Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03/06/2024, 08:52
Static task
static1
Behavioral task
behavioral1
Sample
912f47cf49da58095d6f520b6be89ab0_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
912f47cf49da58095d6f520b6be89ab0_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
912f47cf49da58095d6f520b6be89ab0_JaffaCakes118.html
-
Size
461KB
-
MD5
912f47cf49da58095d6f520b6be89ab0
-
SHA1
91e426a6b78e73fc9d5b36b8f793b3e3ce24927c
-
SHA256
3b45d93fd06410e3a6fa9bbc9443cc09328b1c8750d59a968dd7398e77eb3e8c
-
SHA512
5862ae5928189ae7e02b1177f6f3567670314abf3a58554da2b5f12edd967c984e67c38c71955e5ce368dae32a196cd2643eaab81c29807dbdad0bd19266ce08
-
SSDEEP
6144:SzsMYod+X3oI+YEwQcsMYod+X3oI+Y3CsMYod+X3oI+YLsMYod+X3oI+YQ:W5d+X3d5d+X3q5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008557d42dd6a91842b10cc5159d778588000000000200000000001066000000010000200000004414542992b3ddb67e8436c55add014afe52bce85223c1cbf3a414356be708a5000000000e80000000020000200000000358148eac1b887994de7bf44c9dd3f4d3bed4f00699c2fcce109f55de0d29e8200000004b75badf2b6a393e239289ec4b20b31e72d03b8b8bfbddce840aff665c68b74b40000000b18a369aecdcf35aa9c3e41480874278bfa34d74f38f2f94406d946973950d80e098f0e32e2e5d49f274cfa4f55b8b7cca954202aa3a490e70b1453ee7e52d2a iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423566616" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50bba17393b5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9B1AC5A1-2186-11EF-9E38-E60682B688C9} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2160 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2160 iexplore.exe 2160 iexplore.exe 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2068 2160 iexplore.exe 28 PID 2160 wrote to memory of 2068 2160 iexplore.exe 28 PID 2160 wrote to memory of 2068 2160 iexplore.exe 28 PID 2160 wrote to memory of 2068 2160 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\912f47cf49da58095d6f520b6be89ab0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2160 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed2bb80349c8c8d77a5c3a2955e47864
SHA16621a64f2f7572c143b56539075b507320e0424b
SHA256c860ab785101106107d3c0710ca029b4359621f5512bfed70751acf4001eb477
SHA512cc7aaa659d982e9b73beeb0ba5a4803a9d1789b9e2b8d14c67aaaec172c33cf318eea22eb9b777b1460268edc1c1134e3ba29344cb872b696b01c91fcd840a13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577ce6a173f083e894f5c85a737eab971
SHA1fd8a4b5d542e185d972896ea82a2ef2b6b08b05a
SHA2569bf3133173012667facdadde112e181b2a05f41fb2ca3ddae399dadb960d3783
SHA5125e536c1cecd3f1710e5924bee68b5ea35b786d1447cf43ed6e6d9b6f804e09e577cd3082534851d2da371bd91e601cda29d9bd1e38c57ba2a35befd916e45b40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500f9ddacc044ce9a3fa17dbc17a23cc6
SHA19202000c9e6bc9f0a2a0e8dfeb4d9eb7bd2d60ce
SHA256331ea8f873e783cade7af079b6f206a8fbcb358a66139abbecd3d2f41232962d
SHA512f440245e08f107090352fbfbdb0f3cd53c079c080e648df6bc02df899edc9ff5de359e6eae8192d9b59d5e8eb69142d6b1487b7cf660dc00a09d3e374eae4f08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50eaa7614f1c7d288fd88d32b4d1eb7f7
SHA1601cb63f61c48ee08919d827d76e0c50be7e55e9
SHA256da56b6a905320a0ec2e682ad260b55d930aa52c58ba2dc329f5a257e79250367
SHA512679d081d0abaa280fda00cae43d8ac958bd19b85bed1d4a053a43d6eee38896a1052303de4dad0ee23784da75ffe7cf33958438a03e91ca2d70c6331c541ba03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb9eae0beb0f4258e89338dbf236e810
SHA164b4a4f67ac74c2fcde89368a25430ee60c8d6df
SHA256dd2a4ad7ff45c196e71b7db3e2f9d1208b0f0250f1ebafa65ffe5effa1bfc912
SHA51265b84ca2b2f230e1f5008a85b7c57ab1bad54a7586103a10786f8c18883e7799217d65c76c18d209df52782382b9dad43c539f0b833412f626546937b2f1f2d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cc69a67a1e251e40e83e23ff32d341e
SHA1ef79889712dff738edaac43b4d54a058c250a966
SHA25697e84611ae7b488a01f20560706bea9fbdccd32085cb659ab1040838e4375c6c
SHA512e4a0c2553eb22ac986f686c1b19d2f488472b9154e3f7ec2092579f095a65bb5e16ce51fad7722a9b8a43350a7055334c07a48bce4ad6e09ed76df794a5efd34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c27a3a81e557ed9a6ee63bdbfa86c5e
SHA100096baaffb7113ab4f3c50bd784b089f1393d8c
SHA25675c3f529d0550a46b9d37625c90457ee5e7b90b9272bd1d1d0dc4098ec6c4fa3
SHA512d25bed69b666afdf375c35d366b812f034b4bb089054521669bc6a9c2268afeb43fae4a4294c16fe995797976495c8b414394939bba29487d967b7481ae3ff73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fec0f830b1f19df14229ed8ad80ca24f
SHA165afc75f9b3f05b35291de192c016838d7222987
SHA25620e213bd9870dcd96412d6b72a3fca333b4754ab2ed21ad2451a83c60de6a69c
SHA5129b41f0059acb7ef971e60d64ffb752abfd0ec5156dfab10c798297c17bf8b2502bf13ffd941184cf8e24652ad438e4a3d605432dce7c035b9c403d937906b039
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b81d9d33de06ecbde872ae94121aca85
SHA1f5c3a8cd28adac2ef0834fc5e88fab564ea71e0a
SHA2562f0aca9601fb4fc3e549166833b63ea9a3ded2be1a95363b331bf5b5b0f9d337
SHA5128d143b826b6872a6a566bab6d45263875fe7bf9e0c53b4dddd19253a0a9616f1ff6c2ee35eca6ce37869012d5331a5297daa66a8cc0a72ba681fc7a1955d8dcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565306662abb3300e78ee03d395f04f9f
SHA15e8144f75d5bc9bd7ad17d8cf4d94264f105c550
SHA256899c2f3c8ac26f8472f64b0cf6a06abf8d7108c350e15da6779373064844f38f
SHA5128cc47e1dec4e5836bf242b299910cc2dc9e64ded28d582c59edc5dd0d46860dd0fd5ea819ebe5b7bae73a1280a327028cfa3f99ffedef30a02579d98add2e8fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d6c0cebfe8fae3a07337b5c40abb4fc
SHA1267957d0a0fbb30b9892726352e922c5909eb492
SHA256f6f9975c9e5a19ba6fae77561f2ba0e095ad2ac8f616b64f1c9f6d12aa47aaa9
SHA512b9a28218276a78df98f4775b73dc29f41888d0222b47b20c3a57dd0eda1078611c4c8eb47caa02e93098e11b57df67975fc56dd3a73dcf365dd640bc2233be26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573d72e2000979ec5f291c24c2fe17311
SHA1c926462e79af9bfd7e592f0087a72fabbc68d2bc
SHA256e4e28c46c2ba03404593663d107073005b81168a81c356a7842c459e380bfa90
SHA5126871a99165401c1bf6a057ae346dd55bb39540619cc5c031caf6368f9f30db167cd0a69eb40bd37aa18299e3051283837f9130ca1ab2d785343c29b25aae17ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bc0f480c287dbcd878e03f5aee0f3a2
SHA1f9826c7e6fc6754bc7fc179bf5ba43c0576d455b
SHA2560c87becf6091ffa0d32a4b9232b8bd5930cb21738c2d1d4ce20bacf1e3ed401b
SHA512c507c594c26e453606ae465bfdbb197557e4d1aa565503a4371dbe996ec209f39a41882cd2e96ef59afc1db544d65fe9aa4c3b84bef8520ad4f3ba4e24c99a03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5303d8c10337f957b6b61d8e71ae3366d
SHA129e473373de82cf416549be52eae3bf67cccfd2a
SHA256517ff73e8eb73f0038c38ebb96ef742e7d1ce9c22a8ac499bdebcebce9b20efc
SHA512876527b968d7cd235019770b67917f8e04fb6611255e9f7bae6d23310ed903ce344a012c8e1c3b20d14a0f530aea81e5c2504257cc0cf883997691e281ffab2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7faa7546ae87ec3fbca205e639e3930
SHA113101e2cee923c3cf968472c4abb707aba86823d
SHA2560b76706950b214085cf9267e7bd053f50a584195a99fdca32e24f2ebaeddc0b3
SHA512bad047db255f86e6c510d70ad0770e746b0c4834bb4aefe5209bbedab6726d25737a155b12c6bf93c89cae76b0f6d98311b9ef108d75f1bc14ef15483a048c63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586d315429ce1567629604c7b1b937a10
SHA123d63dbe8d84b1d986423c66b1aae207baf55e8a
SHA25661061011b61062d4a24120ba4e144acc87133ed37149c971fa4df61295e50a9d
SHA512a08c2b1b669c969f070648fb66cb78c7772a8f35b6380d4166ab605194f2a119888a1d2084b7bd84a6df8c0bf62d587b5906cbd1ceb140c75702b66e51f97675
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5350108ef77af8ad66d72d221651cca70
SHA19f9d1f6d176bd06b40bfd8c0dd78d0706a98ef1c
SHA25670f27d3d91e3a81b77c7c22285eb6340315f2b54cad41ae179dd0c5c3cf00586
SHA5123a88e25067b98e7ab4254b63ed0f3c7981bca57e27aa6da91aeb94af0f61d32d2ed7722067df28c89fee6ff47fa32f01c8680a70ae330a34ae00b228e901c052
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527f5d85e8df9adc42ea5c452898b1fba
SHA180386858f75f1b212b4aa9ee90012b9e92252f84
SHA2566984b1e0d6d65880caeb2fa079a3608f3890c8af37f28667de4ed089927d4758
SHA512c662db58d0a04c0394cffb5c528064e0ef44f42b0eeef7b4bc7b8201c219771eb0cd859091e66ff652f5bd5d386936fefc221f4f590d6c4fb2c870e1427c27a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59654edcfc458884d2ef7564b4897f98b
SHA1e5f5e5ad324776cd527c15fb0c97b184678a4237
SHA2564fe46d7bb54cf78efef81fee8be63c5ca6066d5198e4bb22796639196398bc88
SHA5122d4b7b4ea87598705e47057507c3db413e365650424bea3d8737b1dea9bf80357afec02f20ac99ebbef837cc9bf52c9012d03a76c5c89e83f9b1d92b560d73ef
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b