Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 10:24
Static task
static1
Behavioral task
behavioral1
Sample
806b22c65899e9a1bd4f4d6b90fcd267_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
806b22c65899e9a1bd4f4d6b90fcd267_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
806b22c65899e9a1bd4f4d6b90fcd267_JaffaCakes118.html
-
Size
26KB
-
MD5
806b22c65899e9a1bd4f4d6b90fcd267
-
SHA1
fb8b48165783e9b97a5a2d0a3a9b5df835e48717
-
SHA256
43c2ee9addf06ce9d5ff5589ad8fafc6ad5a8b4af2e6eae6633c753fa944f6e3
-
SHA512
439688887ce1e6e63af6c38d1bf022a627ee174870ae340980ccbfb3837b9d7c0d392c0c4b45923b5c96c02f0682400b0cff22335d7b15557709824090fda7c1
-
SSDEEP
384:zcyXoCISAyvFnQrCbfSl1u/yNIsfbYvXXZm2HrHS+4VFL0SzVarv4EfQTM:zcyXo3y9nQrmSl1HIA0Xpm0S+4tEfQo
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423140131" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9E3C9311-1DA5-11EF-AD38-76E827BE66E5} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000002a714a902c31411fbcb0dcf0681074d567ac02886c1ae8a90b6ebfd907a8087e000000000e800000000200002000000014da5a90d118591f3fd1697f3ea31be1678e79bd5f57c947a04e96c5b4cf40c12000000039b955afadd896be42ffe4aff53de114f749ff3eff9c7214c25e8ab59b2c204740000000588467863898fcabdd53f56876cd9f9fbff1c675f57666490d0f972e6104362ffb4a3bd01cdbe02fbc6a0b5a3b9dc1edeee821f70b98d2541d7de4cb2c45c785 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60aa3778b2b1da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2140 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1860 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1860 iexplore.exe 1860 iexplore.exe 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1860 wrote to memory of 2140 1860 iexplore.exe 28 PID 1860 wrote to memory of 2140 1860 iexplore.exe 28 PID 1860 wrote to memory of 2140 1860 iexplore.exe 28 PID 1860 wrote to memory of 2140 1860 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\806b22c65899e9a1bd4f4d6b90fcd267_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1860 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2140
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cee9351fbb8579226755fe4b9dd2f6a
SHA1053cd09c059ff7aae165cc892e8f3060ea990a69
SHA256d402b03aa8e5202a55ce3fa34959cf25bb6b709138744daceded1982b0c15567
SHA512853e36727adb39f7b5fb22872634ab25ed3911ac290f04a748a5349af27fcb02a053bf37a1b40bb5706b583d8fbdb73d5036a02af035b823ad3d301f0bcbb5bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506ca3ae81ab80f6a0e380fd7753f3097
SHA16372c16d8261e31fc01f866d278e849f80288635
SHA25671efcff9eded8d43692b87e635790b4de03e7285afec93da441a03564e5a28f3
SHA512b235921b843ddcae7d9c5e7ccb2a08913fc19f44c3a74858154cc4791913b1e303d1cd56f6e088c894f0bb02fd4b9a1ed3b4065034e46a7e75009d1ebb415ff6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50241229498ed86d521ed542f6f97c71c
SHA123ccd34309d2384acc69d28c77635f1725948391
SHA256955655a3b195704d23baf4e4ab9cd4b43bc17d91409eb01b6f35bd7ff93dc614
SHA51215a458b3ca5b50a92b113d3531b259e8af375445f82c60d27b4dfc6d8039ca4b2a02413593ab18ae471e0a6d5000cae0bbe8d53eb673a665e1acb1700aa156d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5789826ad6603c6ec1c21b6974df49ccd
SHA15ee69710171bbd39bc01f150f5f1c8ed7b678216
SHA2562b5bb0ea539357d1a4503c9d80eaf87043d2828508f6d8be4d4819286ddbe36a
SHA5122b0dc348351c398795929790d3d04487fa7d72488108ed12ae964046dbf027518569d0caff8c3e46c1c17c817591ddb9a7d072dd3865a4cbc16c02d34c5496c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552f4e7b2d2dd2f1adc639c925dad6ef7
SHA18385f72f9979d4b783ad9c137f7fd0f66f23057e
SHA25637207c09a1352bb9df42a918c8b8983fddd93c9421ad98762ad5f1839c3223cd
SHA5126f0b13778f74bbbfb529ce28e67b23d3fc70f4a5c3e87ffc6416d0ae2230502e8d285f1a426d4e4ad7eb1b9a0965b45512a0f086320671be53158e8e0839bd61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f43bd01c3f92832caa1902e441f3bfab
SHA1a90a5c9034fe05545e2c11ae241f7a1d4d582c50
SHA2560213acbf51964ccc78f3b8b189405294902955c4bf98fbdc8fa7724ab0369458
SHA512fac7fa81a7f209b791df1bfbc4a20da1e4f26af8b7aaad55c0aa47967d35474ecf9c5804d8a6b8d1892ed3439b2e9acccf923bcf885d84b4fd8f1bd82f223784
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50483bbebd3841cc69dad8e7a7f577fb9
SHA1bdb29a02980609536cba9b5192971f2141f6f0bd
SHA256af90aa6658bb497d07a939adf8e4986d04fe90cc09e2e106b4b4ad5727641e95
SHA512fde5b51eb3e5925d08dd2e128d5a6d25d2e5caeb39b8fecf0b81c4fa85db5e4f7902d7f05fbcee582deaa2ad3ce5c662b438cc94f1fefa1caf83812f211b5808
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc0afe14e79ba7b9dfeb406e0e48fe39
SHA180fc01dceba2e1eaff3045ef2c614888762ee461
SHA256ceb5580a78186dc148992bff51dfb93d71961aa48b44ebcc604eb5fbaf7bab5e
SHA512b199007911208605f6582306b72034f028e95eae35971c74470ecb4ee00abc15305bed31d932595182789a9a96905c78f2e71e4a4d5c634c398afe92abae7182
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1574230f4a5a066b434095145f82bff
SHA197afa08457c089e94ee93be8b889b8d3a5de293a
SHA2569b426d28b29057a9e1c4dd1660d2f3c7aa2f6743ed6c4da3b9af3234cf617059
SHA512001a0e4b4df8930925f45b7ffe9883cae5bcfc4075d41855b1ee95afb8171899d0bd001ecf182a6e5d1a3be00869dff8861fae4a0c6863af1bae25cf8a8fa989
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5354a3f1af481ff97454452f9f396b86e
SHA16690c6a9e16013e316d0b6065e9769b0f9af4f0a
SHA256f29750624f86fb1cee1fcede9c82a9ce980cc326c5e421365702934c6f960016
SHA51270c475d359bc58d36470e8e18dcd0dbb43a80efb9f680a26ccc3d892cb05b33413e56c9fb415b4d99161c7b7dedb9799bc833a85e553523dfbae073dc4ff4d21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f35e3ee5f921025d957896e41a78dee
SHA15cca9a544278c7cf888994b1e3f409f8952ec8b2
SHA2568791daf112c0db11c598cf4ef942dd7104d9bb627c8b15d94d031361914b9efc
SHA5122cbacfff602341df7045d652dac0d9cb12fda826f61142e43ed70a4fb5153f9775c6c90329891d2e308c0c209149dfd8913e4617fe5e2bc78634c2b27bf14bc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e2a77c5ffd1c408aa67546ec17c00c4
SHA1257a775d421f43196a5dff6a5471e0c7a821a112
SHA256124d8b3cbd917bdb57208f6e5a9192e63d26499d279d0539f4d944c3667abbd2
SHA5123a7b5ad1de238d33764eb0ba1f7ab339e280c31a371de865a5893ebcb1f24bbfa58c65faf482b980bc72dc26fb0d3ccc1583ac62836378e08178d04597ff1d57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595477c669fc49d71304b256df07ada23
SHA110f5e6aefc128f0536df2f0f9a0c02069da34e48
SHA256b30f41767eb57c73af61bd34c4bdbbc38aa6ceaf57eab55e1d0d2c1f56be43e6
SHA512553c6977877f3f0614d2cdc2ef2c12be149d077616c21cfd0b177739701f2f5c8845eb543dca8469a13b449474ed78f26a1cde305fe7027f7ad879046a50242d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b67d2cf100014107ab12ef4f81939a2
SHA1615e707cbe6ea0149c40f40aa7f9cd17e5194080
SHA256ed5ebf8cc903d09ed25eba764b6cd30685bf1802a7a0e3cbdfe93287864cd7f3
SHA5128f3a9dd9ad45c058f7d800ff25cb675c255d3b3554ffdebe6f88ff3dc3e90b968eb33cae064d2d1db90b7f2c9e35f6d73d5e67768b1287afe934051600537c1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c79198a9bcbdfe2ea63ae074c9bab324
SHA164b2b85335e396cbe6991486d9954b68b13960ce
SHA2568c4e6d493a3f68d4f7a8474f48af3352024950aa1b463a00a32a725d0609d237
SHA5129e8c689748238ccf60466bcc5170325ac581fa5609e6cd88543545a972962357ad4ae5517dcf54e5127b5953fc3847ec218b886d957dc1ab1cb48908f6593f10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b75c63eb20a804c9a3d39565b39be72
SHA1c021bb99055bae9e33ea44ae977906e416a1ed4f
SHA25682d5792e78c786acf8823644c795130db1d54eeb94f764e8b8c3d4ad3134aaf8
SHA512a6224e638373096bcfbcf37b9922d932ea30151ab9f17583541d27383c202a60a9d83f59a7d1d95a60182a00fea8f7e8ed070aecc01b7ade5f8a94b56ef37d15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5707eeae7dfe88cb1a2159e66fc0ea95b
SHA15acd8da4383c8a9c46da55c5f266a64233970e14
SHA256923fbd12c26bc50c4326f73e5d3c865e063bdbc1f98f856b6e779baa0f7d438b
SHA51223def904246676bcbb8285589c097b61b5c5aaac54e6c99141458d2804ca0ae7c3642913ac4fb5936eec875911f160045b2f23a4b831c0bbe4c6c88b39ed1ab0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59273e801db16c773f9d60b17875fcfa3
SHA166231f0b2bc1cd400822adea9546ce30a5dbeb10
SHA25619bdc8802b5966dc902c06e31e9fc278ef0c4a62810745860bd49d2c3b79e10c
SHA512a9c590d205468b9fdd237416dc5017d3948d9b93d8b09c58dff50ea94b58f5aeb7921fe69d954a4ba87e0222bf52427f36f8e1aa1504f948d8ac750e97f53b3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553379d2f1aa781b4189538cfc4949af7
SHA1bb37241ccacb728462fe80e12322b6de36c59f79
SHA256d287973049362336db7320647a2831452c3524f2680b52f8246534a82d0db9ec
SHA512a6e264069154adeba4aef2b51dd9d0f72b7f3bb9a6844cbe31e52d1a9a825739b456488ec26fabafa1f3323dab09b154a4749c74049317bcacaef353e6edfa20
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b