Analysis
-
max time kernel
136s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
30/05/2024, 15:16
Static task
static1
Behavioral task
behavioral1
Sample
849e13f9c43f34807241bba1cba8ae87_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
849e13f9c43f34807241bba1cba8ae87_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
849e13f9c43f34807241bba1cba8ae87_JaffaCakes118.html
-
Size
67KB
-
MD5
849e13f9c43f34807241bba1cba8ae87
-
SHA1
83364a678efecc27829df25e4a017bccf127d8af
-
SHA256
b5ac219fbd675d227070fcf0ef9320d24c1537a7ab2b68214df4934349e9e718
-
SHA512
71d720ae081e31caed651326f8fe12da679ecc2a4361570b982e584176fd6842b497beb50dd5f768a95b0f19b15304046438b5da30ca15deb59610fea545f4a0
-
SSDEEP
768:Ji/gcMiR3sI2PDDnX0g6REd6dHxivxrmoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcc:JtDqc3TzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c08c83955b83404b810e3aab534103ac00000000020000000000106600000001000020000000e20cb562dddc740f0f8c76ef4c619923a18ed2344797381338e67f0b639386a1000000000e8000000002000020000000519b16963c04c6d63159ac38df75eb5e89d6c6890e32f6bc7bd5551ef9389e9220000000a774ed867cd1c524c26ec175c7b88a77e112fe0e15f5680ffe752aa4dbe613f54000000003399d2524f9b52d4f3ed6d10233925c2e8d631518683c560a3bcc1f8bac3c0d65fd470028e94721144aa9668eb5750ba7954bd3590c4efb10373ff281aaab98 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A53C9A51-1E97-11EF-B54F-5EB6CE0B107A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423244081" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d06cf779a4b2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3064 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3064 iexplore.exe 3064 iexplore.exe 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3064 wrote to memory of 2972 3064 iexplore.exe 28 PID 3064 wrote to memory of 2972 3064 iexplore.exe 28 PID 3064 wrote to memory of 2972 3064 iexplore.exe 28 PID 3064 wrote to memory of 2972 3064 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\849e13f9c43f34807241bba1cba8ae87_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3064 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d355fa836a2f2d142e3bbe932c9ed7c6
SHA1ef6487bf74c2a80aa5e4d45e613a9f809d474e7c
SHA2561824ca8285b38ccf4de720c68076e5919624636531d0583a35b5fa9f18268135
SHA512f9a4ea728b71a8d9e8510767a7513639a53bb1e8005333f17afe5ceea29bcca7da0dd594d0e76965bfda9a063946236d93698b41073874f5534eaa32b9191fb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c98398686c9d39678bf0336a26346ad
SHA1455218e1bf84e5a6f6afc17bac6bbefd49187dbb
SHA256bdcac4d3c2867d4eddb1228f5e7fcc9f1f51045f37bfc40b96e4466ceb989fbc
SHA512b1b14990dcc7dacfa166a8288d2be7b33766e4e809848e42907e7d77d41b1c51bd37e12e19a4f0098211b1de9e5c9de7f3af7f2787fe87c81cf8414952acec4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a48f3e4497a98f05373eac99e17a4a7
SHA129f83fb6effeb0c59a2af3a941121f77df1ca7d6
SHA25629b1b5146dad0cecb61e42d302d49f2d7b239b9a59fd10f7c92eb58c7333f66d
SHA5122c039c2046f62c2ee94756e84ba8b2d35b76bd5d50e27b1f2709a11a13c45c50b8cb8e980650ef7ed020902581834a6a78644bba5fcc32d9e33efe7c4502e411
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50509b767ce92106bb2da064fc361e695
SHA11a814f59058bc6befe0e67bb6fca97a640fad5d5
SHA2562c2a622898f6429615cb2f1cfdafba448b0d6c12158bd06ddcd1168419ba439e
SHA512713f4232030e24c051d2af60c144b27cf347360630d415791ab0ba9d8db3c72b2217e874ee637a487cb1bb65571f6b26c0105e99aa18e9f1c08d76c777d84f45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3994bd22bc11262d1304de2f208fa78
SHA196ee37cc558061831d5d5777a9e79543041b3d3f
SHA256f48f59ab678fc3cfd309327b490605b923a16b28d5316d2e07a79da5553e0d60
SHA512ae7ed0a8ac31dcc245ca0e320b74cb08f9bb80ce454a05b0b6b6b5dd3b8670e650a7d320d0e3ef81f31f0f5c696c3b7cd4ca5ed805b08035a70238b0344f53f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5652d691af88e21c11215bb07f0c93ffc
SHA13a9d6684f73fcda010c1e7c6c2751cd7d9534a98
SHA2562c0cdf12f682ce993ed56988328f09b167cdb3554a4a4edc4dab673f51433bb2
SHA5128497f493863be6cf986376c533d9e7ffc936d32ee3e422c7973d601719c1eb772cc3c27b817f7406cd04e3f3e83cb5298b1eb9f8628abbdaef0c49e58f1c15f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529ab8c91cdde9fec120619b36302ce83
SHA1d245d77d67ec0f23643dec565843f99137adb9e7
SHA256e8d441b343ce9fe62a4ae1640f4935a0f28e109fea2cf4d1ee8bff1afe6b2d93
SHA5121c7106a4edbc3157b984216e8fba464b8871cf4e335bf7a3b09d799ae3f1b5e5a9b325dfeb98d746f8439b3648f94cb32c5d93778f5ab422a4251f02bfea8bba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efa10626d68a4092f5fa7f8e1d77c3c6
SHA1b2ec7c7a7aceb2ea3abebffaa49eb7b6939f3239
SHA25691c0f6682f50419cda310c33d1f82b679c897c042a45e3746c3ef5c56ce702e2
SHA51200be0df2ec3fe1c107673ccbca44de9d13ae2ccf3b5413b49d9039bbff485f1233592ce2fcd015a5ca44438fb1d2323ce6c6dfce9f6f5cd4602700c7e1f19bf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515e85d6ea7cb7fcabcb7be339ee97416
SHA1aa5a9967380b59f7a7e0810863a321f303532e05
SHA2567d750ea2c5fb04476db15ceab7cccd81039f0736f12a850ce539786be842799f
SHA512ef6d70c21ec280f0824f7199324f04cdb853a5fee00cbc5c1c35e7522bbcf4120e5b41b0fbea95ec849eb5cece4f9a2df09ef88093422e2523001f6dc628c4a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd738d7f26960fddff13464d01faf8dc
SHA16f1e2d32373a7f45545ea5d5953abbf0bccf1ef6
SHA2567b20a86c2d18226765d6284f3f45464e8b391fe90b0db8b86192461cfd1f0bf9
SHA5128396f91dbcdbcc47b8eac094376ce68503e34715b6761cbff3502f711a2ab7fdc806203c8ea2e34c108f9e0a1e9d485532a2d66efdcb3d2df7b8f5eb57da666b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d055311b0ba8f564f28c07ea6db6857b
SHA11c1abeb55becf8d2d214f5003ffb2a7a4deb8f61
SHA2563bd90ac1c39621ed177c6bc711abdc0b1a8e618642ca126b4051b46b310baf65
SHA512fe9c3606164625e1fa1dcb823bf88aa469187114ad469f112fc3a03107620cefb53e5c7ef330d90b18c91f3632769b240a373022072b7b7ef1c67ac88f00e4e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559af109a11f176b92422a7164074952f
SHA120519c39cb694e256943e38154bd72b41538f393
SHA25608d3b6b89f0e791962b80fdc78fed8ea63cde3642ef0f4b635cf2b0f7b631b19
SHA512017eb4c4b6ba9b7ee2fb1571ff650296cae052078936e3ca1caae3d56e75561ff5bf6d5dafc2c79f253ae3ba33c63af697230564d9414a4df7345e6294460c56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e48da82ad655453466b6ced8eb5ede63
SHA1e145f39816a2b30cf577e0a26550c907392bebb5
SHA2561e4b9683540861d2dd7c6dd2adc0667a4cd97399c7d6e4be602eabd626a1282b
SHA512c2426f617c26947e4196478e9086c28e2d01e7c1ed20b8ce23fd3e1968646dd8bf73c48d487a03c27a22b1c259815f9314ee9f9e456d34c77581dc6b36e7c58f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541271289115b5d52a418bda37ecc7cb8
SHA1ad5f1c435be7709a1c3d6a71c95be5e23d70aabf
SHA256c4e61f7acd3155a93e7bbe1b5c7ab6605edb48e1c9a2f66ea555f180f567fac3
SHA5128d6ddcfa2ad31e9d168bf9600478561bd19d9a2a1636e7a44a30855be02eb24a08bfadc79eedbdf2a8767842a0256254be46446cc4e40056cc76e678fb3a6bde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5236b2eaa4f6d1c6cd16ae71bdabe3895
SHA1918793341558087c93d0cced7cd90e84754d1862
SHA256c557bb7dd95326d5232b06cf2386b7b3d2bcf9e65663348657796964aa62b180
SHA512f6e0576eec34e7967a38156ec2a5ecfc33b41d257edd1b227474a03aa1eec3c30b21326ce28a7e3344ef54ffd581acb60186001c61c6ed1e1d14339a7d4b4d98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5642b2a5c4ff5c774efb56ae1c15b22fa
SHA156b3fbb32f6c654720092da1c1e3fb03c5277568
SHA2568398b549748b1c50ff1ee74994a77ede9d2dbc91c20f30e96f0f8d82e728e95d
SHA51259635ca74acea6bebbe6396538c09a079d0da39db165403c40ce03f60be40fa4de81f69eda8d12815c85f6a1b00ae3070bea98e854b88e1aca4a6405a6d156df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5603483b7c12a171b2bfd9b1d9b19b562
SHA177d89fea4e4bbd83f626d1b49134c584706d9934
SHA256e5fb0611d1a46dc2dce1fb7dcc9d5a6a66fe866dc812d4fe4e0c78dee1522ba2
SHA51206c9b78adaf27bf407b7fa33a06a7c8c00039e21e582b84d3593b12e9b633f54c72dc6680bb089608ee32ec1928d74e136fcb473842c22d9bea47a3786cf9140
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c2ec3b1369c981512577f368373d454
SHA164a50ec43bf5ac2b0fc6ccba9b9bac7d98fee661
SHA25617ef2d75eaf68efd76659c02e5b5ad0fbf19a0db6b85bedc8a1367fb2986b3fa
SHA51243b6a843d5c23174ab8ee8d26bf20cc7625e74b8255eca484d962be556c919bd748145515689d9be9748d9a6c376da0bd82d515e6a62292a976394298d39824b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2fca4e3363d8a4b044811ac9befb74f
SHA1c5690d512dcf44eda44ee2388c00e0cebb506478
SHA256a0dea4b71789fcc791814dd6b82656e298f7b59e3fdaf4a7e752c21a868005b3
SHA512e453806c764df70855249a4f9ae9146693690aaa892190ca47d65eae4aa6f1e5f182dea4a6292f1eb9602c980463f43d3e6f2678dc813d27e6b74729cb8b1da3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b