Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
04/06/2024, 14:14
Static task
static1
Behavioral task
behavioral1
Sample
95233641ac18ac1d9886da6ba90be0eb_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
95233641ac18ac1d9886da6ba90be0eb_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
95233641ac18ac1d9886da6ba90be0eb_JaffaCakes118.html
-
Size
109KB
-
MD5
95233641ac18ac1d9886da6ba90be0eb
-
SHA1
46d5df969bf7b38387ad97172b1b0124f846c764
-
SHA256
c59badd8e82635eba990ae02dea688c1ce38c5c2f955fab4bd8a3fa6b30b1009
-
SHA512
9cae9baf8bdb275d1ce68a35f32d2259995166addb12b61810ca196c2c83270e3dc79349f18a804ba74160068cbf09cfdaf2a3ccbeba59a06da453385e7f127d
-
SSDEEP
1536:9HTvCa6IlixvbBqMj2OUwBw+beuFL/KMtGQ:9rCagUwBw+euFrKMtGQ
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423672369" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D1D4E431-227C-11EF-A002-FED6C5E8D4AB} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000519d64d6c3c28208664a7f6551429653885127a64c6aebf77d77003e966e3064000000000e8000000002000020000000f76e2205c724dbfbb7ed56dcf9cf38a2a7326ffda9fcfb0609e551561178aece20000000ada28a2d1b14003f2b67306ddaef82503623e3c1ee30cb4532117cd1bf9d5c304000000009cc4edf5fb4ae587a32d3b54fd0dd0da53fc4dc35d09bba2b6ecede4f577e486e9abcc4cbd6c027db54a2e46311b122a7b8c8cb4e224ad6858f48fb52145f63 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f06a86a789b6da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2552 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2552 iexplore.exe 2552 iexplore.exe 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2552 wrote to memory of 2424 2552 iexplore.exe 28 PID 2552 wrote to memory of 2424 2552 iexplore.exe 28 PID 2552 wrote to memory of 2424 2552 iexplore.exe 28 PID 2552 wrote to memory of 2424 2552 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\95233641ac18ac1d9886da6ba90be0eb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2552 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2424
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5fa401214bb8538b533b04815640b59f1
SHA134b6b43c23f0420b616ca65ba143c2a3a73c8dcb
SHA256bab32e947354b1a9c29e2a6e1c3f3724fdff675207074d48aafdede1eb7bb612
SHA512b7a5bb22811b90173cfd98d6638a04c7cceec87a049625aa79feeb214d34c5c1e1f40adaf645490282db8ad133a3889a8db159608bc7d9a729a4cabfba4a609a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc943540f390dabdf742f631cd649cae
SHA15347636d0f7fe09a3ae368c95f4095e907b5a2e5
SHA2569f5d6b42d9537efb4f913674903dac51a6e75635483c8c61335f064286b650cd
SHA512b2861c5858e316bc3aacbc1d0ace6d8a5bc7942c02b0cbd768325066f663c3cccea3df9634cb4ebf9e082bdd2fbee80e94a3f0af0a922c9d16b4189ca5fe75bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1c62fe2460245e7ca1a99e0d51d6789
SHA1c6e4c83a16ff7130502ed9c0aadb89b5522213b1
SHA25646a2aa953cbc762c0ffd05a9293e6dbbb449c27eed2499285c1f9fe193bf1e19
SHA5122fde82e42906a5a7870073dae7f7c7b2591b22cba7ebd16c2fee753d91a6d6ef44529a494da6e62cfcedeeca5224ed2383708f15e814a545f0b8c288fac1c5f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dca92f35d6a3c9e12a6fd516cb4cb21e
SHA1a81c7d2779cc7c2bcf4fa135c04d30d8e44c0a20
SHA2564017f21f8d4d242f38af877d6d71aa20c80233890f107213cc2ba23c5a0f1e93
SHA512f7e4fed97cf761e699b71fcb2306d8aa479600b28c8b31296c833c05c440467244742bf8d9ad68f4b68043e5bde492d37c757ff4a8abe662b85bd73ecc378144
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5459ac0ad19c6dd3d1e7cbf231d1ef1ba
SHA1a86627ab532b77f8a20a6a2e263e0caf9c7a40ac
SHA256f3d2ef7273f05e0f4bf95f695b853eccd70527a1fd6ccd037a39623f07a35dd8
SHA51257c05d828f28ab651fce10fd026e1ad98d1d9b8171fd008981b948a391f59ddbc4eacc31ccf0942d9d7531b2e833db3b3f4afc1b1d6d18400bff90ec438da637
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ce2e1a63f72355aa7bb352b65eeedd3
SHA10cf901f86e5ca6d5794b78d0ed8695e2e310e86a
SHA256374d0e89dd01d92d81ab5140239ebcd41671dee036eda7c0ac9bed37af4d8be0
SHA51281bf40a744e20dc1d8cc600cf0a174ae2ea0e365de18d35ac048b18528b616ff9a379534b3cda52d31158e71f33531e13736dac7e9037fa60fc857b31d4f5b85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee1922063a927f1dc1429907aae0e4c6
SHA19376617da39cae3c8bdba4792521ab06d391404a
SHA2568ad433e67cf2a2b433ce049df9921362a817a6a6ab869538a670d723f2481ac8
SHA512d014a3cb532b2711233512eb9e5a1e0e5d408250324fe2b3b1265bc62acac934fee27e0539cd6ae68cc923c30aba8c59c1d3ffb2ba26c29ce2dbc6bad21aaf2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599e451a667394884e8cf9a22d68bdacf
SHA1027c76fbfb8f5a46cbc4e2b8987f3706eddb5ddc
SHA25623d45d97d21794bb96c3f678e515ed80b6eaa85acc274e34ad20d6d8314b5f40
SHA51265c9fd06e0f8d6c0091070f290c28f1e4a6ff9581d9c0fd096b06533f7e8954e8e9378553ab5444f10577fb8ac3a17198fb39ca829fa70e6effc8553ccdeea54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fcddae734d4c77b0f3027eb9a3cbe7e
SHA1dca041ebf1fa6fc63d957ac12ad15ab52a8ba723
SHA2569284f2d0bd8cf4fd7a9fb9a42991a435a66b2a86ea12d5f15bce97f73cd4b8bb
SHA5121ecedc5b13b575a95d60126be12d1c4f68dd189e4658a9643b5c0b3b7e0680f77d6f0c76884e2b48658d6b93a98793f5764cac65c947608679fc3c9f78f3e67e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503b4afc579188f060fa938085c9271c2
SHA1445ac3263b6e19b2f2f68149c36df9a0c7d9e8ed
SHA256809254bc4e9b349c49a56a7a0c66616fe2352b2c17610d494f7ba18e1d1f856e
SHA5124d2664c077976297494dab8146a78576928707930e1c18aa1edd43cb40a52811a6575847a8d1dc066e1f16a4470d565b0cf44f793606395d4ae86a8ae3a912c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5650b36fbd29e68014ce75a542d8a065a
SHA1a1ab6c7e17e3352cb22e66c596d958f6bf40b403
SHA256c508bd7161280db7ff6b4bb47b75b5226c992e7437f9c4190da0671e32686ed2
SHA512950ac4fa31a7ba953b6a12f9ec570646a37f7dacc696e3086f44d404136326733ce2ad0c9dc7a63e93d90f3f5944c030a8acf88b9603b5b8790e8cd61f8d88c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5535d9fb3b7908061ce9451d7a9f2f361
SHA19d039ae5d5b84f99a03f66a5f5cb12c020e66ee9
SHA256429f6e84331cb206db0474c604920d1a34a6820cc85b08915f008ed62b1abff8
SHA512a1d44738581f5de0fc5dbe5a45dd1848a3390c8fe39be29ffa7a3ad6f7bf3fd2a870a89f7e277555967b4faa334128abd7ec694306f7a1250fd291400d449118
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e517c49399fd9eabfe2dfe2e96e72be5
SHA1e4909f84a4de96b04a22b8ff72e33a78d3bd6ee3
SHA2566655b8034d8ed46852d4fee74a2a1458e92ffb14edc2b49aef4e154beb0b4d65
SHA512653a839483a6e94e610d9dea4db916023c16407bbf330b45a5c685ed854cc95c24cccd191e523b80c4e751abee5c1a266773e9c84ba992a0e57d9d02d3e825f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd434af6823e5db1b17dadd4afb60d67
SHA1ca72d2add139033a984fd75a701292c54bd0d02a
SHA25679e33400628177cd3a9865bb29af227fa3f44fb8c3ad895e2d2d5479b86d9fed
SHA512c5a287df6c3375ff93110f58aab644589f05c1e03b97e98aab338c2675ba3d2e9a97198108c83fe9fb72915ebf87dea259741f910e1bc7b1aff0921acc74c17e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d3fad826c844fb37a5d69c5190ea8b5
SHA18650c328b2a22e8feaf26e875cad2d74fa4012c6
SHA2568caba0ff99757838d633f10466441a1ff5f0ceca0f1c60aa94ba0b0c58426350
SHA512ff60e18581f61d627c70e97fcb475ff8ff4cd5d92b9777588dab446063980f77d6a65d9087d1eaf4d67b0dce6fc06e6c13d38f020da26b77885bc324ad0a0883
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542dc04e5ad76bb74b82a226a493f1f7d
SHA1be0da2fbe2c44e311feeaa29874e8f98a749fb6b
SHA25676209ea4e7d1b0a0a730e41fef00a9f630deb2436d9117faae9651fbd34ed231
SHA512a945369f0516755d9527509e5cf07a6105fd0ee4d9d5a2884b0dec3ba32c65c625deb71d109012b5783165236173342adfcb7bc488b98b2619ddd70d0cbdedd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7fe925147022edd9cbf00e0a069859e
SHA156c719e714904a3f3bf75e4f183113295147f663
SHA256fb1ed4ed6032e0ebb4b140644c028a332dd3ccefa4bbc7c53afa9bada9c618ad
SHA51233f162627ea4d8ed54a0d3628a7e94509fea255a64fe5352a89967da14d73a7209bb3984cfba8b550393d619867611de91ddc1e69d53931420cf0732523f0288
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_827A2BD464611B5891D523F77B43FEB1
Filesize406B
MD589df0faaea93f98111e3038e5c212440
SHA1dc4c1457ea09fe181a494c69ec5846afc7f37dce
SHA2562242b45559cc1800d914ef7edc78a15b6108240c0093ccc8fc1f06ec70224c06
SHA5121f10577abdcf7970f6db078abc088bef33c65e71958e1890cf7ce0841db5fe5137d8039799ab8beca5d75d7a59de697df2993463f5e75559b40c32f20bae2570
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b