Analysis
-
max time kernel
139s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 11:00
Static task
static1
Behavioral task
behavioral1
Sample
80835450f9ad1d80abe31d1d7dde8882_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
80835450f9ad1d80abe31d1d7dde8882_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
80835450f9ad1d80abe31d1d7dde8882_JaffaCakes118.html
-
Size
67KB
-
MD5
80835450f9ad1d80abe31d1d7dde8882
-
SHA1
a6a61f27a2ed7bdcbc3867331f214779605444ce
-
SHA256
ce41807511bd4d241f297e47c95faf001261f8c1be78bead3d895150fa5efc20
-
SHA512
34871883e2388dd4a3a13ae7204bb7615a43901f720b3be5ff72b9053f324e0797c063664a5b7e500debe49b301dc521cdc78e384db356b9ff515243442c04eb
-
SSDEEP
768:Ji/gcMiR3sI2PDDnX0g6srq6OuGtDoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFf:Jd62TzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60290770b7b1da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ea2ad82da54ce1408930470d1176b6e300000000020000000000106600000001000020000000afc7ae15c7e215c24da6ac65a8bffc0c13a6632af70857f11ff39ca017666105000000000e800000000200002000000078d8d809c7e532e98ba7d27d550900530fa61539ede7cb51fcd6bdf9b56d970620000000265fa4b79c66c1bf072cf5537cb2e5d675c4f28a5a6cb0537e41577232ad5a16400000002d31438827b653fd92140ab908db32e8469b42b9d5cdafa2c54b0b12ea6f4040bb6ab965816526ce9a860117be09abf2e5528ee21598d6c9ad767d5dae2006b8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423142272" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9AEFC791-1DAA-11EF-B0F7-6EC840ECE01E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2312 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2312 iexplore.exe 2312 iexplore.exe 2512 IEXPLORE.EXE 2512 IEXPLORE.EXE 2512 IEXPLORE.EXE 2512 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2312 wrote to memory of 2512 2312 iexplore.exe 28 PID 2312 wrote to memory of 2512 2312 iexplore.exe 28 PID 2312 wrote to memory of 2512 2312 iexplore.exe 28 PID 2312 wrote to memory of 2512 2312 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\80835450f9ad1d80abe31d1d7dde8882_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2312 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50de283522dc6a5883a50bc68b766bc5c
SHA1aedbde57e09f25e255d73e7a77222faa67b2b394
SHA256a43b809a361e9b6c9614f3faf0f8dca704509fa432fac9c953736f2f0fbdeae2
SHA5129cd0e6ad05575bc1f8e0c3517ed442c5cb69d1a64b7aaa5b4d5bc4bb05867bc55362532944626b78e1e8b276777353c627a63e226c3f812ae29f80c0149b6b38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5987aec517a800d9c37b14f8e16e801a4
SHA1b2fec30e3d265857588da09aa53723fd020fccfd
SHA256bdb3549a0985156474e52d087f0325f92edf421c3ac5d2506685927e11f238c0
SHA5121852298c73c347be829febcf98e25323cc5f6944e99782672d7313424a41fa08e77829ca3e8896fe7610e96bada15e9cc4eda4003f52dea03ed226350df3c828
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5755216d1a74c23c431fa80c6a42a2cb4
SHA1385427ee425f83c869dd09f8864aa7753e158c98
SHA256130ed684427e090c674ca3d13f073cd85d95348b68b64e979588dd6697a7764b
SHA5122541da5b0d19a5cd5e0a860e118976ce8efe8fe9efca54e56887d87a3d06e68148ad66c814f2172c60464d6e43e58e0e37deb05364d711477a58a261e22fafcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e5187e6248a7ed9933f3e7355f74597
SHA11cd6aa3cab6e28a859e383922491c26aa8a2b3a2
SHA2567c7281e41e7bbd02992dcc2f7a6b80d8789d2b6f9daf5fd4a946d85ecd49da1f
SHA512161b22ae11dd8c33e5767f162f784001bf5ec5dd2b8801ca727c87c7d2f6e641c3e2d9069313031536c425392412d939699ada2e71a818969f6ade6bca55e594
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0b7dcd90149aab810f23c1a2b7622b0
SHA11858cdcade3ec6959eac33b1def788d5347524f3
SHA256f93e3bc6d717def37a162bdb6575105ff2ee7bed6e60664d5c0089303c9e7826
SHA512c098f25e0c11fcb2f10aaf659d1024107c22ffb05034fb98d76d1d4c429c352fc45d75ecf8be41962d232a0022dc43ec429c6b320e2482cc52254e340e6b3f11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f587583ba9ae681f8282869f98551c48
SHA1261c1db62f936e84ac7426046fb7d6136037db07
SHA256dfb4e47a210331b11754fce20eff5506bc7506c6018f5b2baae8834f22ce5753
SHA512791ee846b44c1cc4f6ba06f5e04659e75e77bb8b4f10331dca454311269fee572419ed49f6016d81349c87a88e0bd57b7dc8d3c60a5a5a6dbcca73c53cf4d70e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53878c6fa2ab1a82172e280f71a909f16
SHA144d5226f1abc2c0643566704c8688bab668a8bc9
SHA25604a3e19a59fe54a2786e27091e3472fbb51a3c9071dea3b2f58c5b9194824ec3
SHA512fe1e13ed9a9bdcb33d491b116023b6f67fb5ad3b0a551f74ed59750b60f0b80d5f8c4baec9b7e8d845e990f95e7ec66c09beaf0615b5905cb9046e6ba91e9f92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5884531e314c5fe0534801f63610c36a1
SHA1cd53eaa2d3e7b925a1d84e80ded41159c4e2c9eb
SHA256362796f7052b8190794f8c793471f68a98e4e38e0b9c07c734c0644e9655ae0c
SHA51289c46e38edc16db7a67aa14905b2e2a37ae006721d88755f4822f1098c6fe7db2df875aba8ce68a17d52441017f84433a3197c9e817406e12e9c8fecdc4deef7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb42377f98e88f6d5c0299371f243c47
SHA184068473a4d3c09bb4f65f846b2ee820e023dafa
SHA256793c515739b2eb5316c509aa7a42bbecb7da28e92be03f9b99317567c9fc3ec6
SHA512f96b91b6c7a5c067d125c388922e08d9609dfee77429dbd3682086fd9356002a3825982190224ab843aa5574a015d8423944b999e24468ead103fab059752f62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52df5c5d2dccb80ccd09ef52760e4162f
SHA14f66e35516e67bab936d751eee50d8baa52439e0
SHA2564eb1d2456701358811426966f384bb5b51cc8ff860cf112f1e0915edcfbfec4e
SHA51298477a5efd97595d4e314650d92086659a93c2014a3b9071a6001b42b399d64e7c94b8cb85f189f70ed457136e83505d392451bd84a87888ea69008e1c0868c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f83dce33ae0c9c133a314252515b38b5
SHA1febe1c55aa9e4b34f121123e3c9ab21672b7725d
SHA2567e05010c8f6e68725a2f483e3e1f06286b717fb38d5ec07c2c0a1b04b700b68d
SHA5127d9b725b04ac90c0392c378a94f3fd1f6a375f5337334a36b3901aa9d5f2486ea88661854223699a990317963d22b88a3659d66164e9a4c9a283a16c3b25860a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a49640dc6556a1cf6f77787ead014219
SHA1dbdc851090bf34469802f69d8d625e06f52860f5
SHA256bf1b8f18c2a94564007147c3fd9d8c60de5ddda26696370339e9c603623f7a53
SHA51277e87c9e85de23234f10876c4fce5ebcb173af571523c8ce0b7dc656bfa25b929fe804aff8ad0bf81d28f2db53af59c7332c4542eb47ebd1c6aa435345a57e78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db612488fb92525b69091a9cc2898d62
SHA1d28909b6aedd254811ff4d990a342eb9b0832996
SHA256c691bbad6c359d6dbbfad4164b9ad545d48cbe83f468edb56bbf39e6d901ca19
SHA5121544c713c9e4c63026e1adadaa288764e363ba706ee8cd71afda14106369cbcd4f1b87b552b26b7ae2ac006331f2de3675cbbf56f0d1de2ea80068c95f952f42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1643cbcea4e1ffe1ffff3542bc5367a
SHA1cc0f6072ed9616dbce9422a1b46958f1860b5c3c
SHA2569dc3f54c2a361ff174d8577b5919a1cd183db720ae9c11c580a8f7abf15f4ea7
SHA51247f5fe2c611fb54a3d2539a2e1ed27c0f7ad6990421dae6dce08104af3fdd850ea1337b57db21d112c7dbdaaf7984ed955024da10f2bd3306d56a46ed1c82ad1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576397952bd254b15b9b5583ad7c24177
SHA1cdb539f3b75841e73517ecbdc005739363d9c885
SHA2560d5e8f13425251654af1a9b143a6780397f897dba89b62be9057f948d1fb2ef8
SHA5121bedb60c079f10ca5d1a1e13bd15145c127e22a1d86fd517fa170bcdea897c448e821f64a2b1804726103ee1186b94673737402384bde6149011587eb4e2c58c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520add540158aa969e4b2fafd4c39fb11
SHA13d96c8bf0d88771e16238157f909599e51cd3029
SHA2564cc0153aefbeeaafed070aa88bc57def234b666b7d8c3ef46017530b4cdb1bf9
SHA5128e39a858269376d0a6c38e76d028c942d0da3dc52fe82b20fe6f4d457bf8daf14583031de9cf3d896c4728c776ba36e64e1ccee4cf4c5b31106afd3038f5152e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bddfcb2d20042c284ee353481184f5b
SHA1dfda31c2227d985a0e57cedb4f579ef7b127ccfc
SHA2566ebe7b228b6cecc1df3968ba04e063ab611e420a8ceb4c4afbc48a79559ae317
SHA5120e73d57fe808c54159a1003e3531309a10f1c275fa1b58be0cbaf135263857a4b72569dee539af5264a0523fbb732966bc4d7e1545060f7b2f695bd74d236c62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f396be7a8f21cf73b2d0f71150b8594
SHA1f7fb93249a2a0eee748d117b79e0ca4acfdc7179
SHA256783750f6be50818f6bc6fa7bf37ed9130509612bb24c4b6f73fe593a4aa25db4
SHA51274bf5f0bfef4c6ffe620311781249cf7125ba97473d6ac29bc0f70421b2ca87291114896039b344c7224f4476c1e45702fd2a85a184e0ee5e8bc547c4085914c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3940c6e665de43be7c94b2c6840f007
SHA14bbaf947ecae8cc6e27e12a509513983ac2a8b92
SHA256c1211e0b1c727e02322e88aa96cf9111addfe5750cbbe8858d9b0413122489b1
SHA5122375c7ec2df28b138a8f8e36f406e02f32b6f15d03af56a641410746c9395bc959b262d2d2fcd0f4553cf75cad5490a7290e049056dce71edb69b9763413473a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b