Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
04/06/2024, 16:39
Static task
static1
Behavioral task
behavioral1
Sample
958d2445a568eb69514967080f9df6d9_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
958d2445a568eb69514967080f9df6d9_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
958d2445a568eb69514967080f9df6d9_JaffaCakes118.html
-
Size
4KB
-
MD5
958d2445a568eb69514967080f9df6d9
-
SHA1
13125e281c64255209c00f4be101f4d08dcd0d43
-
SHA256
19e9a5554e5d2322cc2e650455c0aa36dc4a9206d1f46cbd282faebe5d6cf189
-
SHA512
f01fa8f105afe2cec4ee7a3c9d6fa2beab004bae6a5501714eb370456d864bbc71b5edb7b4ac9e06b889d0fe05be550227d6be2849d697684c682f1d421da013
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oE6gxd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pD/
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000151c2ae58f775c74f83f278f0023f8cea1d5307cbd1dc2adf4b29900153d50ab000000000e8000000002000020000000c911e5eafcffd1ce53e19e65edba76543f3062b7dc9ff6eaa4a67f37b8063125200000001932157690a7e386415c19764df0ff015cae3b1de9f3fd71b214d827af477ee74000000055dfa52844913404199ca97b82752e3ac066477e9e7cfa30ec30344b9a02b6216cfc6ac15c1bc61434f5f141255de86ea55f842ea853ade37ae0c95c21951792 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F47136B1-2290-11EF-AE65-4658C477BD5D} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c09910c99db6da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423681012" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 616 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 616 iexplore.exe 616 iexplore.exe 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 616 wrote to memory of 2216 616 iexplore.exe 28 PID 616 wrote to memory of 2216 616 iexplore.exe 28 PID 616 wrote to memory of 2216 616 iexplore.exe 28 PID 616 wrote to memory of 2216 616 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\958d2445a568eb69514967080f9df6d9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:616 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cb6612752b46f2f8a2b3f9d5ac4e2fa
SHA138da79de99942d50bfb28e8dd82589978240d0c6
SHA256009408f893a38d1492603082d8aad9c9e56e71ca3d60e79246f1a298b240152e
SHA5127df01c19adcddd6d4ef809917528127e8c1b83fd5f4378166b0d4f0f0873c5b8fa00466c6103a814785815ca300fe9ba4fb571d8d8615d91c49857175940416a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597e877c3e799a5b8257bbe81af503413
SHA1ae5645a06bb36eec68109a446155face7f516882
SHA256e273e97019d8c61db1bc1a629f63a08bfc75da18cd92ca0ea68ece3d46452a50
SHA512f6c812f22f5e5e6cf2baf8d29cf7dba6fca04307993ba6457db13232dece96ec9d306410153f7a7af94930608a29a9e24431a6b42c3f1b702be63a980d392546
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5758434e8ea9bfc6d7f56e31c6a7179
SHA1c736f7a08e59838c6574b502d38a0bc0677ba0b8
SHA256b9caf7a9c57ca867146635d99d23570642f57c5d06c89b30de6ced234d3768be
SHA5127b520cf5998ccf40765c8136a923338557feb9c1e1694b48886abda70780cf602165081eb44d4e197e23e836ce7ed209c15120632ba054a79e9321ae7214f074
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585663a14758a4ff331f9ed5dda798dce
SHA10c21dfcd5979844aec4bfa7d49fd76311b506a64
SHA25640e4ff9126db71c49bf8e1019f54ffd8663e7594bf8c09a833a14d068c0b34b0
SHA512ac309e8cf2d56d7e1adda7a380125ddab3c2d23090469943f3ff68e3c9f58cf76222f3c1a3797824144823cb945b79bbeafba2ee405d7a3d50808ade0879b82a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cc1148e3318199fc0fb35e5aa826567
SHA1bbfc8a025f35bf1ceb396ce489dbf5eabb40dca2
SHA25683dfeb55222cfe7a11f5162ef472615b61c4864c25b852ddc85f49d77afd0486
SHA512d886cb353db59b891c41fee41769dcfbba8d51917c97a101d6807c9f56e53784c3ab3b566e454dae73d2a6b691154cc5f828aa99feb553b3d5cb4fa3a6b1547f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a6a37cb586f9d80fa53484230a4546e
SHA14ac9d88c4809ca0ffcd4707d31ab1d8d0a1b6d04
SHA256bca86d0f5b806e784600c58977d2e81345de7f0f477b1143c39462180ea39b10
SHA512a6ebd4159f97bb477839ee55e115cc7edc39fd65bed0c900421400d65e215108c7f0e9289103780cc74cc51937a63950d3cb6fbe86bc4d5ddb6855d77602af69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5152d6c524d576d721c29a9112d9562ba
SHA137eeb4ccf82b0938285c6e5c09af5dc2296e0f6c
SHA25600787f4b8349d29e978debfa0e99990b83f2a4437195a492821df865dd4bb9f5
SHA51260918605eee53e6d38612d9665ada9f31808011557e45e22f0a237f7c8fbcb91c1da3b209adf3ffa8b63ec044501a90652c382381f6e451afc53be2f8ef299e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566e3ac6d720553c9f37728b74759a990
SHA17fc3ccc0bb2f600404c38bfc791be432474509df
SHA25660a242e3096f70a315c1adc2115f2145278e43dcdbe86e960fdcbe2c5c01af63
SHA512d9c02c739a89b54f020d85e921e0a8108eee7a67e1e0f610e95894489327961152ab9e504fa99dd00ccde4ce3f2df76d3fd80de376a0dd19c1ff5830246acb31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540486b318f5a5556dcdb7ff46173bd95
SHA11029c84f0a4995db789628a87dcf9f07e3f6a1c2
SHA2568e56fbe11b1723c1485d5b91638da857a055fe44ba7426bb780a01900501a385
SHA512a26d4473be5d8a17b4371462e07fffbf4035179f494c530457101b86b055345c95624c5cc3d4787d0b665d9871d4cc55907e847effdbe8329f44d76c90887dcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59018b3351c732c06f34aa5645a6c1ffe
SHA1a2f386d519b15a478d2dad3acd4a5a3f32ce0172
SHA2563c7d93ed3d736252f98861694c3d7ab64efea987590d231b65c655ab891b1e2a
SHA5122f1bd6b32b252f7da52b29dd75ecd9c89c3e3cea57b6539ddd84ca349fe1b6652b0dbdd5c9a56fee50ebefe738bebe184d0910821cebfb748d5ce431997ef2a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e56ae910faac2e74b9bf9dc53d1dead4
SHA1c8a7e47082070aaab4ddfc76db2dfc340cecabc6
SHA25639c0c70088263654307eb40ec90abd2e8090898ef008174e895f976332088026
SHA512d0f73e5f54a50d34c306fd9b88212d3d242f8f481fdbd0c6bb409eeb2b1fb9f8a74e9d4ddf1d5d4b4e5b6c710da77ec34f6a86fb79a7f888ebeb5d291287f68f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad132f887e2ed40d29317f8bebce1481
SHA108c6a2d0279ae7d4239c33853292d96a131de8f9
SHA2565b730251fca42c279b204f1687f0f4ae7f08264c7054679cc64b241e30a3c3c2
SHA512e1da60c53549b3f1ff3f4f426f3c163c8135059e988f12b479cc4a438f32975f9905f03ecc6b22a482ae399c09f88b2e60009c3ee257cd9c8ae82e97b2fdc875
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aec495452f39bca231828f54df8ee89d
SHA192e56e7ce8b9ef7b13395fd9665d49aa52564fcc
SHA2568caf91ee4fc37c862983fa33c41d5f327737ddc29cf154fb6bb5a1714ecbf3f7
SHA512df8338e172f63afbcd69913891f560db811ff048c0750a70bc04237b9ddfce90d3093eb54b269db60a2eb4719383dda37fb49ca852cf0f31716b560b9004cd81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a722adf3291cb413100a8743b91ad3a
SHA1be46dc81215f0ed902c6d7d6e91b593281cd99ff
SHA2567ef85d1bdf03534cbd65216de5bf48761c78a513a9317ae0dc4667b8393a8241
SHA512be65a4ce54225e001f6eed4d8ac266efc04843086b7a9c0df2650e563b10c3bf4e5d0e397af856fd8631f0dda5defcd35a577d646fb644340fbcd6201a1e7804
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2b5a07f0e2b05bb9dfcaa4c4451dca6
SHA1aceefd9945218a867136dd62b3c8fb0acb896500
SHA2567234ede1e991f1f57683176af66ab5f71430e0f36f56c87f65b2564c7f88f31e
SHA5121b59b44333172bfa5bdf39ad244c89a7b70d288e53f1e5a18e4eb0cf904cb970d50f91c0e87e7609cceddc3d9a2390f1e3a38fb9412738587d062584e969519d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3d3944d1960cdc0886dee5738d32dba
SHA16ae94fd07045be071d72ff71679bc9566fd07d16
SHA25653d99119c74a22b06c732f8732cd3d73552663e735cea8e900040a5a4056f54c
SHA51248b3d7a828ddef7e76f29bd19f37a35f316adebfbec774dea6cd7e0eacce141ea5a150513ec01c73d9d0cfbcba08560963a4e6f9b707e1d6eecd60e9074227f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f7a81d30ac9a4f33749abb21941964f
SHA1103a507cebc9ac19e82bec6c674ac6a9bd9ac15a
SHA256a1b4e86261336eac16a05fad931608c952bcde6b24b7ea2635fa574627146098
SHA5122ca7e4c7277eeb8593df6aa9b9975206f80bc68c7eb4480f5a3ed900ab00397a7b2f06e2249052235e135368bd3fa9de17e745110b94bd0ecb3409ec0c887c7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cbcbe048267760040af9395efd7efb2
SHA1620c9e44c8fb4d017488f86d4085a812011b4aa9
SHA2569386f6ce1a8893b09131820630ce974c4e8c2cc803edd78737e06573468dc053
SHA512baf9b14dfdc389780e2fc17a47c9d7bd8cb147d3c587015f79bb54f5f653bc1f0055cfadf9396a316964d343852964270070976b941ed7c5a3545354a41a7a4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e8583aad93f488af21821abd5bd9098
SHA1233d97045dd339521fbfb83d74c1378367df87e4
SHA2560cb3d35081f03a0857c152b9d023849f6c0943a9a739c921f1b98a7a145949f9
SHA51213be9cf8783fdfae2994d2b398cd5a3bf370267da2107575245da37867557dc9555a174ba85c6d105503914649932a55180c76e93e33d6c26e6cf8b64945685b
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b