Analysis
-
max time kernel
118s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 21:12
Static task
static1
Behavioral task
behavioral1
Sample
7a8a99a4cc9629c83b17ffae627f602b_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
7a8a99a4cc9629c83b17ffae627f602b_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7a8a99a4cc9629c83b17ffae627f602b_JaffaCakes118.html
-
Size
461KB
-
MD5
7a8a99a4cc9629c83b17ffae627f602b
-
SHA1
7e24762fa67efe701d3876f386847bbdb0b92496
-
SHA256
19fd304d18ac0042c0b31ce0e771dd9b76afa534907bf85c70f498f72570eb52
-
SHA512
e413cdf1917bd07567431b52801e1590562758502ce599475f2bfbe9ed8ccb0c2eb1146acf31c932bd3244466e84406b788fe4d1c3e97acb5250a03b91ece1c0
-
SSDEEP
6144:S/sMYod+X3oI+YlsMYod+X3oI+YBsMYod+X3oI+YLsMYod+X3oI+YQ:y5d+X3z5d+X3v5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90aa1bb17ab0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423006225" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000d2f5434eab6607befc5f453f22b693f1d99009078ea0576c3179f05568a1eade000000000e8000000002000020000000e83db6364faeb9445a35538b755bf23e375fa1385510fc5161e62d1911e6db572000000040cda579d5507e45a2250b9652a2abc97f836c088872bb11e56dbf1134f118c5400000002c8339cbc6b25fc8a7607e2e79049a5932c9fed80ec1e043fd137a0fc6ff8d07b14671eadb2b47b76bfa230922e375ca8a485ad85185e32b714a05e37e27c3a9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D89BF071-1C6D-11EF-BBEC-C662D38FA52F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2460 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2460 iexplore.exe 2460 iexplore.exe 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2460 wrote to memory of 2836 2460 iexplore.exe 28 PID 2460 wrote to memory of 2836 2460 iexplore.exe 28 PID 2460 wrote to memory of 2836 2460 iexplore.exe 28 PID 2460 wrote to memory of 2836 2460 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7a8a99a4cc9629c83b17ffae627f602b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2460 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a78aba57427b6a0603d2cbd2520fca5a
SHA1062491d176aca053851990232b25d925229222ee
SHA25627de7fbd762aa486b4ebc716691e4f68ab951806666fbca09e0c6a0fafad9a01
SHA512300993dc00aaba4e1a208bc89b08c9a2a6dad75d6ee72843ae9944b1f1d6350bffb50cd8b0833bd0f1e6d9eb08b889efc1582ed3f96930e64cb059aff2887481
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5119c38ea8104fb42825e620abebc20
SHA1a10907bf51f415ebf971f83022e077861be99f59
SHA2560e88b85e6311fe7371a1cd8b0313a0034ac4eba07c0cc1014d67a9e012ae03da
SHA512a9f950c4ae750dc8ab2355d27a07f23a092976524d4df406e596debd764ca353b80bd9eee295dc3727ba4beecf08f817dabb0202aed87a06f1f973bb47dc2f48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cdeef0b5757d6c2536641a538a94dde6
SHA185c71416f23df40f96e5d7e1c3a8d006bb2ab604
SHA25667283657d0aa579ead19bc7e51c754588471cd128f01287e4ac69c8c7334a96d
SHA512fb664a62606e998d236435580038a39eb70584fbf149daa86484a3e82ad4d0b464882656f619483b06fd2d6ed50eed7a467012147fe01f17a59f42786aec2688
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5544a920826aca51fe23aa42fa4d45d5a
SHA1eda6b89a0d4d1590527b2c13be280ab8c4a949fb
SHA256a8e5041ee94daa23ac6b7a13ddf4735451c586616274a9287a9d84bf3d0d2b02
SHA512e42ca19da751e0bcae78ea74b08ec9c7772f19c350152f11a945c918c63a122a0887504ea91f1e052d86cbd70c25e2cadf82702848452599360951900ea7be7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff599faa655a11e78dc43f2bb44ebba0
SHA14dfece0d7fb2e0ac3dc2c60f38cfa1668ddbad6f
SHA256df2c80b6efa5d8ff1d60e3dc3ca6e213ebb24fbd349a4fb53b112a7179526735
SHA5121a33330fbb0d5616c5c8dd90953b49dfb04621e50fbe110ade5f6eb57fab4e1791ce8e0b2ec3659de86fe60b9a5cbbc5dff1ebe3ee1801255c884edc5b4425a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f286c25021ea167236142935e8a1be8d
SHA15aff8883d7572ef2714bfa1bd1004d0132cebc81
SHA25677f32eeb55daf895c65e4bed4a0985e6a3f1798bd748bd98c3c0a4dd352df680
SHA51242ca0ee66af9ba7c61a821e876e07ae081198149983ef7cd7696823e58d25238b582050770bfa20d3772cf505779acbc46d30cc70c243c7f5b8c724c0cb02e35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5209d79ca7a9699d862311e6b8ec75fc5
SHA1cc4ea0f40c57cdae587eb1ac762c7689413e4d42
SHA256c46830d1aacb53382071281e9176d6477ab54bd0ed330312a71e50ccd8620f85
SHA512758523ebc02d0a242211e8f7b6f508b7a68df4abfdbc04a109559f0e761d1153774700f9ce80e981ed1aa016f16795dfd000b501b486f3c77b7d57fa2dfee7d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5725614a0631f50802b3452b462174b17
SHA192c534b3e776490adf9b0fda808ea9ae61113326
SHA256887a374ba2dc60e79ec468772b683b21a107f5d061925438bc914256c372f27f
SHA512a184803f41d0a8e293fbc739268430fd47d0d1489a1c166e27c26861656da8bacd361d7822d88fb04d8d0359d43e6e62cc5ae760ea3210539e2f4aa9fa643b88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59043d3a01a6274017010602ef1c1da52
SHA109f17d0b9713f956e981e3ad4e55deb6bd35e05e
SHA256b94a51082d40a1db96cf7c83d599e74effe1a33db56ccd635ffa949ee01c0c6c
SHA51229ac6f342810f1eecda9bc05d0bcd6338d2e164c62d07db4ee1f1eb539018d493824271022befbad0ca7d664a3844a27e4028039b68656d8508a4a61a9970e98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537d028ac6a57f41109166992b4891743
SHA1aee4df0c4a36e3f9ed4bcea355a71fa0940da2dd
SHA256faf4fea2bb53409fde25c2d485127da552774c0dbe4688e1af321d0da2947fea
SHA512479f734bc65106382cda12f8d6a9f73fa1de979fa7e074e3ed0f51063d71a2def8da89e8bbb5e02be9e538e823be69fe8d4f51e3c78cbaadcd1cc14e38c4dc3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a6a76cbb478d10be5ad4d97771c1d0d
SHA159ae17490147ff7d2cf53caf72cacf7a1a6fba76
SHA256b8fbcf63b07ee6e3197453fc0c006fc128b72f5cbcd45df639ea77a2a2993690
SHA5122f13ad407cadec094b5574e590bab47ff5bf91de89644df052ff9496e243c4620f07b93ed92fad0ee4821e019496d2cabf977db570768869a01fceac403bafb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7a28e947ca27cea5c7cd40cd5a1e251
SHA15e94394f3ee36129148ca24304802181c09a50db
SHA25695e199931033d949ebaaa31387806f621b3bc44ed4c49d74c17f966032a59d72
SHA512729f98ed89ec8c659e842e1f2e6b7f439898a7f29c73811ef1584747a5d4e19c1da63fdf6d6ae6432aba1e48c81707c5e2edd7508d94361cdd38eaa42d4c3723
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d92dac3a3a363014205cc50fdc4240e
SHA14840b2b218e77be72cca2659ee2fe35edb7ded6d
SHA256745a1d3d24346b399bd00f53921f3b6eff912c10db195371967d39a390351f7e
SHA512392cc3a6f7b2187b367ae887f4c2c33341d87368a52fb840de077f958e68add15ccd9e6a06301cd2630bc02934ae3869a85dbbf8ed732629209168f6eeff106c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6080d80cee6560bb529c0f2bee6eaba
SHA164fd266812389709f4a494b8f96384ab638dcacb
SHA256a263636cbbbd9e33b0075ed887fbc0e27255b38ec432df709daaee88c0d13349
SHA512de9dfd3b183897d2fd781a08dea53c3afb082cc0b9af8a5a5a5e41a0c44e018203b1c357e39c7f0961835266e9f386f368c7aa26b426acfa654095d84f1cf278
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c1726a37040ffb46dc115b25ef3781f
SHA1675e5f506e341a8ee64b077f2d88cb919f90f292
SHA25618156093d62d87863f32b2dd4daab5dae27474aa43e5bf0d5eb538525aaa7d1c
SHA512a5533082236c6191a000b8cd0a30f2d15b94765ecf2f5b76a9a26833b1abafd3beb4957a9093ad081615ad4ba09a6d37f3fea2b4bdfec7265a0be108790f8401
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa8943840a90bb35ca8f27803d6bafef
SHA1406dbbdda6a64378208d48f3af71bc771337fbe8
SHA2568c715454723e5ffc7d2f146f51206840111c9b86de17a20d4571f9d4281b747b
SHA512f94438549dd238b96d1bf1cc84b71881a6c8e94b4d2d78c95fffab652c91f91853ec44b99f287b3a54edfe046132b31a2fcdf22f04eda60a64c45ce0d6913a73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1a11c679b136cc2b3220fde7488757e
SHA1b5c4280a27ffb2f452713b7c82419cae41888f1d
SHA25621870614aba739d26109b8352ff0f61166222720943dfc70cd33a1c8a36e03fd
SHA51263d0691614b5705c0d22ed90c0428b0cd7e30fff30f1116057e05416e359ecf89e3e1a3ca0e767dc05b433b0e163a9bf9d45b363e007f2e688c67ed7a7c5088d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d406b9af3a6246b041232df44de2bed7
SHA11d2ecd872b52228fb7154733e3e5774730c65ac8
SHA256a0c7d12c7ae8470f9924542f77a5943da8b96ef4dec9756f1f8c38305d91ffda
SHA5125898b106186209e3be215e2a985ffcf7504764d07a9e78d8e2c8056cb08784cf8321e7d0598c41b16248f2db9b98c20b265c799d5c43dd47c1c4959f22ece817
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d57086828de50a3103669acf468b6123
SHA156985a6bbf70d56e631ef2ba9c6c11273f4e9c1d
SHA256aeb210b1213af4ec7d013c4ac13cbff0838413da8629e37e11fb41dd3043fe6e
SHA5126bd45d4153f71df965b6a582860d371222a2c7b39833e6f63f15c8c204034b441a88656165ce2985b5126eba713f7ca077cac495ab65d3a10eefda18c40b44ee
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a