Analysis
-
max time kernel
139s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
29-05-2024 11:42
Static task
static1
Behavioral task
behavioral1
Sample
809dd152637de0ca0f23c062cd30519f_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
809dd152637de0ca0f23c062cd30519f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
809dd152637de0ca0f23c062cd30519f_JaffaCakes118.html
-
Size
13KB
-
MD5
809dd152637de0ca0f23c062cd30519f
-
SHA1
d2c57a6379968ec9d3a7121ac2e1ca509c5fe6f8
-
SHA256
6d28f546c172b9d33a66316173de0e08e0a14d1597bceaf1742bfa8c2d9915eb
-
SHA512
365b2a3cd2a4e8fae201bda118f01c0df019d4bb3a76261257926f169619c744dbfb52d1d83e56a3125412ae1c4dc170f59a501a8a1a056b51d2b8dc1e269616
-
SSDEEP
384:H/fg/4wIrFCBmtyTzvCX/YHeleR5d+EXJ+S:ffg/4wIrFCBcys+d+qJ+S
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000058b189d4e068964dac2cf341af393ec9000000000200000000001066000000010000200000002a6eb8273214b7ee1f211ab4a17f84b84ad01375588310bdd708d91a3620c473000000000e80000000020000200000000a7b7ef5733c9da75e2e287c14587fbc05b4164515a43b6617edf8dc10450c8820000000a1697a40f73cc222a6155473cebc2498ee1838219c35ca663060d083fe9dff45400000006973353be8afd495f991b90af03ce436af78136e62ac081a51d6b17b6811b051e0452fd7b2017f380b5143fb199c6ec0580645b2e309b546ab55d71db5109f47 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423144820" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{890ED921-1DB0-11EF-8F92-565622222C98} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70b4b45dbdb1da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2868 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2868 iexplore.exe 2868 iexplore.exe 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2148 2868 iexplore.exe 28 PID 2868 wrote to memory of 2148 2868 iexplore.exe 28 PID 2868 wrote to memory of 2148 2868 iexplore.exe 28 PID 2868 wrote to memory of 2148 2868 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\809dd152637de0ca0f23c062cd30519f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2868 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59699c9af2ff4965408353eb6257311d2
SHA136908945b338b844677bacd6e9a83124d953690f
SHA25676ff0f6a06c84a8cb05732ab7d545e1415886cf13a3f2659f9c664efae95058a
SHA5126c4032b96152c5ef9434e35294d67db3f031b463e753ba63067a1a14773b029c5800a76ec17eb21e4a58503bee535ed743fe2a96613895952cabd106547aaa50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b33dd43d41a2db31d51d2f26eab6bbb7
SHA182d5e867e4200d446028c3d2733e3ef222e1d4c2
SHA2561461e20cee070bf14874bf63950a33e8827d163f6d0915b999405413f4d0ab1c
SHA512e34c149a97eed3f822df10734416739cb0ecba0c7646d8a3fd41a97c104779ef6b26aee269360c2ac5375ec731aeb0096652e467ea75e7fc6a0d3af76bde2bb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532b7c29ba08f0b1ee0e611030feb4cc1
SHA13178aa146cda71621a2d5b6fcaf6bc33a2490470
SHA256b801b7b044a26906a7844b56132582bc00eecf0c4eaee1299403e42e18448718
SHA512901cc15f4cdc07f4f1559811f2f95358be997d78630c01fda12c91458b7e2fd4320c2d7efe966708cb77872154efbb707a17a1c56fd610949216174aba748328
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52890bda3f651a31f9f3d9bbb601c74ea
SHA1f065333adb1e53ec5efb0345d73a3f8e2007e6c0
SHA25643ccad455b929a6c812b81c35f5147dfc48c0ccf8fa33d4a087605312a36fac6
SHA5122bcbc0d9a56c51ba0c93d2d972dd9e5e799d1675e62f43635a52664fdedb0c7b1aca1ff39462a0eca0d8376abe70cde2aef93548d9c5f15396d3118a8e1f23f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5007b0f7ab76e133e08cbe8a6bd87eae3
SHA1bcefeb8b2c61964049ec9d1d7fb21daae0278ef6
SHA2560c50f612ea475e99faaa18ad41d765ce69d0523477cbd8d0ec3859b4479f19a3
SHA51216e6629aa86a3af30b212011a9f00cfa1dbf6949a718ff2251f150b60e0ab750927a57f9aba5106495403d1179041725fc82fea4fa5bc1e39129d7dc3e503c1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b42692fb7ed88ed5a519c63bf4fadb5f
SHA1152b1b69ec61112f807abd3295382cd5a700928a
SHA256f6af0999873f0737821fa8743ca587d67178832c2a63584820ae8da44fe3956e
SHA5124fb8d06760c6dbe1366212af93b070019962884828eedce6004d85234caf56f2d2e796b0d7a53d077ea2f47dc1b08fa201b1445813e1b6edaaaffdf50a38d578
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566155c92f735a01df5e5e50dd1035e64
SHA1df5c32d2a7ce3a199b07bb95beb094d57f4a3efe
SHA25624360e5d6525b2e4567e3caa7d4505dc993580dcb3440157b0f033cb9c3b736b
SHA51271fd14a5db6d1f42ee7efd2665416bde8e3b81816273f7379b976b6ce960e584f362731f22c1b479fca5fc9dfb502c2b3c39b1d9cd071828464bf15f7a6c7a4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522776a2201caa87e1bec5e1cda05c388
SHA1c598b89925438676c61a5b2532b11e46325bdd2a
SHA2568c5b08a3f332411faef8ae400ec6b5f0662f259e22d3de25dc1f399ee9e13e58
SHA5124e89c9f169dc538aeee4e36720f34157b5fcf960cf2d71bf45ad54a0cc4fe3bd420cde361b862adbc40c54e806c4cd69991f74242319ae23f41801b7ee2608c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e91cb6bf146c0fefe398b4bbbc97ca89
SHA189966fd2fa0dfd5d1255973594e54c2435b062a3
SHA256aaa7409d2d12a3823701230d8ed40ef74c5590d5ec7d0718b5017481fbfb0a09
SHA512ba44687a6d84bc6f3d9aadf4751db0d0c3e00cf60d59d003c4dd668e52965d8bd2d3cd5503ed43587c88a646eed8cfa47367740a9a72dcffbd5a941e80863137
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d245b9bb853c83e6378a4147572c436d
SHA1fb2542c86b205470175b3b7f093efda7b5ad05b6
SHA256b898a43142e64803d758207c4b5cb773461b3ba76f48ca3e0f8c55600b25ed9e
SHA512a18dadb25cf5909fab4aabe9e54f934431f2688af982e71e83c129cfe7bd5ed98a70bff6ceec8865706f693845b5311c6957ca1df0c3ba6335d0d5720caf05e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1a9f58ca151359898c0a2cc1928a262
SHA14fdcc496fb6a2cb191ae3db289fc635eca71b446
SHA256015b8abc4a50c68e524b8f813287cad73f264f602f9f1310748c3e0991f929ec
SHA512b0a5991aa9482bd266b36ecebf2015b6aa88d7b39803dd00fa0f40622ff1e4e7a0e01501b9f68e526e6ea3ccf1155bd80b96223eed2347b03f68516bd9204963
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50450b6ba77bdefc825985299dc4e5b24
SHA1b7bddc3adc88f7d5ae3160347479e6c02d4cc35f
SHA256f8ffb99c65c144f8eb5331dc012805d061166aa7d71e8d993d0c23486de7e53e
SHA51265ff75ba81602a36f6c2a23bcb61144ff266593263d83e09aba0f05c604c465b84e5cb78a556dcced244ecda6ae91662ad9c32003e1d6bb66980b7b615d5ddb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b7ad2ca3019d04d73c3e696a1e7f794
SHA17182f3fff70056610e61b6458cf4e597ac7c3abb
SHA25690054d3b5ca0d90b25d8cc652ad407dd725664b9933172e6c6ee5ea46a4928b3
SHA5129ea7db35b133f25683b983920c5184866bb94bbde2877a43abc6c10ee8baf751db0e6fd9fb4c01f7bd0fb528e1afdf71044984f0cfd6088e2d54d29ef375faa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfbe9f4d12ef12b2bab0d53227e9cb7b
SHA1940d67b55595273274fdfbcbd8ac69a8b521adf4
SHA2561b8d891ffe2f36b1272ac527128aa7c04ca88a773c7afccb2a13be340aeac726
SHA512d19bd86348621613f89b52785346762958b6b33dd129c34fd703b8a33040aa29cca78b22081ca962e78d6b952a33fd3feec359ce129ea27d7f5d3c51adbbff70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549e34c224a3749c93fb0a4e94ec36fc9
SHA122b2a5a0e6e091b510e2cb04c5882959a9dbe02b
SHA25620eb5edc76dd49bfbb1bf1cfe5c5ceb261627aa9ab420dfcbb896d977bb5105f
SHA512e542269dbac014ae81f6927df36bfc0279fd4d20a7fd4eacf02ae6f7cb20206b5ad99f8e4d2e120011966a1dcc3a2f47bbf53ad5016495343eb71c9114843d04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5253d9dda1ff08213c049c2cc066d7d2d
SHA12dad50c5981bf4635abda33373151101cac71e91
SHA2568552a2c7d0af4d7e44b4ba31ab0e1876199dc06f93a7b625665464c2477dd504
SHA5121b36d46f96e32d9d4d49fcc70e5016417ddefd2689f4a563d6cc306b6c2beaf2dbb6df7b99a27df6c143b8b84ebf0f0fac8902a4384f9e0be70f97f75005861b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590a210a8555e8f62c71c76e6985f2e1f
SHA18820e4081bbb29ea60bd96487207fad44e8b230e
SHA25669ee0aabe2696b16c59133e7d56304a92b6b92f492ad90015b92e89e5d23158e
SHA512112e139c4b158d7abb4e04ee73c799da874a5995f34bcf3ae8e89b5917c38d53b9e369483bb416b89effa423a25563e8c3014443f59a83e32139d754084a88b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0333298b3b6aea32b1c2e05e5eebbc9
SHA13dadd1563936b5858b0fd3786549db67d2ef8c7c
SHA256684387d9a3a6e74bf43db1e4cfecf836958fdc21e866efa2cc354e774bb295c8
SHA512c33d81fffdc02b3fc0dee7889e9ab782efea2d0ed5859bb45775988f8f6ab07df66d5ce168a033408a44cf0d0118251a38dfe5e79d444453d04ffd54012f65cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b8288c60225f4bf33808d1de72a7eff
SHA1542ac6ce9e6a946fa9231c85e1ab0d60484db3f4
SHA25630b067a45d3f759694d99be9831af5caabfacb299f153165570cb794f6417356
SHA51257fb44d08e9d18ae5d5ac7c74d08b66fda791709969e540afbd297cc0466d6d38ece4c33b360c6ea751f02210c91ba034d2816d3d5f7218e65a3016143b24339
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b