Analysis
-
max time kernel
117s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 21:24
Static task
static1
Behavioral task
behavioral1
Sample
81f9f27341bf563cf2d3233a0aea5c50_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
81f9f27341bf563cf2d3233a0aea5c50_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
81f9f27341bf563cf2d3233a0aea5c50_JaffaCakes118.html
-
Size
4KB
-
MD5
81f9f27341bf563cf2d3233a0aea5c50
-
SHA1
572737467bfd6abe08ce5bf2d8d4423b3138b8f9
-
SHA256
bf6e05e5577e7cb831998ab7bc22f54ed88cc157f0ab04e72571cddb54b9f647
-
SHA512
84266333237f0c8985be26a3266d0a888cab4e02f813559a2dc68b6dde7ff866e8d6878f5714ef52a0f2e996d6972a3cd0fa56c6e5659a2e9dc3bbfeedeeb18e
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oAVTdIMd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDx
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423179730" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D1155EF1-1E01-11EF-9AB8-560090747152} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ce3abace74bfca4e833fc71c786f922c00000000020000000000106600000001000020000000b3c5124c935c75ae11a82cfccc521c02f18a30f374b846a27eed3a273d39301b000000000e8000000002000020000000680a78382b380e752150560aac922fb80e94e262f2aa19a0b93bcdf121bc877120000000c362914ffabe1f1f4bab0fff2660f92e08e5ff52e0b889b6dace7e735f93c6294000000015b4209fa39ff5cec73a447570d9830503b930df89888cb1dd67493e2e394a3b0ed923415a3f50bc6e44f57214e514aabdfc84fcebd10daf645f3b036c6a2620 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1095c2a50eb2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2832 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2832 iexplore.exe 2832 iexplore.exe 1336 IEXPLORE.EXE 1336 IEXPLORE.EXE 1336 IEXPLORE.EXE 1336 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2832 wrote to memory of 1336 2832 iexplore.exe 28 PID 2832 wrote to memory of 1336 2832 iexplore.exe 28 PID 2832 wrote to memory of 1336 2832 iexplore.exe 28 PID 2832 wrote to memory of 1336 2832 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\81f9f27341bf563cf2d3233a0aea5c50_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2832 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b2e7f9a8dd2d9317fd651b848e5aa2c
SHA16205580971da98793ce075cd1380fb083307817e
SHA25627c5ddcadde0329383ab887e523ee6742635b67adeb1e19af62e69cc9b4134b6
SHA51229231e257501bf86e8ea8b4c73184cbea571b65d14a929733347053e791116265b9e431a9eade8b891bbb5a37082c7abf6860d8f2c3daa16843aabe9237b0fe8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ad50fdc0cf2efbe31b1083601da7c53
SHA113ca06f283ba6872cf3b6db06c3da5a72603600d
SHA256d5f06d47b84afe07c6832b07d7f9bce25f4ba98f3b89a4512d6e7e521ae55b21
SHA512766bafd99f477d7f3a986f13c84008c8c8b04fb2274a73e5e2869a81586cc53de6d3f96181e3857c8f704c0a5edb0f699abbced2fdcabc4d47720b389d302e1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54613de39ac7558876ad6f948759adcca
SHA182e35409dbaf5f48296cd78b331a1c847462a522
SHA256bf3de9d4cf6c0f89abdecaf33c9ec218d36a94078be9feb72cb8a62ef07f6d10
SHA51294e89aebfcc907211160665cb611de550d391464ce771dfede174e4fdce9b09d3bc50459fb489bdf03e9e14e76d6e632d9ff109a7a4c888467f05064245f02e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9e12e0dc47894badafcb7066c41c0de
SHA18515c042ff470bb8f6de382836ff84535e35670e
SHA256f99d6a5f37f6e0ee7ffa13aec00ca9a0d6ede8f760bc4542874efabe853e7501
SHA5123993923ab23986e7a9a08a127a2cdb684ce7a57cb4a14ef3ac5ba596b800e99bfd428905242530346604a295a09c694a8222e9517a17726ba2f32415895098be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58de900728841fbd9bbe98175a1b82e3b
SHA12b5b198c572804e08b7dd484e7daea7d7a246f6a
SHA25637992e9dd0405e1d625b44e30424f2aa29c08213f10bc8397316e3342fae41c8
SHA512faeedb62abbda5a7889f762791d80a030b4621552775ad59d8e8879ff4293afbc9aba13d0ecf59c4bec2de22d34264d720edb4ccd532b43b54a75cb2154cc033
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556b159b552aa7f1f497c138e6345ab40
SHA19a00164803fe9b2cffcf1028b09370aed4f4f968
SHA2567b1a43841f63b4bce3776cf3c613359537207021e2c062fb745357f143311586
SHA51225c6c1856a72a889ffd03fa4f26cf675159bdc727472b849e17ac1347a22a2f1c1c4b43d19cfa0b486b4b447e0b8e501bcbc4577f18bc65f3c2c6420e7666e62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594ba20644bbf18b6b8b488c70e22ddda
SHA144496b2336366df0f6368590cd860f6f88133c75
SHA25629e36ba8f9cc5554768943d0b6f6b9d1da550b529ca65033a8284529edd96d5e
SHA5129db0730076b4108f44f099232f2d18892ebc242292ea12f8d7885b02b7dfce79535b920e5b5118c1c503f2d66722a1d38eedfde1715e5777b0d4cc8a5106fcdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5795cb7bbddbfe4c197b57a4d9f8d7fcd
SHA1268800e97dde521e0a4fe69145a1fe32dca532e4
SHA25653bc944f6d6f86fd74bf8d514c684cb8f1e152e281d24721114930b9487b14ec
SHA512a310f49efc66bc0a5eca493c24cb1994633a322371542fe4c83707b3228794b555c3adc0d1267e781ffed10c2b25abc206f35947fcb5d2aa2ffb16058af49718
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56725f3e5036f675cd76c73f3fedb9291
SHA1b55cc856a46610e553e6e0de03033d03cf63cd05
SHA2564531a0a0c59e7b8f6d01de83e750eabc6ce4c76465eecc23cebdb295ff8ddb8a
SHA512f1b4fffaeaab1cedc7fb7fc68d8946ede33601cddca97588f464164958eed379a5e8e9e5288e47fde8aad772af2786a787b631a61b476ec38b49163ed3a1f0c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df657304404f873cd84b9a73b1c162e2
SHA1a4d7bb4382999963bb889c1dd318afbeec5f2a24
SHA2560d90a5c70e6d0e2dda6bfd3f8620e183984be2284ea3b4434669b7820e840707
SHA5127dfb7f5cade25da477df996b65a09e88ef6d23b532be7acf34049a7540006178199f257b896ce9ede39c85331a2306909ba3eed6f70084c5751648f1d71eb9c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4d9486d0e090e93033e93b7da7359fe
SHA123bf3393ae342163056919fee98ced044aaf2652
SHA256e1cd54d7ad06ffa960f23944d690e861cf92d2a45b1270700586cfdee1738e6f
SHA512053cf11d83a9c013340e4a18a5ecb4fb82d6b8401e4573b53a93c521567384c85110fa479eb19a412ffd573840a95f478d5b6d7a5d30a30b11dc6da024df67cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505753ae13ea33ecad8a6656ca6b86b71
SHA13f2e8c99ae0c86723137f6e654597d0edfc077e3
SHA25635926294e29a8f0f2bd05244cb29bc0eb6e7c44d7096b1e47c0ccb30f5f9be17
SHA512f7c7ffbfac9c7003f4f60ef6d540ceca75e407754cee272385e1b712dbbaf6e93590d64522475541e9244b5b22e07abfa94e46da2436c134e23e494f2b3c5173
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e54b73bbd9daa2eaeae7013585be15f
SHA12ab4383d0c8696f0d72413e1dfbbb0fee76b75b6
SHA256746078591d2cb34dba2b614a79d3898e044bec6c7a84dc393efade56492cbd40
SHA512fb4ebb7cf59660a3506030bdfd3211196e73818d7818ae275d0cc4adc7e49de8ab4a3f9c3d9b5f59c80090255d26e47890397b5a1409b7da3bdeb763abfa0b8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56196aef1d06612dc41c956b735f6a5b0
SHA1f4650a4993a0594ff10a103dd7a9b44ed1c22d08
SHA2562ff5d41752284aac9344509758fdc877c68fb213ebc9ba64bdb69bbb67d2d58e
SHA512761af05e02745c874071f7ed2d4a57278b40862c181e516236291ee35a0d5aabd3c209c3ace1f260620e3db12e89464d4e823ca7c521c6fccc29436de5b74d63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3f827ab7689d2da284bff3da0d52187
SHA16479d4a9c64ff121f0ce985a620f40a0da323741
SHA2568c0eb51349f28506a61734bcc25a9c3f9316a489603304065fc44e0125b87add
SHA51219ce132ed65e3cf53981de800d0786027be66aeb5c0c07edac4083de283486f20bc98fe5055264e27b658ad46874b322ca8cfa26845b4cd725554634a97e1218
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a3ceda46f6511ed35eb63efbb3cadd3
SHA1fc11637b8e09deda4a3b173dd5da6fdf4d6b3598
SHA256a04bb443cb4ac9228f16dabed979348a1d13ac1141767f96b43b8b14fa4102fc
SHA512316ba93b6379eefad77a91c1310ca809978d8d90f4ce3d5da7872043abdeafffd48628891b130fb07ff355c65b5cb3dc72b1b203cf412e20e7bc9c8526162746
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b359da46255ecb59d720a6f320bea9c
SHA13762f176f2a978e7b4af3d10e9509063b228140a
SHA256268d2f05ded97db200d2fb225a27f659f5a37994c3563377950e232024628052
SHA5125e80047079c6fa41176d53c8cbb3765f600b55ae4be53caac4013af44a9852f837aeb40e77d33ada87b0e78b934fd29ce0b999ff56b7cf2b30c126e060bab099
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5669405dfa0b24755a0b1119c01185279
SHA10a4d8803be1914fa831e61620f86ec951364533c
SHA2567e49171185105690dbb866c0369a3b20c7b5180863fef94b1a8d0f7699bce7a7
SHA5125a8135cce79d2af5823a6d2f9e780a57c1115ae9f5856d0a06c7e2934a0b954055aeaa159b96a26bbfacbbd384d4120e928b5a97d83eec26c1b4cb0e7971e9f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8d6c97fe7e7283532f06217150edff0
SHA119de116931a7ecd29c86e2bd473baa36fd46dcd8
SHA256ce69334a0b491ded82e164afeb997a6f0963fdec5287edd4bc95927aedfe2211
SHA512d7fb65ecf0bdfc89036b29c5ba424c7a1aecb8d402fb09a566e9978379688e4438dbced532142b001f80c05e5504640cf24eaabc48900b3428a579a052d86f78
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b