Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 04:44
Static task
static1
Behavioral task
behavioral1
Sample
7f86a73f7d31a42b977c31dbebba54cf_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
7f86a73f7d31a42b977c31dbebba54cf_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7f86a73f7d31a42b977c31dbebba54cf_JaffaCakes118.html
-
Size
461KB
-
MD5
7f86a73f7d31a42b977c31dbebba54cf
-
SHA1
d3dbcb8dc4e111000b740e826bf97c172621bc83
-
SHA256
2bdae74c619453e21687e67b665ae9d7f7b94280a3092a1b033338873a918c41
-
SHA512
cdef8f6d211db1045275e4895578a10f8c0398d68776051162056656d0824cee56f9cf5ce8e913069a2abcd03560445db5788efb4b69b85bb2a3c620e3a6c9fe
-
SSDEEP
6144:SKsMYod+X3oI+YtjsMYod+X3oI+YmsMYod+X3oI+YLsMYod+X3oI+YQ:n5d+X3b5d+X325d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000067596f1ab7bdc342919d997852821bba000000000200000000001066000000010000200000005ec0b2c63e8ddb300fec041e837e325176062fa0cdfab93921365be8b606e35f000000000e800000000200002000000057505afc6131abec135dd1c1a75b7cb0fcbeb944551a486c723117de5ecc85e92000000083b0db7101e33c1dbdbf3e131eb59998b62c97d19773b6884ff7d3e8f792704f40000000d5da9baf9680af71d3a5e3d9640d5b399ca60739c10f3fcc99e9ec361322af48f6df38be6710a2a21c5bf8befc440295b81c759c3244ae71dd0b6f27021d1520 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423119744" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20d441ff82b1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{26B7C191-1D76-11EF-8A5C-CE787CD1CA6F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2080 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2080 iexplore.exe 2080 iexplore.exe 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2508 2080 iexplore.exe 28 PID 2080 wrote to memory of 2508 2080 iexplore.exe 28 PID 2080 wrote to memory of 2508 2080 iexplore.exe 28 PID 2080 wrote to memory of 2508 2080 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7f86a73f7d31a42b977c31dbebba54cf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2080 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cb2a018dfb56c040a04a35d0d98b959
SHA11afe9df2dbc0879979631aa6948cc9a2161da9a7
SHA2563f3454d1b73b63b8618fd48acf383dc28cb69460f25328ee6761ec432bff4028
SHA512bee3c4be234b83ccb2ec4e31976aa8c5dc9121dac335844fb2d1a24ec065544533277d1c6f177efeb98e9c77dc4a4a7f660a0c6502aa9447b9d831eb00574994
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ddb129f25101053bdc50be00ba69f42
SHA1a76dbd2ddf5cf5ed23f101d871d670a8a2e8bc62
SHA256fc15bd22a513603095d1507d0690303aaf75a7cf50b06a1ae36dcd2db047afe7
SHA512f4a06e0ded4992da068130d498a61e94a894d1e082cb9c0e20fadbcaaf39a2f4fc366b6858f406646ac4235334d630faf83c9deb96214daceb0afa4561ba18d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c727635e86ed2d15776f1a3735c5ed9
SHA19de38a7b0687a4a7cb2892bdb36fe20186fdb01c
SHA2564b1acf8772e1fe84a04c86f45b25fd517b0a62c7787a6b7b4d4466880582d373
SHA512eb17d6a1fafb73009d0563d4614793c67daf1e2e3cc9fed40730a09586bbab42f5167e5bdd768bcfa4fac0880b708846959df5630a3ea1987dd37ef864570147
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57496c2c1d642e90f73f0bedc5f7adb01
SHA1d70fea893ba63275e790c49db65416dcbb3f9cf7
SHA2568a80e0d0f6cc929260a00e735eb19b653ab01f83dc7aac1d8346d864748484b2
SHA512bc6f560a08b66f5e40c06bd1b2faba071715f9312cfc3334b086b9931b448b6c8e06ca596501b26622420aef6dac2c3f53ca020c7502b99dbe1241d4f18e7d5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e01721463c3edc61eff18ec201e08f73
SHA10add7f07c2c9b513c5eb9a6c34591bbfe8b34bff
SHA25681760715f4f7b4224bd2fdb43d81d28911b6cb0367218a40c6079c0d05d080e2
SHA512c808be37a64d8df4bafafb2cf6240130d9c2f83145e4d8c6c2409892fd92b8956fb61d77976ad9230d2f9dc6d06cc168760b505b3eb6d5346a1330a0c0596299
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5096f03bfcc395792b77d02a054c77d48
SHA10822d31a7eb0f562b1f03c19f00dd54f0f7fd8ed
SHA256684d3bff513a22721241b3e9c6b5e21420adb6331c246974a2830c55351fe945
SHA512fda774b650878b2753244a3233467011c0cf67aa886d2351aa2da68bca1acd7fcfd1f0fe889b580fa4392881ce49defc23e085ce4ff7ec5b855cbca454160ac3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50471ae28ef47b5348dff9e3f41c2a160
SHA18c5053b2405a37033ed0918eb9bb31ceef6e715f
SHA2560902ed6be7d9d8595d18bfe90f5d5c5290b0c744040f1bc8d3ddf67e9b0131b1
SHA512eaea38b569fbfc49f67f76ce5b10e91b07de8173b4cdea3d33a60ed9d78bdad62afca7f4e1b0627b66f8aad1633f5154092c4ac43285d00297563f68e76f3b1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542204294d3e3396af868fb51a970700e
SHA1ae5e42322b7429a0fa6d337a26507f713d3fc405
SHA256fae018ad3139eb76aace58b984d2fea7ba0d6a7c5a90e6f207fd191ab1c79da8
SHA512a821b4d1c041745030d3a0860d7f6bdcf56fb7120cb91f3d8ad10fa4ef0ab9db4a9d5b03e65fbba7d2b6bb237e0d1d74e112bf14cd4870150d7014692dbffdb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e1f819329aa0c1671049ebb2939ef89
SHA1ee08d287a381260b11f7b5b3690557a4e3431714
SHA25625afe8f9716c91604c63887324bbe1db8640155cd68f2d93f53315d7436085d5
SHA512a5666d13f761a383e93452d310f9d63459d35ebfe52d071d39d59a813af6b879a816234d247aa215f3f6a33281dbf89026b97c9394f4894d70aed8a8ab9c3ad0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52da3cb7b9c78b97d1e3fbd7137463afd
SHA1015209f60c9662d37c73d0571fb4a919c2dc7cd3
SHA25677f8a5e03af1654b437d53ff772231a84f181f0474928993a17f03c0f3139fab
SHA512fa8ec325f0718dc119046daa1e319bc1936b0460ee273284f580dd6eaef5a700a3b9ff413c33383312006ed5caf2eec8d09f2f032ecec09f6603ca45504ee692
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7b565a2ceedbd6622f1bd156363e476
SHA16904be94cf14d67c70bb888ddad489b9edafabcb
SHA25620c81e4ade27bfc7429b48db5ad769112df693ceb1d9b55675285af90b6c67e7
SHA5129117534773fec83a159181de4f02fa2628620289d5aa2d4f00a293f660799d28bef6ef23ada67eb1efb1b440550baba92396798a3b1e32ebe23b84af2bb55ff8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb297c6aa7adc05022f6c0acc70c7fd8
SHA170fd38f3756d73507f1fff015000b759d4df04df
SHA25645bc4c66659f9de319a01ebc6cb7c6c35e555427e5fd345f15a035716524eb67
SHA512bab4b34dd95e58f469aa5d555565e1ac87c5defaed2ca14182570c42b6b05b69adfa21b066f0717abc1edc8290396a8868de7ba976b3c8e8a53799d5fd0a9232
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef61d92351dbd37c3af527c89ff57b57
SHA106eb5ddf295287f8384cc94a9802d53c8fc77895
SHA2560aab939072903f1d9f869dd76affe5b627fd2d206285a30aff5533c6c0c3f6ba
SHA512712ef21cde08e327a27273f051df45a76f0d5d060536ac9313b3dd851ac31ca901a799e0e1005b32d1f894ef527cf93dd1d434d775207f2f86a94f7ee46facba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c883f4e92cc3752e5d947ad09d8a1f5e
SHA1861d1af82333fe52f0aa0ec3205fa1a0d9c07b2f
SHA256c848fbfa273b6e8be27b9dd3dc38deaecd6a0995bafeffe7709f0b9e6bc58962
SHA512ab87de7352fb90c0fc3b0a522669b18b846576ac931e199e13e0276077ecf06fc0c403db7d8fce677af11265f587bf16fe27ac33af38f9b2322a722870fa7d26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537e976a15db2f9b658e42570bca8fffa
SHA133fb6669c6d382919367549d3a21b806a1c95d54
SHA256894e08d2d6dc589ef783b11ffbd42f36a06bee8b9c186e018c189a53fc3c1506
SHA512ceda0350f63c0c0798b0f5c6510ecdf3b2624b9e340dead705dc3d69594accf61ab5e7bbe936b6c545e533891bb8bf44e8d2d721beb70c7f727ae956fa23de84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5056405f4982b30009905ce4fe8be4915
SHA13ef2317230135e3ad635f2efe0099e456b969975
SHA256047701591279aee81beadf10c54cdac1ffd0dafc793384791ae7d54e7e246f2a
SHA512329d876ff16ada3d01f6a8515bacde81682b3cc73d142fdcf0e8255582295181a8c91dbe99d580dc5207047d79c802e783bbb39a377b77604cf68341b450b033
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582a15c029258bcad51f1173105b315ab
SHA197b4f26bc4bd8277f1e1cd7fd857649e6bbb3b75
SHA2562e5fec322248521b335fe5ad5e64e76ca0cf827405ce0750a36f9cf3c8595917
SHA51214944beb35496c979ef2d52e01129d98857116203e4b85dc89af75ec51718c2d324b850f92426a935317f0114783fb9a07847318fb076e7027ed6ab94b48de8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5622ed35dc1ac182905ceb7fec47af41f
SHA1d819fb9c0866efcb7e9d7ad337e3b18cd2b737cf
SHA256a190ac66bdf0b0baa949b2b771a88c72839b49939b4fafae644e35b3153b26f2
SHA512589c4bb3c3c9015164925ca48c3c1e8b9ca2369d8f9e34b4ef8e6f1c0428c7a89e063e5e6338863bd9fd0db1245adedf07eef22a944c8c82a7a8b716edc93e36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5657385da7392ab8202d09610ea99e9a8
SHA124d050c05c570582004cd286ede25aaf125cbf13
SHA256eb9719e6a26b052e1d820430039af383379dd21d930be7a9202f280b3eaed08a
SHA512c245063843b254ad54dc3795405bdef5e49fb2f484a7c8b74dea2b46ceae298b639f838f0939ea94af1394c64826d282025ad80d00f65ac33d595f597b769f2f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b