Analysis
-
max time kernel
137s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29-05-2024 02:37
Static task
static1
Behavioral task
behavioral1
Sample
7f3c633307e3e512fe7ecc3e938e3db8_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7f3c633307e3e512fe7ecc3e938e3db8_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7f3c633307e3e512fe7ecc3e938e3db8_JaffaCakes118.html
-
Size
148KB
-
MD5
7f3c633307e3e512fe7ecc3e938e3db8
-
SHA1
c79d9b68e5e4bf31ef39de1e9f84f85c55b016ad
-
SHA256
4d1459506a43a5143df5115196f98b893d29b75df54c333e5c9cbd96125c297f
-
SHA512
96855df79d1b83abba9bab64227117693db3521c938d03a01ef5bb357ae8703f88401e2287330e363162f053a7f7a84c0a2b5c703968ce7dcbd8b99f94a67ee9
-
SSDEEP
1536:5waD0I5W8SatQryLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrk:5waTQryfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7B1C3521-1D64-11EF-AFF6-E61A8C993A67} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423112157" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000386b727be40734399579c3541993d3f00000000020000000000106600000001000020000000cce1d93624e68ad3181721d5c8b6199af2b2f46b96dc1a8736c87548e01399dd000000000e8000000002000020000000332aaeb4da07334edb97ec8325659772d644d4a95ffe3998461d6da6b73e81f820000000c99f76fd4f5dfd2ac829dea82b22bf44a813b6237c9b3fd5e48499d491731ba9400000008d0c4032c8aebbc48508984ca1ea4296cee2522963bc0a94d2e3e9ae29fc93216bbe753ce688238a90ca88ef3d587451a4f4a66ce892b36348a9972d7bb63f2d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70fa7c6971b1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1312 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1312 iexplore.exe 1312 iexplore.exe 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1312 wrote to memory of 2828 1312 iexplore.exe 28 PID 1312 wrote to memory of 2828 1312 iexplore.exe 28 PID 1312 wrote to memory of 2828 1312 iexplore.exe 28 PID 1312 wrote to memory of 2828 1312 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7f3c633307e3e512fe7ecc3e938e3db8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1312 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a476f3a9f6dec81af47a23eab77a4dea
SHA1bc120de83e2f654871284d390232e867d0445eae
SHA25682598f2a8a0e9b960459b6ed82c2605b5234048c16596675d4b9d4972c09bc78
SHA5127ad6b19d5cd98a302dba876b10512cf7ca097b83a6498128b47b6d741bdbc8d48aa46f94543fc65b7b08d2f8891af2efea3ba8c6dd315a75f827c10853fba440
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d1aa2836efd7ccd5b3ad0bd46198c68
SHA16549eb6cb05bf6067aa18dc2156e22cfa7616416
SHA25657e821b9f476bc33b5663d9392d5796e4e0870479597e509cb62a7511dd8b75b
SHA512523964f0fca065f2ca6f06ce0eecc13ae921075f7611c8409eb079e19163427bd9557ed7a090a970da88b2224c2ae5e7050f034c04f02009884b7721f8d19aba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e90c054146829e0789ee8627f408f326
SHA11561b606945b2dd35a33a82e68b4af7d354d6158
SHA25648c7d989d7b1bd17ee58729768afaab3fdad7a40d3ebe11a855c5135c6a9a5a3
SHA512602ffb9714b34674fcae84f939de3691ac626dd48132c978baf2566d05bb29a020666007950cbca6e18f034d8ebfae3e9e3d4ef056d989c0637107bec99474e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5251723851e1b848889e81fe3b1beaae5
SHA16ec99a427c91de63280757d34d0c543a6bbcd485
SHA25634ad16853826f89f2e9621866df89742913d2dc11763b43a70584b227be9c2d7
SHA512c0b34200b5c2c980abba30f692e27f41ca0cd62b1730d7a03de271ec5d851952d7e6f8cf0841fa3b5a5a1ccca0cd77c7d351de7904e4574e1f0a3b4f33f076ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50927a72731953e10b97e7a7eb4ec2a3a
SHA18533613ebe1d256ec5107eafa9b43f045eefd6db
SHA2568a95bd17804c2981fa4ce159810115b215fc61bcb47b20013ab2876b7e67d1e8
SHA51274ccdf44c56b747e27df1ccc1ef2eb47d443d2461c0520dfa63cc64551cb054c5efc521d18c95430444c314b9c01894e7b69627fa8d85f7e6eb311669df87a81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d8760c9bb551ee9fe55c5c9cca31db0
SHA1d2968a284cc5fb39e56c14bbea40c4607ba2ffc0
SHA2569b0181e9cc2002ed38e760a7318eae40df6062954b0315e4c614a3ad65768a22
SHA512133d6d55c0fb851f9ce83dfce155d9e1d680243c46fed303a38ec21c1823a2c801310bbdefc29882a80323631df3be34332b44ff3e795940ffe9635b540b0d9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524676797bf8948f25394b3d91d776e1e
SHA1179a65c00c2766c1cfa9b315ace148acff950dda
SHA2562313b9ed6eee66cce311309ef3855b35a1f1696996dc84763e2861256bbdd762
SHA5126b442300403b4fee105bf95e8067400886f4aa0732f0fbbd1798d7374cf5dcbe2f65013465c3b5003903fa1d0fe296a0c75418769c0c84824c21a69ebdda8088
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a5a5015bd76bd60c1f99725d9262cb7
SHA1b0ffa8524db6dc45b926f9a357ae28c5cd51d4bc
SHA256c2e31fb3407b5a7c712a3b6a91eb5eeea69cc20b88665fce176f1600d96220a3
SHA51222babbea0345f08b67cb18d8c4a117af3ade077b73afe081ba58beb89544957c31bc4457efb15a39b7d6c4f40c7d9ed07f6272c8f8a9e52437fe1dfc3a25eb31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc04f7214f196f761fbc771f6d5ad84b
SHA12e81f69c7717bfa1b9fc64f963d638bdd2e338e3
SHA2560299c951549a5061f8639ce2d05681af35523e9b2c8fec4649d4ba090a66fbaf
SHA5128ecacf53697ac5fa25eb1f65b830932787c753619ac219f5d5f0a6593caccee81100ee4115810daef3d13183eddeccf1d7dbe808a9fc86cf2c5e0771651de19a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ef2f97f2d474c299e5a9fee18f2baf6
SHA158b84e81ab6c901e9da648c4dbb1c8b4c8569bfc
SHA256b55185180ad625d4b675caf1ee0fbbb89ac744892fada77d95d9a5d3bde3ff3c
SHA5129bd026198cfba79dfbd430f2e203cb34fe4df4826ac1e5728bfef41f8333585c669a8cdced1c61e1cec7bac5584a514f0a206fda501a8e8f68731ec1bf210154
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acd40d2a6cd626d0dc0d18db2ec19f16
SHA1657c7d4e186b69183197c00139d1e37d4a5cd86f
SHA25653b681aaf3309f4c4eb2edc43c25d1128b7f9fe36ef633c02de789fd2c88c2e6
SHA512eb9546c59bb79e126663fc8262d447236dabac8f3c88ec2e9d1e5e7a082064b74d33e95e1fd4f677ff50be747e6dafc0bd9f2f00ef3e055371fcf264199ae9c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5322129b6af34ef44bc2751d770c117d4
SHA1401004fb2cfc84aaf6418aea4eb91d13e172a34d
SHA2562d4e7e2ed9945a93311dc3052fd5119bd0be1ab09f9b35cc8eccbf13962d2b22
SHA51212faf06295b9765139c7e9c2b1bb15e84a8f7684a00d653a1121739cf3bee4242ae87c2af8ea08e78337e2301a6dbe30761002af9be849039404f2f2fc6e81ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513658f154e1c11512c553fc7da1b8ce8
SHA1af2265ef52753e56e904ae3e6cf03fc6f7041aeb
SHA2560a5f33467000f1b118307a5a41bc9805d352eb001e1f51c7654653c5192af6a8
SHA512865a1426486ede94ea4fa95df975c0561db5610bfc90d3604ddac481e72bbe413f21cef7000ca540e89847eea37f96f8127c2f18a170053e6c7b78cfd6a6ee81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566d01a62a038de856041d00615906a12
SHA16b43afb33efb387e54a24abc4b93be4fbfe2e365
SHA256e074e28ce7d4143a9cfaa4503e9b2f564376801c84edbcccc0d36759236ff225
SHA512230b4ce2df000ed7ceb2e3a9c3f829cfa824ace687e30e170a61a1b7297bf9b550b483251dacb87476a2a1fafea8d7a1f179da05d75d3189f6430e82ac7e10fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532db0da6aff9b78f8414a01267b37b33
SHA14504254e1b9ca8e4222d6d0e13ea49633a0fe2c9
SHA256933b5baa50a13134b6d09e2e75cb312baf710cf36da433d9556e3fdd7bfa314b
SHA512e7c2b9cc2ec9502050289c7ca1155a31d94bba52d53cd4a542bd1d9b79dd00152e126f2dddc13ce8d33f925b14d8bba304636cb4ed4a43c8a6d9b820ee0fdead
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2ecc1d1e1eb017a5d604f1b6414bc44
SHA13d073c6e3e21e970d442fe29e46a1e4972133a0d
SHA256d5eeae0be42aea2b878240713a9fe022b2c92c9817a5da1ecd45dfb1b3fc8252
SHA512876f53fed18f1c6242b4f0d18a2f103ff2cafe6eced71d09e9816f1d8ec4445f06652f49596f44ef6e1704990fcdaac09701ac5135ab4df8d9ae76d70feb33ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569e1b87ce0518837f80c8adfe6bdf10d
SHA1b91ba1fa9831ef8cc57877f38769c2bb0c351e74
SHA256e0cdec928d7c38c67ced40c1eaa29fdcbd449eaae022673a21f4e30198a0ee97
SHA5125b57f5d60d105a34a9936a66d7d081127cfd27eb3660e8e821c6fbd267549aeef03a2abb181bfd6603a9c96b0761b4d643d4fc972fb3c125df37382a3b1bc80d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509b9462480d2de4e5684553261a1f4af
SHA16240b17970c015ce5b9f92d377a5e550815678f9
SHA256c51f78f16556537092e04ea13b8169bc1fb70f2c6ca4873a8aea2e0980750f5f
SHA5120cf024c01be4fb5bd02cdc776df7fbff64bd1103509540eaffb6bb3096fc308de3bf618fb27c6db8535353a6cbb8a88ce25338fb11ec5b99f2aa312af9e00da0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a2bae88cb6231bcb8f71c9ffb970389
SHA1337ac7c140e0efd3a8104fe36aea6f93f2fa26f9
SHA256c763ff316412f0b349511dad6c8a6402b6ca368c446dfc748e0afeec16b3c903
SHA512e4742c6d909c6dfd490012c4d0f2d3f71284d9ee87b3a3ddb626af3fdbb5064cc4ef1cead45e265db571f42cb7110728db10bfc1cabc0fd57569687ef868c1ee
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b