Analysis
-
max time kernel
139s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
31-05-2024 20:26
Static task
static1
Behavioral task
behavioral1
Sample
883f6ae1400b80ae55ee020ef35150dd_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
883f6ae1400b80ae55ee020ef35150dd_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
883f6ae1400b80ae55ee020ef35150dd_JaffaCakes118.html
-
Size
73KB
-
MD5
883f6ae1400b80ae55ee020ef35150dd
-
SHA1
f7f8a8d18412aee9a118f13b7aedb339a69a6c5f
-
SHA256
a857923187a347e70c24c071879507396669b1f588c6a54bc83b6fbea2dd3d2f
-
SHA512
e98c8f4294be8b4d61a94ede7595914a6771f72cdbf01c02d5b655037ed201ffb3ff72a593981d6f6950481d1b3554b7ae56fc1fc98ef35a3dad65826e6216cf
-
SSDEEP
768:JiNgcMiR3sI2PDDnX0g6st6AyfPSf7RioTyS1wCZkoTyMdtbBnfBgN8/lboi2hcc:JriAVrTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{149B8651-1F8C-11EF-BC03-E626464F593A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80d574e998b3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423349065" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006628d5cd73d720449a8fe954c94000d60000000002000000000010660000000100002000000001cf2a27aa3faf24f70a333d47d59b10ee2da05e4b9458a4304d7cf68700fd11000000000e8000000002000020000000c3bfec6c3ba2608465b3c9b20e2dc521bd5a684f3d06487edde45f8076640c3d2000000036c770098f8b9b31ead5a780cf370fd4ed7c523210bff92e611c6746087e2e7840000000d8f056f61091904256e64df45dc97b1f538546da1e22b1c2861db5437e41e602b7db5f716484fb517c253f9d1df3d2ea13179bc8b6be6c99082835b4e9faa9ed iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1876 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1876 iexplore.exe 1876 iexplore.exe 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1876 wrote to memory of 2924 1876 iexplore.exe 28 PID 1876 wrote to memory of 2924 1876 iexplore.exe 28 PID 1876 wrote to memory of 2924 1876 iexplore.exe 28 PID 1876 wrote to memory of 2924 1876 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\883f6ae1400b80ae55ee020ef35150dd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1876 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b73c23c4f016a2c759882be7a25e409
SHA1f43b5428325bb81f0ca0dcb135ab8029e608840a
SHA256034e87e7754e66785acd7347b028cbd9f812593cd2b10b501a055ce46e423b0f
SHA512f609d16a0595b04df784b59ac0ed64a51ddf8a92a8fc02afdb01a248ebff438b129f4a1836e0d368eb61496ec37565c7eb3d35988f22551fdae292de9b93e49f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5793eca83ea2ff40122c81f43bc75faa9
SHA135c69ba3e7e0bae686cae77ec93b81df09605dc6
SHA2569e6e60e4fc4beccd6a88e80d839efa0a5e2e788362db1f6db6a1d67527d3263e
SHA512c92e1247e012021c162da01f227f481afe800b5a129c277cdebb657456c371e5c992ae0de083a224690cf8f5530df5243bdae7fc8ac4bdc0202fadd56a1b1293
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e85796e6806e7ba859597e78312e99c
SHA1fe7d39ab1d0ea7b4b3afd0fa69a09f44f7e31b7e
SHA256f599acbbf9a4905369e2725500336c876f7beb774a29b461094279c847938582
SHA512da3943e8a70e2ac2ae25a844bd7f201ce5b6fffd74f86d3fcbbdc7f000958312ebbfd6e2c8764c6529f65079503abc56078d1f19e7bb101a8435d30ab676e6ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7e109841ef47196531dd67ed19d6d47
SHA1138a1f631023dd508494432f3140d295b3491397
SHA256aac325c1efd1508a780c754fc2ded3b284ce76a4ba688c31386e2e44fe4af74e
SHA512be0026a8014d97f6a419c47d813ab0e1a5080e4fdd904bffb35d4a880da1a038d91ebcf1af26966048320fbacf515346744a2d94f04f2722df21237fc7ac30a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589040838a8f304104bc2274f93b64bc2
SHA18fc17159f54c1378ae3b5f7600c0572394ad0610
SHA256a246655c5d85e18895c24af915a648c408f5e947a8e650984b9186940872c214
SHA5121f4c6340de2d4d4cf53dde73c0c39c79abd35905b88ab9f1294f0a157fb60f7e4d5a44b803a9c214d9a0484b2f392f64a058388d47c2d9ac7d3fb1e926087433
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab587b6f4b3b10856d7a341dd6eedb9e
SHA1a43c241e155d5121c30f81cd91449ba9f0bf17f8
SHA256075daabe8c0e9874577883e9588b7f15721d6ba9c950f7da1bd471933d2bb6cc
SHA5122387eb6057211cb13c649071df227900af8e57a7fa0b989ba18be7564a7a43d65d4a981e88b1aad9ece134c13cd1d30e5e0e36f35ef5dd1ddd0e15bf9a0ceb19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5beb657f6c15604b76f7ef2de9e6bf6c1
SHA143eba8ff74b4c53cf77ac752cf536f05fb08ff90
SHA2565ddfcb4afc3907c82eade40cfce8bb8a4f859349533952844e86bb40282d7a0d
SHA5122000b1882d2a76d24b330688afcd862bee42d81ac2973ccc00fe40773a008fc18b2c15f29f017f50ef153de557677738dda971708864e7805034a08d76f79f38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a27fdbc41e01615c2b745dee0270fb38
SHA1e38b522dd938c1ce01726a81065a0e3b3386ecde
SHA256bbc7a8a1256619d25e811f167e0e4e5f387c12b5deece75e6988a7583bb7f971
SHA5121eeb478dcd0bb24b3c2f195aaf0530fa397d457ae36c10dbc34f371c777ce1d1af7961e1dcfa0d85656de100d630dc64f2d4dc90317bca2b4be216679039a77f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e05c90a0662900363c2a80c69d666385
SHA1884ac1dc11d20161ffd0816c33f21bf3750a4930
SHA25674e51f615ba97b1d23913bf3cbd3bd97cb7766865f4c1a0546a9760ae5f97f41
SHA512e75b01c6a2770c75804978189804a9237999d1ff4c682eabe2aaaa41d4407cbb112b36595c12f3dda7ae0029ec3ca701e12b350b91abd66e29f9c8eb92c96692
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9819d4534553033cd5d0e795d371b3e
SHA1b1597c5ea11161388ebb31313aeb6539a9497be0
SHA2560514ba0fc9396c16dd9bb2e1fb9bc58a45aaf922a32330e94f399a1abc25285b
SHA512762b89527bccb085b04c03adc0eff94c9565c5ac79636fdd5840411ba6224aa11e5d31f49102373e4130bb76c0f3cd8b7bb011f231d7a2784f1e28abdec29afc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe75e15a4d4507c2516aa9b48c9623d0
SHA10a7994d66ef5a5235ade0313c7ba3373faa7546c
SHA25629801edac6655b23da55dbb5f2adfec9d020cd4d383c119cac88105b3bf0e61e
SHA5120fceccfba33b7ebcb7cb8c65310f04a99c879d736fca8be7fe317f4cf863a2df18184a8917fd55a964d173a330b7ad0de557a465fcdb12254984774f6661b5ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e07a2104a76bdbb843c9ee3c1a727ad
SHA19c8d64dc160db98d63835f2fbcd768032dc79363
SHA2569e3642700a591ae43cb602bfc09f5bb0d8602f7d06a517a9145d534d60a138a7
SHA5124c7de8d8f91dcb3d664e6ddbb10dfeb1ee70a197953b2493f4769f12fccdc92ef9e3e161ddc5ce879d5f202d6a2189b8c89cb1b4fae27fa1d5d68c49d626e2ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c742379a9639bc3831b5958ec2505b32
SHA15edc7eac278e99e1fe95193648ac2696739cc62e
SHA256030b74c899dcb5dad38eb3251f181ba5c2552a1d9465433737bb716e8d4fb2ba
SHA5127cace97599acac1a0a7c175d0cb36f543c3b937fd16b1b2919ce21b36026b536c96163ea93020e5e6a93ec2c99ad0a69616ba748cec6bc162cc6216576340d03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517fc9bac33320b3275f9d7b4af1dc81d
SHA1a10130328997cec721106f6438847458dc4f53b1
SHA256f563ffe7b153d2ee7bf90020ba4616c40646f788ecf6fee130e9c76e2eccd9ef
SHA512204f72bad1e8266431d9ecb170f6ba41ba9a575e504b1523d2efa6cb8668ca7103a6299343c6663f92d48ed95082f9855a2d5880be3bc196a2cc2f444351f2b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594e4a5b98197fc197637f66afc695787
SHA1b51a888efba4f71ee20c18c47002eee33dce2dde
SHA256c2dcee55a0e9b270c73933ebcf94d7b3c4e24c069449da1f81bc866a0ce5da7c
SHA512669072e9a8d279b37a62d83064f483923fd7fc60b37bab679e280ac70bf759fb4eefc12fd1278d89581f04b22749ba6a8e6f1b396983991f83fb90dff02e6cbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ab9457839343fcfc13bca34db308521
SHA1df5960f60a7d0ac789cac25ac75536659e523d67
SHA2567810ac15666db7eec4747c59c08fc80ea3f0b5b777275de01039b371d9dfcdc7
SHA512cf61545c55b937be34e2ae89efaa83e09728f71313767470d3f8a0d380fc77fb9f34cf9a26549417d2fd36daa6584462aa01c3e91e9ad0fef3877988f1dbe7b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a0410258d27a76836521caad9410619
SHA12d5dd6ff1d959530533044ee34661c565e6a9e95
SHA256c34d9ac8bc4ac2f502df1c56c4f19b4110701cccba066c78d8fa0d0d6e8b3a9c
SHA5126112e7c1cc3ae82047caa778d3534fc1146b19607ede44e1f9a1aff8f81942cf83617a0ad144ae55bd57e2fdb82b7779605dc705b98d7734666ce23f3d074d21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518e4dacbd328538826f7ded7e913d2dd
SHA1388aab9f3fbfb5727ccc0589f5c6ff8aad21fb31
SHA2566dba584efa5074229b1310582c3b786be84e2011fba7f12adec67f80bd0d6a1c
SHA512af203fc53ee4e51de5a31108541d7719d57da41fd26fbaff2a347e9271049b1f560ffed245ba2d3a1a400f25adfb5f9c9231b05db1ad1c54e6282ef9684b74cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54027c4fd73a545fb18ad5fa8581ad974
SHA1c08f2bd48a8cb38f1ea31dc49334cdfa8a1dea05
SHA25647f389cbf08331601f1acff4c7547818bd5a1e50de0144ece91a76fd61a2d600
SHA512b22c9b9bc7f85c2f47990c7dbdf9411cedd649ac758d53e41f5c7ecb27b82df7250524eb1561aa93c3ebaf80333a03d67cf370e02f9949be2d345b551201289a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b