Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 18:13
Static task
static1
Behavioral task
behavioral1
Sample
7a0c7ba3c01170202dae43f5ea8a14e2_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7a0c7ba3c01170202dae43f5ea8a14e2_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
7a0c7ba3c01170202dae43f5ea8a14e2_JaffaCakes118.html
-
Size
6KB
-
MD5
7a0c7ba3c01170202dae43f5ea8a14e2
-
SHA1
0989e7bbe98b085b0283d5d0f80439becbb36de8
-
SHA256
b85de7f8d90e4888c3080f3c3b94b6cd52c1b33ac58294bca6691d392a836941
-
SHA512
92ea69b553c60a0c39fac7435f75535e43f40e9853390783595ddedf78d1eaa930172dca8dfb2fd796843b5a6aa7fab2cc9cd959e2d0f0695a2222e3e8a2d15d
-
SSDEEP
192:IhUPTNPa2EfcwjbhlhJALVWlF2jI6T/W3K:EUPY2E7vrKU+xO3K
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b0000000002000000000010660000000100002000000007ee3d4b31a25918f9e1367fc0d7d75b051d9375a08b25debf6787310ad105d3000000000e80000000020000200000008126a84bc97d4a89113e0de142242780ec92dfb6977559815d9da28e193a97ac200000007cf48a0da9edb04e3950ac903720dde5a9c752574726e6f745721dd79e77551540000000c1540c6fee793b11925b27526a5c3cc848a234ce929df76014d2a59e55753b9335e2dd24f83e1ce0620f5391b92f331c11165260736a7dc9f693741db4a7f3de iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422995495" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DC769421-1C54-11EF-86BF-CE57F181EBEB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 302b37b161b0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2792 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2792 iexplore.exe 2792 iexplore.exe 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2064 2792 iexplore.exe 28 PID 2792 wrote to memory of 2064 2792 iexplore.exe 28 PID 2792 wrote to memory of 2064 2792 iexplore.exe 28 PID 2792 wrote to memory of 2064 2792 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7a0c7ba3c01170202dae43f5ea8a14e2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2792 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a262772506656d048dbf85ea92a1066
SHA18a9c046174c45889a3e2807bbe8495357a2c0959
SHA256acc24c486f7676ab0e766dc70faadb3cf57cf21744918ab1c2e09ca75fad8b2a
SHA512ba5b6f2ddc7ad23c986e208deee791c2a5c26d83622fbec8fa511dd9551263e394fc2b6292363432287360f3dacec9b2a88356f0d8f85d1c68140766eefa7239
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508447721238ff61e9a2f45cf3eb68928
SHA1d40c82d22d511aa604f8f1ca9284557886b33410
SHA2563e0e7df591a5e94e932c6ca5872af0fa15203421e647c6c164d7b0906352ad13
SHA512523bc1e678fe7ab996fa26106fffac0920af45ccbff2690f423101174729bd08475c36b8d4f786218b8d0f7b892879d681eb0dfa784f6ddd10a1366cecea895d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9f462df7c57bb68e95da120cd38b1d0
SHA185334639690ffd31402f1c4b1e2727c172c6825d
SHA256b144393ed99b3fbe67fbf7a88321ea100cc6805a6b56ee077ef3d67b297c92a4
SHA5125d5f50afcb1fb53abd2b1c845c1a5beedae76c3e85872eef086ef9d265c2a2d6efeb95f7e8a611259212269e8b50abb48eb7c95d736a6b9aadbb3a97ede53763
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6eb9e4b736f8ec4a6a65712bbf94498
SHA1da3c1af1d3ac944fb69f5249e563934655146519
SHA2567bee6df191bbac7f86014f161f191b76c9d1528e9dba33cb4af23874c131b4a9
SHA51255af2b3438abd335f1c8229b50b940cbb626f39d5bff8d638c0b1a6850e0db046d46bd7569b70e413af5e1c0f917fbb8b14bb0f5d12ebdf55b03b28b15a0560d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5840789a2dfdd5a06067bfe3529b2725b
SHA13a4737798fe5361659e3cff1d7e7e5bab847c542
SHA25651c2ae03f3278aea2a3b177f478ff50eabdc331b5a16aacea555a5d42f4971d6
SHA5129a3ccd0665deee5616e41d8da17f2f8280d32408483de7a7952550fbfeab5fe63d82cdd3bf3e13e198174cee2b9536553f74aced3adaf7f8b6c0a571fd67bc4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5745fbccf417ac4f14655f7b7504fcca9
SHA11f6495b6b7a2fde15a97037b7eb0fe2a98cfb964
SHA2563b49c873fa7076a3cd4750841817f797b1492f2b217ec525ab53aa179dba9858
SHA51213ff142f1474cd031169c430cd72826b5b7b96e6be0b1017bd17192ae5b11aac9301939269a8271c3b62cfdc206c04eb21ce85a4aed03c172d28a7e9510195fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba03f9bb99f8ee93eb727184021caaad
SHA139b2f64be5c746e48c35c2394053563ceecbc3af
SHA25600dd092727ee35b503b9c4a03d8f37d2ce31bbe03d266e1e8de83fafc15f75a6
SHA5121a923b7fe39fb019563bce3993028a4b6e7d68bf2e2be1bb336061170a5ec82f785653ed2d91ccd214e8da858616371efbad04ef90c6d679c9585d7d511bfafb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c79feae082e165f1a51b1447e4d98093
SHA15e10cb3c4c7d30a1a5e91abc74b4f8a80f6fa655
SHA25690747a1cd4b750a0862826d4043875993521514a4c96c5c4a57f88ec20a65759
SHA51239b5f99704dedc0a50b2517f91b7e3e7b233923be1f92663a9db919dd25dcc0e9fbc479840554fa66ef6118ba18f9211e71ebc220f25698d0001da34938ab571
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550680c9ddd1d046d44faa4027550450c
SHA13d6d574656df2e24587e6fb7ebc0318dd7e33472
SHA256a655d22c64cb91d8f502a414281d3da77d9d60e6cbfb11328b31d93d0b91d554
SHA512f81d31a1ffbe7ed363bdadca010cc1427af5baa17611c68bc297b414c8a6002d9b238306ecfb7df432149412ed9adf8689bb94a5b3e24e015f0b17037b750cfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533ce87869a1102a52dd9fcf68c325c50
SHA15523cbfffe27c29123b8645c25bf6a298cd790c1
SHA25671d999480ec6a1b4e0f83ec930cd75926ea27a878d52fa7b0ccc51f6e9e47942
SHA51239054afd2c3e20fbc1201655dcdb82e817dc2a73d28db7b7fd6458814d2a9a7042c9d5a4cc967c6d795e76de11828dfee3b9cf30b9b06035e1fb5f8c21a75dfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3ae5766266d76c92f2bd4c27099b2e2
SHA1b283b35a074997e4d80e982422c158d535bb2b82
SHA256084aaafeaaa4cccd758a7f2c6522301b11aace8325e29454ed24463c8327c984
SHA512eab339610b8350d688b12555080f8f6717d46f18cbb2c483dd12e2a4622a14e89407618d7df236bdb754415fe7ca03572979f7a7cb9892e85d84efd3b4579cf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5612f9a926622cc4697aac3fdb941232b
SHA15a83d212b720319d95159b0d360fa447772d5504
SHA256fa4fc3224993023878f0d34cb3e8a7afe988c4e72ab6b015a3d006bd92d30a6e
SHA512277d871779159125e1744dc4e8e41da5a12d9a7dd84f84fcb7f464a43b8832f29f3a8e42eac2c866631373f9cc1fc0d0d73088b3efaddb95b8d9e8b7168fd105
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1bade55165a0e356336af47816e9d0b
SHA1e79124dbb55b8070380b36b724d06a0865a785ca
SHA256715ede175e84aa79abe0ad4dd1e20fd1f61fc705514495af7f3b93936d084f74
SHA512ab87dd2de99ad48ff5416588afdc44450e8cd16699ed18be49804fc603a17c64e17193402f28feff8d70f746c7a8f4f3daed9051a318d5005dea92b8dbe5157e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a14db77f5e90ff41328bbc0003bc6d48
SHA11f30de64030c4499f0202f8df90c9ce4957c3094
SHA25687749c5469659a9ea538fec560b8bb682cf4d73cbf932bacde3bb3be0d249599
SHA5120d38377c58263e41cf3856173ac4f907358c7ba0c7165ba3994dc3d0971686ca3d67332ccaa061f3646f7a343bc612bc581bbf97390245a49316bd133760aa4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58893d9b632e1ab1655bbd8162a3d8ab2
SHA126b992c09fed68f250ac4cc35ba6d81199467d2c
SHA2566b0b5f09be81daf42159dca6a72ad0e56e858026fbbe53b9cc42409665744926
SHA51240dfc51b72fe8ae2408557f599262c815b64c35ae274174615a2d416e0a9a847e580d08f464fd0d560c5b17bb939307baf049bc12beafcc4f2b285bc2c59e266
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0d2d8428d8cf8570ed4d086af079f7b
SHA14499cf19c6f7394fabe8fd60eb8b83225cb12ced
SHA25635e96dc8cf7caeec63c57700991452bffc25b98d9c59c4ba5852b7d8dfcd0e78
SHA51280be03d3a3460da1817d9b38f56fcadc50d093a9231f5822a852016772bc6802fb8cba0e9a43216a1090c4b6019ff0e64b1d2c963835c848428763741f09a870
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56bd518ce89611c8358ea2c1b4087f78a
SHA154a5e1d08615a7b40c4478443f8f6ab92faaa665
SHA256bc9d3d754b2bb60df568d6aae5dc3a2928da35f683edc23c74fe4573ac71e227
SHA5125e6681fe652c98460466490db2b7b8aa5d7d7940ef906d223722103385341ec489f24cf53b5f433ac63bf7b213c1624303b1179d6464b01e0d1c058299dd21b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5abfd93d794d6b13373101c76f998fd50
SHA1cd57dc1d16ba2dd523738416cdb914b2303f9924
SHA25638575f58e5bbc686176924fe13636a06e5d91841537e3639c82d55c031f89a90
SHA5125141cc71ad45a097510ee1c9d09bede172d2fc32af28a03a8ed302b2f5528493223a5d8795fec96bcc3875e08b465f52a07891f70648bbdc039a023d4b9cfc8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5de6af69137efb2c6782dfcab8124ac
SHA111f9a1045ece385fddf85318dbc484b95986d081
SHA256008b82b42bb5970d4ee472048de92289935135664cf9e2d7f8aa0c54e8a6e2e0
SHA5123505a0198763df96dbe1b58ca6e98debcd55228544694788f49caf1887daa6a951df17a6dde800cfe692f2db6f59783774dbfa04d1dcb74346586eb97fd647cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5000f0a2d5f14079f8fd19a5b564ad0fe
SHA197e95becd53a7c57c8db7f55cd10b394f22f25a9
SHA256509f5c93e183b2aa9374a0a376fe8d6244779732b282a4be3fd6431c1414e799
SHA51216a35ee805ce5ec648a02b640b5dc0c85ac500e7a2aff154a162c28a455d9e05ffa0e065d8a47f4e1a271a198299a3ef2af18c2b533994106aade12d16fccabf
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a