Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
30-05-2024 23:35
Static task
static1
Behavioral task
behavioral1
Sample
854c9ff08277a9f2f3be5608d82513a7_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
854c9ff08277a9f2f3be5608d82513a7_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
854c9ff08277a9f2f3be5608d82513a7_JaffaCakes118.html
-
Size
461KB
-
MD5
854c9ff08277a9f2f3be5608d82513a7
-
SHA1
95352ced837aa962f77b17c1f1ce3023e5f60bef
-
SHA256
2a1215e29748978b91aaee6fca39bf86d38a1adc8d448df07b68cb9e21a23091
-
SHA512
5b38fa2da642c7e2de53bc03893da45c24ddb2faa869664defb764a506b01835b0b9728c36c9d14b059105999776dfada49fc9ecf0ef3acf918161d55eab156b
-
SSDEEP
6144:SOsMYod+X3oI+YHsMYod+X3oI+YJsMYod+X3oI+YLsMYod+X3oI+YQ:d5d+X3t5d+X3P5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000284be6266a47b98393024f30c5e4f7b50c02df6cd8b02d78e6e3e2fd9c0f976c000000000e8000000002000020000000ffc03ccc4d82656284e52be1c3786cfb8b5651470d3d2da721ad5a706ed47cc720000000986ccdf66ee69569724c9b0948d845c8c945fdd44c6c29bef728e0f755c993294000000043abec553cc6fdaf53f790475e7f85910b9722b1f0d41409771787bacc442bc046ad962300b0f0a9d68321e8f110eba2f66cbd56aabcfb40c2e76d9426e3e880 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423273998" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d01acb25eab2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4D387CC1-1EDD-11EF-B023-6200E4292AD7} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1580 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1580 iexplore.exe 1580 iexplore.exe 2580 IEXPLORE.EXE 2580 IEXPLORE.EXE 2580 IEXPLORE.EXE 2580 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1580 wrote to memory of 2580 1580 iexplore.exe 28 PID 1580 wrote to memory of 2580 1580 iexplore.exe 28 PID 1580 wrote to memory of 2580 1580 iexplore.exe 28 PID 1580 wrote to memory of 2580 1580 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\854c9ff08277a9f2f3be5608d82513a7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1580 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2580
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513f049749b6683bc8bcc3136f8b926f3
SHA1e46f91dcad3b356b8100a952b3aee78ab4cf5a7f
SHA256862c76a217ac8828a345e4945f17ab69261a35d405ab635cd14387ee72f6ff12
SHA512fbffc00a66339e4d746bf8aa57147d1afcabab530f91be6d3388a6dce5086ad24a93c68513c79445e0c9234c6f3a269dfff138bff20f277038995b908ffa0375
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f2b9a5f0b06506791e0d97a42183a48
SHA11c5cb7ff2a841f1852923e8b4767358a798bd53e
SHA2560e76aa6e5786b40b7e6258c55959ee87eef1d85bd0a161a0cd4b9dfc515cce11
SHA512de8e7be5668449d6b54381c495f75210ea8cbfae4f17e9d898d8fe77115dae9dde7c3a0281ff455e401776be50107767233a7981cf8f6a448cb58c3233cf5860
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6e8daa935c774497d84def1416795d9
SHA1f7fb25484c9df03d961645df42300c2beb02124f
SHA256a2a01a77fe4d6d9fed926fe36a06165575a0c9f3b6a76ec65ae80ae51884d878
SHA51219db5f17f0585d449eb30d3bde05ea213cf23c7d0c90c8994545670a2978e6e68b6732f2382f388044c4cb6d4be5e640e0f6d477ed58f299acd58023cbc4c0ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4c506d63dbb70ea13a42cf86d5760bb
SHA134b580bbe6f57b765361d27a636647ab0596876b
SHA256d96d75f6549512b145581044863797b026bc5c425a25e1b19ef9efb5f4a80419
SHA5125f99c63a24387b3a53134c59d83273b8de86f207c7596107c9ed74cf762911af71de6f7fcedd8e10475552272bd4ce8b84df2f40268602a771b142ba8c9289f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fd29a6f7b5c365b3c320d352f314402
SHA1fac3b3f8c3def8d5a6d6680bf40a89e62b4a2bce
SHA256964b54718dd9225134e4e38a2e1c7b4fd49a65065b3bc50b2755d4c17f18b47b
SHA512929e6733b63269d3abb4172d7d7b1e8bf12c78937d3b206a1ad06757f64ec433afb979c55f8c5c4b824f86413a6e5cad34fe8ea017e70d2c46269446dc391239
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2746f528557fb6ec08abc6a8fc35ce6
SHA1089ea54467dd674011937dff4844cc56979a4431
SHA256bda226044ffd1d76aeaa815270ec497ab2d7e540cac3f5d2805a97511f53c6cc
SHA5125482144b29880a75f588fc635c12da635fb0e6dfcc547729e8f85bc4718c1b6a271897c69a2cd6a6d9137627881bc7e2fb21b9e80fd58dbd5e42248254c2298a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2f1ec2c00c96ffb1aa48dd7727ac014
SHA104ab1adc5b9795ce768f51bc7c1d0ccd2c4ea366
SHA256a007ab7cb7848c4c93fdeec4282f82fe2ea9d13c5b60fc75f5bca0e996b8d5fd
SHA512e42ac2a8ad507ef102f3ddeba2ada0cc1534093dded296c6e0410fa19f0d0c7c49eb1d99efd6661628d65ff385a905cbc35bb3acb9bbe0c4136c576fc189c12e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a9ee9f1ecb623c911c14f7163fb8562
SHA1e1babf31513f5f63f148c914dcd9b55cf0c0169b
SHA25667a3fc0146fc626c93bb9675a43601dd48f35df25894d5674029d273b4bc19f1
SHA5126ee19beb8258d1f9e5b59148227d7bcd18ccdccd5e165871ecc078345d258bf34194d78eafcfdb36db9878e47cfb5f3b31577c8d7fd84c4a060302235e5ff227
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e51b0c2c88a146ee01904e0bb4354fd
SHA14c7571a1686583b7f0079df3f8d6aaab02ed69ff
SHA2564751f45fb1e9a54cbe1fc332bb5f76fa9ef1a79ad5259c788bfc1704d4f7c57a
SHA5126889af415039ea001df6e86a694f4b3d068826d4467462cca9796af7df059a65b74def1555fa7190aee3be71940fc720cb5099cf402e06ff77095522458a7471
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c877ba59b5fabbd65ee92ebff08b6612
SHA15e9d0c37f9326721aa66b879318f13b0ffe87681
SHA25667be2e6509688a37761609619aaf33049871fa459edfb1e18af6a90f17207747
SHA512b0e374a6a387132923a7c92b5414bcd13da6cd44910d1ef504258d78b6b76e750d918c6a113d0d517e3ddd3c640a48e470e337ca5b907b2f7b0f8184aa20cc8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5625f777e1512838c3489ad0ea505d107
SHA14d5c193fa67f7e8730f0b906f07b0dbc782f5d75
SHA2565dcfce81aad0a33b73efa31921c6662f00b5512ded6c8ce19138df985c3542aa
SHA512c34d2edbe2aae81acd7040ceecf599671bb9deaf7d43ec818d351a005c9b887976c4b03d1fcb13e8d47bb9b0ccfd8bec5cafc2cb4524c9ec248e2ca14fa4174d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e1d05ec71bfaeb3cd669a8d8141f8c8
SHA11ef64f89d84b0e221096611e391a04a9a8746d8e
SHA2561d922f6f412671460317dcb538503968202a41540649f96dcb0be162b769e2ee
SHA5128c4260996d35adc3b151e7b78fca5c96d73088d8cdc5dc303e2b383cb6e64555a589567328865881c29c198023288a86789e48a37980eb57f1578b8a55c6a773
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505847b51eb3f84b51321256939c7c2b8
SHA1fa9a0eb2f48debfc2c887ecc422f1e8e63da60f8
SHA25604aac1af65c0e9719da552121ebd8a6126e47632bfc8a04e0b98ec04ce24a30c
SHA51230e9283dd5bda3ee6b6f492683ff7a47325bd575f71038ffd3e925f273eab933821a8ae31370a3163a6db70841b5cec579575058e0ba463ebbb89058fa841c76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e686451d788fe4e07a37750c0e151ce
SHA1db04aa000dfa26d2cde17d552caf3cf748dd6708
SHA2566864328fc1e2e3e407391d2a09b7abf98b80ef4a966fc4dbbcc12700a458659f
SHA512b027cc0096533729740f07b8f3000ffd96830ec977adb529c3ef87c65eaf553706ba695f567c571fa484c0e3de0c086439bc256791dfb653064b0427af4be845
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c356739aa709f6da34e99f006c73d596
SHA11f44419b5a8c6cb8cebf7fc1d3c8181a86ff2e18
SHA25668161006c4f02066bd53c39ec60af8b06662a5e3c82931ea48871374f8fd9ad3
SHA512765d1afa378cacaa75f1df9593e811419462411bce55c1537b4cd14ca3f7c807a78ca4cf4867481f26277f535a518fbab08eea15aa16782a507657143c1386ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de7f47fb4ff9db6e6eabbe82735cd968
SHA181611b9f00f2126c28e620881e0b3576de454104
SHA256f35b3ffb24e3ec00c0807b1bf4507ec6d76cdb8adefc21b6a172b5012e8e7e01
SHA512d36166e2b6b0736feb44fa35b40b0446e0d73d75841afd84dba9bf7790185dea729a257140eda6896d28868a1b165129d18aa8bde56c5a31634f965fdc127a65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e0a6d5e5ba399b70f9d0fbde9636f02
SHA1f9cda65a0d077d5d8a0fe1f72b2c8f92ec3438c8
SHA25689b5d6b14f17008fc7089f70c1f783abc294549d825ee08c97dca61884d1e5bb
SHA5121ffd4af72ca919d3bc396e46be01e866502e5aafa18fcc9f8a6791c3943c8a4bbc6fe49137c28370fa42f0b178b0295795db168673b7132e8da89877b38dbf02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9735f548e70701b9eaac14ca8a159af
SHA1623bee4ae16c514c9b78d7d198ef1701684faafe
SHA256144e24b92726a690ed23b0b3f9fa8b82f91fcc5d2294ef15a390079b75c63010
SHA51204bd687fb5a0ae83e97a9e7ca6d4c3081b90657fa675c7f10c3f6f8d2e9ada1f3d1f1ffb5431cb18bc02cf947bd842894d7837fbbf9383d06f17cdb1838439d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538c2a27bb2ee68125c6d4676f4586e89
SHA1a87b93d3bc99da3c118980e131a799c929fa6c17
SHA2566c10fc8a929c707553d116e6d06a920f79f050882afc7da2700c988a59e8995e
SHA512831a623c384aebc7c213da7da2b0255ef642c5a21619eae26040b35e0d439e9892a091121118bc0faf1704b2e2938148e57e4e82c825c508e92bffa29abce5d5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b