Analysis
-
max time kernel
118s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
29-05-2024 07:54
Static task
static1
Behavioral task
behavioral1
Sample
80030098c9849c43bdfc952bb2094155_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
80030098c9849c43bdfc952bb2094155_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
80030098c9849c43bdfc952bb2094155_JaffaCakes118.html
-
Size
67KB
-
MD5
80030098c9849c43bdfc952bb2094155
-
SHA1
b1993ac3dc770a82ad6ce548cdab63fe74af1359
-
SHA256
e0c86f07085287a6e8d1843f38288ba2f33e4a16a38aca4b203fea9004e960fd
-
SHA512
9464e2a33cbff19fe9d7f28f527fb8021b44b4dc6cb133944791374fcf34b5a23c6511cce608469092cfaeb16f07d518ab7f6c147aa59e0fa95e0aa0eef6fd7d
-
SSDEEP
768:JiGgcMsSZ8tN99OIscbzPJQcoTySqQCZkoTnMdtbBnfBgN8/oygcR/QFVG8c//IK:J0WqTYPec0tbrga6cuNnzIjv
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9025c6769db1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A2174991-1D90-11EF-ADEA-C2931B856BB4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423131118" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000e2de0b866d80357f3be90deeb05cafaf3783945a78a8cbcfec313abe3116667c000000000e80000000020000200000008bd6d123b31a5e08e581cc8d12ed8587a2ccc3b7bc32e2452ef344adef819c08200000005aeb9b524be0ccbe4db8cc0b480a011d84d26384c65597e2c866341f196e508440000000b6bbea8c753da38d74623bf67e219335da957fdef29ee1fea369be33d96d451be7b4b8f70fe4c7d1591ee1c3ff943e1c99ae3625bb776c3576e5bc9ceb217e32 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1940 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1940 iexplore.exe 1940 iexplore.exe 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1940 wrote to memory of 2900 1940 iexplore.exe 28 PID 1940 wrote to memory of 2900 1940 iexplore.exe 28 PID 1940 wrote to memory of 2900 1940 iexplore.exe 28 PID 1940 wrote to memory of 2900 1940 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\80030098c9849c43bdfc952bb2094155_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1940 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5da5001d574ff17efeeddcba31ca0a46a
SHA18b118c966543f364f3493d1892e99f2bf12de515
SHA2566de43a2df42a96f62289b69af76484b02a88c804cdc6197ea716c5325b6fcaac
SHA5128d51da4caf009474b4e919960357189d0126a100ed15985ef8575e401e2a803c36a13d077ebb8702b3218921610596157220a5da99e84ddec1be3e56a473d8a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cd027d38dd258cb337516cabd5f2699d
SHA1bc8697b393148abc66657c454f3e778621dd00c3
SHA2563df759de0db70939b8517b949f5b213c63d13253f7b6742151b365deb98ec500
SHA5124e6263620e73d2fc8d7a2ffadedcf5fd22581f846b87416478b127569d4887635ed9273ceab0b0e6c708dfa7f44c010e776f4ca01371af65d0b7610f9e82992c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ccaed266998c837cdcc762add3a18d94
SHA137259a0200fe5df57e5c99955ecb74336fc8a353
SHA256185acabc7e6b33574f309dbc10b71b950f32c3be583f96771642cbb196d4e054
SHA512740584b823574a0f422593dc4b23f57e593cca7af46bfaeb05911ccdda1f83b63e1d6f9a03a4283a179c00cddb36f6d2d8e265387f9d087ea8b9ae1b0db14a71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59b0f7bde5bcd7158699e0db3399928b8
SHA145815df9b2995aeff55b133aa7aacc52076ffac5
SHA25624eb715a9491e14bd7f386ea9cebcd24916c766188c7d93761701c54e41ebc58
SHA512c3af51dc15ddc52811f3a2a4498ec9076388ba4f063ff0f94ea7bb933e0a5a9a49b8ccc97dc2914350c070fb4797975296d1d942496bf929bfb0ef7fb2d77de7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58fd810cd2c7a463b3eb12788e78b2903
SHA1a45d4330ff05c065a793a055893bcea150753b55
SHA2567d91c7900e5c911700da259a21d79349150d2a97a2dab6456b167e48e793ee9e
SHA512bbdd5ece023634eaaca562291119738e42713a485c33b8c87cb3b1c7274e8610a0de6267894bba833eeb558edb0cf14c48ba9e60a026c15d9aff9e2a60f76b8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5233b5126359f7c38e5c8dfef712ad203
SHA1f26c7f5b3caec3e31feaa82a4d0c62e1575fab9a
SHA256ca76d59e3cd221fcdbd85a94ac7af43f05cef7a215084f1d687b9b9e2127e238
SHA512eee467f7f7b846733a368b0f7b144ea6de47471702b4e1ff33a38a8af691ed61f682e9a817303f1f79e64046bbfda9a3d56483ba98679355a2fadb2cfc5d57ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD547fde78897721e4bae46498c40eb0360
SHA1af66b2b9753b13c0f278ec0977d98d0689a08fad
SHA2567e6dd37a6d9a8cd460ba0cd55be7c6b6927e459f94dc44e4efa931d160c71141
SHA5122a6264355a854924b72bbe7ebbd49196dd7c2454805bda82c54f2bb204d8b0471074a073c2affcbf2cd6bd605e99b64f6acbedf8a315a23a0cdb79601b9f7bfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59dd677997d2b4f4167f596e8ca9dbc0a
SHA1a44ae4774b9f0645d272529682f1ff0ca38c9ae3
SHA256b865852755bd3c2505f8b8c86ee72bc154c2c6c9b5506f3be78b99377684c822
SHA512200d0ef7ff5b46c1fcf148d11caff24859da4e113c10c8e0ce343323ae872ed07ec3487b7d0fee2ba20f2fa6bbe2cb391589cb862b11bea279a71e391fdf8c58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5370925f77deb142960ed51e88e7fd420
SHA1259c5d72dbb1b5b5a3d9f400e4cd2310cb202d07
SHA25601f0b95dec89b7492428160d55ab8b49b451533afe97788ffb65f75b87fbd0af
SHA512aee2efcb43124664d314af86684cbeceb9cb19b491067855cc58b8820c24e879ed6fb1934e15a94d4ab63f1625fc754caf7cf51cad7ed93294b87993f4ca2592
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51b5467fb8462388bbc3059fe0d01ffae
SHA18f054ab47f76a8c2c3ed5cf816bb3d687dfe5ee4
SHA25604cc84c9042736406267a87b80a8126c2f7c6dd0942c2567a57ab33d83a0a690
SHA5129060461172eecd9b268a4d8df8b528953da406b77409d5aff3eef902a21696d33e09bf4b4c617686ca650ae38387e03e4751f12be177664a4eb2200a0d479626
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55ef95f6e389cb7e421961e20a593f734
SHA1dcd432ba72a32c1005be3ffb3018f984f6cd0823
SHA256e484bf7c19112bc1e3572a8d71f3869b7ccc845d0c4cba597b740c33b035fc20
SHA5126db46f90c1b9891677b7b8333aab93e16751abbf949b5a837b8ed6c6b6163399492a082ebb7cb7906dc966e868afdc0dbe77161e517ba462158d8cfb389b3dc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5419f421eb25a47e3f8e7fa2d17df0446
SHA16992a4889463d583c4e8773d1a844bad362bb924
SHA2563ae6fdc046c755bd2fbdd7ef07ac5328cad63df640e31b1e3f70e804a0b786d2
SHA512eca23eee32546430e94fcd4b1a60c28fe74a5d5a3a28bbe7b709ea211ca420d83cd0b27e5036ce24b4baf61dcf78332f1c1fa1a225c600bd81d9d998e39506d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5abcdf92db576c7516a01305a72deab8b
SHA147229a93ba3c722c068c9d749e470dd9782bfccb
SHA25629f7e0c3d5f9bc5bf56904e42ed87d833e75ab08d2dfd1a1a783b45839ca07ca
SHA5128e70f670cc22cf1460ec3bd042f65c03b1660eedf54d9be506c31812140f26f4b337252f2371e9d54c0615c6c2c128e0b0ae174483c9264f673828ac613f73d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f7f26716d755beb84a8a61b4bf5c79ed
SHA10b1cf55b29a41b3dd27e7370854df01a56347d6f
SHA256f019a0356ffe4e78576f09acfd6b646022150352750866840a617f18a228b7a2
SHA512424273857ecfc2ab651b2c1f21e179564f2abcc78c90de3be0945c9869d3b367915cf671635a0d6afb809a8bd6fbece4f093ff4c5860311628d8df2ac2218e3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD518daebb06ba97d01faa1360130032d7a
SHA14535625d07b8627754ad6a34bad32237303dc2ef
SHA256dac4c40dbdd92726f35478b63f4bccde716e7be055fdd16175fe4d811d91aa2b
SHA5120809c133dd080612a78009d1a45cf22c79d17e1f5f128586a822c41af2704f0e7aa9537382c2f84f89e9364f737d49b05d8a9125769361db18ff887c7729709c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a6a0781df05087f24593f29d91a59cdc
SHA10efc64ed8875a6cc8a9938eb7ca1fc76b88dc808
SHA256b71bfa3ffe786d9bae288830c1c17bdc2d45abbe6370480311f00311d9a1d760
SHA51205d37029611daa8986bbac5cf6e98f0f2c2092f95b0b90d40258d4880ec22ac67b835401bf894a2ce30faeeb3b41e42cf5d2697c0b50677f1f1854ec107fb910
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56833ac7e6bfa55df94b18422bce5ecf0
SHA12d32b38765c6a10a444851d76f39c7bd0ad5db3d
SHA256c46f77d41012debd4f145822a1ad395ba942c02e779ba6c751ca10702564647e
SHA5123896be37bdb1898851bc7ad58d12bd32e951c5b4c8d5dc833cb78cbf1652daad45d612aacbeb96f32a53f0840424fe4c4ec5c514c141047e6830fe42dd45695e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e5563a4cf76ebb19e481a20e2b9c8d7f
SHA136c9e5e0d721bd526fe36a88a513e6280c956bf3
SHA2567bca4f1fbcec36ef131af9f7b0742854e1e12d2b31d98577214bd0f108f77c44
SHA51254f2f11f74db083fb22472d96f80957a79f9bc97e5f0819fc672d875fc61548b2c3d1aef9b955e37fc893c633bf359560789398fa45185910c2069bf53a30442
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b