Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
27-05-2024 15:19
Static task
static1
Behavioral task
behavioral1
Sample
798bf83cf9c90be76c51aca51f30fbe4_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
798bf83cf9c90be76c51aca51f30fbe4_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
798bf83cf9c90be76c51aca51f30fbe4_JaffaCakes118.html
-
Size
460KB
-
MD5
798bf83cf9c90be76c51aca51f30fbe4
-
SHA1
f0c797a707f7c12587d8fa48202dfba8bfb7a23e
-
SHA256
bb906382c737b3e05f8ca3591eb664d024789647558526fce2b7dbaa83016b0d
-
SHA512
ed2a56348566118fb346bc140b9edd3714956a6ca9799f8be6a7b9801717a8fad722ec9502268a699664f46cbec74f031170d05c528b9a9143f22f78940fe664
-
SSDEEP
6144:S2sMYod+X3oI+Y7IsMYod+X3oI+Y5sMYod+X3oI+YLsMYod+X3oI+YQ:55d+X3dW5d+X3v5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422985065" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000257d553000c804ebf06b15bcf9bf59a9c2b03c2a494f2135c3cbf08d86b6013e000000000e8000000002000020000000eb207770525cd3a076cac904e3104505a4b0d87476a988acda2aa6c902a191212000000071fa00bf7031ed1afcaa7193dee4023f1f156ca2ec61cff219b5ad10fb82fc1840000000a95035e673b880cb4cf49772861d2f63df68646033735a92d2fd49db73e32fe15bab33eaa9238b344f6873fb31955ad497c9376fb31cb9472ef28a2265c7061d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0b0e66c49b0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{945003B1-1C3C-11EF-99EB-F2F7F00EEB0D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3052 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3052 iexplore.exe 3052 iexplore.exe 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2420 3052 iexplore.exe 28 PID 3052 wrote to memory of 2420 3052 iexplore.exe 28 PID 3052 wrote to memory of 2420 3052 iexplore.exe 28 PID 3052 wrote to memory of 2420 3052 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\798bf83cf9c90be76c51aca51f30fbe4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3052 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2420
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7293bbfe13068d01385cd6a0a003351
SHA1c212993c1c47707b52b131d30a666324c40faaed
SHA256fefef8ec8248b762f349b49aab082616dd2e1ffe3fc5dc4865dc3e8734d5de31
SHA512fbfccea6dcf77de444fc9a44d7c529d35791b5266a7aa0652098672dce373e97c8418bd5cec96ddffa84efb17b64faed8792e74bbd06216d71568e26f7daa233
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544569786ebe1ec1848b9197445185af3
SHA1b030ca22fe584bc619dbbff21242bbac9ea13a08
SHA256e89d95399f44b302657f583b5688870adea744dde55e19c189156b4bb5d7bc70
SHA5121a98f242093b483f7188d0cd3161f424db2fe8883ea802cad0efadc59ff2750ca7457d5a55aec6000f29d0d901da8f98e80aede9318f04fbf7985240045ff449
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512fef3586d6db44d2606e3688036f693
SHA1926f374619ac118fd15cf5bb46591d0e868280bb
SHA25693f0a6ed6699b46f9c9aea145bd2c95c691c11ce54c691f6f11abf220fc4e40c
SHA51283ee95b8ce9c545515d8e918c1dab6db1ae7826bc94b58f745368d0d5ffab162a02ceef9c5237370bbffec33682624742b87b0e8f7da48596e5e483f0ce046b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da48c5ba0ffa13db09dbc13b74325a20
SHA1ab930b3cf250fcd1b8ce589397d0b19b0522d324
SHA25614b205f4c5a019bda0ab8a78b22e3c0efaf8f93f6b87c12f78bb35ae3c84cec7
SHA5123a4530aea128fe34a433f7524f479af5f67cede56855cefea43abd74fad1d8396e97fd6b1dcc77c3894cb092f81151680d9e183c02fdac32f5c783761cd243da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a56d4f02f2ce19e330efa39c1553df8c
SHA144025143a4d1f532f174917f603de96d941aeae8
SHA256b0d5a1572e0977bb498c933e448c588fe66dd02407e9283a178bc1ba794b8b3f
SHA512565d9f35ce0923e2f48eef5120e12bc501d7a39364a4f8a5f6a58193dd783288582f18730a67d9d849ba9ce69d7d5f4a4bd0d0a8a27451c5b36109eb711205c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597a2a7fc0ee770e18a9239c0b03eca83
SHA1efc3ed3bd4a4e09b27c68386eddf54c4696eb784
SHA25620515b580937ca1ef0ca232732c5cdfe2fec05f7e68f95bba4c30fcb65828980
SHA512c20083c8b0cb6865acdefad29c5dc9b5d518a191c287114bef57ee8901f78cf3eeb338d4af5fbea208198a64fbd817848498ef3a0ead5d3c8f2a780f5d18f608
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0e54f6c6b286094a999c8fa1be89aa0
SHA1978c69de684178c43741a114a5daffdbafcf88b2
SHA2566e178ff82f811502bfd5da31408dfcfb92dbbe41417528cef2eccef2fcffabe3
SHA512cc4b8d3060f81a034a0122c27f1b3d5f59efc1f1619dce7097c51b4e338e0a8b140b4422da0376ca5749149a12d6317c227c73293f2998adaaf29aa611d60068
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565bc5f3167b8e5855aa9e956003ac7a8
SHA1eaf70fb4d6184c0b7a9656b5c3584cb3edeaf170
SHA2562600c566fede572436ab0a260151517f2eae5b28f84c0851eec229166c0e707b
SHA512a178e5a62d36b4b793ffb590fd7b4b05c50601565f0c25cd5bab0e364ec8c24507814d9d2e1370e04b9d3aee2b3ebd6075cbe5504bc3a17bda133fbf02f239a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd673e03d6325d989e4c8545a33fcc6c
SHA195865a408d48c5f163216783ba22bdc2626ec2c4
SHA256223b55884b547fdf6a7d2da168dbc4e02f20a6bb1d8b385a8f1775b4b3742e6b
SHA5129f0f1b45d40ecdc896256283edf7278a67a9d1c8c1238d21c4f22a7b72f4c11baeab29f112e33952bc8e3b499e5cf4a05227779056b888fcd06bdae587d27f99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589546435bc956de08dde68ba85f547ff
SHA14de2f1ef4b602d3f5cc223952100acd86d8b88b0
SHA256e0dd7cbcc4972bb7888446bdb89dadb6f31d3057f28ee59ab52bee91e485d70d
SHA51226834f72be1e2422e76c4662b172b07cb4e6bc65ddb4246f50f8081dc67424b717203089aa4fdcb7d056ffa73244f8a20d6411952f5a6d6a2871d89efeb3cf03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee5f3e5f401edac7a6458f759cab7c3f
SHA16f51c2465ed3ed7d8f3bf8f0a257fc701dfe7ffc
SHA2569f45db01eaba299fd1d6f66b212db6c0c383823de20e8ecc7c5e28e391c35d25
SHA512d3ad7ee7eb669f29c1d9f455e4b91e278848bdc8be74ce5a79d78eb7163e522b22168ec09906ef4bccf3d0241eacc7999079f7c994678b959c988d1605e9c0e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe28c66e998923813766357fc6ba9605
SHA17b1a855b35c8e0efeb961688698743a3ded24753
SHA2569a07e7830142e94c9d595315b1925ef40c54934d017cae96d9e8ac10a8d84098
SHA51297b8d3eab6fd28d4c32249aae771118dd47a5ad7a7779655c351119df64ed5d608f2bc06c48413abc12adc5209711956ea45b1d782dace0348283ad40e37a477
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53caaf91cb1d0d698649af062006aaee8
SHA1d38c15d1f37fa16a4ed4b0b5598aba90fe21af9a
SHA256ea5da621da2698462ca96e78e5f396cf00e23af024873d6a63f7478f60101713
SHA512efd875a32c483b9ec287274ef4a1ea37f029fffc8192733bc7533385e228e2acc474673a72d71e2d93200eb6e6da5182bf3a282b649745bd02bc98700aaf17bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51613cf75e4337ce7ca7d1490ba503083
SHA19039f8bff71b495b5ec33079790e6f3d6bf5c2f5
SHA256721b0e5f35f17191c599b9db3ac12d9e8b84a5fa8adff0791b5fb80f77a016c9
SHA5129df9c682eebe2df14a3f6f89733506b96dd56e4ec8b1225113f346091a7805e2d3eaca5e1ec415e1d17bdf7a2c06c008b6ca557cff12c538c1d1bb914e5e6246
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501e0a9fc53f928d40d516aacb04e313e
SHA1db233870332db8dab82ce05c35577d47bcb57e7d
SHA256da634e5c652ddc9f45d33209d7163f48282e6c9a6b32b59e3c29f3620da14037
SHA512493f2a0a498d73ee4d623b0285179031592cc1a1d66948184993a0a8ce3ac805f18899f13cfb42c2405ae60d6c3a1c734ab21b07d7e749e20589480213b7cee9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be59d90845b828cda5e3d21fab64d612
SHA16a7b066718739d1c675f3775fd81bbb52b7f7ec3
SHA2564c407e9ae94cfea60d5116aae45a941de7b13e960ed5e31b51bcd2d13a055bb8
SHA51211174ec9ff549bbba8d2c2f154f7a11fbed5215f0d17a3f02a1b3e0e32ab8667825060fe72fb0da7bafde63291d170a125d9a62c58d58f6c9629f172cad16b49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc32598cc29f240dfc5bb7af4cec41eb
SHA1c1ea7aa65aa0c6f911b757a816adc00cb54cbe07
SHA256091ff732b5d6ec7db4e6b186ca92ed33e93c69ee5e6505b73e6b92abc4589990
SHA5120701e7f230b7fa8f1a5268a5b2fe5153f8149cc0ff3f82e5dc82945278c3bb32cbb4a588714a23938bd3c57f89449df1c2654e34905dcf97de0e5ca68d8f5419
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9f45698599e2ca74c18ca51918db0da
SHA1657cde5a29c5a229da6d473e3c7cca307afa70d9
SHA256f50dfb3112c3c40114fe5d1c3c2d64743c153f513a4c9975caf212f1bd5e65ca
SHA512fc29e4ef7c78620592fd04155796f50c6a5444d946cced278c90c4ebaaa8d9b36b7deb69bea2266cdfcdf9d3f3f1b9a16bbc6dd70f2c418319a351d1636e67ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512aaf538299514adcb395dee15be033b
SHA11e6415caf445dd7dd7e058a3e1e0086fdf4d0c6a
SHA25674fd06c28a3dbf0ca7373d39fbcd9449c784e9e4e8469534bcd6b04bb9ca2cb5
SHA5121586c2db2dcf777e210e3dbd20a30c719653a81eb002e652a0de6e27b7410bcd24f476f8332c112b65001aaa0231f0e9f67b0f7b967fb741ba97f8124958d57d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a