Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 07:25
Static task
static1
Behavioral task
behavioral1
Sample
7c2ae80f5c65e75e50756f64fc261107_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
7c2ae80f5c65e75e50756f64fc261107_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7c2ae80f5c65e75e50756f64fc261107_JaffaCakes118.html
-
Size
4KB
-
MD5
7c2ae80f5c65e75e50756f64fc261107
-
SHA1
6634f6c3351715fd9561d1bfbeb5c9a5a36b92e7
-
SHA256
ab77599d363181be54838a55444d505bbca752bcb0cef0a341eec88921a6b68e
-
SHA512
14ce603d91950262442a49ade3c5943344a7976ca56baf9493cc28fccd9303b182201f72b6ad495e036b26e3ad54761f83aae5b9c342d2e39b55074ac0ffd4cf
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oR/WDauJ:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDX
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7001d849d0b0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{754632F1-1CC3-11EF-B781-461900256DFE} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000583a3135378d41e7078992694beab04cad03109446e4e9d5f03c63af217412d4000000000e80000000020000200000009401015e3cd20bb93184ba08e708450fdeef40b73c84bf702a78e16c03855b8d2000000061cf0bb7a73a12172f1f34b1774f4b5628a68cf01dbdeeb51d28a0e1f60e595e40000000671ff9387e63f00780d888faa0d549525e5605ec4768826f5cb5d259fb0ebec748ce39f8a99ba91afdc90a550b8b30ac52252d2c1d5f1b55428d2caf93ee049a iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423042995" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3028 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3028 iexplore.exe 3028 iexplore.exe 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2556 3028 iexplore.exe 28 PID 3028 wrote to memory of 2556 3028 iexplore.exe 28 PID 3028 wrote to memory of 2556 3028 iexplore.exe 28 PID 3028 wrote to memory of 2556 3028 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7c2ae80f5c65e75e50756f64fc261107_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de4464b2a178245f9992836e6a6e59c0
SHA187ff42419ac762e9c8da421fad622f0185b2c869
SHA2566fc70dc61e3649a1212b41578ed8d5a9c450e79b5c89dfd0a57ad91f9263b63b
SHA5125b45c93d1a79974455c827a556c3facae5db31b0ed5b21222518f0acf58be15f16bcf81f562b8b17bf66af9dc44f14e93a69c1061724c032cd220a2105c72219
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb132de2bda48a00b087225b70266e6a
SHA13320ad5c4a60774eea0a853fefb7da946a8d8031
SHA2560549230ee39586e69e03a1c738e3cd0eec103dbbf4e027fc5805121d105795c6
SHA5124f95f27edb1456613b483d629b8b72455903b4f2e660fb5dc06e058b94b358cf52190b8fb83f38c57ff2e91e811b03b12425a04db5227d508c8c8b850a01324a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5f2c43e04307cba70d295fd3b786b55
SHA16cd2fd457ab4454d9a6714bdc5d78d8527b52b63
SHA2562f2ca3ed72fa6270a34793d80f0e737a471f947c9824f960caaefb184244ff90
SHA512042bd0e84055090fa7d0e1702f07177e535487e7f4fc740b4437490b13a46a203dbcd8aa8e9b84b39af37bb607846c82f8464e896437cb418a8c475c43b2fc4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5193595a944065fa419f5839cc396c537
SHA1e20bd59910871948b1f3335b20b08026a058ff74
SHA256b5740999b7eb25e5c31d588a79b5de17649f02f9820699abcba3cf3174870890
SHA512890dc9aac535cd8c58a93817b755c96266599d7b30711fc97eee4d1548c85e41d8d20359b2211b52635b41058fb80ba2706af329347e3485aaaac8b01f667606
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e37fdce979f2bc108a16af8a2f46e54
SHA114771a94f23aa04c131b45ee9085af3d4b695dfd
SHA25657d0623cb28dcc3c33b304aa6b92cbe23f7a0025f1e2064fb6faa45c9c0cd073
SHA5120d278861a81c0e3700d6372538a9dbd43ecf07fd8e7873fc2b361e0425b67b98e39f5c30a580c4d85bd4c06b52d3b449f54965787699741b92f038b449f3772f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f11f896eae2f8739792490ed27dc9f2
SHA1d913ad00cfff75bb09799642a5398fe6b293110d
SHA256a99c459152e40561bddfb5b4561fb453caef701b87dc7e3c3131ca71bb46e77c
SHA512fb66f53c95a3ec30cfd580f163ffbe88e742187545ae360612cca48b1e91455616b06cf83c4a637902df8c5dba8ece29827ddd9547f4e109ad2ae1b9177cfc76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5020d4ebcd07a2e5c894accd29142b818
SHA1e0ad1268af344e9ee57aa60547bdfaecd7cf421e
SHA2561768218115d40c9bb71895497fd427b883299747243d8dcb2bbef639fc33eee8
SHA5125f4146720ef746b99224d4790cf2bbdb7e8c778b0cc3c8cc5285f0830ae5c1c46955ed51c56b557fde893b0a3c553423a5eb4b805ea5627f28ea452c3d53cfcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5012c97854798937e9666ebc502183637
SHA1dacc505120c8ad06a456082d2f6d5200f385bebb
SHA2564de4c904725737b2e89fa4d2d1251ba420eee1a6204d266c7bde7e5abfe8ab74
SHA512aa3316d339e7165948cc01de9e3f03d2fdbd9b11c05dd66e378db6f51ec6e37ad8161afe21c9610b5083ae131f83f63046a1ef37531a132e581164314047b07f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544a623eb3883c15fea807c4169ab7082
SHA10d0015754fc9fad41f7655d66cd5f2af5fba11b9
SHA2565da9032e2cb5c25fff1da0421f45d1161527e276da592314b45400210dcddaac
SHA512091375fca97f564073173f90eeef7b90024b9ad5b37e0ee927d302c6d7c2a2c38b8f87992ea9f94cbc0938227de223959f5580f811133a9baf5f2e874586cb1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f76470c9d948e1944e2928f359fe0b16
SHA1f89ab295d448878092ef1169eedf8a1ed2c57a07
SHA256b32c9d1c396e2b7832d966c9881890143b59d20391c766cf1638c4af162da292
SHA5126239023b9c04e457e9ab47dff4ce80ec914959aafdf06dcc67bd6db14ffb075e3be378bdf225c2fba85d4b91922861daf0fec83c5ab33c7eb2a32293ae49f6e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558e8dada1b392ddaa8d88725ea31b306
SHA159898582dd6faa6ac05fa5302063aab4c085d6e6
SHA2565216cde24871f27c64bf2f6e08ff17bb930f84afdfa2c768863ef569db6fe4df
SHA51240a570fdea169dfbbf3417c1d0177251b0025705cd70371ebc77dc53074b4c9aae60d677fa242e5fd5b600bb8d6f0a9fd6cf313a66cef2d27bdfd396a37427bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c42706baff5a36377486d3567fde71f
SHA1839fb59287a9e30dae432ed303cad67318c1185b
SHA256778257f7306e4f433b2624b62a13280c942d4de29a51c1dccaa4d7f72f052657
SHA512868fc86509af564ad22c29ec35153c06c1f2c165b213897974fd03a99637e9b01074d90b927e9f20028a4c5b25db56ae75a995137a240606d52b8ec0cf0a3a37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570c6a6b4af26b02ff689694f9be45d3c
SHA1376cebe8d3531692252fd2ad45d43b0ad43ac953
SHA2563c3176496fe6249760a68ebfb09164df49b8973bcf24dad833144867cd422b44
SHA512bf2b206ac1e52fc0f8693a44144b6d71b283d7991fc5ef3909cf4455306509b4a2a02333a95e96d64ab56ac3caaeb82b571e5679784147929e82ef7934038f71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533e0ddfd400860ab6ea97d670275234d
SHA15f9d49ceba69fefdeefe1c8db76212efbe3d3ae2
SHA256f38a46cbe8e7412ed4468e9287830cc4540ebfc366ba29a7a4f56484bf7781a1
SHA5121c5b60571ae2aa5f5f066b69203c81967215ade14e64599c16a92279557a6e27e79f8416dd32a908c9726e7f731157aea906e5cf950eb6047967499036c89fd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a218790536b9d41a9c8dac62d9313786
SHA1bce746986d93c4690a44cd4e6fa626eccb10bc97
SHA2564a71884d44331bfeed1ce8756f8dd97fcfd6c6be6488559ce1e71c9625f76825
SHA51237d117144f51b02572dc92ac05e49ace1eed5febb6d88c3814d42c959267e2249199563d50535daf9f926b73d0d5d4220278a89c8496a1cf32c928f32996817f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573340d3b2201df12df581a90d5f30244
SHA100726729f3b3a911e06f2f450658a5e24a7fbe81
SHA256cbe2d84b72d62e1ca2f016cbe6a10f0667169361db804f8ce3c39735a2a062ab
SHA51280810f206918a3da817bef0ad543921895d26968d9bb0b5ec50170ace4c234c00486949d193db3cd2936d39e7416be2a2b932311d4e1b9bd40e747cdcd03e33d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5edcea639d4c0e1df50a88c51c4540ecb
SHA1e4dea1cb0bf93ef48d69bed6f0252bbdd51a7e1b
SHA256e8f459b1bd8092d3ef571fcd76ff904fe9a0e2e93f0efefe6e6ce3f6bd047a02
SHA512b8554d25b633146099280a341d8b1a832effd165eb33ac8ec5f1300b0149d486e8d3a0a9d02cf305984842893b351b4b848267f1a5fdd963d7ed8c5fa950b4b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f980bb5d8eab16c5132750fe725486c3
SHA15f956cf9d0b19937bd8228824a149d80a30dd0cc
SHA2566d649c88932f78fb94dc9fc67cbc3522e1c3e7913b3ccbd5a3fd2728c8725ace
SHA51254f62047e6fd1f37841a5b76899efe87fd7b5c1057720d27a2ea4faad1d74d7b3fce4f9eaf9f1e6dd254fa969df70a2738da9be9ca94f6ac09b5711c3a34a9c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c76dc1ab23fe37d494d09cc5aab3d18
SHA1e5cb136f927682fd05385bd30a50de6e90b9f306
SHA256dcf40110b6cce21a628a9ab05e08eb22324d1c748bfaa2dabfd780d3fcd69901
SHA512ed515dac5a928ff99efe82bb76e08359f5d64f1a668b095fc87eb83be7ecc3020af9eba91720e82ef87a19ed3b2aa97bcc2589866b368a2df608c09e9759a577
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a