Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
27-05-2024 17:44
Static task
static1
Behavioral task
behavioral1
Sample
79f6ce7b2a1964df16ef788ae2f5398a_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
79f6ce7b2a1964df16ef788ae2f5398a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
79f6ce7b2a1964df16ef788ae2f5398a_JaffaCakes118.html
-
Size
75KB
-
MD5
79f6ce7b2a1964df16ef788ae2f5398a
-
SHA1
9549f126e610e3faa1ee34eb4e5dac2edff79d85
-
SHA256
17e6251c6f356d4a3b92704095642c2cbb6fb0c0bb582194bdb0ffdb24878a77
-
SHA512
187719d5d08eb1b858c465883f81dbf20510f7a319eea87f82d9248da5650910df5b9bd49cc441dcba16c542cf68ea97161a492f706e2a1135bd50826c9f14c8
-
SSDEEP
1536:JmR7VGIYGIaQzTzNen0tbrga94hcuNnQC:JbIfIZTzNUq4hcuZX
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000f212441fb0495840a7bd7c66efd0ed7100000000020000000000106600000001000020000000596ebc5a587244a95a07486bdb29858f719725dc2cdf3f5d299705ce03d4bbc4000000000e8000000002000020000000f2e6b6bcb13200fec68e5bcb44c3e06b11c8b3e60abeca6daf6f761fb064e46c200000004352315e08baa8960a4a52af40bf86764a6c8885d6fae367314aed5145655f614000000093c04d4426c4137c4918c354f01348e53c2cd40bdde3d01249cf860f57249f7a4935f1404c933c69eb6a82da1d577a16ecc40eb87506c46b6e32678f133d218f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80f8d38c5db0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422993716" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B81647A1-1C50-11EF-8B56-EE69C2CE6029} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1620 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1620 iexplore.exe 1620 iexplore.exe 2488 IEXPLORE.EXE 2488 IEXPLORE.EXE 2488 IEXPLORE.EXE 2488 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1620 wrote to memory of 2488 1620 iexplore.exe 28 PID 1620 wrote to memory of 2488 1620 iexplore.exe 28 PID 1620 wrote to memory of 2488 1620 iexplore.exe 28 PID 1620 wrote to memory of 2488 1620 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\79f6ce7b2a1964df16ef788ae2f5398a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1620 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2488
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55bff99f859da42d8ddd8d28ed2856b0a
SHA16f561b14b4fe2025899cb68e8c1c92cbb158e4fa
SHA256320799d67904fff1fa3d8d984c83437027882e3cde8e2b05375313c9345cbb16
SHA5124f90b56eda0634fdbb848c038041685f520bba394e9965cf50afb544072170f6ade66f534feeed0a032ba851a92399c41c77d766db4e5c660b6f999ceb09450a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de123cafdd964aea95ceeea02aa799a7
SHA137854386e602399bcf467b9409ec15ff52c39d3e
SHA256dc17560950057a96ef51745fcf77e5371a8e86559afbfb130d97f3c0bb2df771
SHA51232d565d9b49ad5336062f8abc17f3e5ec9159447ef4a9cc5e3c2cf6697bf27f7cfa0e5526ceedbc0ab7c54298ae1d7925c4ae180ae8838f653ac86b65e35779d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553a2ef0a53e16bcaafe72544b0e26191
SHA16c810dc88a95f3bbe71405f5124eae9ce893f048
SHA256b0b198361e7afb3a75c9e13d2a6af0d06030acf36096cbd64f9bbb6f473af271
SHA512dcdb354b32487a73938d4eb2cffed4495cdbeb8edac45165ef2014f6ee73647ade2d3f9a626a45d197f8d1a487fc2817f47d325b2889f03f329f4717ac45a120
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52401d1b382e3e3962b0595c9f452528f
SHA1a896495c0c75c94bdd4b7ea7bd5ac0027c5f6464
SHA256c12479cfc4453184fb9f3e6a9b1a4591de8c28396a764fbf66ad0791806b4d29
SHA5122a8bd0d5fd73c396e3854f2a9288a3e64c1021e926d2a3a5bee1173d954c4552502c4f0314e3696206dd1ba413e019e11d2bb6583dbc135091760cfb625e9e24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b6d5f10530891283e9757af999cad79
SHA1b16a62183b1c84b7734c3546a9d93f9a5c6f7060
SHA2564b837d8b91f3438afad6d243d6357a53e9599fec7d548e262f17bd30a2fcea06
SHA51220b674b4b7889c68910bf91dfef52e41aa2e875b2229e5e26651578a9e16b7788a039555ff982a7fc3c7d66c78caa36db4f462f66c05fe465338360741b9e143
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a688595eb2082f888ef6e4223f432b0
SHA1fe7617288c9ec706cdff90dcffafc3bca6e6f4d6
SHA256baf74a6d2102d02cd9d25b88df2220bf32b6312d0e9911a3e0f7e50dee40c035
SHA512d3412fd5b462ccc8ab60d669da5a0482853040cbf357a8b690b01718cc6a0ed5d7f23119e839e782f31b47a64d7dffae33c9aa2641e8c4f2b2735bd17c7fa269
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5700114809deb63da2e737036564a66a3
SHA106dc6d8ec04151b1ab3dd2715fae224692a191fd
SHA256f5738208221c1f69690ff1ae7b55d2fd3d3eaeb95d22ed02f5ba705cd99255f2
SHA5125c0ac68103e6df6a74e6335d21fc476bf1e0c22a10ac458319190125650e0e213b1d7573ac0b49e61c2b37caae013473ca7a1910a49fbdc14401e74978401410
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8b13c1591440692333bf54d27423b71
SHA14b2421c3e52869cf9efd8c99e0a317e692ddcbc7
SHA2565c7b0c74579fee5d5d21f9e21ba5a3fe317a3a9714780d06cbf20df9bf2e2ab9
SHA512c228849e4f729e5c141a7821fe0ce2e9e24c4ac2985595b7f636fab5eb77e14587807a7fd5d7eb4c6efbda7463db7501de21969db33f696ddec0ea1a0206af9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4f4e9cf5c0dd21e98bbb3f7dbd0d2f4
SHA1cf103582238e255e746695195385ba62ee9dac8b
SHA2568675837945c322109e25821750900a8fde77ac1fe251ab2de6cbabb3cc64ed35
SHA512aa48f161339be574485ad876d484ad215ba839b2c50dcc9fc369f24b2b26961e25a4d451a93d2dd3fbaca40c6d05b683a74f41afc36cdee9a3385eaa54fe0931
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eaa631b70b519902fc8d33b761eb51ba
SHA14f74c149d68813439f88d4746138313912abd318
SHA256f9734aeb80771bbef825b4bc821c43a91e66be6dc0db5d41cabb65bf919514d0
SHA5123895e97e2ce4ff421bb0558ae42876d83f25e866936af13c86bf2aaed05c9c3bd175ac18b9832b7653b00b13e152acdf47ce99cc4b39af71fcde90c2c6e18fb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5537446c0eaed36709914c1fea77114cb
SHA16714930e635f659ec737ca92db2a1b1cddf6be51
SHA256a831417b843e215aee921ac9d4333b365a33d173fbee1410a411c5926cfadf88
SHA51276aa93af747bc7445ceec0871abf09642c1f878e890c5414c31ceeb5bf2dd8816343bed873518db0f28562c294166a3e733c2a62fcd537acfc7eab613198081a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed816c5c35ddca81ee0104ccf9937c37
SHA1a4c5855f7e75fda2535fd318db574facb95ad9a4
SHA256ec3804ba9011405abcde41fc457d2228cae1da3baadd66c47d960ce3c550bae8
SHA5126c45d85a1010894a5440b9a8c3d815f765eed397205b0fb4b4cf06f7f1158d72849c8271139bb6c1a17bfe382cd6b444a462a64904195da21d1d994ae9162bad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc28f0b4eb61e79ae48986ad1a7f3c6b
SHA18df2e8d3ac5590ebdb6a9c5dbedb298a7e9f81f4
SHA25644a2cc9753819fcfe5ec782a1723cfba99e7f3954a5bf171e508ad6e13cd323c
SHA512939301a73cbfff15f74cfb35be4f964733a81d95282bb639a2ed1d4bd88d5187a60021f16cb6c11fc521f1dff8c5db6664401c0fbd9b40d1f247fa0a18c492af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563e92e06784ba3f58ccf434802f681d0
SHA163b99a03af8d4a7ebd6ac4c06148ab8f99b418d1
SHA25631c9f13511993b7223f6f95f0fba311e82955605918a6b7895a8b0908d5c1ca0
SHA512057448a9e240ac386198d6ee925232c391e1da63d0204fee6d94fe2a22ec4ef8d930ae57ce7656def98835911d6eb0bbd73d6eb6d323af168eda700be52ae71c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e07ab70bc0baa1bdbefd4b2a83ac670
SHA140847fba8a382120196ca9eac91e3c27f4a117b6
SHA2561099f0e35ca7d8e290114d9f708353a1923ad525dc26afb1222faa75857739ca
SHA512bfddbc47490a03e71e844f36928ff8a139150b30ef24e75950273eaf4a564a7d7a075a56266f8d093cf0a968942bc4a361b02e78d546dcaf369cb35219353d33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ee8a1d7810cabe91472db31e16581a5
SHA1915003962376711eee7f5ae24f6d6ef76a8707f1
SHA256d477bce87dabc356fe3377fd39ff2eef43144688df54f677320b47ecc59fc6bb
SHA512f6785f4137ddeb25a0fccccfe53367ff787824667e9b5b4d9100572916f0026e819bcf7cb2f17abfa97f4116315d8482525f0471f403ce99153d7fae1177e54a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dfde47d4630feff2b1d9ad9ee3f58dd7
SHA1238a4a28b0305ae3c146526b4e2974e97ae7751f
SHA2569ea178bb73c8d9063677dfc7cb5371243cba8c8d4a9dc1c5341b1e4812d3e3ca
SHA512737c7ba19d3a8e2c7bd80f8339dd187de40c24894531a528bbe0e61a05331ecfc2ed05a59a715f11978192a0baf756f5fdce59821aa8506ff0733c053843b807
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5188764130cd9cab4638c4f552e013c3d
SHA1078923b91af0a7d66fb9eb7fe15eefae6a3d050f
SHA256e174b0774bb74ed4059bc8ce7835b08dd59691901fefa077f5078fbdef7f47af
SHA512f9cdfc19f2d983004a62cc2dd678f480bc8a6ad5f8d3c2e045a6725036f03714117e635f9079cbfe623e43e766ed479b669f1bc6b9bdb31b694910cdf89f8944
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5483ed7e48d85ee288866f981e07b0c55
SHA1b8ca8207a08bb55f9d2b2e9cf2bcc20ce81bb49b
SHA256594acc5823a0dfcf71e84c819b57f60d6122e702a7eb17e17abf8b32cab84fe7
SHA512da172beb6b0c7bbf909066f725a641a7615e09e64aa2084130cb31abd9c699e089ef072d2ad642218c27de6064ac35becceed416c358cecb5974bd192dc2d09e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a