Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 15:26
Static task
static1
Behavioral task
behavioral1
Sample
81315906936d70e560994b8e91d76cab_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
81315906936d70e560994b8e91d76cab_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
81315906936d70e560994b8e91d76cab_JaffaCakes118.html
-
Size
12KB
-
MD5
81315906936d70e560994b8e91d76cab
-
SHA1
c6522ab7086e6ba8cd225184dd9287a7bd40a4a6
-
SHA256
43cb7688458d4c3cce522cc88255f6dc4df4b63d2986612634feb216c290d3a1
-
SHA512
45369058e5ccdd79bd38732cd046cc07f3ae6f7078c635ef7a83bdd47b6b3081d4237279f46dccd096df2c00a3f484842c17664764a5c5227b1b4593b152a3da
-
SSDEEP
192:EduEL0Crm0N0/eqkMZxBK4KBes+7WoBQ8mWuL:EdObC0/eDMZxBuBes+7WCQ8mWuL
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0e2a5b5dcb1da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423158280" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E0717371-1DCF-11EF-8356-E61A8C993A67} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000375bd5c2b03d3442bb7e89ddb7aba55b00000000020000000000106600000001000020000000c88726994de734da1a346990868c09a349975378a971d6b6b13c0a04fbf67fbe000000000e80000000020000200000003b0d7acd369cc48b92c43fb3cc0895a535264d88207e2332d45a3e42d1454761200000009716ae9e1ce4bd0be0df7d21ff60a4b9fc6e5c9b826baec8af5d5e6f372673944000000087961596aec8979f20f8e49edbd9b462a34e5a9d5d00d335f5d8b1f5cc39fa2e6592810ffee01e90ca25cc7466fadde2ef9713e47c37c1ce03e718f6f6c81041 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2972 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2972 iexplore.exe 2972 iexplore.exe 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2972 wrote to memory of 3016 2972 iexplore.exe 28 PID 2972 wrote to memory of 3016 2972 iexplore.exe 28 PID 2972 wrote to memory of 3016 2972 iexplore.exe 28 PID 2972 wrote to memory of 3016 2972 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\81315906936d70e560994b8e91d76cab_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2972 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5878f8d1387fccfe530e5c01d84b5503c
SHA11964cd1bf2a080b5b588f240310f014b84466816
SHA256aca27a46d22e6d26f0d8d4ad82d0f24ba60774897f4f5dbeab6f8a330d130868
SHA51229d1ef19943c32cccd30164a3cea67578602505124b728ce9e4abb02ef922dd3a2219cc6f48a20581c796be9ab50a48de5e7af3229c6f865a67adc19bf5337c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519d39bfe1f1cdeff050cb8d6cb97293c
SHA1c495ea53a1acc41bc6568729d95d6d3615a8741a
SHA2564c2fc9038746c111821f266e401cfca6da12947cfad8400e82f91b1da36d4670
SHA512be56bc55c57de14e8bd5ccb087b63a37416595cb02078e8b55c6fb1a00c350073c72e0387b525c9e46ad69f27740410f0e2e1c6dbe5e1fed583308d116295833
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53181b284633e6286de0697091aba9cb5
SHA1ebbacab5158cc3c6de7905046d05b9cdc47f31aa
SHA256f69b2024bfddb9dbd58ea487f1dcb7a4761c48331678c391e04c4740ea59ea91
SHA51247d23566a1059aecf7b1b82b2005cb28299e1e9c19d90ca8bc491ee1829daf65bfac2ceb2b3fff58e6de3d74aa8cc02398f92f1db61eb3c665f218b372883aeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dff92bde706e5d2e665c576dbd1c32fe
SHA1cadf162389bb2d74eb4aa3b3aebde731c840dd61
SHA256cb6b0de522b5b2a8911dcae72274ac0af8fdf9fb61afc6245e06992adecd5fcd
SHA51201bfcb4987405c3e93a2f9d0f4249fce4c75a9d3cdf4640ccd2330b8e40a8047937e094c45050679418793c707b2cb2762563dc1ca322dc2f05af35d103b966d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9498bb29410008b04a95b0d8357c01f
SHA1d5962124c4ddd1d9360d10028aae795acbfac4cf
SHA2562173b532011f078a8f739e990276fce63e31bc4cae72c415df496c0c2e28f888
SHA5123a3aba50f7c2d5fae89c4312f6949afc32b555b432cc32ba7131df7767b69965e092cc5dbd82e3ef11d1780e3adcf129ed8214f9a1babb292ae6feb8cb9a16a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5852fe2b6de660189765d3a7820fd3e6f
SHA1a34931611fdd9ff6b4e0c03006bfa278e2dea7b0
SHA256d21c3e056ee65be29550046cc6e05f6a2a64d82a9d4d575757854966e5fcf871
SHA512369cf958f394d11d6fa169678912fa16406396cb941b8041bf4dd29b8921f485276bf1667efd4c77eadb7c37d2e46b7120c8078aa4c9fd06e92742b4a279f25b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538c4d4456c5e4b15607e479efb6b2d1f
SHA19f36f49d86e519d9d78b55c4cf52efb6823a09a5
SHA25686056c9c034756bf9487b68911b79c9a5e27585d23977f824c9caa6e5878b04f
SHA512aa8dc8b13483a17597697308531f7c732212fe125641614eb1e2358ea37aa274af520d37c90e786472cadc5cc59fad0833544645e5ad7f0b301e5854a60db7d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7b8652678f534c5ab458c0c706c96aa
SHA11cff6cfea7952a438649285f939363e794391f71
SHA256d2311957e40b45360c61379660c46eb1e3609014a36db788dd8c8b0c915bda33
SHA512850e06fc8699ed2a4c95493a7a3959c7f60fb932fa24b763a2b822b0c297f37cc2c56b4009123cc9dbf1edf7a464d35e19adcfd7a74ca6fb0d8c15505388f3c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58956ea135000f5dc537b2aa87d4c1ce3
SHA15607c49b741a0930b70509d2afa7967cdef7d8bc
SHA2565d9660c0b50a3d21b0f58468709e8bbdba1e105d191baed093a3ac66585404e5
SHA512a702750a4da02e93a4d63af91b8ec95a1c30ceb7aca2983227db3ab3539b242ff5db54326346b095ec636855315c896f1327fc7ce4871cdac810591f7af88f22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558f7777aff291aa9ac62953fe7a294f8
SHA1c6d9111d579f2b682c17db3e1d6ad127fe337dc8
SHA256d078c3cd985bb7330f9424e22ba3a7885c792c1a460aa319fa6aeaf83ba2fc5f
SHA512713b536e7fe959b52d2cc594224d7322b16722a24610754156d3c57759c9b73241cfa6ee7addeb074f599905cc6e0cb59d2967aec3350047249794c19bf9709e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e7076fbc0310e63a6a10e8893070cd8
SHA1c5b46d91907b476b547d030b02f350040a005196
SHA256978aac41f69351b9c35f9a2474b0f17a9d4dd96cf35a0a093a94c8c99d62ee5d
SHA512d8e7540e266ab45ce96696a7d5965d552fcce056cc6b8d17c7d0b35e43283b123305910bf1dd16d78491f93380df78605b1eeddf865e14bfe8e497dddff8dbe8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541fef47ce36c12aca623968158667a81
SHA1a362a7b669c0d281cd5d253ada94d0ee24e063a6
SHA2561babb69f506ade902bf1c7254dd25b552a75998dee60263ef5af1104196c546e
SHA512d547cb2fe67e865b7409f493786788297379a4f5c1fe259c1061d818df42fce7d50665cd8a7b3ae6af2296ec48e3424c998c94fcfcdcbacce136fed0094a5ab2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b432e1eb2b9b6af276617630023b7c23
SHA1c216f279059bcbaf95be9e4dae9d6e6190ad80cb
SHA256c250ef6e2405e6ff5c3365fb990b7ee848468cd10d9332763061018e81178754
SHA5127e46e7b6b1cf71ff1a87f16c5c000bb84d1d2369124ed5e5168a093fab68cf43077420af1ad6689403f04c0509174663b810371d4a90361ab59b6701a53f5e22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55460e3b4650ef1b859e2b8ac8fd7910b
SHA14dc089193aa640c7aeeaece57a6ab39a7b178fa2
SHA2566c18bcd830b467b0d0a85156d75fc49a839623d1f8b06e161717cac9245b1938
SHA512d425dce45447a5ea33b1dc22cfda9ef828451813a4ee8c0fbabc144823ba96d0ef280242ee25d3fbd78c33bc7fcface092cf9bf0ede16606ac50fe742f5d332a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56358cd6a923f4603bc44ba663ef310c6
SHA13f4fcf5e30d5ee31243befd9bdf1326e09da4686
SHA256f6aa731556ae4acb8f865c9060c8d3b456aee2fa6c697c6d096c098998ea7957
SHA512d4624cd8066518221cc01e95ded46d7b1001610ac1634e836e14fa89a2129be8f027976f45022b42d7f542b7553f9aa0d0fc648c3c0c65216356fa79c011b0a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ebc84680e68faaf4f7ff42bfe4393a1
SHA1478fff6e778be3387f5be38e5576d1be4a31421b
SHA2561e9f4a90debc1792bd96694d6879b7225cc399ab049a24e49e57d11d356c8ff4
SHA512d31cd18d50e2877bf2f236edbcb681263a6e35fe2b0e00b74327568e0b75034460624ebcc9083b90f01f8910303ee621b763f60e43af0ff8c2b74aa658db8482
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599d9dd9d6b48747a6b7edae20cd4182e
SHA17c7125bdc2b23cbbafb5fe58d4cffddc4dcabac0
SHA256c9befce61a448b74085295229dcf999a21092977b2e4dfaba42a149172f0d99d
SHA5120e31b62a9440f8bf67657d119dfa42896e3edf7b2d9aac7aa3cee09b703fe881dea1e442fe97443d62354168ee2fe023199bf4be35155e3f76b57121538ee59b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd95c8d005582dffb4239b1690d76a87
SHA13659424ec7b1a09493adef35fd24ffa5255fa27e
SHA256eb28df6f1dbd6fcc23ba77ba730a067e0f2d893144526634a2c4ae75f9d2fde4
SHA51268ecc7273564a8dffaeec9fe0b1fb8483045a0a34bd66ddbae09d14d58eb71ae7d4e14e91f3350ef1b444ffea87a5a739d9ec4535d8d7ef90e36de24f31927ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508e243cda57162b4ca5d98814691c426
SHA192c437b7caf22da2760d671f47ca77978348e6a3
SHA256fee7ba37542568211010c6a220f834a3046cabd5e6f425c280de55a34aecff66
SHA5129a05b028d76efcf49863831ab22b109ec39d5d30d820b58d12cb43b2a362ffcf760c0007e28b253ee9852bbd9e92f5da4ac2f293f5fe5cd2fefa3a8852115073
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b