Analysis
-
max time kernel
143s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
04/06/2024, 15:27
Static task
static1
Behavioral task
behavioral1
Sample
955b42626d605d5cce1ce49473b065aa_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
955b42626d605d5cce1ce49473b065aa_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
955b42626d605d5cce1ce49473b065aa_JaffaCakes118.html
-
Size
192KB
-
MD5
955b42626d605d5cce1ce49473b065aa
-
SHA1
3bf4f6a32755adfd44fe5494885c516f2d97ee29
-
SHA256
b3064bba1c9bd44a6978bd0b97f3af9b6974590ab1973883a29bf428c3f7611e
-
SHA512
16a838dd30bb0c1d565c542f8e3dc9b6110e390733da0baa6bd3dc98fde40e47c667e893314172f56c7cb24c5cbd84619b3b3fe1a3b19e5669123219498b5e1c
-
SSDEEP
3072:beD6LG5sbnK3Fc+oCRUiymqxIJpU0M75KoFCijYkR7NKVcJDbgNrA:bzorA
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 15 pastebin.com 18 pastebin.com -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000a428ae15e7d335f8c1df8f5d1b1f11313fce8c499fd68e9a1eb7cf3799266962000000000e8000000002000020000000bbe57883fccae67dca8717cf488213de9ffa795641fd4b5deb71ebfe2f80cb05900000005ccaf73fd752e4311585ca950c7a64e0436b74750716d3368ffb0ea207732df2aaf6dc304a7b68f0da1a6e37e696e2969a43c8025442061b5e582155747bd9119d9d614dc976773008991cf1eedd1e6f3101951928581a9aadf42496b48bee7f3306e1e10279e609aa22dfb16e3df9a0338aa3d163d2f45bee78a4d29ca51157c222a5f824ddaf10a4bdc4deb02f4039400000002ede88e5c6a8db6bb1b6dacb394ef3b70efc418f5a3a5e386de1bcbebd2513e3e781aa9674defab2669d9908dfa7e716d7136784c9cab9b8efc3e502cee0fe34 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423676716" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000005935ee81f97608226c781060ed6bd586a09dd4847544318df1ff0331b9a43397000000000e8000000002000020000000cb53380c4771e3f1413948cdf74c31d54f1b2eb8846f45d2f93e5d8da8c6338920000000faf04fd153f3a57e8365563a6e74555553a6aaad0ba8b77af924f7f3c73c61f3400000003b59e0d848312d7d35f069203794424c0a359d622bb5d5cec3522e867d33a8c72467718bdda4634f0c4605ff160b29f2a5e005eb0477adc22810eef53718022b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 506483c993b6da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F4670141-2286-11EF-818F-FAB46556C0ED} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1932 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1932 iexplore.exe 1932 iexplore.exe 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1932 wrote to memory of 2172 1932 iexplore.exe 28 PID 1932 wrote to memory of 2172 1932 iexplore.exe 28 PID 1932 wrote to memory of 2172 1932 iexplore.exe 28 PID 1932 wrote to memory of 2172 1932 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\955b42626d605d5cce1ce49473b065aa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1932 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2172
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c42881486976b7c3b7c4384318a044e
SHA1a8ec85aa554d268f9d8dab1e1918c4bdd09920e2
SHA256918e63762ce8027823da0ee76c4c5be0cae4f6cb9e38ab202b9baf6af218250d
SHA5122cbdbd548874219e6b1fd872e6ac41185e5a6641889e905895e6b7359c3c497f12300f8cc6c384464775a232c54502bf01d4a315c80f63599357da9da7630a8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a56a0ee38f532c16423626609b983b99
SHA1ddfde41e3428dea116185639a268fdf937ec4d74
SHA256b41ae8a86daf8c7623e7afd34f4ccfcfafd6409d9d1799a28611a7ce873ef41e
SHA512dc1f65895af391471080a17f5a78c7653a16ce68c1e82afb3c2eb816e7c1c4ee61f470a0c5f4dce63a3209052f7984ae2a25b28eb8901729a97aa4a3daa979df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5676307b2d17dd5ed168537fe6c507caf
SHA10dc55194adb9886520cc820b1cc4c7e24d2d3561
SHA2564ba5f60a839f4ce4baf80fa286572b0dd705a7050705c4a4d3e2173de4529582
SHA512907dc356f1eca5f8dd7d831c412f01343ec4f0ce8407f6febafb9a9703649daf2609bea5c98469a1c6971be4ce540180fd9f2130415817684abb057b9b42a8f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f75d96ed03124349b6a09fc09ee6f207
SHA1ce7243ebc6278b448e354cdf4e8280ee3e62eb73
SHA2560a62a5a264562082b4dea2af06ade6d8c2d4c47182aa145dddc9eb1764e37020
SHA5122b7eb757060fdff04bb76d9b6c127c2ad5406744c4c6006ff64eb807d9e7da4b23c7685ac25e9178ae9b8032924d421c63f737ded7fae600eafa3e1657736836
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d69f81b654282bd7813d0285c43ec555
SHA12da2e3289ed61a51be061e894e58c36f6cd511ee
SHA256344573fb25afba04c981bee480000109b5219137c3c54da424bdd1476ba7f346
SHA512be0bafd68c01be5908d6224aed7ce21ba4cc40290591f05044aa7987279dcf39e7af20834f46d9738e1476b1dcd2335f3b91a8383f3ed5f7fe5f292042688e11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5155436aa78c42b12a89b530bc7079d05
SHA12a47f80e0e0aa0732d634e0583c142f862727971
SHA256245fb761fcf7ea045764fd0d37d72a7e478608d1e293d2d40f987e7656b7bd0d
SHA512a91931106b4327d04d3b34b03e33a8f1d6956957f0e193ce0d365dc17788e40da7f4173488b16ff41a22b13db3feb0748c39cc27b26cb57febd1e48fe0c2d19c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5211b9abc27378a78c3b51444f53cfa83
SHA1e5f22629c54359cd739abaa9e222db64cd667cae
SHA256f3905ab89e68c5dcc38630b5b275bc86fe2a2d179a97de6469b8923a4d257461
SHA512aeb30185f7d4984c1d90249ba7317089d7adf7610c74cc86268cb851ae7c067a549415a29659806738a982d4df4dbe79f9f30281a0ddf15821a7f2aadd588c04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8c176080c59b3c4b173f12fb4342546
SHA15279670970b244ff137717fe4425bd58e54f70c9
SHA256c38d502e26a6945abe085f2e2e40113c3908958891934110d7a36e65bce8ec17
SHA51254d23b5e25047adac281b7c73ee91a2fcde86bedb1eb64040325371d64ecf418d7acd833959683f136bcd68397009b15f76fd0fb0df1764aa2c64b67e686d4f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cf655e1f209ad3d545df06953d3d6d7
SHA19badba212c7f7085a7e53b0f37a716c5bc9aa274
SHA256a04177b701e94e9da1fa499ce6232e4c0411fb386f655ed498bfd3d57b268adc
SHA51290b0ce211d37db6293a3911d30d52253ac4e7a53e289f330308ab1dec3b016eab749d9aaf40dddcda5da786adea40e111420dcdfe999ea44ca1a60287475977a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5338bfca7ba496ae04bb6767f562863e4
SHA13357282690b4b2509efe019e3a10cd7539f2d829
SHA256b43c288f5fa8df71ae06dbb9dc2a10607ec8e2a7441800d2dfcc15c73962112a
SHA5127f6e95e4edda99387b000edaa3dce7dd38d6d6787d627aa78f4e836ba8dfcffbac2572c66e8b59878d577319a3d6e2d83475977a6871aaf4cd67c53b948e7ae2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ec96da98e6d4adf1736c3ab23b57e1f
SHA11f086101ae41191654b16c3481fc52a03ef3015c
SHA256c300fa523674e7eef1d49069c8dec602644323fff5bacca541343d9e50416094
SHA5127125a82603f1adb6363dd0ff209793317d2b6dc29d2f251394065a541c21fd006f84d42ca793ef724ec02e890012aa849735911ec8623baf0bc35c66b28b2af4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b6d545c2d4b6631bb698636acba2bd1
SHA1f6faa638417847fd761010ca2c47587ac478adf1
SHA2569985582c6859c887263bfa0839c9acb5cb7c13ed0a074f7b50e9a65fa196ef85
SHA512da8a5ff8e2e3d362da34c92c025ff92d0f001c38fe3471011fa7d69e9750139c943a2862e09398f1a86f85bcf1748cae243de2d314f78d27e4def56f9dfd0b6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571dcf8b9ab0ad45f091535d5d0e233cc
SHA17fb49150c30f6b4648a05edf27aa8438639ee3c5
SHA256dafb8c34595e8d88f958fc592e17bfab69a78b1cabaab7e4e576ee7155560f7f
SHA5124732753497e0ea1278a9b1fca06e1eccc7b9dbcb34ea1eb57f2fcb4d7ff2744898f492272eaf4488de2866ca57cb47c39c0be34f2314cdf45fb55fbab538f51b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da960144cbd995b78e10a7285084264e
SHA10578c17f640da870024715b67a0ad8ca4831fcba
SHA2567dc8d727677820dab2547ce89c0d8b4c5b5995d8ef39fa56238984c3ca752654
SHA5128882f14b0fe669ebc76de3f7854c8600e57b9a540ae508acf749ef6c628690748957ad7947eb84b4a7a0cd1e5c8bc332867519f7f3d19d37ed626a488032c12e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561fbad1647490e616aa14428a1798a7f
SHA136c7d697cf7aeac9eebeb00de956f5cd232e354c
SHA2562e9fd07eee00906b15e788b0f15e77d6a62e982164eb53349584aa8fa186f90d
SHA512e8119889b0f6af574b2bca206f2421853b6852ab4e03753981d09ea1c43110ea40bb6645f4b09924ed8c44191e4245a7ac481399147aaa32c30aad36ca9f96b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2c15480aff5e5f78d304a512bcd6642
SHA1ed0bd3ce6c166498a870512b5a012c9952cc28e9
SHA2565b15124248594bfb9b77dc14f14582467d104f3cd020764ddc6f05f113087f34
SHA512d1c85080753bb4a51837bc9dda51a63b5f3319a43252c6ad01a7420cd2ef12683673fe12248d407a02d7d49fafae4f430cc66b0a279e5a6d69019fac49c4cdb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ff51da4d895802007ec270ac57d7465
SHA1cde264779a7c5ae4540311380a620df39026cf9e
SHA256017d955264166ce358ab44e7686d366485b3218332c2bc1e27196e5b71851111
SHA512c9ced89b84c83bf8ad808bd01d5258c8ab9174ca06e36408d47d4eb526924f36faa2f4d69798c41b5e16c4b3dfab512b72106547d98181cb5c0f69e9fc8d268b
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b