Analysis
-
max time kernel
132s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 02:17
Static task
static1
Behavioral task
behavioral1
Sample
7f306618fc55ec0b780fd6f2ed425b6b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7f306618fc55ec0b780fd6f2ed425b6b_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7f306618fc55ec0b780fd6f2ed425b6b_JaffaCakes118.html
-
Size
6KB
-
MD5
7f306618fc55ec0b780fd6f2ed425b6b
-
SHA1
823ca804e91a4e5ce19cc7cf3fb281f6e75d068b
-
SHA256
a93a92716fff3ca30fad0d5c04f1dd6d6b7e727318452406865f0f61ab0d3f37
-
SHA512
4266f04a0f5be9e2a65e2da0e9b8128164797b0927e76be1c9037ac535671b0b9d10b61cd8ef78aebe6c74a98295918552715785de6ddf20ca9465ac08b26ade
-
SSDEEP
96:tMuYFOFkF/3cFOFkFGFYZhf2gcLZGcrUTZhF8pU10lGGrWhMULne:tMTFOFkF/3cFOFkFGFqhCSSlGGrWe7
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{90658421-1D61-11EF-83FC-5267BFD3BAD1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009592aca4fc1f5943981f6ba7da1605080000000002000000000010660000000100002000000090128fafe9e95cb9d524b46e94f165180d2ca1ba673a76f56f86abec85d7317e000000000e8000000002000020000000c1550296bf47ead47823439008ba65d58db085c638573b724b2957b477f3bae520000000eeb98da9d6556e799a7e860a4893ce1f7fa99862e2a53a5d30e6c4583c32634f400000004d4b91cdcb3dff26399177f4e67cffb0d935e20617f4e1002265b1aa5a8664244ebf549d286d8d434db9a75195865f5566741bf0b4e36ad2c0152c1147566c1f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423110902" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00aefa646eb1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1964 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1964 iexplore.exe 1964 iexplore.exe 2228 IEXPLORE.EXE 2228 IEXPLORE.EXE 2228 IEXPLORE.EXE 2228 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1964 wrote to memory of 2228 1964 iexplore.exe 28 PID 1964 wrote to memory of 2228 1964 iexplore.exe 28 PID 1964 wrote to memory of 2228 1964 iexplore.exe 28 PID 1964 wrote to memory of 2228 1964 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7f306618fc55ec0b780fd6f2ed425b6b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1964 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2228
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59670a986c4b7fb26cf403ec7c13918a8
SHA14520f1886db4ce60db0b4efc2ae995668cc3cc90
SHA2561c6a6bebb4e8eea66940d793eaf4193ee2dac5795f900fa60b7965b40b9c4391
SHA512a20205aee61d9236142a4d8192d93865d84dfc17873d7596898fb384bdea6841a82f85e54da258061c6ebfaeddc2aead9e678e7a013080788430ef7d471fc978
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532e42415ac75ed56032e6974a6d6e7be
SHA132de06618a13a22366d0201fa4bcb71ba91aab6b
SHA2562d662c3c85bf2bb69c5887e4d72d67ae2eb1b5e7ad67aaf0d55cee67d0622a03
SHA51254986166b1928ea57c9aac7ef9a42731c5f4d645203932e010f70a330b3a5c223c8c979a3b390a75dd1bd3f84b0be9b52726b517a1cf81d123052aa81bdfcd68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d67639fa71394ec7a1c3d1b15d3ece42
SHA11fd5d927a7f01ec8a73d7379bdf98179809e4db7
SHA25606b76a4fb8cd13bd08f7268d7ac1d0c32a33bb4f15f38b7398c3484c57923f15
SHA5121ce8efdddf5ec2428a0a838b08fed5f533071813847e43225f52a485360edf525e366a445309eb62f2a735becbdc8855518706dd5116aa78962f0d858c57fd5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6dfb752b580de5ee3aafd74ed7a69c1
SHA1e988c6de06800a2115c768cec1699ed4acdce5a7
SHA2566bd108a50026e344134938e74959669a807630b681ee5e712b90aec3afcd5024
SHA5128d79e2b31a1d3daf585ca76cdb27a2e019d10fb113b1d10ae6f6edee9aeea9b86cb83ef842bd6b83ae838f07549f1939da299105082312e7e8b23c32103bbe1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df802d81a4282857ac4d9e8d88346e84
SHA134ee9fd429c2ba09c475c951f6b510ec62165b93
SHA25636e84ab323d182306eee2da05e9754c8e76e3273e926c3cda8d5f75e1ec32baa
SHA5128649851daaa401c595debe3bbdda465aa54e3216274a5442bd025746ed6dacfa5ec1b6fd69bf6216c6f22b173a54d584accff693a077b8af3ea4be35cc5f4779
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6851872387275d4bdef5ea2a9092d0b
SHA1f453bb64d3ff71823d97f4ded81e51bcef473f8c
SHA2564b7e6ca58fca739389e399dbf8e0e8cd943e1d55fc820e113c8c7fd5907dd805
SHA512b388af04d32d6dba2bc3abbfbd728d05f4e92ca177ca2deb791ce965f488fe3f88a844c77cf8ef3f6b3cc43ca110a404311883cc401adc4571ac02be3ce33958
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df00dcaaf117cd4f66aa7d3e34b9685e
SHA156ce63beb3ba8cbdb905b7ec1a99a76bb8669327
SHA256e1f2e1cad78a546d7a268bb2a1caa3d03d9e2b4101a73b28c88df12070ed18ed
SHA512054b7a101ed86af71316e7a6344b12d1f534114526b3bf5c8e532cecb870c57c843dc0947276eae3a30cc9d8454f84feed169ac373a60ed3d990677368cd7a6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5584be033453c731b4b9bc0cdf2e48ad7
SHA1b6874a5649fa93ec99a23b1d2228951231f3f078
SHA2567cadf2ceb61b722da6e9b1e55459f575b61b2eaf55ea04b903df66e8bc6e2b70
SHA5122ceee193b271030af4c1617cc71a5faed6e10bdfed9b8493254169d67189e7eb4bc629d7dedc3f5ad7735f728576ae659a07c71e74a61de091d71103cc49993a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f3a250a7aa77760aaf682cf7a35a8cc
SHA10d705f15ee67b11e3d4249fd7e8f47c14f71f464
SHA256ce7faed698d0f04e12b53bc6b39789cb17596355908dacb173333627c1c9aa77
SHA5127eebea82cab99b0a1fd03cd27774393b737e8c81d1f52ad061152bec1b941996c13d9a1aacf6e50cfbb286baaaee79b2c19352c9c5938e84d2b9c426ebdb0313
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f29f59814dc43c0b58fc5e90097af3d
SHA1dab1ea7e5b056a82536429ca4c5391dcaa42640f
SHA2565ffd0cef537a779585e4f18d47fe457f3b3543643b410d2f040e4bee4acc3146
SHA5122c3876b32f24cd98f9794256fb2b19580260327937bb8a5919b334fbaeac443f384d81210c0f93ce354fa0b266a7ec5ebdd7f4bb59256a07497bbf62fb36cca9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9f8df422de5b54e10e10e763b3476e6
SHA1a95c665039e2280e5efc30eba1fea20df5413003
SHA256138bd109dcc425472b36333df7a74ac693a6c0e8689225f010ee02004f7f77f3
SHA5120b7e2a33815ffa4ef852a0e5974bd269bce18210e8c128e5df66878d27d3fe8b1872b595188323b4107b8029d94475867716fb3ff29a6e938662a88e70f5f3a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548da13c3379ee0ed0c6cb95c4bb7d967
SHA14a337bdcbe7f4f5b557f86c4c0e6df903fa9c136
SHA25687e677eb73463d0f78534341e56ef8ab48c87510541782bfff15ebc301c4b865
SHA512568a52d74cdf919a546eaf025b632ad57af8f13fdd8ea1821b218381a78597e634c1757f94ff1605613d4b21aca52151a6c0ecd1ca096c7482fb0fd97641cf77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf70840fa6741ac26b074bcfe289805c
SHA1b59d18b9ebcbdbb175727002dce68a36b80a03c2
SHA25606260c87dbe0943330e38ac7f4d381800b70f4814779f6a896fd88c9f996ff1b
SHA512ae21d5ce8de2f17b0633249d9e5edce587852597af98e02486d8a172b200783e5921c71f86283a15592ee2ceb690bcbe74613562e7cd439306c85661a302b90b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e89ffa0254ae9d8ff9c726acfed9176
SHA1d6001b6c9249bce1ac1495bd841ea327ff51761f
SHA25667df7600a6c73bf638cac97c06cbed96539fbb701b88795d2b26de88df6b3187
SHA5120b171bd65e3bd79730f146a27d3ec172f7ae323d4b07340d246e4a444665ad76560381cd41a4f522ffe555fcca02363822ce42acaa2738cb540215ad2cbe3766
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe546f4f25c4acda8344a0924add47bf
SHA1de752c6c9985475ca28bb5505fe130707d06ec0b
SHA2569594b024dc28b65ffd52985114e88f5cc7c9ad1d9c542824fc9260b967fd4ba9
SHA512d65a4d33de305e3fcdb08f9d78c59c61517fa21fe091325cb73484d33684e0fef0812cb103df30936b3d75ccc6b8962fab6c25781837965076a47510dceb614c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523d4d5e0d34fbe121fe8246f127af9e0
SHA1964c8c11f12b833221c309b2cd7d64f94bf04f14
SHA25640667e403bc1678aeb94dd357dcfeb0cafa2d935870dff526ad24a3299c0e268
SHA512f572cdd10006ffbf6776193a54fa800da92b00bfff4f4408efb14ab1623b665ae9f4ca81e786d8d319096ae8d72e08f07c41033728bdc0ddadc0e49190e87d52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534ffa554179fa7e4da0e8780ca43738d
SHA1f3c277a2433c49fd15b0aec280672180f8fda8e6
SHA256cad4263a4897267033762b2cbf582d74920f455a5a0cf5c97e2ce2a00ae9f4c7
SHA51208cea07fedf805b42c68788519ffedb4724521612e852fcd9d279bb48c3e18a3f8c509d57ba519a62047089310b19b430db2de25466b9fea072375f1c52ce6a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5331c1e920d6b18b42051bfe532e1928f
SHA1719896466a406fc67a96da4ad6bbf86ea5a56a06
SHA25670f7af7cb5b5cee339c4987acbc99a0e9f95edf6e2cbf77ec9b3ad2e7d99b88d
SHA512222b4a32b340bca3342a74283e240b4f63b8a04bb9c2434a2bf788e43a4081613db21a71719808c71872fc2584a7ab88083a98e55dbc4bbcd76aa8075216cf9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555ba206248e2e03a9b06b4ce3c3c99fe
SHA10eff1bd4f46107fc337095e8ca05803935c34704
SHA256cce6b0c912c4d57512f232f6fc45e8926bb87713038491695d1f657fd042ea2e
SHA512054c73171d4e32420c9183eefea5f6abaa84f2eb380ec2429cb8770956ea7b03f5e37bb2ab23fbb9a12e410ff3c42efbdd0cfc5d7d8a1d6f200843f6222b8267
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b