Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29-05-2024 19:43
Static task
static1
Behavioral task
behavioral1
Sample
81b0379b97ad5ddc396e9b29f155ce30_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
81b0379b97ad5ddc396e9b29f155ce30_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
81b0379b97ad5ddc396e9b29f155ce30_JaffaCakes118.html
-
Size
4KB
-
MD5
81b0379b97ad5ddc396e9b29f155ce30
-
SHA1
b63000c00c3f063001f079e3b98fecfa050343f1
-
SHA256
f6bdd9ec2504c23f9f7fda8d2e3cc8f9ad71f8f3edfeb79fafaaaefd85f0a8cb
-
SHA512
c7ce53723b7f8e7b10fe24afb646205fb0f59f68f455367b4eec6581f6cd9248b367a4c4b1f7b844c2f8d5c562eeacf1fa1f04832a55844f989479cf4e0cd355
-
SSDEEP
96:492NuNSvNB19VEQbuLSbsaiJtg4q/gpp6e/ExJ/d3t7FJX54l3a9VVKb:duNSB1/juLSdEeW40ExJ/dt7F4OKb
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7089fc8e00b2da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BA65A241-1DF3-11EF-B804-569FD5A164C1} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000087be80c004443a4b827e2572282ead22000000000200000000001066000000010000200000003dcc0f1b38370acc8226f768c94223fecec0de19a961aa09441473825521a3dd000000000e80000000020000200000008c9325d437eb41c17713c5bcd2800be2b2717b697de0bb0081909168ab8a063a2000000040033e77eeaa998fd5922eeb62b46ed4ec417c688f6d1f2da199ffd6be2c7a67400000009a00ee784b6ab7a973099e93aec90dedbaf5ff39d8cbab4657987e76d868059c6f228b0bab158c692b36bb003b5e2924a709cf295165bc95f04e0ad5b20ac02d iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423173679" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1444 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1444 iexplore.exe 1444 iexplore.exe 1728 IEXPLORE.EXE 1728 IEXPLORE.EXE 1728 IEXPLORE.EXE 1728 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1444 wrote to memory of 1728 1444 iexplore.exe 28 PID 1444 wrote to memory of 1728 1444 iexplore.exe 28 PID 1444 wrote to memory of 1728 1444 iexplore.exe 28 PID 1444 wrote to memory of 1728 1444 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\81b0379b97ad5ddc396e9b29f155ce30_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1444 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a75a0ee14aeef9caadb98924b3b4aa44
SHA160d6c34c397f011d5fe903218e0d0872ca50d181
SHA256b959ed5b1fc6b8ef7d0144fd8aa291c862564a39356f0d8fbf98c85f29dee040
SHA512cbdc15f6d1f33f88d9bb6347f75fbfb5eeb2cc6f30cbb4fecfdbfa48d30990bc60c74606b6ffc2a850021048880778aa75443f2332e181f4c6c95b5c39ba19ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5962fe84b5a6b1e81b5968c16f9cf8fb4
SHA138180321c1846f2f9949e94400989609d4851fb6
SHA256a0e5c092709da38563e02613622c12fa977dff1849e2df481fc4c826c3d2c704
SHA5127cc5dad1d5fd942441df5f84473add79af7f0496c5c8b258bf8c5491825540b2675244f1291356623dd77b2556b87331a3834bf13db370a07f502b0980db4fc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e88b2618b4342a04bbd3be97e944fad5
SHA1266de02243408bdf0e595c30ce1cb4aa94ad71b0
SHA2562019723d7337ac446a839bc35022494e042be157333efb43b15ff53b2d837da4
SHA51203e9f7865bff5805502e3c7010e44e99bc58f9bf13de27a13879619baa0fd49b4b249547f7348d4a8ca03a58339bc5571cb91ba95eeebd8a7472523ad483bbf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c73ccb133860b401fe7dc3d56520a704
SHA1e1d7efc9ae01c2262c755b956b4884fa2314eed3
SHA2567a6ccf64017985584df65db5bd1a4db522fda00a846f83f86525deef32f785d5
SHA512af3d8f2cb78af10b25a39c293b93ada465d5ea3c8760dd8fc3a1c3882b621a5f7a0bfd13f705f9803065537bb191c9e015c782be3e751f27c6dcb548b5ac1a72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3dc8efc05bea8e516570c2ca0067986
SHA1f0c7531f49b4b006506c5160edb8d6a271487695
SHA2565fbd19bb8ab4b8090b22570ffd8d21f312218f0dfd9f6c801226e9a972d01d80
SHA512f2292d9de410ddd34941d60212361dffbb757de40f984d00ab832f122575a37154c59600241558d90ed7dd7a680209d39a561c7772a249b6c4e44a455eeef0b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52be59b931d8a51a7fcb96a62a62cf814
SHA1891b23c762916ae20b6e40e09c4709874f3e75ba
SHA2563a4f18e655e0ec9eb2cb8fb2563d8aeb05e10b6d86bcdca2cb457832fb8cff52
SHA51249a90c2650d067382f3ec81065dec3465b2f464f91d10a04678aab068990a8e7886e089c24674164684d4868cc2d9c94b11c0a565525afc9d4fa55e462b6cf58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfea33d19327d0ee1780365553e38c6e
SHA107f2498ffbc40127ea6ab84ee009d9086b8ead31
SHA2569c2f65a566e57744429070b80d3655b263f5686dfeb8fd6bd33693f0deb59b02
SHA512d07d70366608b43c85832ac17ad14a74883496bf8330c73946238d7cb3038506c4093881e5be7adb5241390b2f2df401b4aec67bfe31e202a00adb1f5d003454
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dde79933b00e01f5308fb53a54c2dc13
SHA1989e49552aa01967ff998789e04fdeaf4d6083a0
SHA256ec8ecc19c9ce099eecd7e7a302e48712272a1915b8d161e13f717a7045d0c230
SHA512ca5048bf0e54daaaf10f2cd191fb6e36623f4ff54c5d8fb4d230ad44765899ccb410ed1b42157eb872fb44e8d47cef00bd7a4290bfd954291faa7a5ef759a17d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599686de6d2e30561f1d66cfe21e75934
SHA1130878253a4efeec116b4d084a12f5f78a694f87
SHA2567f0e01b5f72376f9d4683d34bef736e326e023b8bf08d95fc6e5c569088ad29b
SHA512276352f3e29a035c1bed3934b7c9a8b77cfb4b610425cefb56a83f7398cf0058629398fb23fdf70078a0b1488aa6197454b1a4ce12cb600bb33beb96bf20fa33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dbf2a84861fa31db07a6360db5f282c
SHA15de2d14e461c3723e640926085f017677bf05b37
SHA256039dc10ca5a424fb864eaadfcde76bd8db4a35bc561ad3eef12f72d4306ecb33
SHA5126f5f12e628df0ec2bf087e04aff64d03d441ad7d2e24dcb365db2780a75dc74700f5bce3559d31dd43e7032c17d5ec135ecdd3ea6acbbc09a8dfede8eb2d73b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c92ae7f0f36d5cdb885340e4cf7ba361
SHA192360ce4b1b05794ed1bee7c33306e556b49debf
SHA256769762f55d57b9aef4dc1c62dd1dcf315e40e5f0cb8e25838e52ee959f62b18c
SHA512e77a7b2c9357ea0d2b268345c841bbbdc0ad7a7b0508f4f470508bbfb0b85ddc20fa90d351dc4503bf7504e4a8220cc848484a1f7d99576829ca5f703088de57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd383e1923629fb6af2d9f627dbdd527
SHA18d896bde6c95b7e046069bc65ce621e4a7de7218
SHA256434697dd04830775fcb8967f1357ba9f42316e21ed3a301c4784a90864ac6d72
SHA512ebe052fb979890f98f47a2289e70bd03159f7fe73812b6128f698ce6f25bfffe491d70e27be44f70cefab3903153f353555f9f107092261c3c910e3811035790
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bd36c75bb883e336b3919cb220157e5
SHA189981d017390ea3d27dbcf4cad1d544a202eed99
SHA25608ca105ec088d14d4e60eec4136443ff4b96b09cebe44893e89b3a1e02ad261a
SHA512bad5ef99a099d2d46a5c252950e62b5c9a8da9325454bee12e2a62eaddb1ae96f8a77c639ce99448753deed4704455efae59096286c0b241cf582de587eca37c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d786838c89e40a7d032b6c3b89ac1f7
SHA173d0d7b2241a5a2e4c62de7e52e02b1278d6c6dd
SHA256742b073bb11482012f1f2137450d75afd1153fd07134e9f633cc72dd127cc10b
SHA512ae472a8725a6a30b41777879896e5ce35ed373d184a2a5b532b1d72e1d8299d7bcca9bbe110f78f972f916e2c49bd5be19790c7ec84015688df6987181a5d1b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538084a665f706ec805bf5491f76e5ff2
SHA1d6b1fb4bd92b43469985deb560d86a4818f97ee1
SHA25630378e1619d99c5f397d97a31b0425e479dc13c650af1673acea22605c171450
SHA512edf2ac16b1b1a515dceb4d47343cd951e96bd756ddbf272559be9555df30c1d5cf2443f35f90bfa9563d8a7ced6fc7c36096b2e51e454cb20f7040837eaab1c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516a90658d1153d163ca2c88d5cd4050f
SHA19f4f03dcb5522bd7af3315d86fc485d8f77f212e
SHA256a323197a8f5b2d728542d1e17defd0454658c2cbad9825c111911e806a19e6fb
SHA5124fd5d6e037ef20965851d83352b6a92f43c0ba5558005b15c6c58422e47215a403fe3f875d6f836f24fbaaaca32e3b7748ee82f5c1e4ac73b7ceddbdcd3a6f91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bbc65a0c9ce6d7fa6fe0350427eaa36
SHA1a1d99aafaa5e931d1f72c0282b41af0ca6501025
SHA2562993c1e0ca054fe6a1477ab450669a11ed9f97bcc903aac484102b662c73fbff
SHA5121e160dbfec9c5021b38ae00929d2736e10ac4c1f4a6fafea1c670ce1adea5d5da88b78f6b91548d91a370ea7bfd042fdfc7e09f03ac7ee00294798a47279e4d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596ed6a22f0dab28a3b8576ebc033e97f
SHA17e97ebd7899fa877ce617833b92e15e5a8aea111
SHA256e4a2d6e645bc1ba055c664a6dd777713b102dbf9bd1e69fe69846c072d15c139
SHA5121ff26483826bfe45868497b5f4c7518b4b1797692934f7fa62b949bff3e3abc5b2d3befe925700b88bdde07620b9442fb4bb547e320c7c297a83c225a852c68a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543703d0f953dbbeb76aed891beeebd67
SHA10cffe70412136c14095f23a9a9c4056f4f0fd5b2
SHA2562f09b9d426521f0a2cb2c5a4eacddc2c5e6334df8d375455319b00c85444dc98
SHA512fddc1113dbdc087df7b5e732edf82c1470154f72828c45db2931b406ab6c1889411d3bd09f1018d21c289601eb261566a96bf0cb959a4551ca8c8cbc5ca360cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cda651361a5f215bf109a4327778b4f
SHA130ef7bd0864a7e9bb3d4b7d7495b830ebde2b326
SHA2569528f18d0fac760754d4d4a4a56d2db50f3bdd7399f1951d54143f620502f5c3
SHA5122406cd661d2099f83b24cfc6a1d686b99774f4eb58c0854ddc1eaecea2363544d767e870fe4ab5ef1607d4741af336e7a9c6ff6079d637cbf6d001b2c6b6eb36
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b