Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 01:39
Static task
static1
Behavioral task
behavioral1
Sample
859d8961cb422909d868e547344fcb40_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
859d8961cb422909d868e547344fcb40_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
859d8961cb422909d868e547344fcb40_JaffaCakes118.html
-
Size
461KB
-
MD5
859d8961cb422909d868e547344fcb40
-
SHA1
6249cc7d87167b40bf781464db6ec8c5462437eb
-
SHA256
f4ce16c98f0a391d76849bcb9ca6846744f0603616be17b9d252d10d61df03e5
-
SHA512
dee7f134f94a509f0ae07d0733aee0da61c6856a3a0014b4c310822763cb3360e6f15546c1fd4616ca4329d684c4cf5ac4a226f26d1eb56361f0d9b58b320e8f
-
SSDEEP
6144:SfsMYod+X3oI+YHQ5sMYod+X3oI+YdsMYod+X3oI+YLsMYod+X3oI+YQ:w5d+X3s5d+X3b5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80be9069fbb2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{90E60491-1EEE-11EF-A5E3-DA219DA76A91} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000001b1cf87125f243379f662b03a1e960b881d7134ac94a428d973bc357634a4f3c000000000e8000000002000020000000ba754f8243017f3f744f337b7e0224685729624a0523781a8f514a957509777820000000fb1530893bf21a014ece7f1d2fde83da31cb2748db68cd51bc55ea0cab085e94400000000948e1a74bc71569d59fa312c203a52c2b2e6d46831304d1deef28284706de61ab9af9a07cf6ed017f2dadf4e13da5312015708979ed696a86c3918a848ad472 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423281413" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1916 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1916 iexplore.exe 1916 iexplore.exe 1272 IEXPLORE.EXE 1272 IEXPLORE.EXE 1272 IEXPLORE.EXE 1272 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1916 wrote to memory of 1272 1916 iexplore.exe 28 PID 1916 wrote to memory of 1272 1916 iexplore.exe 28 PID 1916 wrote to memory of 1272 1916 iexplore.exe 28 PID 1916 wrote to memory of 1272 1916 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\859d8961cb422909d868e547344fcb40_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1916 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1272
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549dc54e64ba99311b850d79c87fcbefb
SHA1478829ed226cef8362ae7ec19f93525ef3bf7020
SHA2566925e8991427f91fcb7bd357c988cb78962064a458ac1de7045de97c3dabe0a3
SHA5127d9b8c8c504676daa9120b0a40c44ac6cbc822f0e164d0c069b66bf729b25642bef6debaf171b48dd3b5d1940c892e86701738c75b3c4679f9bfda6d17a95822
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2cb9731ae40d3da663ebfebb259c40d
SHA1d367841c6c1ace33b94ce9253c605ec2f4a5d675
SHA2566bde22510e095e78ed81cbc4e09f01366cf200d088a8fe5a69d98c278c2fa2c0
SHA512f9296d544949a3091b6fc1daefed16ea5e2cd891f25639cd62a9389703b02f7698175a3fca11666cb154c649a54e94ff0a3cd529eea8655f80993addbfcaaeb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523c0e0eaa9609ed7a8e37ab9076e2ded
SHA186de95724a57b6b770928451b99b42215c68bf82
SHA25612ef6170d318b88ee94568f35af571f0f25211780563de87732b14a07545283d
SHA5120d2bcb43828fce1e76f05d2915b8342d3a59b43f6788b2a815db2001ea22851c8231ab64af64298b2349401f35759b2fd65f8ab061b0c9c1c8fc390f9f67d956
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536e7ffd3563375a60a5119c27c28ad6c
SHA1e3dbfdd89a7ee735e2690ffab1fa7f04f812fef8
SHA256e099677aafb20dfd1c61dc4b6c5a48cbe618f4dddbc31d93a2f8e679437c249f
SHA512eda942373c7ea8d6268d961440c177e9e4e385c33a0c96d428408a39a7113e48a48746a40f77cf27fcfb7c7809da692e100df3e25e0c6486ed43d9d1e2f30148
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538977c92bee08a11c4ef16a361de8095
SHA1b9c8845fc3f92523124565a20ab5e0749365a116
SHA2567baa9ae864449c4d70584ddedca26c7131167e1f25ddd341f3c33d959abb04f8
SHA5126aefafd0ad048d242e88fee8599cc3fb63e42fb955371d3d680df19668d6f0cdd9a858bb9dfc262caed1ef2fc65a937b5370e811439ee7c3053a417c63ad8712
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541525c3a6dd1b5d40dad392e9af6157f
SHA13cba046a47066673b2668dc6eeca101c7970009f
SHA256cbc9bbc157bb59a6398a68b05a38d622923a8a823a64979b1c8b06631430d468
SHA5126326b7d4fe718df8a561c53f31226506a2f9b5b71491bb31e6f7cbafd1b24053005c32bc5b1805bb0e6ae1768c52d34e96778b2b4536d3197f6fe40bc5555df1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0a143a3c9831571f6c56303d39dd75a
SHA11a108459f45b9b4f33abdad28218a9630d5c16b9
SHA2564dfd979755665966b7191c49310b9f74559da070b597ae46e0d8eb48d77341bd
SHA51249e63964f7aec622281d0b9109953d3b09990bd471ca2b59d1f50bf1895cb149ed71e62817b78314bb09ca5612566ffb18ab3cabe6cf2558f12b27a0f96f5574
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5070c55de6b7a138fa4b277ddea204edc
SHA133fff2c72ce8279bb9a3e581335fd48de48510ed
SHA256f29b9f5b609d0fb6d083c7ff32bd29bfba7432f942d4957a694801d63c118be9
SHA5127d33882c76a7542ad804002c1dcdba8d53376236da371111b1e979b0ba2e93d09cc3baf4dd442c69cf003d74d1814ce06a9fdec73979d72a789d4e13963a1bfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df5b28ff8af729b49998945d321198b1
SHA1b161dd51801b98ad97c424c1e08790fd111a6745
SHA2568cdee66f63c3733e24d38f1f03f735f0f32db260f32824c7730549cf8384a465
SHA51296b30075e20e4cbbb6f392bc9f0f519625a179ea6ffeead11fa9c73e25e06f58da0ec09a6ccc98de0503ec228120200bdc904135aa9c1fe43fd84366a1b96816
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502993be3361c3c447763d837bbe5c078
SHA1c429e169c5a8461df1f2231e1ebd673df648331f
SHA256558b678000ae6ee2a99e603730a95cb15135c81a7944f729aa07155ba6250c05
SHA5122796c54839821e8b721e8728f68ccdabb1a94c6cdd5af5f4396663a2721db0e7795fe3698e531ba883fba06242c10338de80ec38db51a26df75720aff5ee13ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58717a2bec8e6a850507198048801f491
SHA142441cb0939f98c3ddf597e6bbc9b2128426ac1f
SHA256c519b29db070f9f3dfd3f34767aeb7556c59e28fdb1d7c999fce5383d92c0f2f
SHA512c8260e0ef2efec0b90158f726da053fdbb4c085da2205ec0827a324face9a406eb816d78304c43cfc0e2d26b9b88311f1c12d271254c1be428b3bfa556288edc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a5155fb81c9d47095c813756611906f
SHA13dcc28fa05d80c8d000b3dd720b3ff91d4e0b6cf
SHA256608d8830868942a90d6b7db26b7b02aad6bdbab5db96c696fad70a293816b264
SHA512215a31926cffc99122e857331e350eba1f85fc55e58240ebb4f527d8ff4700c2aeda1ceb25f35a0a8e6ba130fee7fd6d07763a14a1299860122405352ae6a65d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58294f5a4e4991f22608fa025b337548e
SHA1762a672d66bb740a4e87f194d2dadeba4016c164
SHA25652531bb37a056a6f2bd52116b50aeda2dbab5cdc24b6596e1e26ec0c61519561
SHA512ebd3b4efa14b13baba3b4192da9e223ee08b808007703f4b1a37e157fb6943e71b5d15a5783b9d822d8ea31a427b5f450182e997f8c602fbe3eb7cf604493001
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57288638c5c86964be4d10b1c29106bdb
SHA170c04c455e25396c01b7279cf85366b4c4a24f3d
SHA256049036948fb54ec9dca2ec0b5440a37642cf98c09815603540e5fb14792f149b
SHA5122de1e2bd6604a719208daa4bc63cdef862e176675a3bc33cfd33e4a84e70cfa50f3df18413e9859c9cee3eb06c69bebc578ec9ef4c7a60056b6550c0fb112413
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdc28466ef371dd7367ab96bb8b583db
SHA1a67ee07546d0b2fe262b211c1dcc07e549b3b71c
SHA2560118cb35939cd633f837cce5d85d46ac34e1a9e06401fb236d922039d0c078e4
SHA51288c4a287d09a70d86e7c0cca12080932363b0ab88f725c659f65b9c0b84b15855a1eadb14156580aa77934ae11e31e34a3321411cb792993556249ed854b0cb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b1643576bc32680c4a6dcd1e30ec459
SHA154249df85c29f2c2b99659868afcce053ca58ce6
SHA256d2cc1af5e6aac60497d4804563f9b7b0fe7658239f6dae0a322fa1931d869cc5
SHA5124f2c4991225f15bb268a4c7701c64a9ac9aa0fc22b2192f065882c379d9ec3933fe2a65beb6baee721c2f3a0e746719ecf666b66ee7d149da7990b7f761bac5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c1bb2617fcb3c4ccec380908f54826f
SHA1a8407351d00b98215c605d233f6fb0afb73fd13a
SHA256a32d785589b92aa2f4d600839660720d40b493963b0901eb8d219a8ad5b9ee94
SHA512738c8eac72a8654ca382cfe66a4f99503ae6c093ce96a2511ed9510fb2bd5fa0efa7bf9b636bcbf1ac039208ba928178a7293da92dfd91621a9e443ccb0dffd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e0c650f0ba89848eca32cd7d14f07d9
SHA1c0e352b0126f221d0e774331976ddd100a6e06f9
SHA256027cc64120f1fc194aa8283bccc059361f32756c8497d6c2b85513f0ff79e9fe
SHA51213690f3bc099a810bb036a964ca120cabb504907ed537ce3be496a582cad3a057c81c88fc5be7c05828d360ac0737d95ac6d5181426a2d37aa769672e99384b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580f3408bfa357aae48da762c63c3e619
SHA1aec5e5b4f0a9afec8dc35c3b7b85cad16c0b856f
SHA25671f9d03a48a8fb02d287bc08c1124cb1004c971da4916daf8a8a61c76395181f
SHA5127c2747baed066b6d4e2531f6150c677ae1788d1347470396f09ee1e4f47143e23443235b5b945dd2adb0261a1a4eb1d9eb8884a09e763c3fccbfe130e696f282
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b