Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
30/05/2024, 06:44
Static task
static1
Behavioral task
behavioral1
Sample
835202dd00f3bc874cb93a23f04412c4_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
835202dd00f3bc874cb93a23f04412c4_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
835202dd00f3bc874cb93a23f04412c4_JaffaCakes118.html
-
Size
168KB
-
MD5
835202dd00f3bc874cb93a23f04412c4
-
SHA1
3235f46e06a6e219e0d7aff511909b65fd4de6fc
-
SHA256
4232ae2f153bc58b21eb582b4d21f3f2d0948b202aaea6d1966ff50e472330ab
-
SHA512
b8622b6726a840d92cc3077f1d6c816007ea82d7ea22107a09b30f3d939c70c97c27da3fed22ea25097842826468054595ad36b0e685866ef8e1d37142b5b10f
-
SSDEEP
3072:Gs+0H7dfATubwP1LZCumtmNskvLyKgFL9/CTfd9MubGLn:GshRPbgFlNxTydL9/CTfd9Mub4
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0D6CECD1-1E50-11EF-8D12-66A5A0AB388F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c09608e25cb2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423213333" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000004a794a23b840ea34428aff40c9cb2b15ea8f7a2f72c0763b41869eabb3962981000000000e80000000020000200000002bb8faeafb448ab59209c83ef14b615e8410e81632af2a9b1c0988128ec50cf9200000003833363bd1e9e1c3a6192b9460700567dda7f72d4f4ae5ec10fe0de274699a384000000081a4d62a76141a808e95a0a35d8f2a16be40a2505f677add11a4ae9483fb1e463da9e7cc83fe73ca22019c74968bbb0dbf6d1946196bec36835d5d25c3ce53d0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 836 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 836 iexplore.exe 836 iexplore.exe 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 836 wrote to memory of 2112 836 iexplore.exe 28 PID 836 wrote to memory of 2112 836 iexplore.exe 28 PID 836 wrote to memory of 2112 836 iexplore.exe 28 PID 836 wrote to memory of 2112 836 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\835202dd00f3bc874cb93a23f04412c4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:836 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50857f12c3e72548f81cc722f699753f3
SHA12bef30c6768cfb32a456c73e92a2fce9c54a9a1e
SHA256fb14c5f19ffecbb2e06faa8aa406a8191098aaf5caa2d5148b88ef88849a78db
SHA512c6bdda6d8c0e5d82dc82e08b14419f0d04fa14b0fa32b7e3567b3fea611c8a01a08d8988d4f885723c6da685e09c9830fb7e394cfb59fb87dea45fd167d01215
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e39d8224f21fc4b45fcd8a62f5cb584d
SHA18ad8d7526a8b74fdc0ce8f6ed87b1f1c2aa8556a
SHA2563c76906428081941972341388e3ce0332ea63d83b4668aba36722b8d1c2e2dc6
SHA512f86680b979040385bf34145ea527105c3ac8f97c45fcceed6a74e60226532dadc9047df7adea87f7e8f5b75048fa63e1fe0dc2f2619e7a1fe898fc15185fe2c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e121306a689c4b96f25fde14c68705d8
SHA1b7bca7ece93f53bdab9503c4d00bed0235c4f905
SHA256cb36f616e6ce55c643a4bb3c8f398c182fec2285db6058faace9610f8b75493d
SHA51287e0e0b0b6fead5b57c41686d5b025d204d98bc9fbddf150191205e5b664c5f30c0957859af829fab4d06e21599daa4ab39764b449c24296ea54a27f7868e7a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5316c638661fb3c0c935b78c60c2cec3e
SHA1a77885074355c35e9ca4b95cafcddecb0acebb90
SHA256068e1d4b8ec057eeb69a8605f304b5d38581b66a5c3bd5b74b7008f10ca72f96
SHA51275ed2cf8c402e65f2b6e1e83300b476a3e282659b29d0622f603855aa6b46f40a783258af1174eee917da787f04f8c340c99c4d2329c4beb42c74045c4e41b8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563e1fb548bf5ed0c327dc76766000c24
SHA1efb01fc5693f0ced43ec0058d8ed3b4841f26cdc
SHA25615d6a7e63b190fe49dba05a0cbd081fd17d36367815e6f711ddc6fc62ac8f6b0
SHA512304abfae2efab5f1043672e5675600dd1f57c2300bfbc66b6f5016897a41102d4f580b1cd873c5e8f6e2f0a0341ca5f2a55e416ec61e8f7fd214cdebf54ac874
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bbf3596f1ad7bbc56f0c4e6f9cd477a
SHA126b6a3600f17f990611f2da50ab4786c7b887a6f
SHA256408a5cb1a86e3176cdc0502c00bd98fb5d238b8abae3bbec92710a460ec37c17
SHA51264b57a15d6a83922b5f6e835c5c583c4cbb75a357654d0a9cbb26e0ca9647d5b7a734c65f7c11f5bd6819f89070a957ddae6613193215cd36dd5987bb8979106
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514f7facf389777e14d668ceae8854326
SHA14409a61e633354911659f4f5416e187096ef0330
SHA2565d498446acbac6e41c6dc5f1eccf08edfd67720f6ea576782829a4eff8586f29
SHA512fa5beb2a004cd763846eeb853ece3292b56e834d598086dd2739e6077c150a040f312a04d4da4a662d92f169b5ad3f10be39e58e941a82b056d053f77c0e6fe8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0e51f4b263cb86659baa4dbf5617d4e
SHA1288b3f2db0febeb02326da4ce459d42bd0a7cb09
SHA25640eb81d28e3b7b8eaa0fc7b5d71b13d66d7c30a6ec976dcaa1b9bfe0b274716e
SHA512ec9763b3fd857a1c23fbd305d9b42c0fb59f9762e9c65246a6973f6b94509f745f09ff2e4369e44027b6b697a09915156d4c704d3dc255856c1c62bb843e3666
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53978df746efd4b36ca467c9e867b7723
SHA1c3d491e1a3d0512f156f8e6aeca89c66eb888ecf
SHA2562ff5f2f58a52fc42834d32efcb51b27cfd6c5260b8af7b5db8b81d2d2d9de688
SHA512e0cad2a17ce11b173f6cb066366ba1f4c1c19c9468323ed776e22d48ecfce3aef8fffb2b93ca3b33379fbc7c2c269401ec709ce48e9ad3529325081883e55cc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587807141a3ffe1c744358ae847514038
SHA1c0b1bc164103eef13cd1417fe4d57d9568290982
SHA256ae853d668bf77009a9d7414dbd712837b836f84b765c78bc20dddf64298f829a
SHA512fdb2d1d6b774a5b54b61acf5a4836df9af788d66b5bce748957a482a7fa271517bd504f2a637c156da83300b124999ea09d2d208e735d736a4b5b8ec625b41d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b7429262bea1fee904bd920ad8e1054
SHA1facaf72fda7d6e8196c95374141236f47bc84b4f
SHA25619ad6867bfe592a48137eb8db51432adb6450d45504d461596e88688307e92e8
SHA512f2fc167d96c630aab2c798d63414409bb4c046d391c3222e2f9728189e2635f8642db358f7a1aabb6b576d7efd202f75abc977ea81322d28e4d423896773ce27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c5eeb902885e1c50ec59f00c1a5d6ba
SHA1507477ade6a07910676705c9f6ca3a7622c2180b
SHA256f234d95b85458405a92d1ba9968861ed5508d97163bab2867c7341225b63ec37
SHA5120f26fb8a36cffbac00ba6ea9f0c41cdb1111543bfc5bad45cfd74c055fce40d22cec3b0dce8efef11446c295194ce7c31c08b3cc9e368c5a3e1de046ea39f663
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abaf275751b7c1118063c681c37130ec
SHA18c4310e6d941731a7508c6290d4fff160b085dee
SHA256b25f1a1895eb9790bab834a9ffc5699e067d062e1adac6fa52ad17b838a96344
SHA512026a466128aecfc1c7bdeccb89313af936137a20c11e3321ad1af7df05dddc3602e1f6b51ab01d1d20279ccb0ee9e8cff007749db3686b32bc34115b9137c451
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5287501ba17168487f639c827a05253a7
SHA117c963d38b819095ad522b5fd37626aab4aad342
SHA256b9ba90b22a599dccbc613369394df109cbedb637d5fa28d47b8ee6dc6a7e434d
SHA512eb86df4eaa1f78488497a9419506164af44fc8b562340564aa66a6961a3a0dd403db34a9326af4eedd8de776cbc56983f83bb86fcafe7f89ff9a83deaec6a033
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d6dba90c3864ae08fd5c45269f010b6
SHA19b62fab2b1abbbb5c3f022b077af86063e0ce6a6
SHA2561eab12a4578e1174cedbae180db6968ab95ceb8d1f5d5f7a5e0ddda8c3d015a2
SHA51210d8074d222947b9009dc6d8029d42ecf1078d0502ee40c6f3c402a78d3e06117aad33a85f5add1b8413d531125fa289a5e9f89ee03fe0b8634ed224f55c1ea2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbef46bdfa4743003ebeeac4466de3c9
SHA17d69e8db5ce3bb5f7dfea3e3d3d13f512bc0fabb
SHA256ea0ff62b3670f05a04aa519d02f05ea82a1f080aa5de05814342ecf20844391e
SHA51225a6430fabb50015e87ed114c94c79133c781b9968d62b5cc4c307bd2a0c091cdeba5e64d3834e796f49b0c02e4fde83f928fae5a99bea34b5ba4627a01257b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54335493f2c1197f6772e54292e8c1349
SHA1b141e74ae87c6dcd5ac1defd799a2d2a61b3af49
SHA25641cdd2cf1f085ab2f3b009a5511ec252b41320c473ecb4dfbe46d2826d7017c3
SHA5125509b6eee480e22c52c188a2f38cc559492540d98a8b0ccaca180a001a428b43bac9ab45309bcb84bbb72bbdbd09303206c9b882aaf65c8fee5a644deea1bcd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b55d2cc1db819ae56fc28b3dd250281c
SHA1343c2a3a196c7607d26c548e5524c0f5c9226fc6
SHA25694214b7a694ff2f8ae37a9c8ec548b3fa9dba5a389590eceaaca2ef29ad1e143
SHA51217953ec78e03f0228cd9cfa7899ee80644772dc7f76133cd30e66e2d93fd8875515d62c4247467984e2661ce38bbcc15f7a47b04abcbcf71e670c24fb16488b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2ee6e02f4d089fc73cccaed44cd5466
SHA1b693234cde4195aab8f43af73b4869d13d56fcf6
SHA2568ddaa660ed709da4758dce06b23ae1d436a92ec1c62433067896e2cd2ac5d057
SHA5120e01efc9a797ed3c0a1f29ec2aa001d6cdc84c2e69717232f42a8420564a85c4396fe3ec3f38fd6ab7df588ad824e290eae6ffe88ae211bb3089d866e57d8c4b
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b