Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
30-05-2024 17:51
Static task
static1
Behavioral task
behavioral1
Sample
84f86617bba109eed7b544a52d377f80_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
84f86617bba109eed7b544a52d377f80_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
84f86617bba109eed7b544a52d377f80_JaffaCakes118.html
-
Size
461KB
-
MD5
84f86617bba109eed7b544a52d377f80
-
SHA1
07b7986f6da8aa0d1436975240fec4bbd08d1019
-
SHA256
f78de7521206e7ccdcfe9ad1944c15513cb7522cfd732741e45f9d8415c06634
-
SHA512
a617f87c78f257e08adb5f9a42632bcc1aa5cbda91bbd6309873f18023582a129fc0d3ce696b3be158dfbe867811df131ee05f20bb6848e5ea1712476b5dfabe
-
SSDEEP
6144:SCsMYod+X3oI+YksMYod+X3oI+YcsMYod+X3oI+YLsMYod+X3oI+YQ:P5d+X3I5d+X3Y5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423253385" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 606b6e27bab2da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d99d732b87fd0247bd0f06af0be5a9d800000000020000000000106600000001000020000000da5bb64b46b0863c467abb97ae79fa613551a9e8d2e451f40767010d7a022e9a000000000e80000000020000200000005787e5e05a8e65966e0f943d9ba8ce15749c37a46283725385516abbaffee4a32000000056b90342795b07366f65a094736007536a0dcec51955020c7adae892316c1eb9400000005aed790c2d3c5756966c57508483f9fe5dd1aaddf9b709d87f8dc2f9f488b82238b5d8b795367c7b2a68e7e78c00608451e956cdffc964111a1b42e455840115 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4EE0DE31-1EAD-11EF-A1A5-568B85A61596} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2072 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2072 iexplore.exe 2072 iexplore.exe 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2492 2072 iexplore.exe 28 PID 2072 wrote to memory of 2492 2072 iexplore.exe 28 PID 2072 wrote to memory of 2492 2072 iexplore.exe 28 PID 2072 wrote to memory of 2492 2072 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\84f86617bba109eed7b544a52d377f80_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2492
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d8d26a72979702b8a8e9685d4e61242
SHA11344659a1180f0c829ebe741c4997e961c9b3ffb
SHA25611419c15c47e868eafe87196e2516e824c49bab56d721199b06892cb5b71568b
SHA512202f3ad62e71a8eed5b0ce83474aa477de307ad051ee1304c2bc8a6da795a1dca5e2cf717748b5e04b71f7be0a608fc4d70a80196aacba63883f093653bbd30d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc3cdc6adbdc12b0c80ee5f1c3eecd6b
SHA1e5419e10f6c8b91b09cbe97ff3a789993e56a001
SHA256eb7ee8f9cd41329cc3b96bda3a1705f160ebfeb74c9745860c20e0a8ee7dfb6b
SHA51262b123d299d3d5b9cdcf5fa6237425d9169f2f8b9046c920555cdf6c4882207f4e667bef1d9ae5c4150ac884a3e6c29c27a779e4bd47ca4244f8f240a34a6f8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b96f5b3d72965e827b71856913474c5
SHA1bf2c5307648cfb8452f436793be4dc2e0457581b
SHA2568d8e56ca6c4110705b66c4a0c1c0a491b1e716e3b7eb59dee9287fbdfb23cf80
SHA5128433fa5a80e317a51dbf248dad5b8f7e4fd54bc6ea43714f11909c05468545a47317a4ab21a618322a9a79d009438abc6e22e91f85f8d7673f328e57cf1b81ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cc5837f14b83d9039ed256967af0c65
SHA1b773eac1882fa44ea2dba329c392fbd6dc5db177
SHA2569f62a23447f8e13c47345addda40436bb86ff98c7d8d12e729347972e1035d4f
SHA512e7e9d0e658150ceb3bd125daed5e512c660820141b5b9b02741cd1b674354417b138b11886705fc0faf7c143d81f6e631d9dee37ee15e659d98532597354989c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c99684876f3e27653b5a54bbcb3f10bb
SHA1a977f97b3d90a93a05325539ac829430a8cbe625
SHA2569d7bde3a60dc6b1a8dbd77f34ed71ee636dc0c9b86e15d63e0edd36ec03ff3b2
SHA512f0ac61329e87286213b9aa3c53645b64cfc1f053ff7d5364bffa2ef4a8b9d06d2f2fcaf58489d4d96c52428cab4506149a41c3c1fdf54530af713d5040b902bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554ac0fa1959c10f6c3f142cf4879f320
SHA1f0ae5edb51d3582085bde3b8faee24818e25aaf5
SHA256088a9c83dbf2ae424b14eda7fc05da749fafb33e948f461e5e9f942466767de7
SHA5125e5e358011899276fbdc99f17c83064d98ed74846a1cecd5cf911ff700274d13a4b397710e87762c6c5b69b0362bc41b0c6a49294fcbcc6a83fda7e86c9be6f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570f548c024b29f3de76559b8bbe0494e
SHA177fc4b5235b3b2f6a4bb2dfe199c028892a31fa9
SHA25604ffc7234d23275f45b0614a79948c5e75f754cc8b6e549961cce7bd8a5edfd3
SHA5128bc014bddf7bbfb328cb3fc664976aeb57a351016a4b7db23c6eed7919605187df6ac584fd08158ced5ba44670abdc230634879f53861f2ce8771451978991e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fae5ba3fa0c1628461f48722c1d21d0
SHA16e062604c6ef268fdc82b6f010f250fa34aad5d1
SHA256e60f36539e04e32562afba4e46f0fb34369b3a9be32f99e5eb936b0eb75026bb
SHA51230b7e0b4d238e89cd3609049b2411a5da93f243118f62ca2c5e8cb353d67d53bc8d874b48a1f38a5b32691f71b7ba1fe6fb5e204dd55eaee37e9d3e60a79f024
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58413e9ff479df0930425131be4dd99a9
SHA11dcb357d1a69449ab1b9a7eb08f5ee8cfddb8a1e
SHA256d47fa482d107078a95b955205a484f54824130d77abccb04d443150861b50885
SHA5125ca741bcda63155e7bebcd9c27cd753bc769ac9d259f648a59fedf7801e0a644b592158618e247e1539294c734bad2afb0460f8a1807b3c492d17f78ce4928f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54232b134dcb71b15ca0f6ae5c5741f7f
SHA13dfb54c19ccc892629e2b2fad83ba8c696dd1582
SHA256005381d4f334929dcb3da29ec4c6d3605dda67441bd0aa24f1b5d7d53233a233
SHA5126dddcb0104bc8ea4449b3541219a0c4e40f72688491dba73370a3a0df235a0c6a2bd814bfffe9da80269b44e5c432faa7821612484e5f39bc3882589c01282ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542486520bdeccb31502d21cc1947aee0
SHA154c4b07b57e365931b27ba206f68fc093e6fa5ed
SHA256ffd57fee1764da1ef6b04230e639182ad54b439aa55c4e6c29c52cb1389c97a9
SHA512f78aa9231d3f6dc3d0824fe321b95722498f267f089522eb855e8b001bfe5358657e6761d5061a08d26e42fb50726db801d0c9a6465c9ebe1ad03b175b4fbfdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af6aa958a7c7dadbbc3b4ab284b9445d
SHA1fc0a7f0142afddffe3e9ba6d3e203c00dc7c71fc
SHA256d225f69db734e54276425633761c68a82e01cb345ce2dd47abef607253eca2ee
SHA512168064aefdf1cc92ef667cb3e84cc5822e16ef13f5eef9a6f250d1a524d0b225a934ecc0c5a2f9a80fd0481ae02b2b7243f2285fc184eb83614d55151649e96a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad2a1dd7d0857166ff93329e8c5a68a1
SHA160f0a09888c5b2191e12aa520fdf823b1176ae93
SHA256c89d3c2c42ca45b11cb79875e07c0dc36e68c0e97a84567a6188767f6b4d5514
SHA512c468f942fc696d6782be02bad604ad73f5ea6898746192e0688275df0990eb9e94f363469000ae5bd8bcbd28b7c9f7d17671d2079954232325ad9c6075ee15d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf46111c3d61474255058a2d7c33b160
SHA16cc57f460181475873471b330e8cde97e248dc33
SHA25627dc34a977c3e2afdd92048837ecadf012bf6d9da016d0f15320b60916839c1c
SHA51229fa6494c763cd08254ac577fcf8312764a3b83a11b14450357a6de957de2689c78fb6cba37515441b980d17c9a9e7b84d7152cbfc7e938522adea65cf29d6ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c0f4067f63f570255dcea7ce96c05b1
SHA19cfa9790dfe4721a6d409424940e9b39749c8716
SHA256717b2421305f79b4e6fbab75930707421251bd169508c02a05f4afb3eac1b26a
SHA5125b053183509b822507ba25647a7064767488a12766136bcda98ddbc3f2d511ca0ee050be639a02d35dbe2e1eca15ff785867ea65184ca605a3d316f250d83d17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb8a8fe4abc6431dc24a8584b6ed82b1
SHA102e6a9670f2edd0d3df88a84583ca2622a69bea7
SHA25607fb24202f5623834899eaa74058850351e02168e8de1fb4e47405494c04bae8
SHA5124a4d8e4e41ed29325f48cf079f7ce6b564dcfceb9d7bf338075a2df137b43c85563fa0ec85115d66ae66beaadd7eec74c2bc402ec10ed5578ecbaefacc1b5a7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553294b634fb512fe33634561d47402e6
SHA17d044bf8fe2f63da63fdc44b65d57ff42aefd2b3
SHA2561174bdaae8ddbd80171c6f501753a6e9699d0b289d9e4442eedfe07440244c3c
SHA512d5df44efab4144778c9199542175513f75c20b8b2e7135cb5b17f8fe90fb7b67860b341c48fafe6a68b0b68ed32baa8c1f94c6dc43bd2c889079a986926b3e3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f81b161dc3c6e65935168b11dba0ba85
SHA11a5e3da70d7b4118d3e1682832cfb09f79b18252
SHA256d25a09e44454533e5cafce4bf8455b8c5d709098559c8c5abce34261ed71fe0d
SHA51277179c2163d0428365ca7f02955c0baa4c8aba6bc619686403dea89790a4724f04815beafd857da3e8243d8b0c5e2710bd6162062792aa3a0f1332098bf7e2ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a756f91bc8584f1926db994c73927b2
SHA193ae69a66de8b91500e996f1739f3a9c80896637
SHA256ddbb3bdae033b3685dabd7880ecb30e724097b70f04b2ccb11df4b29614b4185
SHA5125225749e3c22afadd4b32032bb36e31e1e6a71f7755ea3e3aec7ac2e35085b2bd5e9f1236ce3bb3cda22434d20c58571cb3c48b33536e9caf0017eb77fbe8ce6
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b