Analysis
-
max time kernel
119s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
31-05-2024 19:16
Static task
static1
Behavioral task
behavioral1
Sample
880f0328d1b364f9638f7777b2ac0638_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
880f0328d1b364f9638f7777b2ac0638_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
880f0328d1b364f9638f7777b2ac0638_JaffaCakes118.html
-
Size
28KB
-
MD5
880f0328d1b364f9638f7777b2ac0638
-
SHA1
596953303437608ebdb89971a3a2c32aa006eedf
-
SHA256
5f975be6199e7849603bb9ca567a090498ee8ff3124792577eac51dce77b6437
-
SHA512
1c88f88046a59a5367e0898be14973ab8cc06841c6bd262916cee5b13a1e34cfd139476caaa169c8804f4d0b44630b83c87479d86fbc1f7a5eef6da0f55549e2
-
SSDEEP
384:CGZghvhIxTN+LIjkCiqHIqvmlAb7aHAB1n:CGZkhIxTN+LI0qHIqmlAb7aHU1n
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5C864E51-1F82-11EF-989B-729E5AF85804} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f006f9318fb3da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423344892" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005821efd0ab36ad498bbbc06add07214100000000020000000000106600000001000020000000738f78d373dfd761ccea14bd41e889b64b93102bfc9a1c3e9e1851377749f8ec000000000e80000000020000200000004f00f8dbd5575ad480b4afa3291a299eb48b245bb120d55e33866d630c43e29820000000cf53f2ca7a62d39b6aa3180772afc3c1b55e14928beaff5a3a5ca59e691b7d6740000000fe75aa9be0da7e44003034fc9a37f7d501c50e408b7e176b56e006bd33faaa63d8e989ba64f2de44b5aa5fa492b931108d2670f7e522c7f7dc7f6dc4049f4bd2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1708 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1708 iexplore.exe 1708 iexplore.exe 2844 IEXPLORE.EXE 2844 IEXPLORE.EXE 2844 IEXPLORE.EXE 2844 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1708 wrote to memory of 2844 1708 iexplore.exe 28 PID 1708 wrote to memory of 2844 1708 iexplore.exe 28 PID 1708 wrote to memory of 2844 1708 iexplore.exe 28 PID 1708 wrote to memory of 2844 1708 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\880f0328d1b364f9638f7777b2ac0638_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1708 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0da28839db07a8293e8d407661a2a76
SHA1d3c77ebb4ce8ee9a395ed27066788782f3f35f2f
SHA256a0f352e0c0761fff0af4176ec809d5cbf8a7c04a5bc7f6bce6dc56ad2c5e14ed
SHA5121e2d1cd5d7780babdbbfb97d56361c4d13e59a945305dd55ff0069a2a7febb267bdbcefa5505ad2a04e1968060624929cc8e82c7891d528ca41ca2451a8cbebd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2e8d719f7589da9c4c9d934950087a6
SHA1ebe526f1dda8bc62b5802043f5528b7a2af12fc9
SHA25682b2d5df7ca5a979e13fd095c0d09f7805ca3bc9a9942a0d9b973d55fe7a309f
SHA512839b88695089bbaeaef1ca97afd1c46df43f9db09b04d0c6f4ebe5719bcabe455a5ac40f4fdf13236ced09e83ae9a141a1bb1822585eba97c53e70d3fa98d10b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1f78456d3bf3ea7ec579bdf3c5b681a
SHA190d15d4ec4aee228c98cf03d375ef73e7893a868
SHA2567b9cf04bb747403ef571d125766ffe8f5fbc4a69b6c37a64e9a9db03c4e72181
SHA512d7ae6d244b3988fefc3d56878bb8d7450e3fa246d70ef00874e0bd8e7b49c7de711f56f7ef92643aee4cdcb4a17f75c65ed9cdc7518c685654c4245a01b9b5e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0cb7d012f8cd91bc4a34bdfbce0b338
SHA1c6f7131aff0ff4d7f3cfed9462ffc2780475ce7e
SHA256acfe8e4d1dacff30b937ee6f66cd737db181b96a3008966bab6e84f7de7bac76
SHA5126ced657caade988852256c1fdc5290c37274439574e102bd3f9bac1b5e7fc33f45b18504e04885461abbf65b04f373b1fa56dbb036eae196c266a2a49829650b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b85b8b1ec735f051171c1530d50aa8a4
SHA16f9e0b73ce9c4697a29edd0bfe0f850edd117fe8
SHA2568874583f0d9cad79f8ba5f11401f7d53cfc84065ca6d8a2fa93f3c1ffc961f74
SHA512585481554f25ee8a8ca926166c7e8f049888fcfe228cbf11d55fb161fe04d42e1be92658868176fa398551a8a26795f0588e5497e138659bc7a41332aedfc8f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f241f0e35c054a90674aae484618dc4f
SHA1afa4bebacb5a18dbf8be67db4489d36dfa01f141
SHA256680c05a9af00a4e7e7d9e49fe3308e3eeffd24bb2bf6f4fbeec41ee9caf0c53f
SHA5129232e1527c5573e876c4635efe12c69a51409fa4c324953c133573374747c91d98c0863c717c8586ee8c12af51d550da3124630c9b6516f6ea349c49b7cf3c2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db1381c099ada0457dbb4f5eeea4777d
SHA1b40dc5c56a95e83bb2186d60ff226aafdf471422
SHA256a0afc8bf617902aaca5745d4f45bc29dda9f7e5db688c163774e7d6b0310f317
SHA512e278018acebc0ba08b9271024c4abefe55b6f93e43c4ccac614a316e66a930a07d2eef5ca549f07b13acb3727c0579a29077c8d544511e018f225deee1e431f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e78589131b6a4dfe291049ddb9da799
SHA15f1a89e7cb89d5690a91d7aadea2276bb006b5f4
SHA256a039b47fa074686f02de2a450089a6321f2c222b87dd51d8cf2776abc142120f
SHA512415dee5b65234c7891cd385414ae73a53477dce3a723bb13de0c1e8e0f0bb040f41bd6ad601b10510d788fe1e1a3a0b4b1feda07756d9829eef667e1eea99373
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a2a4d49772355103c7bb27b185d8575
SHA1d696bdb70b8fb2c943ed19a8a9069e96039c233f
SHA2567a2e465b8f3995fed935147a6ed2e0e55ed9815b060eece135c60de21ba0e6bc
SHA51284454d48d615c94ea9a0824d37b5dd9653a13e1b544fad7ae9c69129aa92795a9cdb84c00f1bd2fb1433c804e81c85fdf000e3a55a7ca8c481d28f742bd86d05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0d098a0329422c817c185e2ff9335a3
SHA162464eb6b6bb988052e075ea5c90c43dbbb22ba6
SHA25645e2571835482e97f1f76afffe47194f54df86718cbf814ff8d46601d946cbb6
SHA512cff544e38c7c2ab4a50d196d5bd5c11ffbd27db4c6232f839141089fc2f0e8784f6ac3ec7f835e854a84c56c09474cfe3e997ddf71d13a7c01914a2fddb54a4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cf1c8f0c6d6c753578dec41301f1de4
SHA157d25e24782197a637744c4c5d2404792572e2bb
SHA2566f70b58d22144b0a91d57c3491914461b245b47384c81fe021a612d561b398cb
SHA5127c56095715d5fbffce6f8422f014d34c05439e54141522c5a208c60de53f6b62e57bcbf35454d0ce99a6d57b498d1dc568d4a72c6fafaa8ecdd86d4a5e660b71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e51a344d562182b00090c57555fd1b1
SHA1cafa594eb3e3dde759004925094c2078c158c266
SHA256a99c7a5263ee149812be8f7875093cbdf721c31b51e76bb6e1658d7cbfca7609
SHA512f7547c584daef78a56596c12a6f60f95e550c0a0c40aac46065af6c75b7a301a6b2130b19a83044fb7d19db3af92af78d49fa15fcd385aff57fdf79979f72194
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db8f885673dd89c5e0a72abc4baf07e7
SHA17b7ffa79bcb07967c3c0e87f42c9e0b857a5d444
SHA25609cb4b85a46a0a8d310fbec6f1fef56966a6129067a524caaef81b57aa9a5103
SHA512553d3b42139cc46bb8a9189b0b693629661183420985e49f472e184ce5abf5b84cf4f439a1b56151b920200a6b5d6313ee9618917df69bf6640b1db116e01d3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5409c2e568617a70f362c92668c7bc2a5
SHA10c25bf0bc479713176be40b424949f088efc366d
SHA2561acacf860fb712dd71d1fb9c6f9be4528408cef873111a6896b238d35d4961df
SHA512cdf5223667183d6a2696c18b7a1487d5438626209cd810b15bec4a8dc05f1a139ef221cdb501f48a4caa31b85e132bda74bf1ae31d49aef2284773a355138071
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b25b3ca7de58d9c3ff90b6a2c156d0eb
SHA1e155bab432dfea063d2ff522eecf88d785decce6
SHA2560820159292ba803def479e7349ce29361886f2591d85392313cdc88d1d13efc3
SHA512febe6555d4aa97205ff7bf063796eafef8c38075910d7fff36668f068753ced9c5706c3bfb09b3ca191dfd587bd65448a7bb12a9584c0037d9fe9adb8c8d9130
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524573102aac54a08974d144331ae7385
SHA1be6c16c14798f048e8dd40872efd7520b361f77d
SHA25664e87496d52b37ed5f925bbc9014f521bd9821812ed887b8ecc7eeef53dc9bdd
SHA51297512ded764a0e892d39deb8f455c420ff7c4c12e3448072566b8ca8a5d32dbdfc379b1d6152ee4384bf8e19bc3ef8c71b677674c2ab7d5f54645c05c6bdfa67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5741b99c24bbec9c0b4ed5d27e7f3b6d6
SHA1bfbb0f527f5483373b4a4cf75f9a6e93b600979d
SHA256bacb6c6a81df9b39b55debf520c03c1f07d08f6f78860e99da94a2f1be179513
SHA5124763619b6bcb864b094bc4db66c50da09b9142c51b30ea148ae6a2719c275b6b81db62e377686311ac29d550724bb46d3338d6e09df8265518a8d57d537514c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502ddfe318c76c0e55cbd8addcd56c624
SHA15184ef9e4a17887edcece0b68ea3e210f65a37cf
SHA25622d5e85ea50eb21b31735a845fda6bf8251c447d35c26656f176c69841a3d958
SHA512686155e972693c9188656b858d5f6b94780db1c62b8043b905215aa5b634a253411ef331563a883d28c7899a70a781ff3a782d5aef493000a00b88ff31479e4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562bfa00f748c77a1cbdc9c211fe4cbfe
SHA126929d8a32a16b906834c0ff6c524edf95ada1f2
SHA256dcdce5a1f2d5627dfcb8ff09fafda78d4c7d1b90d1ab26ccdebc8e1d7aabf828
SHA512f0fad852de677cc5078f80d60733deb04ef25af7aadfd7d53abd0d3f8960a4136b25cdb5d3ce4004f994ca3bb972bb19187f5867ac9741300d26b65da0b0372e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b