Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 08:33
Static task
static1
Behavioral task
behavioral1
Sample
801d7d9dbf72a6c58c98e700d75e6302_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
801d7d9dbf72a6c58c98e700d75e6302_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
801d7d9dbf72a6c58c98e700d75e6302_JaffaCakes118.html
-
Size
460KB
-
MD5
801d7d9dbf72a6c58c98e700d75e6302
-
SHA1
eedcaa866d0312d3b5ad48c85461e61dfb10a9bb
-
SHA256
87fb4513d56d8934c8dc97f5cd0599893a4779b99081ff483f39763981ebc30c
-
SHA512
48e1ac8b8c50e317d418e1589db71054fd15b8d988d1e1aa86f36d27dbd699b171cbc690f334fd5afa81781b41b520e169d12ba98eaeb42fb4efb1354326b343
-
SSDEEP
6144:SMsMYod+X3oI+YX6YQJsMYod+X3oI+Y9sMYod+X3oI+YLsMYod+X3oI+YQ:F5d+X3g5d+X3n5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b6a4ae6cac60f249a16d22eff48e13160000000002000000000010660000000100002000000064c87ac238195b671fa42f87a5427a10a0dd8487f9f57b1c426f50987b66e524000000000e8000000002000020000000f00766af8158b3d1c2d9d7c33e00660a3a8c2eb8ed6bc7d4b9fea032c5527e4720000000f8661d2b8f980ca1b02ca3a2a979239fd499b25c3191854971619f6131ee6f3e400000005e75ef5a533bee508363165bc2a79dd5ad16b0f418818fb95bca83e82daa15826de34fa81c7e7f820e8c84ac7ad43551662db3ac74484d6553e5992941f15951 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423133501" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0f28407a3b1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2EFDDE01-1D96-11EF-80DF-F60046394256} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2896 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2896 iexplore.exe 2896 iexplore.exe 1564 IEXPLORE.EXE 1564 IEXPLORE.EXE 1564 IEXPLORE.EXE 1564 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2896 wrote to memory of 1564 2896 iexplore.exe 28 PID 2896 wrote to memory of 1564 2896 iexplore.exe 28 PID 2896 wrote to memory of 1564 2896 iexplore.exe 28 PID 2896 wrote to memory of 1564 2896 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\801d7d9dbf72a6c58c98e700d75e6302_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2896 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b8cf596e530ce2621f8d46af9b85e9f
SHA19fe8bd2a8d86d6776f472e10ce9cd989dbba670a
SHA256fccb3527bb26be5d2d1e617e6781db32b691e2763758a0d9cee3413e05c9080a
SHA512516badb49b0b12feed384345e2deed8602642a6c9100a9e68837ca53b2b95900fba1390a033c7cf6b9f4d975ef8c697c898bf530c4ae70f1f4566324db04b00a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faeb0fe5cb951425a749d92ec155b26a
SHA19e4b0c5959fb734bd8b6143cf3b168ecd0e8bfe8
SHA2562c13be607bf6421eb42349eaf273807f72ee09db15c5dcbd39706aa5e3ab7b0b
SHA512b97f9895b785a56d4fe10517239e29123517f04b95dce627a9fcb3c2c03025fdfa6a74ca69e723dab293bf8b8abfa111261e73af1f70533c416d94e15a725609
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5118ede2d3fcf71cced39885c071dc169
SHA19c63653eb671a0ba3c7a22cf60f4757a0c4e70d9
SHA25649b607b124c6c0bc440415386307f70e22d8b7a4524371144819a5334eca7ea4
SHA512b5b86503ae39d7bd863b323f10c24e428033fb835aeeb325169ec5bb894dba3c7058608eb2e53ff49608138315ac291af1d344ab0bf4e9357aaab2cc727d0ced
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563e16b0cb42b487d4d55e41dd8774a17
SHA1beeb1b11e64f83df26e62a83a0cae65acb42b47d
SHA2560f99b9b4f5a9579c9ebe43cb568754c18c9779a5b04cbd6fefc3421d905a82c5
SHA512ef3f48faaba7e8554ca4f9bd38ed2363a74da5cf1e39ff941fe9cd9ad8fae9ed803242b6424f3300ac97c140aa319e732ca57d2d3eb7938ea63bc65afde38332
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af48411bba26a34c96f64aaf71688d84
SHA19b2f0f954cc21f3af1edd6f89f556ec113a2d8ed
SHA256854c50344d0d76a95c84c16b81e935df881ff3ea16e59ab520cca9ab20515d1a
SHA512a394cba26f9362a2a40b3fee7afc851f75257f9b7222f997e568c358741a4d62baddf72f24046d2dc5c9dfb73370294eb9a1d13f7846d9acbfb975e790bb7f32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51db5d9a69cd7f8cc0c94c1d9351222f6
SHA1ae28c2011bcc2ac33eff53f75127a0a3ef32cc8f
SHA256ae2786745d82bcc1f9edfc19381f85b2df144407b6a1e822e9484c7520b3e5c1
SHA512d0bf6408e257874935913bd4e777aab9e7d724f2df6cb46eefe02f2bd3fc4b8def9d27d50e49ccd4ebc9b96bfa25a423f61ec69c7c6241b4656d500aa0d885cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5877f0f3c2de5fe94224226f43f06c901
SHA1e7acc7822271628ca5849258efd90389e1d15ca3
SHA2563f22df40ac71bbb1029a6938b8eef360bef39ddca7a1d11e5962352bda0075d5
SHA51232375c9cbd472b5c75ca140518dae953fd850681781056c5850acd7c936b05eae039c87536166b24647f8f6f7d07b7b6ea07eb8ff383122ab4c1b29a1ec0b8b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5656760d96b55626f09d7ce363a6ca51b
SHA1c3a13fa6cd9260f9648b6e8ebe5e61eec100f19b
SHA25688779e424e61c63de9317d9d24639c82339ae03e89110cd9a76f7d84fec4766d
SHA512b576e841f6f6d9361817775d452f8417d02d8e95d3ace52fcbcd8d0c0ac46ff94507e1ff550c608e7a64c4f85d6e3f38eebbb4607aa0072f5a3e63654afd7657
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569ad07e3f11abfbe50cb6f483cfd72c7
SHA1f855105a911789c4ce8ea035ceeb3285c09a419a
SHA256567d5283306b3debfe0437f16e055831cad5bb913ccc4f5e687bcd2ed7d32a58
SHA51226c84efd39d12bc8fa109bd7f0cfc8e3aaf3dcc485d7ddc6fcfb511ae36e9eaddd59f06db55d17f2b79bd162071d183255769bf33eb6bb4af0506ebd4154206f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573253535f8a0b5fca97e59239ec14f82
SHA1472e41fea517dccba5c161ad7144dedcc509f028
SHA2564d7200cd71e0e14b885502fe8b6494ff36e39a840c5e889078ddae22cd9e569e
SHA5124dc36b8184265a7b1ea0712b9a707794a6c72547913752bf0fd4ffdbde891e38c39eec1daa31d0115b1038b168c366c4ae57d888bfe507a2e70b2fea535d4115
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5294e266142715b110529aec4396d2fd9
SHA1e6c2a77844d78d239f52c4f3bdc3d42818fac565
SHA256845396d365e1d891020856faea468a5d18cb0411602537a4981f78fae70678d6
SHA512546f796006540b529acbdc4225bdee13f5be6aaae846242eeda8c53ea5b456df1753e81a257f4682b308620c60b1279fc3e1bba01f16da48e9826f72f873fe20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55084483747820eec3c3c1d35c478ac88
SHA143f08e7229118ca492c4c03186743519e9756ff0
SHA256a53017ab8624e233e25b8fdd55fb6d85d7b1618d0ad9c63d3ef2dd3c4c78529a
SHA512f93ad32eda8e1b005a2e947da169b17b2184ba5eda24048a06b62a8f1f080e4e0f823687fecc407c215e1b8a76adf7a4792f29eb8f194f51ee6f1ab6d4565364
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c76ffa95242901c17c50471bd77fa58
SHA1d9f022f9263183453721452681edd5b3bc8f8fee
SHA2560f0d90a9fee3af864197afd076ce3c2a8a31babb00f7f21fead0f3bbc8615638
SHA512ca074fce5ff2f68a0b451a0497afd031a58df4ce9670399a8caf7a434d889a1fc99555f93d9fad0beb400ddddb9a72b29bd17f678944f94ef64c0da9af4cb1dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cf8d166e8b09c98831247b636a8b581
SHA17f183d915a1121513f6275eacb2404682cdb28a8
SHA2562b6c9d824316968eb725f77e08a75e46a20af3fca40393b2a5353236d81d104b
SHA512aeb170364fcfaeb9dcf4f0265fcd43de39ddad6945cf7e6ff2f60a82d6f616f1a225c10b745b20fa695d422ec51cae3b5ffaa1ebbcd3e40d5128a5cb3c75b8bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6d4c32eecc80a2def765a7fd8762f4e
SHA1a1a7108cf89a22c568dc0a480b6f8badda5a547a
SHA256a3e87b3f1c16237d4aad7357b26d44e1fa77e073f4fca9dbb4297adc989c6014
SHA512855caf2edb3d790069332e97dfe185f2fbb8652f45589db87e5c0fc7692a6c770ada16b282ec9c763e8cc633a468b3958ba76769c47978e7365a466cd4a0af1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560741a19c664ce95a64972a903587ec6
SHA18beb3376715b10ae703477cea9946442ad063630
SHA256af78f151bf4bbc841f043a8f3aac3963ae6446142b68678494ef95d4afe883b8
SHA5128554c157b2f3695805fa30f00ec5d6e46e38692ebdc8bc99fa0201727decbc9e7b1095bb9578f0964ee417b179d738a99887491d824de1f031c3bff151e892ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5372b420b1b86f7373af1828093b63adc
SHA11d1f2392c98f249524c5eae3cef5fd33e931422a
SHA2561b8e14fdcacf9bfb12fd5274cfe175bddc89b6b4cc510abb7f564fc308e3c039
SHA5121c96fba6591f967cc2eaea9ae42a8d602a73ef3b7918bddadfa13e04c0c1cfd7edbaffae7e3e8211159e88f1c02d2aafd01d7e2815a1848f3211fce071b36885
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4903d475a7f71ec96d1bebb4b4977db
SHA110c96702833eb64b0af93a82b571b4f363500e74
SHA256e3e0d2415ac03e43897500ff9035a3b9623f8530d8892d03b0c30b3e6fd4b98f
SHA51221a5b84600a948918333c34119726f5e517ca62080dd78a70457f6acf1fd38f133e244fe080efa36208cd5da699d854add68524446978483fe1abcdfcc5bc39e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58819f2ee314632591ebc1e5428c4684b
SHA143b62e1d527e88e68759de6d32fa24fe25b4c24f
SHA2565ddc4567869aafd62c23369a9befd4c592842884046a21d721383f251464f6ab
SHA5123ad486aa0a600c3784fb77b2cefdc4e0bc5337bad525ea83c909b960d3660a537b4cce15c025b0e5f9d4db2367e9f7db1332e8a10d01b8f3c7614b2224620099
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b