Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
31-05-2024 03:14
Static task
static1
Behavioral task
behavioral1
Sample
85d3ee2653d79d7ae63d1fb29b68fb08_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
85d3ee2653d79d7ae63d1fb29b68fb08_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
85d3ee2653d79d7ae63d1fb29b68fb08_JaffaCakes118.html
-
Size
125KB
-
MD5
85d3ee2653d79d7ae63d1fb29b68fb08
-
SHA1
c887ff36e51dcc8c156b13514d4660ed3cc3f242
-
SHA256
82411937c768f831567eb4673b5574f6891cc534b0d501c66c277ca21293e60a
-
SHA512
d90e482d3647c957bd8b8cb1fc7be5a885c7941ee0698e644f3a1bd664c6cad83c374a7b2ae733f9a020095921f9f9cabcb39cabb898a719dcb7c107d5552b40
-
SSDEEP
3072:vC0s6hc15oC7yfkMY+BES09JXAnyrZalI+YQ:vC0s6hc15oCesMYod+X3oI+YQ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a230000000002000000000010660000000100002000000076f6f30874c571df4e1dcf71883e7eeca1ff6f54d42b30697021db1e2d069f6f000000000e800000000200002000000031aeeef3a2baac138e4c8a0a9aeadc480772f95ad3136069b3026996749a431a20000000c8081b7142dfca361bbfb81eec5e37e7930e05c4c5ce9d9e2f8e958ad0d3c1f4400000001f4729d248ac723db5b93d715abd3799615f82fa65d09905b8c161716e8873803a29e30d5f1772af61eb0a328046e96adceb787932a10184b0c7a32d5bf962d9 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 905fc8c308b3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EEC243A1-1EFB-11EF-A1BA-6AD47596CE83} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423287153" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2920 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2920 iexplore.exe 2920 iexplore.exe 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2920 wrote to memory of 2304 2920 iexplore.exe 28 PID 2920 wrote to memory of 2304 2920 iexplore.exe 28 PID 2920 wrote to memory of 2304 2920 iexplore.exe 28 PID 2920 wrote to memory of 2304 2920 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\85d3ee2653d79d7ae63d1fb29b68fb08_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2920 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e779dc9272465385585093c19d56d731
SHA1c74d192ae4a0420a99042d9be2134d0468adddea
SHA256a1f44445c6f0bf0b6f9fbab41a06e41884f4a1a3c3d87c5ffbcdc4b795c2adb3
SHA5125c2be01de299a760c2af966d0d903aa8f1f0cab0b4d05c318192c005130ab4b19656368c2821c01ac41cfd303e2806ea91c2ac900a7c2cb90e2feb90fd0ef249
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce1b94019d3bc74bab7a23d08523c00c
SHA143d0c51424dcc31941af0bac6e0a839e17fef1e6
SHA256231726a93b776ffce7d3eb4085a7929ccb5b22865506c628c38ada474d28e6b9
SHA5122eb28a49620b44c8f7275728696b2967776da6f54d42786aabe49ad3d8213261b3713bfee9cff9cca8a2af8a0d185f5075628c0cff16ec68fa0ad704f50f97e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512f2154bbe7127d5edf8fa3ad37660fa
SHA1b09b1b339cec812c6187d44767647022ad0252e4
SHA25649c8de48a895c92deed7406b99394903afbaf655904b88502de3e0c384087fce
SHA51292eb15c254436c674dfc525aa7a426c333395610d84ab37175c739949f29e2b958afe46dd5d55bb4b93eb7c67a9df94e4aef3fbd73dee22e9f452007c9fe74dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdaf240098f66e0759af41ed85e6b072
SHA1de20f31286d1fa075d4147aa141d9acbb0e29e9c
SHA2569cf104d2cf0be070201e2432b29b1a7b8b9ab644c501e6515e0b2f7c13dc325b
SHA512eabc46df066d7cef98899d95e9b37a7dc6f63ec88f0fdce305c93ffaac070af830afcb3fe4da3d39dcf0badbcf85e52754b37e9c9b33334244486b1b6960e89b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c590f160dcb645011ec994b064b18261
SHA1bdae6909b25d2d3b63116c407bb6fd64dbf02729
SHA256ed9c640e8e09b33c4561d5f822428dfadf4aec218a2bd7ad79657257b3cd5094
SHA5128df43e6b0ef86dcba7231a40095c9fa8c735215f68be3d7ab710736220c3a4d00f4c04e918c28d99d3d52b567bfdacf22b7393336cb44495ae3f00b95c909e9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587430c0e9612331ab2b12b530352364b
SHA1b4eae3ff665084c891f051e7f33a51717d335a5a
SHA2569f012c64273b620509dd7281b804f47f0e1e8fe496821db23186b4f656cebe6a
SHA5123fe1256d60c772b99b93f72c9a83b749db9875cf7fe11689f908454e29be8fdc41c77f83310f4e035d3ef8169bd6bf92cfa2d736632716dd30dc6c9097279a8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5334d15c5d61ab52d1f1e29f1d27cf60b
SHA17d2448558a2820f3d3c5b11d90018f54339fd142
SHA25619b0211a4594e6131f9ca3831e6b937ec454b6dea242a45cc123eb8aa68161d0
SHA512aeddfaa7091e4458d46936a7d0b28c9cd890518f98974a3e6ec470e35acfbda5e84373268cbb02971b7057954c0aa9395403806bbd018ecb3e9892c87fead171
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb8455ae769e8aa51528d1d0fa949770
SHA1ef14b05646d8abf392344f728a1c33fd96d82530
SHA2561e1c9e95c6d9cfb9af5c1e3b1e99567709bddf2d4affb063b4ef81a0a29910aa
SHA5125875e776904eaa79214984a252a06d7829c4c67c35f3689cb3e95fa8f6b78242e7f8d6da6b9b54e2f274dbd7d088b45f7a90c0dcfcc05cca2606b51bb11db0cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d8bc901938f0d3e277dee59f5cd7b77
SHA19c887cb76b774cf85d4c435ecbccc6b0598533d0
SHA2569e10546600d747a38eaac937d931fce5ff8155de707d10e71c1e6c3797b16d77
SHA512846365cb92ea9d136ef762d95173133b5bab7a2c9894b61abb97658d98aaf536d95625fac62e4acef7abcaf66f204740fd75a83ffb36fa27146d8838c4304c00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f483cfccf99a3ba5a62caf670c3811f9
SHA10f0ca45c9d4cf3180d2bd4d0b5115ec9eef494be
SHA2564e490c58122188d7ddb7d8fbed99962274519b3113259e15d5620b42999f058d
SHA51282dd7c68b94368e09b0c846237727cea5ffcb20cd5d7b831ab9777ffa5819fef3cbd83448c012c7d8b396f47fc24b0062d5c7ff539e1a0a5e3e5ac8ecb2e4a55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530b070b04d767a2298b1a9cb0113e86d
SHA1fa16aeb394cfc8e44c7344097b9545617d4b4f05
SHA256e18d7ced94400162de52346265b2117cd80732c2d1bf9840301e0b068abfd652
SHA5129e702325a297215be3429dac920cdff933853866d0a4f92fe602e659eec50d266459cfa6d5ee56a9580c9d6a7adb7f649186d1dbb36004cd8e821e103140b209
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5267ad88120c61308ed13828048179311
SHA140808e8d1f9dc3f33e08de0f6ed2e4d4153c9c5e
SHA256aaa4698fa8230a548ad7982469e62b9f88294114a9431de01f1b140cc385ef3e
SHA5122ad11aff312653d67e057d58190084e919a2741a305d3938658ae005245cf1b521f228c36c3d51ba8a43ef299b04f3047090a079940c606f79e17e2bf164f441
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e91c0a19dde95fd2b0272e6010f4b156
SHA13f15795b983791f2e68076ebe256bc6bc99f7332
SHA25686dfc869e740308eb4334e9df32f20174a18aedd1cf39fa70cd70e21e77ebc9b
SHA51226918a1165074fd52ed439801ff0865dcab245f7b64638f5a4d71a2664f240a189698445d6811f2934605573b360cbd0c56e95f424f8a338040318e0c79ad3a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d1714275ba07414554f807b6cf9d1d7
SHA1a0f9517745830a0b5e8c9cb720544b2a17530920
SHA2563ac87761bf4f1172b08033de39033b1808990b40e3ba3f522174293908ff4057
SHA512791d6f471c8f3e1b6c7659909f26e9cdd985a12c03f59f40a2c2142b0f13d0cf3ac4a063dd1d83bbb8be0402991914be2f4dab906ee54066c733563a891bdaa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5192a655514ec7846a9c7cb6ff8dc234d
SHA1fcd0c6c5bc3e9e16f1eb728f9a67e06b440b082b
SHA2562df84c51a0f4f02f432dd476dff464588ae248434855d876496532af49191022
SHA512b387821416a2bb2994ecc100e59774853244af1be505304d90410f0af133ef2bb77d93c858c6d3a03076799ceac7bbebd6ff351223ed53b4f85adc776d9703d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5ee26d80ff93efb9df1adece6f1b55a
SHA1064726ce5f009b42187cd6a50b8cd87c9cf5c01b
SHA256e2eb848ead9479c443b4c28109e4292f7d6103bd39c8860a49828391dae85c29
SHA5128c02f2692df1cc9f5684ac3748d458041d36e44ca8b44c7877904b60d895446e8fe6eb0581af6e28c550a39b6570b334846bb972b0b7471be5f599ddc2411377
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5283f9e2aa56bf91f1d3a6f1c321ac0ab
SHA1179a361797ddd0df5f73dd25643feb3e4c049769
SHA256a9c1e8a47cfa9c320e2c9baadf44feeaecf81ff3d0d2c64a6bd56dd8b67d89cb
SHA512321c4d1ecf92abd1c4990a10c33aacf2185134fa405cc9c3a82822846579ec64d928b94eb9c70bc5ed2dd71705131a1f9082089cf1c16d34e634d100c363ccd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e6c6880095ba65ed7d45ad764af160a
SHA1c3c84fd11a5ebc26119c817cee7e14dcfc3de639
SHA2568903a7322b61f435c4a8dd2e796b24b087e9975a17e852b73ba2afa9993104de
SHA512d70a44eb9696d9cf59ee9d0e67a29e9f887e267f9fd2ba83d60ea788b1cb93795af1a823b2500131c97994b5a83ece12807eea2a586e624aa69a7f7ee7c46c57
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b