Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 04:49
Static task
static1
Behavioral task
behavioral1
Sample
7f89d3f6e597e5a999c80c75b6002511_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
7f89d3f6e597e5a999c80c75b6002511_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7f89d3f6e597e5a999c80c75b6002511_JaffaCakes118.html
-
Size
19KB
-
MD5
7f89d3f6e597e5a999c80c75b6002511
-
SHA1
df9db368763c53217a602a3aecfed9623688b913
-
SHA256
7ac10ffdebfdd1b96a5adb183fbc9f5c96d59fdefa2dd98116564f42a21505e2
-
SHA512
7e8903937ee6762fd28ee03b371e2ca0c11bc1b6d9cb445b35057537d097a69c1422cf32e69963c91a4d6852b8a64d4128c008982bb0f65a4d9fd1525e8bcada
-
SSDEEP
384:zi3K8vLWmYVBD8caQ3RctVt/OPWcmWsXucfIk99heNzzVc9B0E+r:zifLWbgct3Iv/OhmAOIk9SNvqB0D
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E4C486F1-1D76-11EF-AF55-CE46FB5C4681} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423120063" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d94fc4513f4dc54e90e187207be9cf8100000000020000000000106600000001000020000000f9e43f45010a30cda3b062e12fc64a3110e80a898b61f941f4addd02340ccf7a000000000e8000000002000020000000cf1fd8d885002f2b935b06310df293092204c0924b34de1feb4a1aaa595ea04e2000000063d55c8bf5519800c2c989953e2f62c58ebe229b43268f5c1af603545de2c51940000000e140d3205bda868b086910fcb4deeb0f504363fb7f45a8a0e6f6587fdaeba21fa34ae4f6bc770dafc60bdf19847c3eb273c7516d1f0db57745ff3f4019c0e39e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f01656b983b1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1772 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1772 iexplore.exe 1772 iexplore.exe 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1772 wrote to memory of 2660 1772 iexplore.exe 28 PID 1772 wrote to memory of 2660 1772 iexplore.exe 28 PID 1772 wrote to memory of 2660 1772 iexplore.exe 28 PID 1772 wrote to memory of 2660 1772 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7f89d3f6e597e5a999c80c75b6002511_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1772 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56aaad3fa0bb841a5bcf29419660ac778
SHA13330c6c9fab0691110b7c81f87f369f2f75ca242
SHA25638ce95528fdd3fc73328fc2b8801dcebfec202243eb1576b3c430ff5c85adf8a
SHA51270b8486d599604517090f7698b66d12ee1aa1ec4a5da0bc1596bdb4d31322ffaa7e853112dc55a97a0ff775043b706e048b8b0ef9dfcaeb419909e8ef4d8f7a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed231a25818fbf05d9a8fb50fc1b7508
SHA10762fe2105066da8e1999e52a65efa9a47cfc47e
SHA2567f4cad729d45a1d1213ed7b3eed4773b34f16af1d744891dd5c1dbdc4630575d
SHA5120541bcf338b4daeb02cc669fdc0d6048f01eb1c9c098cb39c48bdf137977fa862a6da8e743733610f5d64053fbc95bbe8de244d20ae6bfe6b60f81acbe750d43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdf1d317315eff6c6de08015c3913d7e
SHA19b9f6caf10b56b41f7e482810623681247355ef7
SHA256f8908733063402d0cb041d65bca64e635fab068c5545430383e7ee51a5927ff3
SHA512c80ba8e0b1c514e2c2932d820a55fde2579f6cd8a170f6ae2a6875da3e16431c605c3e2c072430216d65f57f4728f6b0e9af0bb81548fde98f641afa6e7b2a95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5589d4edd2eaaf020fb8b68d4ad3892b0
SHA13fe8a6bdd643134c42de5939ae77dc6df3b84eb6
SHA25609a68d27177dbb92ed553322bbbaeb676124c619b89013bf5c3a1d15ac170d0a
SHA5120efad438b528fd6453bcb4f4cd87c3ae6c3d33fa6b6d56f80451ca1ef89f0f7c11183921ad95c50b6b87ca4067a9a227e2c7f802eabb6f65e77121830534b79f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cb24e0723f1412f119d51f14dbb5bc4
SHA1be3b0e41430fea95088f20fdee595e2f01f74b02
SHA25676b9d4cfcc795b3f4062cf3bb585f6c675dea0e5391564e0d357e704ca76ab67
SHA5128098d3a379e0ccedf60ec028570a840dd2abac74c73dfc6cf2a056e92ae6fb7ca6bdc095f201a16eb0063a3b920074dc2207ceb5e6f65f941a013696004ff4e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5ebb14e877ec7871613630628a84308
SHA15b1538f9dae76fee26eacfee7d8e19e0cdb31b7d
SHA256cfef93fd23ccca70f39fa559f5fff0b0b38ddd9a9bedb410ebd34a5eccc17829
SHA512d106d802e1602630c049d654784484e43451c8060026739e83536ecd8c2a49c3c0be078410a47cd8d5a510a063851baed88d504fcffbcf69621f673e6ebf6da2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531fcd443d94a22919fc3df00d3bd0f4a
SHA152f61b3471a0573e4590879c9889105e4927b37e
SHA2566fb64290e6f82b37e7ae39f2186eb1f5d2ef798d8877fac82530324b0216b4c4
SHA512931492d71ef61f8f2dcfcc3b1fcc8ca272078adab3cb167fcaf51095dd8ea79daac5aea2234b3a22abde3ad089cfd454a3b2417eef78ffe07c5f55611c2c55cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5076ecf6510bef4fc994c3483619fadfa
SHA16c382994eedb90d1f0e05d1cbe1a512dff6d4d30
SHA256bef3fddf73c6f31831da86660c036e87ab77837abb108a74848022da22dc9e43
SHA512dc55d4febf0acc540a3db194ae48d44cd61665d2697c914ebf48c541105e44e9b5889a3ea021aa6058c73abc3f92eaf6d99947b9a259dfcda7933d245446a722
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588c48348b56ef9c566e2a1687b889e14
SHA16d824d2cd0f34ff4b62116ec21c2be4e6881ef08
SHA25685600dea0ea7241b554c9cb12495ee13ce6ecb0d02c369bfdf676652764c062a
SHA5123a8cf625c0f77edde04c4fab7bb1d0d18117c213554d084554d5259c0d2a3fb867d6efca0a941b54d58022516d02835034d908b3d9832e479fa602fb7b4e9c13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550b37e8fa9d1f8d10799e6a4692826ef
SHA132d39ace4ac6d5e475b05ff13dce659f684b8a54
SHA2569c82b319d6391fd3706162bf25e8022e5b822b1e9c90211317af4ac916705707
SHA512daaf9a92abc69a2562cac841ab9f6df50ae34e358b8a304650b141bb7862f4c3ea52b4aa1a9c849bfe8e12fdf7d1187355a90e3ce97eecfe692372de74ef4b7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9815a6410baee2710b1b2357baa6f2f
SHA154bf8b35fa98cfad152a3bfa468794145bd77dc0
SHA256d78894d9093100cf1d71e943f6868018d19acfeed0cf4cd2d51d6423f294f1f8
SHA512363ff2222aedf104e5835d3a44e75acaf3efec8a5294d338b45f764972167f80cc14180c3534261dbf6891b3c882c29b7ae8afa319ccaf56bdbc10f7a4fbb98b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f7089af691799b65cb9cfcd1d09ebdf
SHA1ab97d68b246c9114a1ab4cb661e8c3c4a5c4e34a
SHA256cf5458e241ccef3b0e49fe2526ceccae63606f13f726b4e50eca8d76242104e2
SHA51210a2a2636eb8ab84e3ee17060f4a1d18d27a6179ee6970d39f1b229685d7ecb8f2ae6301446e9d00f768c01592ba4fe0a5462587d7bc8a1875eb58a747b6ed01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5378dbd07f2244e152c4a3b5cd55b13b0
SHA197bf1cb5a0281bb7bb4a71a3265e29ba01f7ea2a
SHA2568e3d8d0cf8fdb3bba698e84c943af1a6efce12751d6e580d51cff6669ab10acc
SHA512163bce24da01220f8ebc472b79989fca1f5db706380106b1a47c5a3c2dc5f849209775c05a2e45f283dbf08b9f4d64d86e6713d470792680ff6c03d4cf89d16a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5747de3afb5300371049080786736cbb8
SHA117cb695e1c3034d63027767aa3b3a5f3990aacda
SHA256fed87926ce606349f39f2210067ab0e03ae6e748f5d5b33bc718fa00243260bd
SHA512c34ff9c9b9fdac547422bd50631b64d13932be70cf5a63b28d2bbc24437b95692ca9771b73840622718374bfd9958c764d0292fc13f7693284b1c0a4629b2783
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9fabb2e313b6c3a5704fffb44964308
SHA1b0329e1c88d2aa94d23cd0e28032d19c86517465
SHA2560eebbb6903a9acd4de7a202ee2d2b6ba8785d25e7beab1edb1a80cc3b5dd8d4e
SHA5124af42cc9aa334f651d7c0aa861be7b6603045e7869a15c59a261df59f3287dfd10019f7feb9897692d44f0aa3511cab22e3139cdfa8a34a44d3696d9792d71a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50df74045615a1a6c14aa2b9166fa487c
SHA11843a9755a8bea3353da077c326ef6d7e246affc
SHA256c0fb2a0ba95074c74a46f2536cf6fabb41aa1ffbe9d9a2230008a66c33a7b344
SHA512af6ae29a7a0415614a1cb2a050ebe2f560b7e4bca50680a4cd1b18897d9a964d94c912c0d32d49642be01567afc356d3682082cbdba10a433d592877938e8d60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5526e41c18a8e98fa95e07f0d47d93cdc
SHA1083e7e8bec304d1bffff153081ffbb49f857745b
SHA2563ad3da375be674d6efb130c53cd99b6f3438c30dc72777434a5e7e270cbbab63
SHA51273ca1a4ee4a2aee3667b03836c57f6150841604da7dff395824cb71defe201411b778c9175a886cb1d5d53fa508fbea427b75ff273196a0248ccccf12bc91a77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5b80d82144d822bfecdbc9cdd749c1e
SHA1368f279574ab63f70a4cb6bb11976c50aaa50437
SHA256a7f8907e0b505da6a8b51a6907cba7af65aff2c570359cb3e009b30df2ad6dae
SHA5127d23037206b97a82499cd1ca32cf5d8e8180dfe7087e1dad76ae694f6c331265253f0f9604beda54e87c3c65ac077f09df4699aab527ebe0635d6d915fc10588
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad0671cb319fc44e7a84259337627268
SHA1923d94651f72afeb12b5debd803ea4b28e3325dd
SHA25654840d6853f8641cdff4edc85bdd6a23d12e7dda5e25d078eefabce78202c618
SHA512d8aacaf7a1d835f7b45427c03719bc7b38372d3dabce1120e7829f1633f0c08b64d9aaae8f9e7a36fb1068705bf5dc1f86997ee721f1a779fef37714f1a8df30
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b