Analysis
-
max time kernel
119s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 04:21
Static task
static1
Behavioral task
behavioral1
Sample
7bae31ef902e8e56536ceb91671a1b3c_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7bae31ef902e8e56536ceb91671a1b3c_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7bae31ef902e8e56536ceb91671a1b3c_JaffaCakes118.html
-
Size
460KB
-
MD5
7bae31ef902e8e56536ceb91671a1b3c
-
SHA1
b00f8f81fd390f1a5e17ea7ac68f020cea251c85
-
SHA256
e08905a019bf1ce2774e39660f5a1a8130a4def38e1ba62a874c44d757278996
-
SHA512
0bb7f55fe73d51e4d469992a086367689ec8ead1535defac37a3c78bd46d7e81dc95b8154211c8ec78d803b2047de43bf9ece5eada17349506d5d42d259bc32b
-
SSDEEP
6144:SRsMYod+X3oI+YksMYod+X3oI+YFsMYod+X3oI+YLsMYod+X3oI+YQ:o5d+X3w5d+X3z5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423031935" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80fe008db6b0da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000c1e985580e379444ddd8765f083bbef0b3c522f4a5ce4f4ad3d8020f87de0a90000000000e80000000020000200000002ac4494a282c212c2ebf710f3f4dd5e87e716abad8a2af78d8730d4a6fc6d7ef90000000af5c2e16751f5d54b2d5b97406dbff0d11c7a688b7b52248bd0846bbdf2dc910cf2f4f1586209599e71d11f3ce3067d55356cd0a08ebd7142ff44571b8eb4e6425cb10371f7db467616dc6c3f2f0be755bf6b8492dd3bd780245b5db4dceb23b2e0b24b9e04f723407c307e169a5685522f1ceab651ca11630f25d2eb0864e864ecf56a39c6aa96e0dada19d9d679b834000000073521d50b46f69b8e94685d7530314ff2420b7e8c65cb514c11ce84dcea922ae3a45e9fa44a93593f63566545665e4510750f1df87ad76d82623bb93cd2f7ba5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B4693821-1CA9-11EF-A538-5630532AF2EE} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000d40b5aa214dd13530aee183918b21f9355c4ba132180f00a9f3897072be01bf8000000000e800000000200002000000051cc722fff4024dcffd3c399dce20a8e3c8e48c7e937b9919ca809e45ff4aa582000000099470c7f397b2fd5df9cb23b9c1258e6ce76eb8cd0acea93385427d3c8e74bdf40000000cdf2d7e0c99803ca0c4248939a28ec1f7bcaef28a4b580acd360953614c0a33cfd9ece5e62c6c1f61193490e07ba43be2bd097738f0f6909ae0a4de6a6468759 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2152 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2152 iexplore.exe 2152 iexplore.exe 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2152 wrote to memory of 2412 2152 iexplore.exe 28 PID 2152 wrote to memory of 2412 2152 iexplore.exe 28 PID 2152 wrote to memory of 2412 2152 iexplore.exe 28 PID 2152 wrote to memory of 2412 2152 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7bae31ef902e8e56536ceb91671a1b3c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2152 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0853cf1c848af4faa78742a6aeeb380
SHA120efc3a74c7c024b1289d06bca794168fd22c60c
SHA256bf064abf91d72d6ff816e31b82714818296378466da50317250db4490558ceb9
SHA512e92ec07f42585b5bfa1c1d99d5a1107032f4f385ed0632a6f9e698c8b83e43de3d6b04a3c05b0076ed54e5d89bb9a78aea3be687332a7ee5cb2e64c6a7821721
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3024bf38ba7e3ba13c1e726d03c4050
SHA11de1f5e99de54a5bcfdbeb99c7dd37ede9625376
SHA2569ef07645d028b65a6f59b26f7adaf7840c40b2210c17f7a159726ccad0ea8449
SHA512003c18eade1f0e56aef0d8dc2f4c7520071ca55874fc8ebd126391df1cff20b6e18b9adfc9687fca2308633d9265e5d3ce40eb49b3e522a710e3101e84616a92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b4a69948bfa81ee5586169ca93db43e
SHA1f41a9dd9a29796cf4addcb7d8f5328c51cbc1f8e
SHA256b933c160ea57d4bc4a287be61ac55b54a578742b18081ddc08429532ba0aa468
SHA512b65f3f9371308aed338b384101200a5e13c2ce60cf93adf99e35d120f228b33e5153683f2c48251e45a7817fe613f48b2f59072c98fb973c6318c9de9c0eb853
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535d2b021df9a4467bec92bd116f20757
SHA1b3240566459359c0aeb1e5151bf973b6f865a129
SHA2560e32be96e899baad26e7bc6f70e1f2f135ec2740e8b732b4efa984f41691f10f
SHA5123ba8e3908f7c695f757303fc34469c0619d02152f1e8e7c19165f888db7741049839f93621bc7e43a546936713cea011c1de907398111ce27a56d8c98ac970f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bda2db0c82156b0077ef5b79cccb0d9
SHA10524f1edf7871762c38393b5ae5e3b57c8f83e29
SHA256c1a2499f0f3837f7795a7e116bf930019872f3d9408dbb29d1c9d6531f65c4df
SHA512b5791453fe5329c04f9d19992860d5fc3e7a0dee18211af6f9f1b836b940745af48ebfab14c94c329d864175937c74fd43eb483b4f746324a3c2575c7f8edb3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da748f778a22a72ac31874385b373d8a
SHA19060b402a373352a3d1876bcc6b9f74131821bfa
SHA256238933f25db768a1ca8e45d5f6adf504b4973e0cd1ad219a85a35191bfe1e877
SHA512fb115447bbe8c8a29ec8cd4ac5f11d6c109b4a9300332760429d7a846fe18f8b397cbe5dae0912e9bd49419cc16ed047eeb36a398969e3fdbc015b2070dc1246
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc46954e31eddcf3b08cd59942d986f6
SHA1e6fb247a64f57a0c8162fb910b3d42769256bc3c
SHA256fb2007074dda3788959629a7615acd8110e451e60460a9f4b5252e8a671e837b
SHA512db02d3a8ba5a9b8339a2da903dbf9d5d98b3bf6bd5158208a6ec35fd9db3519d1feca42ace5d04a7b91b2bb305e50867d9b96a4f39238b14853daad8e5b24d5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50da5520fc2e5b328c7a9e9c9091101f9
SHA1b2b12e06cbf81edfdabdc3fa95384b7e6ac64a8d
SHA2567b63fa172ba7a3ac8fd16483b7f10d9cb27ce51132824337711ef18574d79064
SHA5122e7406c86af78e505266d9f3d5fa4d0fb580a0a696da022c70da6878601bd31ac46dbd2dc92cbba8a4ad35eb774bb21e6f6a954a1f7ab5d736ffb9ad63d8e9b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fdaa0f9af578bdf32ab0e695ad3c0727
SHA1697ebb49f3ab03e7b432f1c55ebd0ec5375f61fa
SHA2569749824c630667f4928915f29af11508935a4a0a928fba58c8bfb4023eecbff9
SHA512fce52a9610b4d2955163b381149338461d5f4a4eba06ee8c84bf9cc300dc1471e2e74cae41cfae8886ea84cea7997a68553e52f1d3d59cc0c9be0a6c5049b6ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516d5418910d3cb68a146735fa261d896
SHA1ce02494eed7d6a42042d1d1b6b3b0fadd413c3b9
SHA256dd930190139de2dc04765397a8a7ec5aafe50bc813003df1c438bdbc04e96e49
SHA51244b27d60776a0c4951405f133934949ffc0b1cf8142a402173d6f1121615be27f4199af517fee0ec2c66235855f2b78afa5fe2ca06a946f74ddf4e4bb2fb5fbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e223810edfd9e2fe0455ba71a7e7728b
SHA1c1f61e377de8b5ee3081eee4cc2ec49e8df2b215
SHA2564eddc516733e15ecb36a9a1a4ea79631fa1b7d67f06a0bf53d2c257bae432362
SHA512143ba351f8753113c55c27f550fd34656671ee591095af49dacd0e2cbe9afcdc59578c16bffab141265515dca37a0db37b56578a3aedb20b676ead5e62fad85a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56622a40406fc597608e17b415f140559
SHA142b86b16cbb79d9ea0898a7002b5e8b49a4b86ca
SHA256f323a53c2159bfa077ef0f01ee7f21244d902ca1ac89526de23d9acd4ce2ff7d
SHA5126854a6b57bdfb88ec4a92c3aca05a35d6b9e71b478a42165d0fdf4440f0e3b606d6b00d5ed873046116afb4a50d4ba9c6cc9ef4a029ed62332364af7646e7315
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fa571bf7abc4c8f9e295a8bcee06d89
SHA10c5eefc16f0ccab886e9df6beff00122b6f10274
SHA256c11fc4a1ca660d79e65cc3d75ea13ab15603c452e3eea223f24dfd7b4f1d91d7
SHA5122d4fc6eb5cad07ff4e319e0265208d7daab724bbba33eeec773db9a464506e58d9cdf07bd46edd037a007dc390682332876ea79f33a2c3f8b1fea60cae45ab33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531a1c05a8a54ab6e398a1b6fd79f6b7a
SHA1a6d22a2fa9b4e415c6e23a94f29f02edc004e607
SHA25629d1fc45a39af02409b664cd6bf9923040b28a10519134e8d2ef1c1a1668af3d
SHA51206c330df779f3c9d99321f65ca7dc72982d72cea6731fd98460b26c372a4278c45c32a89b537035e6ed6267694ac52231eb7b8c976d0c2af4c445fc35451e25e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2562c2ddd406fea34b46bed0ef31978
SHA1cf290f250b9626addb4848ee8fcd73a2448a3f0d
SHA256b782f060fc0454c6e7041758a2a3e9cd97be75fae707a90ad1043af8124f4473
SHA512005862e5a03f339aa3f4cb450671b660eb50d71259b4712ac92cb9486d711de2bfae5e21d7deae366d5dbb1aa426bc8bd9aee2918a4be09609f485d12661bd46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57588f4e6500fb6d12ec7f0e2d68a0ff4
SHA107635a2d2de0f2ec70f8d106fcb9223ac514fbd7
SHA2566ff88c6f14a5bfb522a21795fbb66cf8735b5ffe9c84e51c874d6e1a2f6d6f38
SHA51261ead984411ab979da71da78b75357aa5ef8636c2315be070550a9eaad7f23a1d0ad724004015818dd6e19b18456efc7fa8af57086d06c7bd6ec92a8c6e54adb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef5529ed09fdaabb82edbe0200b36976
SHA16db7dde389eb71817605aaae74335061fd3b8025
SHA256af8eaa72bd904fd5eedadd11160b59b256229310e6a0dc4605e23e553dcc03c9
SHA512171c0e30904e6f7bddf5e9cad7aa38e477691f4f1d9716b34d4690e5d1cd2b7b8ec50c77a97e938636ad48cd24c9a9a0b8220808ec6f7054d24640402554d2a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5246403918cd47dcbf20b6f1e79cf0d83
SHA1d39bc5e77da460658555aff520eb6fc2ea728bfa
SHA256912dec1940f38db8ef37e315a3eef6976b0bcf253d3e09c0d50f7748f77ec1e7
SHA5121ace102988bd7a071f0da84f28bdf661a06f38b8d5bfe1ea09df461170bd391b9d363e177bab1e76635ee5f38bc62ff96e55f182b892509c6faa98cac62de219
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a