Analysis
-
max time kernel
136s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 01:17
Static task
static1
Behavioral task
behavioral1
Sample
7f0d3602f0ef0e6252e1686855cf5737_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7f0d3602f0ef0e6252e1686855cf5737_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7f0d3602f0ef0e6252e1686855cf5737_JaffaCakes118.html
-
Size
68KB
-
MD5
7f0d3602f0ef0e6252e1686855cf5737
-
SHA1
ceabda79782445eb00f113f285258e059df27b7f
-
SHA256
04073cdfa078720625aff07a2f65f33dc68476d073542b6cff799eb5f27938ad
-
SHA512
af695e5946c6d82cc430e75c5c6c1659f2df3629046b08c5e02a2d319ce2be349196dfe9a150093506f171283f0517e7eab52b21059680daa78572b06b0e1915
-
SSDEEP
768:JiygcMsSZ8tN99OIsmqd9JCVrFoTyaQCZkoTnMdtbBnfBgN8/oygcR/QFVG8c//L:JAW0neCTdPec0tbrga6cuNnzIjv
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3FEE4751-1D59-11EF-8B04-EAF6CDD7B231} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0c0951466b1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423107334" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000003d60d694c12d59f2f836f716ccc738e93c9df23f4b2c7df54b36c98962b8e99f000000000e8000000002000020000000171418fb0774ea0ff04611f4a50a01bef07d7d45753e419e58b2d09b6b24c6a620000000df61b64e415bb9a660978195bd6c6b4420206e104c6f8e38311604fbbc69e24440000000d9bf431fc7913600cbd1c021da4134738eafd455567b5ce830e12e92078d8a34b3932ef9e74f33a05a6d6334cba1a35612a6dc369ac1ae0fc2396b8637fc4e0a iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2368 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2368 iexplore.exe 2368 iexplore.exe 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2576 2368 iexplore.exe 28 PID 2368 wrote to memory of 2576 2368 iexplore.exe 28 PID 2368 wrote to memory of 2576 2368 iexplore.exe 28 PID 2368 wrote to memory of 2576 2368 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7f0d3602f0ef0e6252e1686855cf5737_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2368 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f3891b36084f352b3065ff576d3d2ec
SHA1765213b5bf2bf83917d7db721b223cc5d2c63759
SHA25674eb81ffde0a1f19fc9c20906470bb6599501a5b8cc74a4d895fdfd168809cd1
SHA512a86d853f9fd69a5c2313d78fc90970d027a55287d693600c3d79ff6346cb1d6ed2cbbe64cadaa17621ce264443920c9f039f2a1bf977127a2c32fccc8e07c573
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ed8578788055075759b554d2ff648d5
SHA17d23f7ec99499b87a552269c687f98a36a2bbbf6
SHA256a38581614433abf0e0574fbb7da2efb07650b01ab23cded79b6f4ec75d2a2104
SHA512f999234322f11be0fa66bd96a7df9cc123ab99ce6c366072acd3f04808d1481681316b8d3fc9d0b5a9423ba7fca1505ee27537fbd6e305a4d922990149619aad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5934ed31885780c52659b35a65b9e78b3
SHA1a31d5637d3fd52d4f06cf866efb3f737e5fa6e9f
SHA25604e75314652938a6291d3b915ef932d391d2a81ba4c2861309922549180a70f0
SHA5121cb2f283094d4f0358280936c846ce929c4d679872642b31aa1be8b74a9079949385b4caed693e70a8ea702ceb87c49139464d58e585f953d0314cf4348ea201
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504c8757f3a367ac3697d220bd169d855
SHA1b67d556ecf430653dd03cf7c9ff4c61a05598058
SHA256dff5f2be3131f64e53c8a09a3ddc04cf62dfed8830558486f33212a6674a3a7c
SHA5124a36148166a452274ce86d1db678626de7dafa479be6559078306e9018c269c196f74f6b1b5d2560e475a7755bd599ca29c5fcfb231210ea09e338bbc6892b8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5971b68569812a7be6c603f4d99e8cefe
SHA1bc327906ca4601dc3def161b22fb4950f13b2b9f
SHA256dad1784dd474bbeb45d82c9c9a654e65e569f68d7a90e252482fa681c4317685
SHA512c44e2634dc2330827b15a97b3e4c564b06fdd7cc67c30d6a2326b6a6755840ae50a4dc3ca0520e25ed80cbe0149c9666e6cae03d855cc0ca7619342cd541a212
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ceee5f90c9bdd1c1e1c582f65bd7111
SHA1e186cd3372d580f37368e1e03b34b24041176869
SHA256dcd38e00995f5713db3271bafca92aae37ac9ae8c36c77ba84e14c46159e67a3
SHA512b1b7b5db686e1c692e8a7f1e9a53ac341aa769d1351fa6dd7de2a6da02ed71750969992c2342a99502377ccb9e991766a5fcfdb7a0f8798ae0c1c7d73dc75a58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568bd8d9e64f7b3c761fde64dbde05293
SHA1dd87498e7ae1f7204555a44700cc8caac0f119df
SHA25606b204dc55c764174de742a0d39bb34ae9cb1d31e9c28cb84ae4b3a35efd12b2
SHA512aae194598b236d3efed8f135e0c0c2d6cdde8391e363cafcd847ed7ce084707999250121c93d928d9b7614fd454e8b6eace726cc01711d289b12715af32f8de1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582c8098b4ff32943373ca6cd75ca13cb
SHA19482572d11949056c9f0b5218c64468fdbac42d3
SHA256b53941fec11c079b62d27923186a2cb58c39061039ef4c1c2123f30ecb30d1d7
SHA512c3ac189fc8f30e9378f964316a7b5b1194b1dc24c7929ccfdc1b1e3a4474d15127191791973281bdc546fb4da84e24a3e121a1aa39486a0be0625e81cd110432
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5debd040a519dfd96cbcc3d0f79540cde
SHA1f877573afa212a280872b0cfed1beabeec797823
SHA25623c10353db6f7472b30e53878f388ebdce9cbdc9ca2862df9abc27182b019c31
SHA512d1ae6890a424cf225eb1010ddf503958270e281688bab78708ed3f1fa2ca804c728713d1723224ce9945ca3fed9af415ed6420634b6085620ee21a4765499787
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5910fd4f97dbdea2afe41cd07bc0d0f30
SHA198a4a98d394f4309c567d13f4b38dec1e6fe435e
SHA25602f10859f2d19d086ee721add349a385f868ec25292dc6394d8bfccbae28140d
SHA512e98144fb5acf62f733d2da1b7509a84817f86640d05256581244d71cbc2f3980f2787f2a151d0f36dd0ce9ae44438471cb021524b55f4204327ad0883a177dd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a3552c4e47c73c4aff7e051eef16c5d
SHA143820348c857c2756723e12f2f63bcf6b78a8d7f
SHA256544dbb10a5511ace2f05be8cd6c52965247242613cfa6f55917ae1ab9b2b3c39
SHA512fae40cf250c1d7fde26e17ff015711996b791dd395394b167d27dc997d11578e3edc046d597518adc8ece51900602d74835f7e3c7460e43a33cf7404e828fa80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ddb78a89f56448f420dd6bafce788b1
SHA102fedf8d87e9862cead27ed49a7c9db6554d6af1
SHA256c4c5808d4f3b564e22bc7767155a3527263f5459260cc904f91741c902cb59bb
SHA5122a1a0475167c7dccc8f58d33c230cc7591aa2130a6b6a97dd71480cf6693957f42ee21d93463b9e6634e67010a7e7f1019ffbd20aafb60df3560528294babce7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c563a5284a6d139eb31715159da94dd
SHA1e7b0cab1ce7bf37d042dbf3b03d1154ac2e57279
SHA25648099a7428d5bd72a0a6bc5a1bd5b66a3e423955bf0e1eee1568e859fa753192
SHA512944eae2bc5a773e7250ea4f7748059ca052b4926e8ae8623eea916e7ddbbc9298d08465896f18ba212d9f67284b207dc51c73a07a628c502d293dae4980f8b66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f5a4eaa429b35263f0ef18866a3fe5f
SHA129e2fda9943a816191a02938fbf0bba09d8535f5
SHA256a2652878d0765a5126099ffa2bd771e11f220d647198806756bcccdedcb6d000
SHA5123dd6085d5aa874995c927c78a5ef7cb4d23559a40ca84f390c73bce0d57ea8aac470d83ef9cae8b0edd2e3f97014b456a89f4e227621698b39e9c66f38651aa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dfb10f49c9459ce8258e87d1d11d4ad
SHA1ba07a4d9208d95b6020b49b26fa1ffb1155a6002
SHA256d8320ca06c4aa161adb3a68f267a9b4dd48967467ec723c6b09e9118abe5321c
SHA512e6a18f8880b9ac636459ac264c3b46d0fe3b2f391e903b19f0eb79cec375da23d331e215d2664943549f2579825ccd04d97eb0a6626e3284615040707ad32aa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a1d55cb4d4e7690691d287d44d76570
SHA1a04904536da3b88f24955d42e7e7ff1e773cbd7e
SHA256af6f344ac69292d4f0721700ed2edbb6b5a661037b6d21a829378118a4302195
SHA512a40c1c105c860a50e2e2e3b96aba94d4307616eb73fe5a8fb9507e1e15c3efc108da02160328d63a6070e8e5dbc4cd51bc2c93464a7c69f9cdac1bb7295c539d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505a5875f126ca8bbfde29b7ece03f86d
SHA14fc8fd448816ac85e8fc792e81af2e68329f1312
SHA256139e925503220046213a2fff40eca14bc44af658ca0c52234b4c5434c7a3b9dc
SHA51258e06a4e4c32d04fdd95000712e54445b7776e747b11e23e7453c7b73133b961ddf749367c4c128a0902201bfecf16e356cb82fcf9aa41be4e01719677014235
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507cad5a30a7c8a536c935c292e756a78
SHA16132531e20daac8f90077483012a7b1bc32d46d8
SHA25694aae0964ae78d4e503e2a0b5729a11a88c96a7525fda86aaec28741ee7f4e79
SHA512162636575cbcda680d6fb841200cb07e8bcfc5352f5045293b6a65a6c898b81ca60b0611762d8206416a09834669af930220c8253f7572f10ee6c556aa8570fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b299051d5ed71965c110241721430a9a
SHA1f720af5b750fd3d7f816710357a3d7ec6b74d01f
SHA256b3ec5d1b43bfe27903760bf58cb9e15646f14d3f107052afc8a7790536ded857
SHA512f42097736c4d761f5cc240f2b369d998936a2a744e6e777f2ca3986ed229efa3ffd64b7f6b1f9ff8a1f3190290a3a02f8398e157af6528fb8964e043e12f01d4
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b