Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
30/05/2024, 09:39
Static task
static1
Behavioral task
behavioral1
Sample
83c2ee4f78a0dd39fd62a846e1998f45_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
83c2ee4f78a0dd39fd62a846e1998f45_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
83c2ee4f78a0dd39fd62a846e1998f45_JaffaCakes118.html
-
Size
461KB
-
MD5
83c2ee4f78a0dd39fd62a846e1998f45
-
SHA1
9c0edbce4b6eeb818d7660e0208d5c0fe23c2cda
-
SHA256
493a9d379532db3c756d13bbe4a3152c1767a6420b903601af6d2edc1ea2c9d5
-
SHA512
0025ba2d2c4a90e96ca74217d029cdff86fb6f04188bcea0a765ff640874cbd3061dc6f1a2081a0b6fd8e169facf491ff206689731f81918ba9972b1042bed85
-
SSDEEP
6144:SWsMYod+X3oI+YDsMYod+X3oI+Y8sMYod+X3oI+YLsMYod+X3oI+YQ:v5d+X395d+X3o5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423223819" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80f5525175b2da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{78C25341-1E68-11EF-BB21-6AD47596CE83} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000a3d32fc0b204240cd256a7f2fda7c88320c77fb66f4088fa4740ff9607f0761e000000000e80000000020000200000000a4356deca63bb4a3f89dbc0e6a14a0a069245b641e5632f2125038060632cbe2000000099e3d1d6b128fa814e4b47e463785f8a1c797e5a2fcd2ff185635c452f8cf88f40000000859d457b33418ab5d62aa0519fbd6cf9941898fe0becc77f38dd743855b103483812bc139c99da189a05f1af4793b76b54e5b921608f5ee065c2607e24ffaf02 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000e6d01cb369f42fed04b0a36cabb24143aa0ec32d3a014606b1eb1d66e78b61e1000000000e8000000002000020000000407782635d7387013c342bff315fb4d6f4afff1a7a260babc519af7d607f6b71900000004301e9aa8cc599b8bd646d086a6e42ccd0e04d16f56789239f36befc96f98d0af665f40c2ff9575d1516d11cc3f3317bf7fcbe6683b4413cd4763a516648045c6533f5a0d1babf34c595e56802520138ff133daed8f9835d4047988b34fe570457c7dbef4814a10bb6c2297a8cd6e281eb8c4f63c1414f8183f2400be7fc59e8cadcb74acddf2b95b478e51b39998df740000000d0a4d0215df09a3672e17aa50e5bd775417e9ecf793157512a91e58c77af05f5a99fd51d49f05910b0d7ede9aa21d149944a5714e2112ffe32e024c291944ad7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2320 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2320 iexplore.exe 2320 iexplore.exe 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2320 wrote to memory of 2216 2320 iexplore.exe 28 PID 2320 wrote to memory of 2216 2320 iexplore.exe 28 PID 2320 wrote to memory of 2216 2320 iexplore.exe 28 PID 2320 wrote to memory of 2216 2320 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\83c2ee4f78a0dd39fd62a846e1998f45_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2320 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a04edaa320e7877fe4929f8bfd1c8841
SHA12fb384efeed59796d9ac5afdda980a241bac4f1f
SHA25694646688bcf6d949190a5488a103ca934699ff5e30fc3904011ea02653a61faa
SHA512a625dd6cbbcd9a4f395ebdb0ef9705925f5eae66f67129ae24c0635b4cad04653913b1f8d8585b8a5fcab1b93926cd6ff4640824db39d04f1dc5d133f626e156
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f51db522b191f7ab3abe42fec60932f
SHA1869090da096089b9667b798ffb42cd34a9d94b12
SHA256ebfad89f81c2c9d31f8973d035cdf2327275c13d83773d4d5f139aed6fcea1dc
SHA51297ee8238c18f466c0eac796f0ce37c833329bd0e6f8a06eba2f4de3391ec04c79b1353812c2d8cc666849821cf148c1277b9d155c62699166324adcdd2a9eabf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af2bb3c0c853c2081784e85b2b703e88
SHA1bbc33817d65fc65d2aad9f23e2df7bb2ddcd9e36
SHA256c18c16f392c4b07b03fab5512f1982de988c22f334b51e1e820ddcf9acf3d69b
SHA512dd80f9e0a7d3fcabfc0a747c8194e6b7c8d7304611bf0b46760226ce924d35c4ae7150850241845a8d3aca00d5fedb7226636b986fcbe049322b88e1c9a07d35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dc78570ef3d88e5ede0d40dcbec1bd6
SHA119b6ac36c7723e334da8fa52555658fb4f32558d
SHA256c5db10bc0c26f89906ccdd51edb66e7cd5862a6706f2e6fc3836d843d5b5ff3d
SHA51274052bacd5effe7258de7e47e31fd33eb00ce857e35dcc159ab9a198b97825e16ed3139f30d1a3352fb900a91abadf4a9ed6cf5a4ff2590a906ce164fdec7609
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d7e149c164c8c48a317924ccf699e96
SHA1c2873b0d3e7d08a9b2bfbc84031895106803f879
SHA2562608251b46d817c122e3e14931da5f43f2e5094152ad6d8caba87ae2d7c33b9e
SHA512411d33d98f7aa52efb431dfa643e1c3a969d0ecb357930dcdca8021b5377f0c05f7d66b28eb1780544f4bb87918c6236c643e362490039e8313941f0c554c4b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f3076b96f3ad1d4cf1ff90ef35efd07
SHA1fa1ddd29f9e0093d7d3fbf5fc3d97a544844edd4
SHA256d095d646b55619fd505568c8b59f8a540a4092fd58bfe74b094da8023f61077b
SHA5125f89fb645bd14da8167d61d1524f3be6f04a80fe65ef56517d90f8e4a4eed22653d22b5c2719e7c27e65ed1541279e6321504884bb7471d7751bfefb4c7ba26f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e2ce7da9139dc8624400aa68a49df8b
SHA1280c0ad27ef4a691a0d75ecd55a7d670e021d9e0
SHA256857941acd7b9c426fd1b43ff7475ff93421055451da8d47eea7d753efdf4a2f6
SHA5123b45ea5fae39a67190f765f87de483f15f5b2174bfb7538e237abc5094a5890348fb62a3d44b59b6c07b7a349e62434f7e8e51728e78aa5cd6388aa62d011160
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5383f6b4aeb4aea5afb425097c29118fc
SHA1a8acdbf52d9df1a72ae5bb501073cc7295f325b5
SHA256b3b896575989dc7cf32d77df051759d0ad9637689c202c9795263b27dec5c77c
SHA512efb9b260125a4e98abd743d516b212b572039975d6bbded37f8049f582b45147126178c8309e1f5ef8d7625829ae4324dccddf2e82fec258d3bbf8427b88745f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d92eb1d998b73bc4715319183dea8d43
SHA18039595b511b282953bbae7dabdfeaa36ce2b18d
SHA25689b4a395d50276e7fe104f0176ef29de211571e0ecaa50729eb4d55fa05002eb
SHA512ce254a42b2be70a3d9243496eb631d3aa6473144ae3a22971d44af49988d147c4c308744fe271932145b2d27f2727b099a8975e8f9fc020f6e11de0eccde429f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58759c564b3084a807e5ddee9dbc0a61d
SHA185848e410b66787235e908572201dc49a49a33ee
SHA2566456ea5e59ef276d6fd18f77afbe8612a763322643cccdb540793187b20ffc01
SHA512f4235b14d49d1ac1e34b3f1e4deb7684f990e31eb9017ad4cfe704c4e614a380689d564ff1ceec72560e9677d8639ce5346b60e215f48083e0f60594c8d0e487
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558e9ffe31f4942a458035ca0858be899
SHA1f956989e26b82874e59fa9a377e640b75d24cf21
SHA256f8764539562cd5a7ea277d5d0f027828dbf1bc69ea3b0bb32293503d44b4bd6a
SHA51205085285c1022fa49d876d351d1c95c434341e5860a73674f01c064de9e0da615c890bfb604c88e13ee472f26d4abdca8e8406c07b0fdda16947f9a9b1c0b5d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5327cd4a6eac198d97da189c577bec36d
SHA1a71fd464a5d2cfac995679e5269d21042e6f2fe6
SHA256a67c2e0e158005e2d46537bf3bdf0404d852ee07cc113f5c439f737db2a399d6
SHA512576e25bdc89e80756dce4154120d72f954f51ec0a511ffe87ef29f10230fb29e62919a5864034b07b24621a1687edd29d894232596cd299b0eac478f4266cccf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d4bf1e5b440fe13ce9c803d617d62cf
SHA1acbd042733251ddd8dd383969c9631d5d0efaf3a
SHA256582f1a58fe78d105260f77d3140e21039c7a9891b1abca4361cc26ab6204d3c3
SHA51202f4523dfc213e356b03743a5861d7d44bfec36855fc29f5456e07d0babce556afb635406659018c551188b4a040dd5796e1b8cf710c57aec010179af81b033d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529c1ce0aa71e655a63b7cf9a26d84394
SHA1e015756a1c6a38a5eb87f3f4fcd4920abe205d6e
SHA25636d88bb36a8cb8272ab91e3dd105c5d5874e6eec58e6ae662dfcd045152f5c30
SHA5128f9762cb492d6a1bebeb4d3082a620cdacb68ce799979e6ee9a0b49c9edb4b8b021f453cbf90f9274c5cb512372e256e7da2e997ab217984abb01715c9a2b37e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58eec05d8b120d5f7839e42460266eec7
SHA12d661547689f1104f13af978337299ad8e921e67
SHA2567b04e2bfe9330f3f321d6e9cc315b7ac5c82049bf5be4f5fd90114e31e165353
SHA512a3e923c78d1ad17de30005ded3fe62d220d2c136532eed57a5272f115311aec4b308e385c98dd93a0e387f16d10ac685d81d2711efa80bbe542df3c9ea81ef05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0f0b6e727eb11f0f6229164e60e961e
SHA1e2d2d85069b883b4086fd1207a663d04ec325d26
SHA256abfc53ef29652ba672d0437bffbc1ba773d7a5daea9accb3bc491f49ec22a1e2
SHA512a7867afa0297ae21be3c696a64c35330a4904547c17447568c2d8a996efd745143be19d5d88ac2cbca9e3ed2f1e59b5cb3a54afdbb9699012501f79760057086
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541fe73a823e5e001c7c3f0e3a10f51d8
SHA16d5835c7ae4df40b0634529fdb0f102dedb27372
SHA25689fe43fc02bbbf53ad3f370aafdc8b393f78e083b906f3d072a53e43976bec73
SHA512df53da68623dfd773a33e768a2fa48286c296c369349d555f63af3344a3438382897c72efedf09c1ec85020885017b64fb65825a0cc4fb0ee1a953899a4e3ba1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b17e391caa7739b247a7b4f175d61d34
SHA11eae3276a508f2c8394c4775e012ede407b72d5b
SHA2566caa27b0c42b1e5457be771fa40769fb70ce14ff19dfa5ba4a25c9d65a880868
SHA512afb922d03d215e34b8da32e9d547ea4047979c115633080690075dff3e5eb9ac9b4af6f75df62ff4756b5b35de8f8153fb7749aa7c85fc614ebecea86d6c0f29
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b