Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
01-06-2024 05:01
Static task
static1
Behavioral task
behavioral1
Sample
896e0a749789bb4ae67070e117460df9_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
896e0a749789bb4ae67070e117460df9_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
896e0a749789bb4ae67070e117460df9_JaffaCakes118.html
-
Size
460KB
-
MD5
896e0a749789bb4ae67070e117460df9
-
SHA1
f18b4eaa179ccdfaff6dab01538ff8099fb698e1
-
SHA256
6271dfb08b2ffe30831f899be5a3bbb7c3202de7f73a980e7830d56ceaa9395e
-
SHA512
be86b6f7cb3a276ec2f0a8b566b36a31acd88ff600f57de1017a16a62bb46d8e8aa9b6133dac145df528968bdbfc93f04a89f76f0a861337d7a468c6f3367562
-
SSDEEP
6144:SssMYod+X3oI+Y9sMYod+X3oI+YJsMYod+X3oI+YLsMYod+X3oI+YQ:/5d+X375d+X3T5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e05f47e4e0b3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423379973" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0BC80381-1FD4-11EF-B587-FED6C5E8D4AB} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e93610000000002000000000010660000000100002000000060d8d66bd27f6197e579cd897d7818bc6f6eddfa0ae50acd475d577558f87196000000000e8000000002000020000000032b84e331b07a0f167104273cc5a1a0c90976bb6dc1580ef945df027ea5f4742000000048c7bd810b298bef383d5c682c48dd9fce83dc5ab5224427dc6d61461ce2bf954000000084fa8ec1b84c171d13c62a317d99fc8f82a0a054b25fc260b43e98099674bf51179626aec7d91fc435edd74cc1c434ac1916f7b7813665f664656a61ba43aaaf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2024 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2024 iexplore.exe 2024 iexplore.exe 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2024 wrote to memory of 2484 2024 iexplore.exe 28 PID 2024 wrote to memory of 2484 2024 iexplore.exe 28 PID 2024 wrote to memory of 2484 2024 iexplore.exe 28 PID 2024 wrote to memory of 2484 2024 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\896e0a749789bb4ae67070e117460df9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2024 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2484
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ec8deea2a3c5a15b2ac0d5d395f148c
SHA18b315e666c458ff2107f7a2a7d877561a330c0a5
SHA256f16ef1cd0e5c1b0dd2dbcc4cfb8ed8670dc588121b92628975d47f41a8eaa7e7
SHA512fa43964bc331139065a689b21389b75aa24251277cfd373cd57449ccc49da11307280f24c6bf0a6a2965b5a291a013ac8e17db7b14211da31a6a1eb5465d6086
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f86f528ad7086ec04404f96c7dbd9707
SHA1bffdbc8d70eb78833f7ba85911dd4b72af5a1f10
SHA25619bcf4adda3047b89c5f8f4ed371bbb3e07b6b6a7c869623c78cecdf7ef46dd7
SHA512e6224228e399815a7d505ee9fe52c15e0982831f0e86445002b3aa119a278489cd6541c4531582630d1bc5be83e1db659b5e78ef0525bf20d37aae472acbe272
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b6affbc506318cc900901ee6aab5142
SHA11fdafbb3b3c7800c90e735264c189386abcbd6d1
SHA2564d658e23854c2dcbf28423cb754eab9d1b9809f60b8ed03c44318e12bd9221f8
SHA512d66f3959a70b4e1f775579eb71047cc4b403deaba328525e2daa1144da683073095a89a2e88ecc2fef5bb5b3be961980f31d641e9f322164edd49e39e3bf242f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527a11fd68c2096c4bc3151f948de75ed
SHA14c275c3d70e15e93780af6ef4fbc83d893cb60ec
SHA2566b2adc2430acdc73eb8028bce52f20d2dad97703e2d96d37bc8074b514f33133
SHA51222c83dbc110d3bb6cc9e6c9e893514de7f32e35a320f4fcfe5ed94470e61eaf72d134c662fa6d8c1f12cfc6d236d3e5e63e3a077aad5211bf07c924be7f9a8a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c65123486dbc7fa0958173c48903daed
SHA1afd4ec69e0a8fbb9a7ed86728f01456a4ffd298a
SHA256b80bd7379ef6741a266a3b70564b66ce13cb688c70aa3cb7aa8e1cbe5f601602
SHA512350daec993cf1ede3c7782a02ba0852ab93f9f4e902770cfdf8cb42605a6428edaf9a613e9a38f8b2dc24ecd990aa65e86943e4ebd759d5e1671dd3d8ef61ccd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519dbd5b5fe7b05839991640418f433af
SHA17bef999fe0b5c074c59d2e2a668ceba023794ff4
SHA25650a975b02c0abbd8afbc49bc8342765b623a491be2c7b79e9ebabd4408afec7a
SHA5122c2119fe202e007903b03dd9b86dd1e04dc0b0bcefefed58eefd2bca14c5fda49772a0eefb32e838d1e0000ef096bd7a145ce3bfc31f2364f5b5127eacc205d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53adb45d4e228a70d6d9b79d72dfe66f7
SHA1302133662d5a24c24688a80731f93b5d8eebfa9a
SHA256582a07fdab7fa1d28b760b6ced6c4d2d9a8078eb47c69167655bb9fbebe3e339
SHA512bebeae93f33e2ea3154d1998db171bcec77d4fc75a88202c3286ada3a9f2ca9142da2bf23bfb7018bda79f00355e62aed15be8b17ccb3a0a4137695e009b36a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4834b084fc67ba34909e6fea6c330fd
SHA1df5dc124499a5e67ff2d5423ffd99bd161ab5790
SHA2565f390215002df03306bbf8d401bde1cfc98f0df5f81cd9acf9c16f02854c682f
SHA512911d7ba7d896ff198c0d27ac6a7131877096e7773141178bff5394e61b1de6d9fd927a28e9fbf9904aab4391d45ebf599ea2759eba84393fa20ac7df92bc6155
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c6e6114c96312e72ddb6f66b985c953
SHA10331aa977af84b645ea375d80a476d0ced649311
SHA256621b400e2d5da857a8eec9d6659ca7e06b3c5e781415681440d917162771c9c0
SHA5128a00e712bcb2a1c9d7cf8db6bb6fe15d0ed77ea54501dc8c8cc06711def9d0945c0828c633e2cfaf50ec0502c525da171fb4fbb600e9eadb3f381ce754f2f41a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c2da9327bd6f447066e5070e0566aed
SHA1b49e09a4e8a690d82e23de376701471a9eaf5445
SHA256acfec9e0291fc3a420b999986bfc6f5b547f446c761409828ed3d9695286c586
SHA5128f333f5eba5a9650598729f4749554d19ad469fa9e903ebc3a0df963ea8d44d588815161653f51708c665ec2910de4ece8088045cb7fc1418a2070275d1593aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fa115b938686902ceff1f6fe195f69c
SHA1259f56198bec2c161b94d41bf86e76bae9980774
SHA25674e399aacee17f51005adbd9db152d51491a8a7c02a8d23e6db1d0068100a5cf
SHA51206c635c95b9548d635291af9bf38d622c724519519e875e431273f76a50c017b96891a6de72ab28191929d2d6b3cf17f53b5389a80261fae33a01785374e4ce3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3dda000d1cf2fa3814293c281e8549a
SHA1d413e1d87a78db72c3b169aaebef666ab9f5f29b
SHA2565851422abeecdc9732b0d6911c3032e10816a5cbded083ebf323ec731f5bebc1
SHA5121a9c95bdf40b3040f58728707b6457b9dd1321d5c84128b63585d13579fac83413f30b83c57cf7a78bb7b18547efe866851a0c374e2f44da51afc86ef6696871
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55331d7bbde834f86d32c1a58ad2fb825
SHA1a9c3bc801711fbfbb068ccff1075a0a8177543e6
SHA2568111122bd47465c845d32a1a12634e5acd50e28b3578bd8c0fd361477e37bc85
SHA51299578d2a30b305d4ac96b9038322f1d508df8057dba7cf6fa46c2ca0803161881225d951bd45876a9fd6d4bac3845ee2ef6e10bf7a07204384f7a63f437b0035
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8bcac1e14b0b10a0b5e2d28887feb8b
SHA156f92d205245503b7512db3ac821ce8e24c84356
SHA256dc21bbf6488f4f5a2a2b9185c752209e3bccbfa27e36e100495291ca477e7907
SHA5123c0d52fe3dfebd46db9796d7892beb0d62f90ff70875c79948c40ee021b18005c9d594a02f8269b49ea8ec7d4d937c7520419c09587cf526988fafcbfd15187f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbb24e7cf22477d95bed6689053015c7
SHA1889a4455fcea9c1f650e854944ac73566418724b
SHA25601a885d91c7adb7ff9d847f61d7499cc9810e21059b07c910ca26e7c07666fb5
SHA512fca54777b66220d409c30517bc774f3a482adf392f1a34e360c6b30bf5395ee3d2b819385f540918b5f59fbec6c90568b6ec3e9aee28bb1dec7b94f8d0334586
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51acd2ad1c0acfad7a3456a7d8fb0f413
SHA182962fed9d2ff4d867c8ecc7ae4403ad1f337907
SHA25625833735174d57c1c83b01528b1bbfc61739ce36dfd829b2798fd1eaeec619da
SHA51263e2f1af691e7a06a7b42e7a447e2ba5bede3f95a686f88e993cbc6b5d8ee492275e42ce0c9154953a120af51dfac1d4f7de9c6e756dfd55f76183248477eb6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9e7b9243ebeea4ead3a045f6fa96558
SHA18ca583b82351f5b262f871e5c31f7e910fc46196
SHA256ae16494c35ca6e3dbcfc2e7d6f59064c08656ccd2b8ef75cfd9bb303d0d030fe
SHA5129103ab65cc17117ce4b58e4788598c9bc6bb76d05aad2a3b5c37cf2aa149cd29daf475ac7057dbb663198ca17fefd3f12b9a05cd0578c717ca0caae3a56bd2dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1832922f3d3d9f887f7bd454d41d0fd
SHA19e88120c6d0b9203f37bd2d4fd45cc3de8252096
SHA256f54f3ed5bbdc8c44c87902a92762f0a67c8c1be4d4a91eb365e7cc52fe234ea7
SHA5127f36b9f7af3cacd437a2102c63c79d05e70ef9f63c8a0432309beb34810f23561c8cac07ceb4e3650af6654bd0218953b738c88efec86b6889a9e5f60d5b14ca
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b