Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 02:38
Static task
static1
Behavioral task
behavioral1
Sample
7f3cc39a205dfb9026dc8d2981dd8893_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
7f3cc39a205dfb9026dc8d2981dd8893_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7f3cc39a205dfb9026dc8d2981dd8893_JaffaCakes118.html
-
Size
461KB
-
MD5
7f3cc39a205dfb9026dc8d2981dd8893
-
SHA1
b1fce59e81a921e3b1496450089b1894c4ac520d
-
SHA256
eb7e04e9298ade2c23951a8ed822688bf2f9d7d74181cadb371af909ec2055c4
-
SHA512
a0f7f438f97ad1054425791bd2648e6ec47c2aca06599179bc3ec431064b990af4fc65a3c086e2059bf9d5ce826b747ef963ec8b393d3ec67b4a63082c32292f
-
SSDEEP
6144:SdsMYod+X3oI+YRsMYod+X3oI+YgsMYod+X3oI+YLsMYod+X3oI+YQ:o5d+X3/5d+X3M5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4061db6f71b1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d0c6678b32569542b049583bf376c6900000000002000000000010660000000100002000000063bca5b11ace141356c62fb23b7894c62201331c39c7a45dbfb95efd4bdda885000000000e800000000200002000000003fbf165e189c0403e9248d40790ce770a8dcab6e5b23d69a9f3c65cb2754ad820000000f3aa048a30a98a263bb5b47efb7c6a9b787647c6435bb63f6cae5520be78e10640000000b5ece4ab20ed20e44a87245cc4616c0c1b61cc0ef285b37719ef2264028e55ce920039f4792f204c04f418f3f9014e8e625ae567c91919a2d527209ace4ae02d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423112202" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{97443721-1D64-11EF-92B8-52226696DE45} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2768 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2768 iexplore.exe 2768 iexplore.exe 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2768 wrote to memory of 2712 2768 iexplore.exe 28 PID 2768 wrote to memory of 2712 2768 iexplore.exe 28 PID 2768 wrote to memory of 2712 2768 iexplore.exe 28 PID 2768 wrote to memory of 2712 2768 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7f3cc39a205dfb9026dc8d2981dd8893_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2768 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512cc919c968ae4fef1945e1b9ac9e2c9
SHA1bf3009ecb3e8f5987a2a92965c307c957088e045
SHA256ec78b495aeb125ee5b1f90538620a7e51c343d28ad7650b0630c0a552043f456
SHA512ef455b46e58b5257119bfce05b4d97ff12ac8185a4cfa153b81fa0d081d2c85fb7eab89923a4afaf91c523b1aa78c5e756114cb2722c9a2c941b9dcd6aa89150
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5621aa8e0ef0795ffdf06e7a25bcf5ba2
SHA1f0b5ffeeefb5833ed4edac06adac0863634699fc
SHA2567eead85e43fcdce325e9584c41b8091342e6e40da7dfc7cb3d985c7f723b68d8
SHA512fde067ca1e4e89738d28a353090c1a9517c91ca4d87c7164e6358ac64bfcc85459e13559c48759e21004f75dd58caa3369b1805570823c5e9bd069fadf8d1350
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cf74fb4efefc4e45aa1e53067fb4340
SHA16a29cdac637a5b8a8a621654930f2406fb218f38
SHA256f2cd3f11dd3cccb2cce55094c19f258bddf72fc60511eeca15bf0f50dab7dd0c
SHA5126252a6417102c60e06c01aa5551e88c09e40a5de3503710aeabfc1e6b51b850085593d41864ef554f146bf38af1430430e213c840a50bdc30d4b54dfcc643af4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5428e6e9762949de88b8fd6a230bf50e3
SHA1674459d6004892c504ecbfea011aaffd0928a5bf
SHA2565ea4b5dcab02ae90a775ea72392456e7bd7c25967b233fe8eef451612edf8328
SHA51257be0255a3d4a73643f7e01e423838146ea10890ce65f5e5841f3cae9e159b3ac574f9cb97a9619de336f74bd2e9d7409db7f098498d9abedd5d9566fc82f875
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e68dffb6c9a1b22abf2cc9701be4ee1
SHA17deae4b64e244baa2841723eacf346ed254ee1d8
SHA256f415cee35f5cbd3f6535316349d1ac98e6b1e40174c02389a7b917eb2596db6f
SHA512d66403825c32546348892d7fa90b6acd5ceeab53c94cf23cb6fad4dc4dc0ba729e8f0a694e526a51a22cd056d10ca187ad127b596e19488bedba4cb57977f18a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9b9a99d1cf163c4cd4d099a64bd7fb2
SHA1a8fce07718700e56992c857e32317f1dce056e9c
SHA256022d6c96276c94fd4dfb61546fe95907f8fad7e3513d9c1e9b0668dfdd6300a5
SHA512f3c7d2a62cbd0ac5ea5ca7f513b0b3436fd435663644f18e15e8ad6da15311d5b2581973533932a6f88e452d6bcfd074d9f862e8f1a6266a0143b9783ff991f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c7ffdc843505992e950844558b14d98
SHA12fafa49c146e216de599655d5adbd7251480f71b
SHA256d5f731a135f160fe233c95def9e24249d20846a4f9c760cb5e3df288d2f0a290
SHA5127aee3c41105c1421c1b4b4674ec7f6201f3d6e01ed32c4e584822935f3ff54cf881657ab29302030a3e0a4249f4ca7fb773263c756e64921f8e47ca9eeab5a5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a39b0fc41dffce7a56391cdd0cd44a5c
SHA19c7843546bbf0501d23bb798f0a70766eded9b77
SHA2566a9e1e3a2ddc083486680213bbedb808b005923e494036541aa39a364bf01823
SHA512fadce71567e0beda8a38e7c768ddbc356954ff1d49c2a351a7e240a99c0b717406cb31ab4e770cd2ed632709cbdcc7aa22cb1cb37774740fcb128f8be0925057
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5b65a9183a2950d0f36bf759b366d52
SHA1fb35579bc530118ff2b9eb490642c04780dd7df7
SHA256ba6f0f554a9afd98dfa229b6e1e4402e9668d13b2528ea6a4f081ce52353a273
SHA512120d23e3a4fdeac7edeb987dbc642dcb6624443a2be2c93f5cf6d4e3182175f0b012a410c9bcbaf5f63eb0b7a0a9f3184af4441fb6af811764b015b8b0246bed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2ea3ddbbd91b397fcd6b65f743ca993
SHA1ebfab05827282bdc9c6c2823baf06f6533150c5a
SHA256121592f300ed519169a202dcfbdb03d2ce226d8c31e060d0b4fd15cb3beabff0
SHA5126fb67ccec6c53ee2127235c27580d0956ac6d3f4e9e96ccc87070fb2c02b80270235af3ec8b1dc08e820e86de9b166b3e03fc17869d8130ef32660551d5dea4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5287776c9fad119c804b45a8f9df8fd1f
SHA1eb890b5f89cc9e5a60a4445d2f12ce0e7cd9e8bf
SHA256ddaeae8db95aa2ee899c0fbd7e34d9c00f0fd96b5e2efe711eb9fc65449a2719
SHA51213131a5fa421dad3282592f2852d7d46543981c19db9817b20231d50484590d257486e99dcaecf4ef76b44a3f22e6c5cc7a56232e913ba016a4a8bb940ddd2d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db6e016ca9ac62f628f1a999924f7dde
SHA158a162deddd88e150b9f778abd6e14e87c5b3752
SHA256963d9da44b16f6ad8a64f08a3c379171be1728521ef7dc893ae19223270a2d58
SHA512e87937d25cae99b0e91b6a6b05ae7627a698002004f99659fa0d8e38b22de1aaf022a7a756b1d035e5ac9d6b33bce41730acaa851534876ffff40bce248c2204
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0b4bf8946622d22cbd24f08e1fa392f
SHA1ecd4764ee5d2153762d6dd24bc7c3e34f936880f
SHA2565fafe4f242aa3999a2b755c50cda703c831ed8b736bfc6821111d6a53b903641
SHA5120dfca57001e7cb4b9f730cdbd4a032c855aa3d795ecac5c0182c99532a686d7c6fca54ce899ebef143cf6eaea423bb6253021429cac0901a4bf4ce493d403762
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ef215f00ce7368fead028e1685f6ba7
SHA1ee2e9df853285c0c1a77eb5a0fe4c152d001778f
SHA2566de08e56f62fa734fb8adff72ae36a1f1fd52662e5e92720a77f0f9fef58bebf
SHA5124e1068f2d1ec8a47c787b5c8518aac7ecec94ee67a2b2e5589f8e11da384d194cf3a29bd7e959be50c72670e1c9dace0b847ce3b60cd99c0b4c0a56f429bc87b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5933b9d0d22db04112b7a63652b920a0f
SHA13295c8050d7a55d6848123d372d5dc063b253939
SHA256405aa0dec29ca830d270b553dcc561ef11e500e125b7a3ce02cd3c602189d89f
SHA51258090ccb8d4e3f25a868f8e45f8ee1f5531a609b86b910da0dd99f2ce9042c6b83ce6b175335f46891bd55f2ef75b3c814855684bea25a00bb415df72997e26c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d41c51698d719473aa3aea9297f6190
SHA18a76910aa907aa2031b35643dd9d692cf8ea5a04
SHA256a2538eb248b389978a5eba6b83c2bd70392090d3dfb171297b648bcccf8b13f5
SHA512c4b63b5fe3607b277de6a47701d175667dba98ba5a8716a4f4bdfdf2558516739f787be261208b4db228007139e440ad26e9c12eb3674b1f3700488ef4008906
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1a2d3ef8b47411288fe0386780ab76b
SHA17b3f3f68b1073e12a7b359a60cc8fdb2229e2c93
SHA256e7b19eb9a81e7e6902654637fdba768ec4f6e5214e39a45a94f11435f1a413d9
SHA512f6972aeb82db36ea2b220b444b9ce582170fd1632db41e3e24bdbbd00dac6cf35c76e12deae42f4aff08c5e1430c6c2f844bedaf2c2d13c4a14c325458b48eec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d7afaae6c4454ba2d3a9f94b808033b
SHA1fe4e21e7ab1ba00b09b72d181ecf78b27dc5b730
SHA2564d976a903bf6886109e3efa32c20172af6b18db6b72142c6eea1b4bb8661de9d
SHA512061e143539f49e2a84b9c146d753404af171e0f6d0f3132794a6fa27452f413845485a8999c2893b944d7378b4be6e79b652b9304cba1d8cd558864148dadce3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b7f90b32cf7db4ef2a3ca905228da45
SHA1342abfdd3b3405a1efa450b356900e7eec085390
SHA2568dccd1b5e17628b033dce2fc5cd84e16302ad71eadbd36a5444715d22413dcc7
SHA512ac520d83d57d9bf05053d9c1d0da896447df73c628037b50e0bddeafa46211c07b8c10e41a90f3f295c840237ec615c83bd552684fee6106e2b88147fc08559f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b