Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
03/06/2024, 08:11
Static task
static1
Behavioral task
behavioral1
Sample
91126a36e56e4cff53b5015d4ff64b0d_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
91126a36e56e4cff53b5015d4ff64b0d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
91126a36e56e4cff53b5015d4ff64b0d_JaffaCakes118.html
-
Size
28KB
-
MD5
91126a36e56e4cff53b5015d4ff64b0d
-
SHA1
cceb61dd680bdcf44fa0562af2d9fcbc58beeac8
-
SHA256
4ea764cb837d6dc4896a28b6fec46a72c4a163271adcbe5fb12522c81aa6ea0f
-
SHA512
11ad9344e10952f19ecb08c17e6ca5dc8518e9cfb0b6efb6fdf81e65c18622126a0a73c9bb30dd055bf2831920f799aa0165664778bcbb3389e31735060594b2
-
SSDEEP
768:11uFocACEjDbxpWGOnd3KxOZYOXUrYauL5:110ocACEjpQX1L5
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f08a68c58db5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EB8D57B1-2180-11EF-B411-768C8F534424} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423564175" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000a31fbe5abd6c24dbe798305f3ec9dc200000000020000000000106600000001000020000000203ea4a9e5fd6e20be845970ae6db52abb99a1e7bcb00f7583cef838a99f5a38000000000e80000000020000200000002dd659f5ccd4299867438a4e775bce78ec8a4d75b8d80e5e60d9d44c47133e2d20000000611dd757e7fabf8dd1e5c8fb8c2235926dcf94b9629a8f002712d5b7f75d38f340000000f4d89e8af4441e8964f23f39ee88bd79b9653389609576b85eabb3b2bb3c5b2e2bba3281b9d955f5e7c40c3686448e928fd270080a9464156426f2c066bec6a3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2240 iexplore.exe 2240 iexplore.exe 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2136 2240 iexplore.exe 28 PID 2240 wrote to memory of 2136 2240 iexplore.exe 28 PID 2240 wrote to memory of 2136 2240 iexplore.exe 28 PID 2240 wrote to memory of 2136 2240 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\91126a36e56e4cff53b5015d4ff64b0d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2136
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5f5723a7b03717e286bba7612d370ca3e
SHA1d94822f36cfb3bcce0f612ebf68f6cc016239134
SHA2564244750d9d641dbf774ac62d10e0d49d624841b275d95633cb4218ecc77d66d4
SHA512f49b0482896fc75f97a19e31b7fe40d107c05893b322870f4c4f40f598d2852859568e7adf6e373c75a69a89c596ed8956bbcb8e6a4b2ba4cc84da01bc8d6570
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56780b0b443dd75e467be0d14cadc6e3f
SHA1ea90aa6a050ae27d6686cdbac69b034beb72bc0b
SHA2569d01e001ac17fe674e520cf50da8b6d1728f5d4125572b3950bcdeda0bc457b9
SHA5122b31a97639165f9f377fec098fc9e2100f79b3f947d830683f3e23908690f90e6a8b7b474255699d2304458fef2f29489cd031a3fe815a4f6d2f829ca0624df5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc7592ba779cef10df31197661f10eb0
SHA1d447c3e154f889ea2b7d0c3aae426370944a9503
SHA2567ca07f752b30d646b11417ba34890ec74cb48bf314b47d783ca531fe38d284e7
SHA512d24fb676383662df0d4b47991e5f53b3c17c01f472e2bd2c5589141ba970cf52c7a06cc3bb3edd6aa8b9969d2c293852e3b9dc74b301f896ec9c7d4e3f5346c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6727474535fe26655caf41ed8416771
SHA102980c48da8c6bb9c486b0b349014b9550a7bf16
SHA2562c23db00e8fd5e53c75a7300b3fee0014d457e5cbbd2709ac98633feef750edd
SHA5128978206c923fc9cdcb1c251da289edb5cbc7bea45e5fb2b943d1d06497934430f4c074da60e200850fed1ea0be19bebd67374ab65eee1a20763a121015d56e03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54121d098ad8a6107c5de2d3004a884ae
SHA1e78bf54ec990c6e08765737442b3365e7fe55d20
SHA2565dfc91d3bbca23dab679332b9a3c9afc8f343e2c648b1ed3188808e0327958db
SHA5126ef6b4be3c578c31ce9e3de0b8d8a149b309bf5de746fc9419dcd4bd1a4f8b006c7dcec3973cbacad7b37d342ab5ee517a354a4432db4c23128c555bea9e17ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac0adfedd7d0da398a1421f4dbe59e03
SHA1203b0d4f2c94679aaf928e2730945e205ea6106f
SHA2560cdd360ea30556be2239fffe88e4048cac4065d88bfa710bec278d98b9f63d0c
SHA51248504b989dca1ae29e02259a5641fdd7a6ecd7d61e958cb90cd86beff3e6297e79541dbe8cb201350dacbc45606e140038c3514b8e02faf54c97f27174d7dca7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5b4fbc2c82ae462ba4252aaefd930b3
SHA12f88063e4adec919047c8d3d4ed9d16c09bbef74
SHA256d3db51bac20e165d7b1c76583314ed07f60c95f5857b82c3d05d577c2f3aa810
SHA512a075a390c76b7e9d7a3edb7ac74133a241d550a242bfdb16bc045302ebfae72df042d69a14a245f1525852d091fd2b41bb79f80f8b606df0feefe8ffbb141079
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5174c67182ff9a3b2e73798b4ca5f5f8f
SHA1efab74c26a7730b86fe60960ada588ba6804f49f
SHA25664ac031b831f0fe812a1e3212bb63da9fbba6a2be7d74340771c214bac6ad457
SHA5123c9334b9497e2c290a6c5509a5aa9bd8fcdf783ce5d51476c6f547b08976badf27f2b6ec2b44559dcea8a772a7a5a6796b202f6afcbe0a4f976f98e8dc6a32ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f78562b3c2eedd04e0b9b8f909fff7a4
SHA1d8cea66e12555ab46f2b0529073ff09219c11a14
SHA2561e6b1399b53fa86699337353c6ffcc292d76b2c86a131b7b80f74cd6f7eb9663
SHA5121103eaed836a714d64a1b9f99f9bfbcadccd331ee20b49637fa9d4c1566cf4bd6f9a87b43e38d503684150c332647edb0e47aee20a8912ccbf61f60385a94edd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a20b83f050b0351221100db56930170a
SHA195e02a1ecca4379cdb843402a339259e714608e6
SHA256ce05618d31b854aecc73d8049879b9c7b90bbbd304a2e92c7d63afe26adf30f0
SHA512a735eb1c23e94260e8b896e30a548faa9721fbf2b573666e780e281704d619ac71342dfae356738e83407f95e976f2330f8c67f5c5e5e59be93edae8a5c70f00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510782a11b876a95bc3a4c73477b545f8
SHA10abd3396b5bab5b78d79f6c2bef32c5e4353f8ce
SHA256613a5b23cc858f3702f8b2a7b234ddf40537643bb92c51b9bbc5c3b6110ab2f5
SHA512eaac9588ec5d1f8154c84c1654e2eaba1362fc3e0c90a67735c3344778a04d115b0a259df590935715e13f4a16f2a61390f5b1670294d730a10288c9e8c19ab9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1e34cfc439c0d3bde65239da0914e8e
SHA10fb4b5a1c8ed88ea1bda5d56a78b2d87a287a6d1
SHA2567610fb0a944bc055b8ceaecff3680f74db4ee838ac1f1164c36c8966318bf20a
SHA5128791dee0bfb2ece428c03394c43618c22abac9426c2899a13b5bd6404a63b64bc7050224ae110f170e01810a65fb5d4784aaf0c178b18d3e90603239836eba96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5d38596caf26330d33602d1d31222f852
SHA1c6199f45a289f5550a7cc68b1b4828f647df0c46
SHA2569dc487a1a892c6a288b548874c43b86c5d75fc13617fea00d477efcd0317af5f
SHA512f14ea9da4f596edd95e58aaee5b61a0ff3966608afd69969e96461be7273dbc05f95c08f8a8e0a3dbd955522e188f0449a09548e358d796bf4eada94f3c92b1c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OOWQLMJV\contact-form-7[1].htm
Filesize124B
MD530186f8c949f588e8613b199f1e9004d
SHA1431f950a4d1d3ec880dd89dfb749ad73bbd22395
SHA25674a2b4d655922648d7d56a441fb9715983955a0d99a90a8f43f550b2ad409ce5
SHA51221e035449bb0c3beb688073928f6b51dd1717dd16179434af2f116281b7c8ef2b47394422d7a7836b45a958b2ea9430905aa5e5c91df65624599428b9b671450
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OOWQLMJV\script[1].htm
Filesize114B
MD5e89f75f918dbdcee28604d4e09dd71d7
SHA1f9d9055e9878723a12063b47d4a1a5f58c3eb1e9
SHA2566dc9c7fc93bb488bb0520a6c780a8d3c0fb5486a4711aca49b4c53fac7393023
SHA5128df0ab2e3679b64a6174deff4259ae5680f88e3ae307e0ea2dfff88ec4ba14f3477c9fe3a5aa5da3a8e857601170a5108ed75f6d6975958ac7a314e4a336aed0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OOWQLMJV\transposh[1].htm
Filesize124B
MD5e90d8b1b2d6ccfd636695c5c2702739b
SHA1ecf3c7118d6bb4ed2a2d5db0c872169e282c85a8
SHA256c8275ee305a445611a508f26b7aeddec6d7a3381702613677a4489e87419f24b
SHA512d780e87ba84eba507022e414a2fac69903bb132beaf5f08ba491388ab223495c4973165d42b6d20f6c7257214a49a4fd9cd3c8c7386d847fb9a805584a2272ab
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b