Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 10:26
Static task
static1
Behavioral task
behavioral1
Sample
86adf90e95e1cca446efc415e4ee37c6_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
86adf90e95e1cca446efc415e4ee37c6_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
86adf90e95e1cca446efc415e4ee37c6_JaffaCakes118.html
-
Size
268KB
-
MD5
86adf90e95e1cca446efc415e4ee37c6
-
SHA1
9582437e7702136a497e6984ac51e239dd02778c
-
SHA256
338a4fe0a84fb09735945097cd87909f2938bff5d5d04650eb22cfce6b5f6da3
-
SHA512
a387d5f4e92252a181ef6d2dbfffb949926abd23c424f5dbef631e1c389015bd764b768a7edebe60cffd275fc724072323702d12434d3c62f125656a4324bd07
-
SSDEEP
1536:oKckS1wp1u0d9twATuUfPgU6lki/oCkNl9Dq+NtFJ1rbpn1tS:oKckS1wPnn1YHz
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000007c1505e2e22c638b1536e91c995e27144fd978d6ca3d8edda4b78852a99c10b8000000000e8000000002000020000000b0513b0efb155dacb5e4f745d8ffcf2f4faf42f25750ed7c74486dd2d260ab7a200000003bb634bd459000bbf893c012aded49a172cb3839bc1164e5377cd7b80b78ab23400000000525a0e43e09619d67527e2dab51b66d1ad09a82ecadc22710ae105aad0c44c99e57774d32710736e0e7318cf5d8be8386dacea02fb194ddbe021b81d397c6b9 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423313048" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0d2522945b3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{38CCB481-1F38-11EF-A5E3-DA219DA76A91} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1644 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1644 iexplore.exe 1644 iexplore.exe 2996 IEXPLORE.EXE 2996 IEXPLORE.EXE 2996 IEXPLORE.EXE 2996 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1644 wrote to memory of 2996 1644 iexplore.exe 28 PID 1644 wrote to memory of 2996 1644 iexplore.exe 28 PID 1644 wrote to memory of 2996 1644 iexplore.exe 28 PID 1644 wrote to memory of 2996 1644 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\86adf90e95e1cca446efc415e4ee37c6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1644 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58821b6277c9481c78434ea0ab3eb55e1
SHA135a24dc090b22078cca497425a9b04ab9d840c03
SHA256990680c1e417ad0c4b346851a6f46f1b8f26882c8e9ccb025b7f7b297a22e662
SHA51281d55f3a5d3adc57eb39bb0c2924a742630649001e9a7f3c91d6ca96be1a7888a3421b92877f6027eb22af9a7fce2db97a68acd5e81342d324895b483e8ef556
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524f60516c14e4439d59dd374a6bf1834
SHA1fdaf6fd081b82df5d8df084095b6ac3ad5624a66
SHA256a10029d16ad56c26780820fb96ac44749548da8ff6e7f20cb8b0a28008ac86f0
SHA5126a16da2346087a417fedfe37f1e54d35b3175e1d80f3e50e171be0f94a1e63d5f1824cb9f081faade21003d34ac135a3432f665f049470815d9bac61b2d36245
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567a7bc43b024dd3fcb96876dea1b57de
SHA16da5374364a2e1f98114c73e3d5d715e90c44a90
SHA256e732b4124afa2e19ae8fa19bd8bf4c059a47c478a13497e36ac9942ba1818f8c
SHA51274fec43b784c9a608ff9d644de37e950a02c06a8aae144de213bd1a4795d2700924c26fd08a90caf06e99d66840f0c42c9bb4a2a8e780391f2e7dfa5c6bf4942
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e04908cac06f7432f1b7e648bc78acd8
SHA12e2554dd26ebcc554bc0a89e690e50cbc9680ec9
SHA256a862879a1ca7104a4771e4c6c3d10ea20d80e9c4459b6330f16a68e937da0860
SHA5127fdb1e4ecee4f735c37ab67b7a2266512abbaedd68f1fec1b83f9abbd3944800f9f43f46825dcd3a71ae7abab73ca55f5d601b1fa42f5985baefd7c18cf1cc64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c468c87bd60e6e346114d29fdfd17d71
SHA12c491a2878abd35c8787bfe5a92fc3c07babbcdb
SHA256d95cc29338cb994bc5a6e23fdb049b6ec556e4444724bb4b182adf2ddb0e431a
SHA51219396abd161bec299057489e7dec69b83af6f83a726c2acc36acf5283c3727801bb8f3baeb7d69b8eb2486e155a5f930e3343d5c45b269a18c710d9179d7ebb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5274c7177bfc9deb57dd181099552ad28
SHA14a032d28ddd272b416f866f1bcc99c2636e64f18
SHA2561e46b9cc45102ca0f00d05881e76b019b9c7b3a10e2200c6b32e27407dd745a0
SHA5127b3eb171952fba5520004db6d021ed65624e4524b152f7dbb85d065bd3dbed3f7889d5d2c9f02a2597f2db9d8e46c352ef19388150f3155ef524ec1932014268
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4aa0178900ac2f6d88f831afe5072e0
SHA15c5df2bc2754503ae666fa54b874365dc39dcd8d
SHA2569bb9b1078a605b5af57cd429bab89be47b0cffdbc3121f595d6921820700fb6d
SHA5129a7d345c1c625ce544e5fa168a3ff380b8dfa93de64ef2ec2a8518af77a2c3d33aed44fe79f63e4f89e905c52cb9ba0dcf4afbca0a76feaff11c1878442ce070
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d115f19509a30f0ddd0eacf1fd5588ad
SHA13cf2f102d9aa386b7ab23a0ec2eb9e081fc9c088
SHA256904884b139013333fc12881095c70611c2c9487b5125e0b85489fed19147d7af
SHA51269a81dd011b05c20ce1dcde538632c9a187fd95c2f3104daae7625f1f91b6297e9f4a344f750aba0d172d2a15ad832deb45ffa486492f25d412b6b657ac1d62d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5891bd01f3edad7343a21d37ccc8403f0
SHA193230767124f6c8e8538fc50f7d00d31dc8a016d
SHA256a0850a45d4e61df613ec70ec5524e04ede3017fbca45ca77bcb389b7002c2773
SHA512a1fca59d21208478381cbe0db91ec743a68e196765dd33320747b8cd9ac331e2288692985f020e3f3f2aa6363f938f50963a9fd485a2fd7bebfe050b7f152953
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c168a16300b0b815a195c3880f5b6181
SHA1d50660d785259965c56a629b235f86fad8aea1d6
SHA256302fa60150bdefc404c9993e08eb193cecda4e8895d921fb2e47b97bbee94b45
SHA5126495cd1419fbfdd277f5b7da046a63c2c0e0d1ba63d15826c29d4b1246c67277e02674cea655049ccdcc5efbeab8abf467d40c29d1f0bbeb65cf88695be53c74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509a4cbb09954bb6706114fdf724ea11b
SHA13cec2c1d62f0b939706f2b237e201ba302a08146
SHA256024d9b26f47ac0474135ad42cb10750fd51f062c2a0a9a9662abdc6398da2aad
SHA51288cc9a6322ac6cf45f4f96647fc364d7cbf67e35837ba6637020963d76e9e8ca7fc096c8a6e3166305834b5f48b4b47b0d09f9dd025c1f4de873ab0932f7a559
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5646405c1ea4696ff987ee3bf5ca511bc
SHA1276727febd6e937be0aabc966a9009f93b083456
SHA256a1283fb89a51e1b82299c30c332c7f8f18080aceff3d5e1cdc0865bc9daedd14
SHA5129308808ed20f931b6062925316db2d2a996a529f5999e2adbba9bd45003ff139db3a4422fc6b2d234b81bd692b0dcf9e6d2593028891ddb5fe8a0be498f85bbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54858580b52535506eff850e668d43df7
SHA11e2cf3a9552cc0133b08121c1350e7c57102cb08
SHA25675c0875703b4e567935b7142628f82e661c49113a4c52f2f43c193bcd856143f
SHA512b7156f96626d2ac1c46ac4423d7fbe4f5fb418889f5885440c55121229699cea54b5619215f4dce35a65c1c5f6bfe053948513e381c8d70e3d4efffd89c9dc80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f3548bbece0e4bc4d6a2f60ce95ad3d
SHA1145511d3edd4df45edbb620c17b115eb7dbd2bbf
SHA2562b91a69eb3265e537dc1368a390f444d1d35b34ec479f244ed68aa1170fb2c06
SHA5126ccd55b0edfdda6c7215a37d9ea74cd2509406644549bfc76eb6b9fd1aeae88dce8f5d959ba38288b262044af18bbf52337fc11b470fea2ce3ead4bdc3d9945b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edca5e346ec5e63f5112b67d6383f705
SHA1a3909b4a022267cbca791907d8f1eaccf258fd23
SHA256d9ad99b1f7d937f13d8d0fe2937c5baf9f1abb6d29260a01215c94baba2c5897
SHA512ab22d37987f5a519ba06dfea4102ec61db1d396c4abfda7cb8f89dbbc9344d0ae04c45c9f9da7a3260da6b172b79118901bd81061e3bedf024ce382c9fe4b577
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5444742da57b3461ae0ef4ede00437abe
SHA10d8a381f179e1b56ff808517912395fe150f8e20
SHA2568e2841fe03538d9adca6300556a6e7b8a34bfe1c1a05d4d284ee8e68bee41b33
SHA51298220b4760a516f08261ec07ca6a0aa836c4a9dea27e673af8d0808893d5bf3a2be0aa31434c4dfc4a27a48660d67da0bd840d5533176581bd10fdd03459a3b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ac36fd5c66dedb807a323d2e8442da1
SHA17ac9b78913832b324f0001d8fc9f982ddf5018ba
SHA25604cc0d81db40a6f872cabe7703f3c76f40e1913b63f67d0ae5bc8f59046be849
SHA512ea1d978976e96b6178e4bb3b44fdc5fda7992a875910d13e9a174ccf409e37b9fbe21e169fa1c017f6db5447de3cc7917ddea4f766dff95d7a0596c09d0dbab5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5352933040ebffb40bff559b0bfc49cd6
SHA1a69f9e8e5a2201b405b09203b259ac5351d485e3
SHA256612bc18ce6adf5cd7e505c9cc8fd6aa321d85b09af858bd74b90d6f1beab2248
SHA512aca5f65a5df7aaacc98ec2b663366866967494fb9f817763c53e16ce3a889b8321176fc371491cb773c9d3671d47e45ddae943ad5bdc53f4b0a740854954af1e
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b