Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-05-2024 23:10
Static task
static1
Behavioral task
behavioral1
Sample
7eb684b08d1fcb803f392ce2f5f6ffb0_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7eb684b08d1fcb803f392ce2f5f6ffb0_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7eb684b08d1fcb803f392ce2f5f6ffb0_JaffaCakes118.html
-
Size
162KB
-
MD5
7eb684b08d1fcb803f392ce2f5f6ffb0
-
SHA1
4d76f9a3f92dbec5e53e53c0d242afb2092dbe45
-
SHA256
3b99032dbca74a97ac3c399f26942a371c10814b648a280fffe5e1e7d51c894e
-
SHA512
62a438840daa950c355c452105b8ba9fc576ee9910cee5fdbb7156f02442afb14d3ec7eb4220c0a83adb0b73ffc97600312f8da25d877cdd024fb53a292c4d9c
-
SSDEEP
3072:Sj0FrtKKZ8/iLyNGt+X5gSiEYGvTBo2yK6fbpl7KSYKmXm6NZtxtRtCpHRLJfxrd:Sj6rtKKZ8/iLyNGt+X5gSiEYGvTBo2yR
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423099681" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0a2737654b1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000cc534425a0040a4396809aeb7fa91720000000000200000000001066000000010000200000005716c084a27e0ceb22d1801a80ffa84af4c95c9c9398ff41f8ca19d74c282bf2000000000e80000000020000200000007ddac6ec0aabecbfe2c70f4f4d6d34c51a9dc5a3c96bb3a312c02feb1e450f9320000000aa1448694e0c950230de3780897bd27eff423cabf7c0676ee2eed704b2a4304f400000006f07e28abafd80f9c99dd9c3d8102bcdc38bf041f491c7291141cbf78b8ce3f18d8f963077b6b07db69b3a3f691da19725c57dc4c476b27b44b7b78a31812ecb iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6F08EC51-1D47-11EF-A336-7EEA931DE775} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2256 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2256 iexplore.exe 2256 iexplore.exe 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2256 wrote to memory of 2052 2256 iexplore.exe 28 PID 2256 wrote to memory of 2052 2256 iexplore.exe 28 PID 2256 wrote to memory of 2052 2256 iexplore.exe 28 PID 2256 wrote to memory of 2052 2256 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7eb684b08d1fcb803f392ce2f5f6ffb0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2256 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df6de13b2b352fdf24b2fb5478ff19bc
SHA189d4e28d88c1a6a99cdbc7d1376e62e15845f223
SHA2564ea104d8b95c1d44bc757334407eb4f283ebd073ae1b033d3f8e4687d3f87b8f
SHA5126f2e2357de8818bbaf254cc33edbcde96ccce7995e28fc7affc6d76614ef4297a2d1592e964fb03f783f01e49e102c575276263bd0237fbc214585475700dbb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564645f6e1a1a7fcaa32447085528eddc
SHA18825e5e518e2edc88ee0a759c09cfc0bfdd6ebee
SHA25683d5f4d2c70dcff6822c7283506a53a50d7b34b96e3a8c54eae39ac75f511a58
SHA512e1b9274935073a0a3bbfdc9a486787c8f66088eeaabd87ec08739251cdcb287c596952867d88331a488d7b4745b39f6a52cb7e7ed8586462e14bcc56dc1d3806
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2002bbd80964cfd1ee31ac0aa34e93c
SHA17b2e2c95c167655b832d5d348e6d7c49c303865e
SHA256725b9ac8998f384d0aed25b85aeb3dfe4541f80342f1067ec3e0bf27280db04c
SHA5127d8b0392ee404f60b1c1d47a801f290adabbc6bbb76d2fdbc56fc0e0584f7cb61b69befc99c0ddbb971f505071e9dde5297cf7454f5d99abd01d56600c23721c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526381b25703c48375048c895bf6ee264
SHA132ca0620c629b18734b8137122775aad12a7e53a
SHA256bfffeb4cdbf1d48caf95c79fea73335bc8224e1d61062c8e9e2b049acedfebe2
SHA5123b397dbacb10c908cf21dd1310bfa7b31bf5ce661e53e414791664a09dce304d33dfff8c30135830c07302a0622d29f9a174a4f8c2e9b05e8e53d1e21be9941b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddd42270538dfe7a176b2d30a0e4bb2c
SHA10e9f603e6b8f0da7e1da8317104b9b6f234c2b06
SHA2568fc101713aa82b5575568802a779b6421d2f5ed17503db15183e1c23e0178162
SHA512fc6d28f6b6bd933bc11c57eb0d1d879a5c03d70c48f15712b7337f52389c331e054f01e73fe459a38f81a8c18786c4f39a1ca8b682c9999be28f2f12395d4ba9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bab0ca4c1a8605dc67fcb3775fe4a57
SHA186777257826cebbeb9be5a81b2c3740cdefde664
SHA256c7d1ffaf4fe7ea8f7578c13a0c3729519f5805a2dbcba34b3fcde8692c939420
SHA5122c94fcd45227aee21e44217ac3353737c6b64ef4984a56f69830139811a8d4ee3a0d63d966f3ddd22554a6ae67b21c7d87bdd3f21421ed37eb8f6627902ce966
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581132d59059feb130e75ab6b022f79f7
SHA188d43967cc978c30d9c04e536103e7b939add145
SHA25613c2ef79bfb92a7510b17be764264199d0d9c51b4ad2407d74680070fe70b123
SHA512518870f7157932faa2a497e339b5c334ad9ede08c19a0b95f8e671dfbb1dc2bda29f840af0d5cc1df883763b2c2bc354f8056ab2ade575528134bc4682f98559
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f755d1736b96d29dd08f7bb5a04a25c
SHA1bbc6c7d9c31e4637bb914c58c90abe8d79f345b5
SHA2562ddd7885d9d5907e761946babff0f44905cbf857b0901a4387053c92da6670ca
SHA512234680648a1c42eda79925f9af4fc5acb464d8b5045b45c96598bf155cbc86e921bedd2da63ddbc21d60698b9ca1607f8aa448e03976ffbe2eb2849b0bfff411
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5686519ad6874e85784a3266c01beb167
SHA11e162a8543df4a75ae9d4300be044eadc92b7697
SHA25662d5034a6d62ad55479530ef6645014bd0d4b380845f5ee995f7f14d734b8c6c
SHA512c00f15fcda3abc4386b8dbca932d36dcf159870993193d75b394b414663ad5bc890c6cd373ee5cba9622c917b55ce4327b3978b6f157e3b988caa7cc89d5f232
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7e42b7858edac3ee0b22276918cf137
SHA1b416ed1b9cfe31d74eb4892e7c4df37ca2af5bbf
SHA256ffc446a68f69670d5b44e3a86f72195a989df0a37b23117a29d0d8283601dd16
SHA512b41516a72ca081802bee61bcce585a14ac1265f03f4152c68c2dc43e745eedee682174fbdde95db30e90a51dc75cec755a53747ab01c0eec8f439eaff99d85d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e19ddb502a334646484b2063f2a23653
SHA114756da20bf5e4bcee45f875b5909460ff126634
SHA256f25fb7c08ece0626d9fe7253f4d13df54c6c0368a011f424ae76b4e4444f5104
SHA5122d383e5eaa67b7783fc391f11324e2a4db2355a68726e3f2c09134e9a935de03a4834f764374afb76fd3818dcb3e3ad8535ab85b8931672cfdd5fefcf6ddceee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b62e872ab1380ee3c330a28461cc600
SHA193fa35b1944f402e78836549eae3f00713d52e1e
SHA2569e9e9141596daa548a6b4398d0dfa03e859a0f8290c68e00c2e77a05d1566d96
SHA512b7569c4b3f2dab4b47f1b4e36ff2f5897c3c225e6b07945dd7dac71d4d9a2e7e7165fdf7587ca2aadfa476a367f56b44c7ae07c08029c1311764ad89281c2a1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54068f20d12913b271bc0e09388e3df48
SHA1e0c667b4fc53428277eb7bfe78e1b0542c560359
SHA256fc40202a2ee31cb4d289fc36396eb59de215ba50bbab37697d06f3524d9406c8
SHA512238b1221ee468c0676f2707d9c864c8878dadaa433f72ae923b28536f64fd77d577a29fc5e6488149c16fd0793fad74e2d68be51a06c353aa1ee586a0baafce6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ecd09253c1a983f330bd4f8a387746d
SHA1092d65b9bcf41c8823d5e951299b2c898329ca24
SHA256dbcb6830858bcb275026fae0d77a661060574fc42c5c82da39eb281071326c4a
SHA5126ac026bf4db890f91ff98532e6fb6623e20422c033555d990afaa044105836d243e57c2a6f1b97838e0a0f4b35eda56add5c1daf61205ed45735525a3dbe17b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa735dfd9cdddbb7dc9c1f37f265c431
SHA1288fccbb054092b351a7043aa1d0e1da93cf9abd
SHA256fb34a1e916a5806792f2e185819c7a5db0c2c05c34665b5ec5e45ae6d8399572
SHA512b50e382069bfd1cf2b04d3df363d63492a07cafc6b5ddd0f1884d48440f0bdcea90e7d3d1de9b5e75e75c8f1516400262f61c04e12f4561d72486111c637ac0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ab0fa9b874317d57fa3666afb76f7a2
SHA179310984ce11a55aa6a9673830c8c2a33d6ab1af
SHA256b9b09461f5126be9e20247c4b9233cd41c653e26dd6a555dd94dc23dbb3aa4fb
SHA5120249b4fc2b69525445b23ff02dabced21a9526756afda3ca6ddf025a7a0b74598faccd85cdc01dcc53a1af8fc7b4f09ccb33aab88dfdefed7c06327c2f1a4fe6
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b