Analysis
-
max time kernel
134s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 03:11
Static task
static1
Behavioral task
behavioral1
Sample
7f50d450c3d48b6d4182f0ecbc2817e9_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7f50d450c3d48b6d4182f0ecbc2817e9_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
7f50d450c3d48b6d4182f0ecbc2817e9_JaffaCakes118.html
-
Size
69KB
-
MD5
7f50d450c3d48b6d4182f0ecbc2817e9
-
SHA1
de40beb5992ba99b0f6d32168c84f6a66a66248a
-
SHA256
102139388e4e4df4d3d2d0313b8ac956ce50e93796e95ce1f3146925128c84ed
-
SHA512
415307ae54c20a9d242358f3bf9320fdca4cbc40d9f6d2e0b1b6eee7f4b1c7f6325b48738e58f2c2f065fc94852803f44cac3cbeda78b0c35544d3d04b065a46
-
SSDEEP
768:JiWOgcMWR3sI2PDDnd0g64grBHB9NBhoTye1wCZkoTyMdtbBnfBgN8/lboiGhcRe:JPRORNITvNen0tbrga90hcJNnspv
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{38376221-1D69-11EF-83C2-E25BC60B6402} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423114191" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0e99b0d76b1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002946f4833609e34db84334d4d16b547b0000000002000000000010660000000100002000000065dfb6614b3c2bad459d05b99b28e92bb45350e89f8e1e20ac526a185fbeb2a7000000000e8000000002000020000000e24b4708434d7562c98d207ce1b04412b90518be1a22c7a982544ad4f899c07120000000d6de8640601b98170d199cdb5e3261e7889e322c4abc5828a652aa1b1e6ce89940000000854e451ab2cafdf792cd4118347da82f196b4f5ee9298a402070b5162a284d23a737b12911824f8269c1a3a36f1c38475f740039352046377e695d81b0b3cb05 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2212 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2212 iexplore.exe 2212 iexplore.exe 2308 IEXPLORE.EXE 2308 IEXPLORE.EXE 2308 IEXPLORE.EXE 2308 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2308 2212 iexplore.exe 28 PID 2212 wrote to memory of 2308 2212 iexplore.exe 28 PID 2212 wrote to memory of 2308 2212 iexplore.exe 28 PID 2212 wrote to memory of 2308 2212 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7f50d450c3d48b6d4182f0ecbc2817e9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2212 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2308
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e961bf724c832ecbd4acee29be6e90cb
SHA1bf2e8014240f81cacd6162c96f744393ee3ec074
SHA256aaf9d1810f739244d728d86333db18eb53a988a7d2d7d1685cafff58a036fc77
SHA5128474783e21ed28403f2f202ae535a00fb452cff1044ded3f2b72eb8d0f8416dd46dc0868db0456a06a03236b916581c588c0dee8183c2017a4fbf0c5a6d691fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51088662a9a4ed53cec239af9a043e309
SHA1ce382fa6b2c9ef682fe73d7d9e1338a32968d80e
SHA25637c56376bd697d08e225196dc2c77eb50631c8fca2dbc5ccb74a5d260598e0da
SHA5126cdcf99318d6904b3fe5336e1b1c7f8c601cdded35f7d2635f36165a6ff202292d93ecfb0167c221a2bb5e2a23c25d1f4f53537aa5be0c63455a04d24de452fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c552e9d8a62833ba93ac894bb9f60fa0
SHA12948bf72157277d262f898dbcddd25f3c1dbddea
SHA2560389f068f41ed84426e37f0f0db3bbf2e8c1cbe64ae7670ec81662214e56b467
SHA512ba0961711fc506de5fb2c17026111f9d6addf009a185a954fcf66f1aac283ae4299e25ad655c4062b49c94d5788a3aabf3e478d858bf54049da32715c037cc99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1a3ffb60bc35a56851e345970a0c676
SHA148f785c6cd82e201c0e005da2ffe8af4e9f5cd5f
SHA256311633411bd0686e191146a879fa80da93eb2854c52ba65575eb8c0f7e9b8057
SHA512cf41415de7531410b78937bd31822f51b227542dcde44debe8ec03ced9a6d2b924a4bc7223813c6fe64a6975228fb57028f559de8f7e0f8f1a42845d93cb39a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fcdff70e9aca5ea3d764287e9c8d738
SHA10391c7c7a18b664f12548027312e2ad2433f3076
SHA2562b8b49ae4f83024f131a3228d2ed39853364fba4af0b41a9ca848a27e9221494
SHA5123520dadb4806e8dd280079b660598225d9ae959514eafc1c3d42cc65c7c515fc1ff5cebaede5c417554364db0484a119b3db1bf19800f2d4d373af64a6fd524c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6b79f07ceaa313067de7e50867ecac4
SHA1b7c932849d4cafdfeda5a348e635f8178ce1c89b
SHA2564b9c7d36144124340d9f2b2a110c981070d0eb05907f4b60e833c51a13d2b5d6
SHA51244166849f2c21e01932fb6a83a1291095466b5619e51019cabf751d698d28c33958adc7eead20c5cd725e76bab3776836ca389ba5497ce38e6ca3606c4bfcbac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5263dc8acd93cf30ffa8461e27ccdd015
SHA195dfbca106856ec42fe7d49ab2988a44a97c80d9
SHA2562a4b6ea5461d79c1f90322da6ca66124d48377c708fc9f8b31e99328d7dfe057
SHA512aa8dbc2c1198d9f90a4841740ebc67d3534f84f9a8e34a03d062d62dc2a9f45acf323f1e20b7f8c7d59c03f4ad7b1049680397a58ae0f90cfc532a1edf47fbba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac4bf93cfe1f77fe773b4924483de301
SHA1aedcd5fccb80b397de62216bf9fa3727d85c9494
SHA2560d224b93deee8926d9d325f39e0654498c7420431e0d3ae64d4c61cab534840e
SHA51263f6d6bcbeec41e2a2f2f66780700136059d4d20657f36c956d05c254a3702c399f21f207b237d0d11ee4a01b1955c4a650bb3fde983ec6950c251d0e28a48ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5699452d43b144e924fb2947f155696e5
SHA1c0ca02043f2ea186a90f30ba9084cfbb39cafbff
SHA256e4636546dcaa99d7b2a2f0a8ebebd0f6aa4a082a9cfa2b11dc297954d9a774ac
SHA5123129aa5ce825e15d0e2adc0eb3843768de85e882929a1d2eabe404ba87a058484a4f3a5eaf8d070bedb6294065cebfcc96528a59f5d3d6e7615edd9988df6c25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fddc71ce992de69cf1bb99322b83c00c
SHA133655aa82fe8d3ca340bfaeb67e740267fda3ad1
SHA256f9f6ea4a6978db3ef35743ae80bf77ffda1333bb19b5e336b9696a1a352318ec
SHA51212e64521c7203ba1becb6b7233f43e4364abb6e36510d42aec9efdb5d0dc5fa55579cefa51e32210330dc5596c6993e54fbedf2df9c90acdac7b9cdc5ae467d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfc5b104ed0b2c8f82b065dc6b0953b1
SHA16c8d417791f2410f8e58c40ec565cdd2e8d9d7ef
SHA256c2a6fae61bcc5c0ddb669d33c628c41277c63e9c8a48bde5d10d39ec784d0b95
SHA512b9276fec237231664db4864b5baf64be6c278c5fcf874299481d4c22abe00cf1e755876392e7c8a9cacb51d4407c1b84a61ff001f1fe728ec5baa670ff9437db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a2da6a9543cc30688e0775dc8ebfa09
SHA141edc4919ab89f6e5e674b4711682f3e525ad606
SHA256dee71b34e82b834c4147cad28553aba73f6df5ed3a5fc3a534dc7f9f973437b8
SHA5127d118d91e5bc798a25e308f4dce4c6b9fac9e1a1bfdc68fa06f358a81528e73e41c06fcbe3336c67aba868bd6b90f4660231a7e3aee86692b813d37c802ca167
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e4e19353664b967f9b49adf4cdae7ab
SHA1394a25e57e8fa8d4dfcd82485189a7debb22de6d
SHA256b45683b2b2e89253015c905cb6f4eecb31b6c5d52d670faafd70236f197a2fbd
SHA5126398a2712bf84f60ad3c6f6244cea8b1a2dcae77fd730a91602f1e028b39cc9dcf4cf0a34a9d278bc56c367b03fb7a267a1bf672fb84cee56c517079851e3717
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc89d296f9b464616706f793ca53a8ec
SHA1a9b14eb0ce5e63a77e67843b597712ff60119ec7
SHA2564bcc04ae9d40512fce98260200fe10a9c76387d8c52717a5f36a8a16fdc84ca4
SHA512afbbbfa8add1a942c540b5a2cdde0cfcbdac2f976aab6b2465ffe0664515d500aad237554f286ffd779ead648a56328246e24dc7f0180f1489838e9d789aacf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e10f87c67ff2381d43df82249b8e6aa7
SHA1c0e11d3050130ef584c0108ae091e9ce8fd07c55
SHA256a2e1e3f3f3f81a14fb33f7210552a5ef88bb8f8e49787bb9b95f3cb23c6b713b
SHA5126939c19f918901a6c0a5bba4ab50cda8a623bee264376476586a3b2744910b0d96bf4c1a5d989838cf8de435cf5acbe5c0cb28718e46b3fc481536a0faa85385
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e6adcd4656e6443ace951d998cc528d
SHA18940c9e479e30a4ca7ebc40100ff098b14392855
SHA256b0bc1bf0fec3e27a68e9ca909f75cc5af3b730160ca54120e117361f69842157
SHA512cc9cf386e875f40412a0d3da337f985ff2192c654093e37fa54985b284adeff7f30f0f8fd34238b13041627c10fddf61243ca4dd3c2106e83dffd4d13ec86195
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a08f026794ff82012e501de9f482d194
SHA1ac7e646d235a6e1fda58a6c1363eacea902a5cce
SHA256754e59e72adf0ea4286946f470f1a4ce6b04b75826f6ba8b3dd791716f8e6b76
SHA512a40733df7d4ca8c37b6813ad0464d79082be4f182519615f5d4fba65e48ce7d670a2436a38425114a07d2b8cc04de79c43fb9b39fa143724cde993625797ed43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50db829b0af8157530b8068b3fb70d799
SHA1cca1ad13c24f29effa0994b9261395c3543efdee
SHA25675f21cdbf3a5412b46dba796878a724dcbf7274c62b6e4cee6a24fdd2df86990
SHA5125ceaf666c212603c7c386f8e2f8fc7521f98030963bcdf5b8615351a8e7b58f4209df9b417559aa01531dbf4b8401f922cca1ae5e2ce1c893ec846ed30548312
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b