Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30/05/2024, 14:06
Static task
static1
Behavioral task
behavioral1
Sample
846a0995c613d0b77a1bb9272e5a2203_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
846a0995c613d0b77a1bb9272e5a2203_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
846a0995c613d0b77a1bb9272e5a2203_JaffaCakes118.html
-
Size
4KB
-
MD5
846a0995c613d0b77a1bb9272e5a2203
-
SHA1
36448ba0abf79557de368e3ae661d6050e438da4
-
SHA256
603cdca6b77b4bdf067ea39b8dd48528040e22269e570f670e1b20e17bb16ab4
-
SHA512
2cdf8dab6f07d867a46b72974c20f9c9daca17e25ca3d9363a30c27e168def6cbfef271d56bbea2c366f6901dcb4714c4ea50c840ca888a31c683ed94f050834
-
SSDEEP
96:ziEYIZmV4MSEPBDvV0n47ej/hgOKiljSR1Qnyneqh45NSU4km:ziGwV4GD8/h/KiZwQn/qZU4km
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0a704a39ab2da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000079743d73b0769e4fbbdc881c83a8e026000000000200000000001066000000010000200000000ab2bce630081a7f58af73658b5f6c8dd91dfebdbab56afca97192a3d5617b43000000000e8000000002000020000000be917a2dc8cb7a6b69b2409354ff5d665bdccbb4a2c3486bbf550032d727489820000000c8b503285e7ab7ea7f32e33c51910f5a086bef95fd883be504b7d4f7ffda3e2a40000000c29693b57c97c0447e00955e326aeb0ff0f1bbe76ecb5a44d022481cf6aeba983f50f8964bd40f8d3e6c8904479019a906639a2fd2941f14dc8c94d030849b67 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423239885" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E0431751-1E8D-11EF-A40F-5A791E92BC44} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2992 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2992 iexplore.exe 2992 iexplore.exe 2156 IEXPLORE.EXE 2156 IEXPLORE.EXE 2156 IEXPLORE.EXE 2156 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2992 wrote to memory of 2156 2992 iexplore.exe 28 PID 2992 wrote to memory of 2156 2992 iexplore.exe 28 PID 2992 wrote to memory of 2156 2992 iexplore.exe 28 PID 2992 wrote to memory of 2156 2992 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\846a0995c613d0b77a1bb9272e5a2203_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2992 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2156
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4b077123d65f8ba03abfb162223a6a5
SHA1fc2d03bea8ceaab2f70db7c18b4eedc2e517f928
SHA25666512d546145b9803fbaa4242fc7405ef67d89f123baf3b61486a1164e259065
SHA5124cf8d07d956c236e39a43ec3a773303d125550b4894fdf5e8f38aa408310515e3d4c6e01366873c28b887cee2c9574e4b6bd204ab008a8e21f3e168ecd305a6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c418182d5a174cae1c83c48f8ea371a7
SHA1028daba75b8b4e58212cc2fffe668f92c8ce2e47
SHA256dda245ddae0a4a4ce24a5eb92ed8765c440e5352bbf2d9b1974f6c294e7c2d04
SHA51280d9466d38b1b727f5ec316963ab575259644096d612ba76aade56026e42c0c9e38f893226aac0679eecc90859952fb46f1dd77976c252150373b90721ec2c87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5394b9986c31a342653c253357b366de7
SHA103a434a8b73e91c48d45d57ca968e684aeca7e0d
SHA256f32badae6c7fdf83a2ae44af88dd4fae12b12d3fa9c628760ce81c1a258d018b
SHA51281d8eb7d256b8783f16679773e8471b4ffcf4654385b34968ea1e515e7edbbc000a46c683f9b9701534df1c7e37fbc8eda9ae195663cfbbb48a3bf1a50d8b263
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d49e6346c2932a7832f6c2033c943474
SHA1e1707524316b76776753bdf3abe706781dac46df
SHA25632d9cb4df4e34d99d962f81fbed1d11b2fa34e7efa2274c7d81d7e459bd4912a
SHA512dfe46f430f7ec3458a9db08fd310f11bcb9cdf4a179e1e0e3564886074a74532f0bd78d8ba89eedc1444cd6a14aeaa709dc8ce4c14e120bc3896265c23bd79b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5982bf41dccdbe680ecbd22f1e44dcd28
SHA1354021a59fb245c0212cd39aa427ebef3c747597
SHA2560b702e2ced3e7424bca3e95a9128dbdf4cae3b79d84a7c470e3a6c10997a6364
SHA512d70936b9c43b706d276b16f2b3d1da512af7cc1e4098c88cff890080e709cee13242925c2d579e2242ff16937aa9fabd7e2d85807524587faea06cbf189378a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537f5786cc431d1206fd24e6697543acd
SHA1198b18f9a4a07314f9450bdacd8a79aa81c03ab2
SHA256539c15973bd779391b9ab3f985af45872f58be3b8c59b4a03058976f46a73c61
SHA512089697ef9050f081045dbb0062351e622e9a1b3a9cc81f177215e714f4840056b091b47c3cde326967cf21f52d14075642880c5a49036e1e140c1ecb210d5db4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffd62e54e675cfc0db2f8cb923c0f346
SHA1c038f187259fc40c5e32855bf01b4c5661a2122a
SHA256f78055f1d9d2f3d27d78956a77db030f61a9165874d8760ed87b47359bfc80c1
SHA5120e40d09eb82ca877e428076ddcef388b3796cc6a36fbb783b4665591849e3263560c499af03f10c87a9dee9455314c206ae7485edd9fbb736a8a3494b8b3beac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cff57ac60afc9e6ced1dd60adbd563a1
SHA1beb9377832a2711b0e3a12cfeb02b4e3221f7863
SHA2560af30c4397dd061bb2e11fd9fd8d96c59ef2871332b3bde0805b55010e993f4f
SHA51244bfb36fc1707587d892f350fe15043d7358d746a5210f7d72cbf914b7e0b98555a820e11ae058e1411f01bfe49cb3724defa340ef7e0ee9e86d5f6ae6bdde36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dd01ece265a44bbc63d313f26a4b9cf
SHA1fbd8dc72aeb492bd0c15b4a406c73c918d34303c
SHA256500264c547241cc14181ebbdd943f167b3c834709dc92871ecada6b477888567
SHA512b9f5a07df7b1179be9faa44db704a26d6a6f17b0a76df1abb14d06bbf209dfdadae20e062ac7fa3eed720025601a0310d5c08d5aaf9a281844619a578f4a2565
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ff858a192390c6c17a74f63ff703c02
SHA11e2f43f803efb947520b0bbccf6f9390bdd92b72
SHA2569c4c9431b150dcf9f1771869ea1fec8e416409a63f769cc506f48e86a6220fd6
SHA512feea868646d3afb38f063f803360ecf55874036d8286d0cf3c565d34aa4ed5b17fe09c2dbec4c9ca894cd07724720d2c6ee70f0630b2368d36b62aca97b12d26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585860b59824d1cca2533feeb8c06c030
SHA19c72ad5861c402969ab21686e3030d036f64ff56
SHA2560373d623f1d1f371e0f5c37e11c6ddd0844557e60d888473e73cdedc9f905213
SHA512306fcb879fb0ebaaa9271e596d74158d2acfba6cad9583e2c63b1c622092c4d7e0067a8df38075bf8670814de03b811ccb4e9790d3d3fa12677d41e22d323fef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8301a48ab744f669cdff48c2e39e1ad
SHA10e42b26f2300c004647744532a98c807ec45cbd0
SHA2560cb9bc3f45ceb9cb7d1c7e691fe71a553ced14e1a848735ac0f509362157f776
SHA5123b6391984df78136531558fa33778967d5ac71a883decda992053f8f22cdf9612c8f784c25cafa59c5aaa271dac6e5af8d486f5982a45355de99cb756776a223
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55849b50226937c3004c7d07e33ad375c
SHA132de3367af5fba98cdcf7c9d3cb3d3309c9845e2
SHA256108c0cbdf6d94933cef2d29d99fc60dac3bca512e438e8ba493106456af27f7f
SHA5122c32ef05d60097af8ecf7208533ec31764929eea9cefa09c26824756292764c9ed107e58992fdba60236c6c60d8fbec69bf0882783a3495ab57e029f2ca0d4ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf2ba160c359d8aee9571cc5e8ad822c
SHA12061a6e78057cffd0312321bf0c1f662d3cb1e53
SHA256d15e80d0f52649311934d6fe9aeebac2c0a47fae14db2f5407055f3a4012a174
SHA512ad3eb56e17c70118a9ecb18ded5e3bf7e8bc53bdb5b41a7eea0fb2d8c5579eaeb70155c6982f380e30d491afbc9d9f0d8ed9f3bad5e069805689c80b9513582e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dccee45a0eb0035ca928cbaf8f1817a
SHA10f4d2c1b07dc417bc9a4cc6e9a24ef5f34e1a048
SHA2563ebf574e6011d56cc2483d9253b2ee42ee76ae8ccd75bcbad7e363e4d65d8b8a
SHA512e948c036a01b9b47909403a6e25249d7d12effa651d370aac8f59b5670ae5cf946b43edf79871e4eea45f9df2ba141821f1450ee9c84d4484e9d8ff49655903d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54eaf253d79abfeb83b116fac4c9074f9
SHA14ce22ef7f143d889d2b0ecc69a5e152ee1c7440c
SHA2563306d9e1bef2fb0230ab0aa4cc41183848e3f963abc34ceb916b3b8fd5f66461
SHA512f8b86c9d326a1e8d05eb5dfa7a091209b4fd74a4437908843b572cebcefa2fe46293dcff2246601606aad6f0830e4a2ecf3d8b78921409596b1430254248976e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8b7f4b9b08c384342b9b1dcdcc499a4
SHA1366b8243d9f3211df134f84175770d1a8cc8b114
SHA256884dfc7a74f4d11552440142a62b600192ef8e00020c08ece84f45f53436aa01
SHA5124564726e7a66390e653fa16a39ef4b0b0710516c35c6247ada5d0e698929a48af45303f6f445fbb18ba3f78157e7fc765bd8935a7049e269bc17a359a9c46db3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52520de0f165bcb0dc0c20811c9460739
SHA1b50162f5213ec57976c90f4375bd270b3e61156a
SHA256541c64f060f626d4fddb4f4b637d2b2ce49e3b9beef60295bf2690fe63fb8333
SHA51213fa9b7559b1d0131294310f27cb0db254500d8ea25a4e2951213747cfe5f648cf9200f6cffcda4b5660a66ca20bd87ee56b8283a2937b613ee08b4e289f8c4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5623dbc44b347d80023e6ece101a16891
SHA16b2d861214ebb5a199e6d9e22d808c39e6488a00
SHA256eab06b70aa291966347fc695ade9a2d0351659db560219290302f3c7a5406645
SHA512cdacf00a15053cfd60be6f32a191b5e89dac9f2f95d874e8af489068d34272881be7a11f002ab9aa273b81efbcd87afa246077aa73fbf5213b358d6ff8507fc2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b