3f8bf0a12c8830038fb7749efbbf602eb64a5a22fdbe37d8647fdb547f8c10
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a