Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 00:43
Static task
static1
Behavioral task
behavioral1
Sample
7ef7729d3f4be69889c0e6254a195ea3_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
7ef7729d3f4be69889c0e6254a195ea3_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7ef7729d3f4be69889c0e6254a195ea3_JaffaCakes118.html
-
Size
94KB
-
MD5
7ef7729d3f4be69889c0e6254a195ea3
-
SHA1
90672d949d6cfeab809f4f354d69e4a49a60b32f
-
SHA256
798cd8df8ada35748a0b1e5c23e010ed4ee7dc7fe50376996cb0e16be52a6a51
-
SHA512
670cb7b1097b0c9753dbdcd5f5d1307b43f47a75fae26a486054aad5c2fb5db4c16ffce7a28991d49dc74cffad65dce0d4ec3203a9b5c0fe7f941ac6585b6f94
-
SSDEEP
1536:WMLiNKqLbL6RK9of5iSLfAK7LsQQa9FHUZyrXy6BdkrY8mgHC+qpEyW:WAiCvTBdkrY8mgHC+qpEyW
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000a19ea2c95b70f3310c916b894e8f0d295351e623bcebae08c2e6f1df9f634ec4000000000e80000000020000200000002492112e6e7571b956c10bd66a7e361ccd59af8705e04c58b11a0e1e561abb9d20000000a2c53150417e6af362f8e06da6769780ccf9273064de795821d8f415eb659e85400000001b53d37efcfcd4fb7cfb59f5f41d7f63e83bffe1cf06e61452df9c54d824856a11d7c0f0602171844c9210f19e4786a96e2fc8b2ddf5bc8dc28673daebff5c21 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6BBCAC01-1D54-11EF-9F9F-D600F8F2BB08} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423105257" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0d74c4161b1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1648 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1648 iexplore.exe 1648 iexplore.exe 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1648 wrote to memory of 2632 1648 iexplore.exe 28 PID 1648 wrote to memory of 2632 1648 iexplore.exe 28 PID 1648 wrote to memory of 2632 1648 iexplore.exe 28 PID 1648 wrote to memory of 2632 1648 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7ef7729d3f4be69889c0e6254a195ea3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1648 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bb099e8d807fff21b00da8e336bf9fc
SHA13fe4d430c9b2b4262b916bd3688715dfbe87f5d0
SHA256b6ba038b687d551641604ceb5dfb0625c280cd5d9c9bc29bf7f94cd80d823010
SHA5120490d1353f9abc5a26d5f721b43424a5849afed3a11117e017e672605e3bd5c807e53e26405bcf3c5d6455a3a46a7c73bb563d83c3ec899bb410888c18c1e170
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cba8bb3823019aa31ebebfb3b852f402
SHA1b16ad61691670ee9be7beae15f028c9f4867ea6a
SHA2561ef47232c9f1de562c6d0a7162963c04184c5afc5fe0acda978202c10c70d282
SHA5121613825fd6e50a1b548040a4c0e2d3589850f5f32ca19b0a7d3de00caf22efc9628661c9810800b7db78850bd4e19d121126f3effbba6967676161ca851b4e0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fbcc216de5ad3a2254f990b8d377e70
SHA1772548100220e20c5a43de3c64939bbaef6a2698
SHA25680c21c2a3a5ce026d98d0679dbea36bb63f66d0775ede76c2a8af562f2408513
SHA5123c23a8f8aa53d3c000cbedb0aaaa08fbc83c627e01848f938081ea8cae665d7a9dea89e616e3c5dd9c18d7cb419f53bc33e979cb8f7cf92bb5680f890d3815c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52eead634ec9454ed299db8cf2a39b938
SHA1939f6274853560b2a415e27b1c84df6b0c279bab
SHA256c6d90a8bbe1b44827c2bae4c7f57b8569ae6e64831ec4dd476c44b33e0ea26e1
SHA51284041146b6e811793135b6da93d47851b89d4261ebd9accb1bc0f8255c9fb4eeb9d70f184c387b2e97576e41a54e2cee376282e894890867cf69f44d519df922
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bc0e84178b7faa139a4df891dd48455
SHA1897ebf0e24aca97ca7861bd712a35198c5603a67
SHA2562f6eda1429b2a0f8e1ea9c17d8e0b1f5d84b0701f422e8bc48422fe95d0adb1f
SHA5123eea87255075d63e48b9acf4cf1198968222d89ebd9f18cee6047f364c7c5032a5f0fd94113952ba78af0f422f4360a6884791f4015ca209168ad3f037e47a70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5561bd69da28878d6ab4a0e77d36fe0d3
SHA18f2722fcdae04cb3f543f102a0adb17027b05dee
SHA256a969a0f9725b1cb02d5072ad8767989820af05bccdac9348053496bf4a6c5c73
SHA5123b38834684ad73911be5db08e3e84bbb5aee1d8565bdba24044ce0c622200b52ab32bddf8cf090008dd9f19ead8d3225a488351e5095a328ab15661c7ae97d90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe5b79d883ce116d8859858ada0e02fb
SHA13c236bdf0d03bde5662b5ec23e363876c705ec31
SHA256615cbf0729e2fb45d95aa2dd26f7db24528f7dc93a5d33cdf18e0a8e54f42dbe
SHA512526cfcd326a3307befc8ade6cc81286bf3597b51d038314fd09d43f3244dbddaa62c5c08e35ed14dffcc8093466935480cef9e22b3e6a2decfdb41192943d0a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbe9488124eaa56509d7ff908203d30a
SHA1ba45263576f63b94294f411dc2e5ffeb12c442dd
SHA2564dc1221fb70f8c6fd92c6684aa990ce064ae2ae10e6ea063707775ad9a5d2a99
SHA5126d9d3f49619e543079eb20ec19e02494d9d6e2ad018de9478b6eb693803a2635c6db4fff1fd5b6f5ddcc9617dd76943850a890bb6aa29cfd42284a6fcfb523b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504e1f91ba9a1e0d16a25ef380e2bc0a8
SHA1b86c947311446212dd1c9faba41ae1ac2e2b320f
SHA2560655ef68bfdd61ec59dbaf00d49c8ce3977e42024f8f6f38dacfccde6a7ee508
SHA512b0500cea55a8cbae5fc580b5dcb5f146fa21760771efb48c61803cf7b0b4324138555eab97a8c812493585e35afc81c58194b2a5f942c72740fa53d5d0eb4dc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b6703ba81279d524883ae1f704f54e4
SHA158b7340d11690cd066dd2456b81f51b9cb561f4d
SHA2567d1ce14edb574bb363a3ec4642d4fbd5d9fb4ff8dd9a256bb94df8359373e69a
SHA512bee5221816fbf0fda4c41a17cf450019bb46460dbadef7800867a19e4ad64a48b5dca8d7fa9110325d8a07dc7bea3d4183d8048ec4360a5df6b8c7a6786186a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523907153d9deb4eca83d48796137beea
SHA1c7834a9275e7475d32ab21ad4e17ed106087bfc5
SHA256850975c7903cf1888d65c7cad8216607942f089dbb082728c8eda628dcb3be48
SHA51200d6371003d095fe07898b97e98aa44ae7bc7329e8cefb0ac061198d66ec1cf349a16944ca62056a6ba67ced78b9e6044929e9b3c74f49314f8072135fb94981
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0ce2be2399077c7145227f29d9900a3
SHA1be17e3af5d39918f785ba2bc6f40d213f2e443b3
SHA256406a8bb01d8ab369db979466a900f9db53afc2aaf2644e05397b8e4989e7a3fb
SHA51229a6a55ea87c3fce65278e5c3f5847c10c3c1f4a345b8ddfa587f77393bb40ee729dbea50134b53f7343a83a3f663377d1bc24749440b5d11adf020175563c48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51758aecd623c8bbb8d7e0b41b0ab5beb
SHA1463189b30b24da85ebb929d3b62852082be8841a
SHA25614a0f8c3a9b72f0d396c98116f0641452aeb37efa5192854b36349de93d72ca1
SHA5125f0abd0618bb6ed66ab7ecd7a0587b03baa0620092770669e946c779f086e88b4c5e7398e1c45906957885a78709e8fdbba5349844b985ce12aa6c1bac769881
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e829466ee1e3193a7f8675a6e135f77
SHA17ff551da9872760d831d43d5d4871fed1fd6a283
SHA2561e7c41e586daf4081734a52ce5a73ae5d6872b8e78332a14dfe6fbb1d4ff395f
SHA51285bd284bad8a96d8180b508967f7ffd7325e7257f2d9307125561100a385e0e24cda01ec0a488ce92eadd8f703ab4fe41e0349f2595c483f4dbdf5971b1b9c8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d441eed0e790196a40abe3d32ad4f85b
SHA161c895c0549e7dacf9737e1b0cb2eccf7ec25964
SHA256fc56ea8f3d55d5392cd044aa065820c2334ecb1d6c526343f26d51e9ae63bc44
SHA512aef1897a16dabab7b41263fa20ca1d93a4680b947aded9c9a5b2655dbf71985b7d60e53024b07d2dfa1c4ed0b2013f3e9c45f8a1f924baee6e3fc1c5f4770c0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5560c5d4b164fb7f7dd06a5f20d97ca
SHA11232fc610ca9f5432f8a6c5f9ecfee3232267185
SHA2566188ae844347b468b01a0c57e76e75cfdbeb8dc97dc755204a0512b63ab4941f
SHA51206f733298979c3658db69deb2bac777192bb8d767cf90ff17a74bd89d05781a3aa62e3935e3cafc66ff69475050454819e9da2bda63949b2d39095657887a4a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df88ba7b4d978880209186614c7c9c17
SHA177384a8af553f617084d34d3c4cb915aefbb72cc
SHA2565df1e3eacc176900fd0f946e5ff1f71cddc61a02b11752c019726301fbd9a789
SHA5122580e11fc76b88f6dcec7e157df8ff192f71a21c724a8506035c422746fbdd8e3123d1752363bb7a0f2c3d5b3a6bf1f0282926ca5efb1ab25563f4f1d5293013
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f23d64019cc27b6d144af9d37d1948b
SHA11374a88a60f0dfb992d7bb130c686fd30f079dcd
SHA256471681b9c0d15837ba1236279e3173738ddd6ddffd98a19635f8282c828bcdf5
SHA51295030c325962bfae52e8a0781d7fe48cbf2d09389a0f04eabd703aa94b37be462b6a66d35ea48912bf5f03247b1e1c1871ae7398cbfc0341248a36c688d6e346
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\KRMHFE1W\coming-soon[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b