Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
30/05/2024, 14:14
Static task
static1
Behavioral task
behavioral1
Sample
846ea3e852528df175dc6b185e48d0e7_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
846ea3e852528df175dc6b185e48d0e7_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
846ea3e852528df175dc6b185e48d0e7_JaffaCakes118.html
-
Size
15KB
-
MD5
846ea3e852528df175dc6b185e48d0e7
-
SHA1
f7c4deeb21fd95d887ca15643f84490627e8b4f0
-
SHA256
fec03a340698e2192a763ab321a388af97e4b3687fe1b37d32bc3f7658062055
-
SHA512
773bfca792d02f5a54064d91fef53f923571d4fb7182bf64095da068904670fd7f2ae05da73259e1a505f39234f736f5050ff33236856554901443cad2055672
-
SSDEEP
384:0mkBMzaEDLLLLBq4HH7RCpir3dLLLLLMkLcdXkLZtkL7zh6l+Pd:hkCuEN97EErtGUU
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0d22cce9bb2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F693AFF1-1E8E-11EF-85B9-4A8427BA3DB8} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423240351" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a77bc11c96bc624caa13c5b723162be200000000020000000000106600000001000020000000b86aefabfa7e18cd5b26ff3574469ea17f4309cde2b222b947f2598322aa3ca0000000000e80000000020000200000000f6815955b8ffabcfd3be76464df8956aea0b2f34dda1f806e9e1268962c5d46200000007d7ba49dace2decb03c7c8844da523ea684431e08cff17208a4cced2c6c7957a400000001c3077b4991dba3dfd1056cd74d73645cfc8cc1cd84c832064537c44921eac91cc1841b2d93f4704adc0fbe77c7257e6f68f0685a825987b20befd214d54833b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2368 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2368 iexplore.exe 2368 iexplore.exe 1408 IEXPLORE.EXE 1408 IEXPLORE.EXE 1408 IEXPLORE.EXE 1408 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2368 wrote to memory of 1408 2368 iexplore.exe 28 PID 2368 wrote to memory of 1408 2368 iexplore.exe 28 PID 2368 wrote to memory of 1408 2368 iexplore.exe 28 PID 2368 wrote to memory of 1408 2368 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\846ea3e852528df175dc6b185e48d0e7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2368 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a08f9cdcc700d9350dc536073e477041
SHA11b700c2fa1b9053b99c43d9fbb4f6696b9de88fe
SHA2565e4ec72aad3b142e669de40e4c2245a4fd006f8908f450c6118673e93304e374
SHA512859fd60d42463ce3a99189e733152e31d18369b6c2f33e9e61385c07db6c044fee43adcc9d5071ea49d20c6d95e89198a4f5a3bc09ac8c0d4b632b329a182684
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522b296d0db01c1c5772246eb0f8510ef
SHA1abba17f67bc655ead551a7c61ab2f8162ab9d8e7
SHA256b8a03cabaa818cffff4f81f00b43d01607fefd4ea08b5e2ea505dfeb5bf132bf
SHA512075a1aa563a01cd2e0d7b76b7a545103796a3bb71d3fadc665f29cf62ef0d373178fd94b3181c2b20d99265caeadf745e1618200632e24f04d869aedae6526e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e777bef9374cfc02e2583260f49ab36b
SHA10e38c39a256d4f6bced71f11cb825c963a88a9af
SHA2561e4767ca73dded1086c8afa65957e2b1abd9252d5fb8c040434d8371453bbfd3
SHA5120b6588f4694ea46a502603261b93014f2bb133da4d423c7aa8eab18ce1ca4d917c7085d5a44876d8f912111513e4cd3bc4ad9e5d13c59654ded82f0b29c3e923
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589ab37d1aad9988a3d8883ebf59b7111
SHA10f744a6a2c7a3bb61c4eee089456edb52a015796
SHA2565c47d0bed3fe25f86e810999ca7b7933e77239538b9d0db96c9d5f3755111f62
SHA512a7680ea03446b72e6e4057b96496bb9fbe6cc9ab86f92bdc215a0a28b1b8b1c6afda4dc11653c8589f73ab4f3e2075ac192d90d03e8380d2589e76e6582812f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528b59a3dde3d464edf4906737ce6d8ab
SHA15e0090e45f256303d7958a86c4caf8a8953cdbce
SHA25623ec9e158dc3ba08f34cf47fdd854c0f99832b5f463b88983cd54ad8178a3dcd
SHA512c945a770715bf8ea3142bf9275624ea40cec21bc97b09cc6406a0fd7d029570c3d1a999dae479eefbd8bf2e8ee5d0d86c47da28df269a11b38fb236601590287
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538c8d7ea6d9adb0130af55826c036a17
SHA1673114018875e640de49c44e84a3b79cfbc27db6
SHA256e15b3fe5ee9a8d3ad39bff43af907308956d764f9142aaa427ac182e21060337
SHA5128707da55906007441237ec3345421a92afd37540646848181ec0051e4f384d43886075376e80fc2f377a21cba74b072688d518dc0c5c973856bf1d6f2da2279d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a27331fd063e01b647c725382cfe9478
SHA1e02728b3c06f085dca614846ccb1144f12d68896
SHA256fa6c8588c577f1b6aa9c50ced96fa72daa14cf6c3ff6943d7af9f945f37da142
SHA5122b4e9faa3b27447f58d8a12b3c1fc00270af608a704e32a5334ba25e4720b0cb1fba250e18739700dd26a74cb20bddf2cbf85e351cd9a11237db8dcd60230129
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e12ebc868a8ccf6c0e649846db87d8a
SHA1bc52064d7c483e54dd6b249d60a2a8b24e3dc2d7
SHA256c7727059dd8476155e0fae49db0e0ce6c9849e7e77cc30217984a2af17996b03
SHA512f58ef7123407047c5dd414b5ae2ee0874813eb8805eb5a4f728c970d9def5918fc37d11397e1913fe64087697dc60b75b8cf748a11774ff132a6d9555c9b3688
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d8cc9d7f27b845fc5498af8311a9d65
SHA116b5c0648e52dcee6811c687cf7f08941517290a
SHA25699a8f7e87a7b3673f2c16421ba422aee9f1214cf8c057b6abe6390b324e40f4d
SHA512238e7039ead3bec0d91f83a14801cec9c2db796fa9c3b49cb20ae91970573e1a1141449ee0505fcd12bfd9693bea0a10e93701cf3c1e59f652007bdd7dec5c90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c578c6e1f59b6d426b297b974d8db2a
SHA1db6456aad3b1cd4cd1180da1d4e4e0103855842b
SHA256aae8ba55995cfd47ed980d2cf55e56ab51bb69fca2ec91dbdf290424e3929324
SHA512421c3f5dd5e9eef0e147c5b15d02b19b9f716ea9121e3a12a001cf4687cb22c44feec3ddd34f302be6d6818d1e6c0581bc9325e803678e1297524fb5d3539192
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55182b0e085048d28f3c27318608aa2b1
SHA16d26fe28fc83b03ecc83cfa177b887bb8ce16373
SHA2564cd107d6b1925453abb04033a45fd4bfb108644f8b7fa7c89811e250aa202801
SHA51296db3525b8085d57d6a893fa8e4825a3faf5d6d9a2292364294b73be480bd102761e0981925f8bb5b55dcd54137d91c6994289c8e0652b871a0a18d014028f13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b879814db6b4b3c5f971e1c9f0ee4e1
SHA1e3924ff03bb8adc05a9ab54cdfc732de023e156b
SHA25688726fd6a6a0bd35212b7a797d47c13d868a76a68ae40bd8ab95e8fbae5802ea
SHA512fb58a3a0575db00b9d6aff7a62fdd4cd5c757fa796b6e513253636ef283dcfa6ca5ce4d426af5774d71cd445541e84fe0d4a9a05dac035f95af94b4d8b3dd979
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c82dd76374d7c95ccf3010371fdb4b8
SHA179a11dc1e7b7c84010a3b768bf312227acb232cb
SHA256d2821a10d00850c8ca16070508de93a15cede22b577d3ef444b1d179eb16e953
SHA51297f8deb301f55838919c96dda951441a5cd0fbc74deb3207672c15ea004931b09b65eeaa3548c769ed222c00e9dd9251994d0742318fcdfc7c564a387fb0d2e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d73c0e5cad8640174b77639c8f01cb8
SHA101b768f1dadefb1773901049466b4170921dc43b
SHA25695612f3e2d2f15aa07623a41dd505cc95f6e7db969d092ee626a42144b3050df
SHA5122c877cdb880316ad50b0e3ec4b050734f1c6c4c59fa1d8f25437e14ed019d041f4e0638adbb275cdfd5931ab8b771e003090eb9367e6fa025c9f0b639d92952f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf0f89fde6372f907af0ec3bf53b3604
SHA14745f093ce00ff4692d6490ac6f0fcf42d5836f5
SHA25607de9c104a575aebab38b91bca02d0cccfad472a58d095ab39777a35cd82aa3c
SHA512be88eeae13dec3031b6e3cc2a587a79518a3991e8dadf05b620e98e57ffcd5b45534026695295ed69647a33b50a7d872cbae4f6fefcd8b69c595071b675c169e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540ce35ee5e87389484563d3e09c66dfe
SHA1f76196aa33743903169c4b13f1a576ba56022b45
SHA256330a29059b2004ec2a20ad3797a4987eb062fc4aa925c6ecb2881594dacebb28
SHA512b84e0beffb50e3659b69e92f2c281f727deaf0d54be282eff861c5f2c4a0637607fb472ba95c1aa0ab6aff2c210aedc14c527b3e39d105cff55a274858c7f786
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d57d58cb861c6877f95000b6abd9276
SHA1446c18553addbece7d167a22f53caecf4ccdb489
SHA256e07af1ba0959ac6c0382f1098bb68a571369e65e1ecf7af0f5fd52a7e371a12e
SHA5128f4d58956d179a12b768b5a68e8c27166f5adbc9acdc17ae8935dd14875550b80079612e2511bfdbd19aba94fd5ca1deda612892c2cbcf5788135783467e95d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528d99f173b5d09cd34c62d8b8c0e3d52
SHA1a6a2919583b1b308bf9cbf14452f45bfc6316a8e
SHA256d4f5bbafe6262e2a7cd25660a7d77a446ad223b94d2a23c269052eb5c93e8819
SHA5125db365776fa5e758e6f8fc3c5c9fb2e29902a5d3af0c09d19c64d482c39c259ad194d18ebb7271963669ebfce9e41484fa9ac57577dee9314479ff2d3c910be3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4ad281bb902abc13bb3fa305f9b6673
SHA178187a276847d4a80a07be84afdbc310104bed6d
SHA256cc25466fc105b0428cf83c04c92f4b2959c50f0ac1ed84f2d3c6e4f7880bc0ef
SHA512f328f246f56e76396470b873a1140329a7dfbb77b134399c3b89c9026117d742163640bc9fa1edf3018144f316180960c52cf7669b5a2243a165fd4a9139a63b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b