Analysis
-
max time kernel
136s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29-05-2024 02:39
Static task
static1
Behavioral task
behavioral1
Sample
7f3cff25cdd31b4be850a31486f5aa8b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7f3cff25cdd31b4be850a31486f5aa8b_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7f3cff25cdd31b4be850a31486f5aa8b_JaffaCakes118.html
-
Size
29KB
-
MD5
7f3cff25cdd31b4be850a31486f5aa8b
-
SHA1
9e281b2d12bb810aa2c9268be481e3370f026bc7
-
SHA256
e42caf98f83bae4a11b4294d16d6126505b7b2e9b56b2a1485f5ac8a4abb13d5
-
SHA512
a576ad4ea3b9eeba11c88a917ff7ba614c08d9e6f8c7f14da4dea32f80d2e5a1d09e2fcf5d8a17b81bb67150c15025bcb79b292507f3a57fc13e0786ae160458
-
SSDEEP
192:TYlsG/9DeUocv0N2e73zyaQb072FbnUl3vo6BA4iTSgdlGwNjqSyVXwc/eGi6M+:TUsG+2iQalwuWJ7jq30/+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ee73686d5610be4299d5e006ab52dc7900000000020000000000106600000001000020000000315b504ad93bfe49a749e0526d25cd5288f7af0488f81beaaf849211eabfdbfa000000000e800000000200002000000093f2c37ffd46618b4d6029ea913ec6dbe213173ebd206923e13b92e80c3bb6592000000038e8703267077005176bf375a21086bf3b8fa78fb92ff9b8ff92594618788ff84000000079bfee2e3fb8358731270237a4cd929c7ba41e3eafa563a668c935ff94895f406e72e1aab2cf5b5cab5901cd8150a1aa2538b4c050c8e503f3cfdbc40aea1147 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B9CF04F1-1D64-11EF-8F9A-6A55B5C6A64E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 109cd48e71b1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423112260" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1244 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1244 iexplore.exe 1244 iexplore.exe 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1244 wrote to memory of 2756 1244 iexplore.exe 28 PID 1244 wrote to memory of 2756 1244 iexplore.exe 28 PID 1244 wrote to memory of 2756 1244 iexplore.exe 28 PID 1244 wrote to memory of 2756 1244 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7f3cff25cdd31b4be850a31486f5aa8b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1244 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56f1ca0f354f047ba210e5d72df67181f
SHA14d4272ee243136b5807b57214b2251e84b8d14d9
SHA256a9cc9506e849cea55461b9b8bd6b5c77cbcf32a9a05f12460c05ae38ca110145
SHA5124a8f3c4f727322690fe2e52649efb5232ac9b46c7c50b33764bfb5f0d403a8ec54e744ca8785bdedc3a24a4a259ef9e4219a60332afc464567adba3369e41245
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a796fb8c6d3b48c433c03633ba6d8c26
SHA1cb8d08df7a1aadc2c4a86b6df96f5c61a11b44dc
SHA2560376647e3c6d1f51b30a17dccbd6458ae9607cc56f5f2a376bfd5a59ae3eef3f
SHA5127701ac9b33aeeb260b7387a2664e493e5911439e40b762a033edb459a4afaa61874d55efd38521a3353781401337e7f36e2fcabf3bfad74abe7e67756e06ff54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5622b08fdabe4462118199e218bd8b759
SHA145eeff748f4237f9050cb2c03f784d99dadbd85b
SHA256f281db1b31c91ec0f6056dace6e30442d0ad915f8d5cc8ad3cc57b5eb6cf0a54
SHA512a5f941a20a0d2db72d6d0a6cb6ee0dd029d439f930aaaafb0d7bac2c49cddf6f5c825ae829f346bb4469cfad2d40b69904877238662e74c1d02e21b21c5ba694
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d6076802a1ce6dcfc44abd4440097c98
SHA1f9a9ad72fddbdd78c5b230f5f4113725501c19bf
SHA25617f04d60373396064c050cd8d06bcd8acd221d013521a4a499438792a1e2a5b5
SHA512a29279c982f4ecdd4d966439bbc72ca1073c5c303cb953088694c46c8d06d3d529b142e9fa287a648c6d49352a1cd6dd0a91c69afc7cf37c18b962e80b5c9f20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD552f70130afc00825d634433223f2ea3c
SHA1f701a42eb692f0a534aad9d3b56178dd80b710e1
SHA2566ff4fdc06f356e2a488830c2e4cdde7b96803c3bcc886ffeece5e94ac149e3c7
SHA512a278b585f4f6cdc2a0ae3dd2fcd629b6a3cff7313ef60be5a833fec99e91cccb120ae1e0b287c4c9ff0e89fdce53a51e427220ecf30676d927dd5f45ab957988
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD510e839c50982b1ec301ac0873b1bb1f1
SHA167a48321e986fb372e98d616a36f206f15c2c645
SHA25603bd294f11b12892801fae522b7a9b3bc5e33626e3facf80c945b02ebd3a1afd
SHA5120d84152b4799192087bfa18dcee47b68fddf1ed71b3f99fac5143a189afd1442095e9d551755533461f3d0d21191162646bf190025af8106d766fb22cfcf2e0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ea3f708ad44aac1c72429428eb341fed
SHA14edc2711c05ad97f37bfb90f9f568378563d7924
SHA2560ce87ef2ceb39b25886e58bdb33e786b98e9c4f8e3c090419e5ca0d330f3bd1c
SHA51243e5e677a62bc4771042582c592d609a786ee2db526b1229de5e8a693684ceeafc8419e1468e24c9ac8ae9176e5daaa13b530df42b4678fe841ce94410c45335
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD558badd8e982c8b2c7058c27a46aa8c50
SHA1a7c40b139dab26b7c2edc83823405568c76b13ff
SHA2564c1d56cba15fdb5a97a464a4a10717d0c61773d2e35bf59776f42f2311ebd477
SHA512b7e559c7446f1073716bb2046bf054d27c1fccc7f14b498833c97610b3eec9aebdaf50a9ac1e8f041d0bfc177ec1fc91af3d6c7ec9d5b3007a544ffb3c01dbfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58e7ffb112f0ca2c53a64f3b5bb00be92
SHA1bd805d40de3e771e6296629f0228b14895a2d2ef
SHA25616250e4e44b648b97b0b6a6e77f08dbb239be4160df2c555a20e3fba7ac28902
SHA5129ba6e580889ab948d8c3b8e6106187651e8b9d6c4f7313e99efec62d57b3beaf481e1759a1aca9e6126471cd3f0445243d9e7d41e60b887cbd5705aea04f6e80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5da6cf0d791c449d64b95063a7dc0b08f
SHA143ed688d9a2d3d872f98aef123ebcfbf70d70201
SHA2563fe1e2bf65ad1cf313cc3611515e4159a4fc135ea88483f18a81d92873813068
SHA512ac7d9dab37e1d39b81802cf2d0ab69d6e5aaa7c6cfc20b6eeaa54cd9672e1f9560889b8298d8811691bed1072ac51e25adc444ccc53ed872c537f32effbbcd0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50308049d23674f35bf28f1ed56182a9d
SHA13e28504e298b5ea10d6dccbc0de215729f4891ba
SHA25604e221cfd32f6f6ba9044ba7654e963f5f74943bae475a97415687701a07cc1c
SHA512063d0d0b7727a5a036fbc06fa0924621df2cb92d63dfcec9a8c88743b3c0660c82e1ee5ba97f781f36d4e817ee8fc92a5917748323c9641333a3fe0f273349cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55bc957fa0ef84e5dbaa72c4b862279b9
SHA1363f7b8ae1c6ac3b2125eeef5d8d2b418dbb48d8
SHA256fa6706768995e8eb14d6e9aef57d984fb60734061e9641d3ec2ced2e8d58ca81
SHA5120ea5dbec8f171ac0da97f4e6cd5f6da1acd27506c3096b131d0a0cfb95d8cdd28eec1a8a7b6585cb818c4e6d7a3659dd3ad8d5b02bfd8805fa5bac2afe6ac41c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD501447a0b15640b84487e83d841376dae
SHA1a0aa97e778db9ae6429b8bc5e170f663af040fc7
SHA256531bd62a42597e158f4f9bb1eaf5de76f2d58e82fa932c3658c880f51fae2adc
SHA51279d84ccb08a662e58feb52bcec675b9b830041ff83aef8a6289df013291e01388ca117f4fca4c205b1065702a3f745951981e77441ddeb4e57057c40c29b9863
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55e2c2ebdf1505a28c55d49def63ffeec
SHA1beee7c61eccd92a03546cee132733a4008266b8b
SHA2565090927f4173fb79b8ae1610354e6a83c47e376b527187315128dbbdaf35bbe9
SHA512b88061699603101c6c4e1dfd4f9c02e83353a458a56979464e595b96bdb3bd7210c328380eec473f208ff513685344181137ab064709956cb865c431a45b7eea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55d743e5005c20ea9fd38e7cffab8f41f
SHA1512e86e0e5932e99f38182a2d404a0206fe6c6a9
SHA256833ad247a97214586e898600a78fa84c8cb135ccac4e5dab8bf34e1c9635c3b8
SHA512be01724d13cf51ae44ef8deef5e4b608becf9920c1fa35cfc5df35bd90c618d80d2d45cc1f4d4778c14b341fbc289d03774148c8e3946aa1576b72ca83599c6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ec2e14813bd63ae88e268bf21086bd47
SHA169ba18e6bcf60ab0f841c843d947ad200f132ae6
SHA2560e79ecf56f2b9e2d257fbe91e4abef62769ba959fdfb418bed2971414643b79f
SHA512d0e52de67645fa81548796ddaa909d6cbe8d6e864d5f5871751b97bbf7091c589c0a26def33b0d7806fd3399d392a0ee6ac79e0acb87213f555ddefb7c45fbd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5de4b79a375a3919e59fa75cc3dba7756
SHA11b789f9a5a69f3085c022776ab5f6d22751e7b0c
SHA2564a8b89df2342d1904feac643a006a15e279937cef3dcda5290bfb579a9f9cfa2
SHA5122e600f5fb4c1af88be0df33b0fe93b1a73025a99c850ffee9d0ab18918f20099d233bf64dd7bca40532b17989211691bd6d83bfe858fd8bf8e1a38486444d9e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50f261f78c65b7f4d5ec27477983f2258
SHA1fd30c0f71496ea8dce87e1f62720aab7e68070bd
SHA25620e8393e85ede7b75bdfde180e1e24869cca96b80863faf7990d926a86bea12c
SHA5128226278ff9c2066fc38737052a2c617cee4cde495317715fb8720f79721657e12c56727b385c6d563807cd7e68320b7fc5b44228aa2c76461451e1c4b31ec54d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53bad05e60d0c6747141ad2f6695962f6
SHA1d8845bc922599eb7dfb3c44289cc3ea434d13138
SHA2563e99b7a07138e3ebda9bd51413d478fe4ca6db30aa3d2daaf2d43ff15b0b6390
SHA512b3f5ec61ab85a682f2bd69a4d0b7f04dd61b9c5f9d25cba5deb39de15a01dc9817f72949091b06760d0d425ba045b28995eaa13dd98e6f16e18ee937a70b178a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b