Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05-06-2024 20:50
Static task
static1
Behavioral task
behavioral1
Sample
99385f840aba631d02eeb5b9817235ae_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
99385f840aba631d02eeb5b9817235ae_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
99385f840aba631d02eeb5b9817235ae_JaffaCakes118.html
-
Size
461KB
-
MD5
99385f840aba631d02eeb5b9817235ae
-
SHA1
f8bf6bb297b96ee321a3073bf4ef404a97a8ae20
-
SHA256
85adfaeca890205dcad4b12196b473f83298a19f93cb4fef9d8bd8c8d86bad3a
-
SHA512
68b5e27a98eb4d6ca3ec405d0ae0b56a7376d04678afcbb407d48bdc04b4824a847cfd74273e39a6fee1b41c1c354530a4924b71372c35105d0ff75c6390c4a1
-
SSDEEP
6144:S5sMYod+X3oI+YSQtsMYod+X3oI+Y/sMYod+X3oI+YLsMYod+X3oI+YQ:Y5d+X3Z5d+X3V5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60ddcc188ab7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000056002e13bda5d469fd3fb5b6560042d0000000002000000000010660000000100002000000056bb6572852943a25b7431a5bb62ecb3663e1e485d37a7b9c638254cd9d1b23e000000000e800000000200002000000047a00c08d987129a211bc255e736de2613b622057e629cca1cc0fdedf883515d20000000379af5d4d2ba06617de5290c57894d66350aa0b35f38e780392e8c2232a4184f4000000075bbb413f0a51470b7d49478656552a6795399aa4969d1f6eb747f9e88dbfc4b7bf84702de9a32d2bb6b37785379a2d49adfa568608b0b588fcec81b992cf2c0 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3FFB3A81-237D-11EF-9E38-E60682B688C9} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423782500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2256 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2256 iexplore.exe 2256 iexplore.exe 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2256 wrote to memory of 2544 2256 iexplore.exe 28 PID 2256 wrote to memory of 2544 2256 iexplore.exe 28 PID 2256 wrote to memory of 2544 2256 iexplore.exe 28 PID 2256 wrote to memory of 2544 2256 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\99385f840aba631d02eeb5b9817235ae_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2256 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ba69dfd9ae3b718a03cf643205da982
SHA121db584a94738c7b9cbf1d7e0b4068feb9a66c77
SHA256fc4eec575a900cb0006e5cc58920180d911f28bccef805b92abd4aa7707031f8
SHA51255f288ecbe68b9c0dbbde484a45a4fc8b8e598203655455d1b80191c84c80a661ddf53303bb1aa98c0ea7e879a2a60c98a0a23f7432f97d6028ac265bd4807af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a14ce521415a7557f12104f8777d789
SHA106a84cc8a8e4578786fc9aed20de1377e8948204
SHA25680296b61ddac60ee9d6937352355c7ea4dcfd8e1ac14a30133261286714a4c0f
SHA5125b8c9aca3684119a7b44949294813828bb3acaaccc8d00fdd561175b7a2172f65a393dec14813d7533561a429a46e86a433c4be8b37d04be80f0aab850d0488e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d083841e9a33d32726861a0ea5341435
SHA1280a3f2b86cf34d6b7e83a6174827a88257a4561
SHA256e151474e95ab9365c1bdaecc54ec5b655ecf7c0d1a9d1d8217680e447c49aadb
SHA512efe98adc8aa8ecab358ec39f2a83f00bcdb3f6b15139eee563069d0f930f88e2360eac64f82b7ef4f710c8ddef143e493caf940c64e5d4e43fde9d4ede56076b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c651f7fb247c247cdce4a521acde0b4a
SHA1abc3fcb47fdb967f398af155866fa22ed5a487f3
SHA256ca29ae087aecdbf7cbf6127fc7d8f8e00b590a602d8423ac860b9e382fccb9e5
SHA51246fcd0cedff4c51766e79159c0d4162e888de23c371dc9ad4e96cf4bf442ab28593ed41bd72d3b814660a7478f439d54786ae5851aa0140984c5f19503bc8cd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa04968e18fc2876373b2f67cb385e5b
SHA19246a415ffb4b8357f84e5448d3d162b520bbc4f
SHA256c334f56e7fa60fa2718bb36f9eeff4b0afa785043e1cdbf19cca5caca8907418
SHA51205e93bcfc40a3f5e460f39cd3371b2ab646da1c02f6ca0a7a8bc24a515165749eb8ebd3ec404bad62eb3681b7be8ed25fb3881519c8085739e1ac1443856d1d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca90c8ba57a2ea13702ce05ede181b77
SHA12145badbee507208b8cbd0c7e4e78b433392e3ed
SHA256120292107f43161b4edb29d184f2034fb12c6ee04c0488d8e8d87bad82ac6e1c
SHA512efbcd20375664f4c9c0840c67073df3885bff5838f0dc8a0b508081a1c82c8ada586fe07df15bb91da93acca525cf06489ca563eb43123aa4572e3fcde3bff66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e332deedc208f59be4e9234e4594cf9a
SHA19d0aab01e467d9af5bec8040d59bc4858f3fc968
SHA2564d17aaf2519f35a758181ee7257d0bb0d54d4c11dd2fa090c4fc0c820a8ab98a
SHA512d942c7619869340676efb2b5551aea3ed13d3bbcba7295f5cd2b136564231b2eed0d2bdf317be01ec51cb5ef107bd4ea2f4a5d21a20e1b9b3d11ea67c0a87e46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca7cb0cdc74bd56e8a3ffc296e6cdb99
SHA12230d65808554565b1ed6dbdac2c4100577567ee
SHA2562b281a39d8ce0434e16604a17519b19a6cdbb67646c08c63780d542d91673bc4
SHA512025184be028899f0fae467b9c48e723693fa0ddffa8e249298bde864aa82e457a7b10be8f11cb8dd0cb1f779cfc3908a711906f10e13dba9e7f3e40e07077020
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568804bc0173046294ddbd359fe3c02e2
SHA180aae5f12e3494915924e5aed365ed4416866c1d
SHA2561cc50987964d94bf7050f452277795f3c9a5b8e3eef2b9a1c2a16261f0bec767
SHA51200c5a9ad7f569bd15b5a857206fd714a0b7b65c7090a669d5660332996d907fc982e68d64460332320f7a54032193b5afb11840420cbda3d3cd68d941c350638
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584e34d5f638e2cf50368da59e771aea8
SHA1ddfe0fc9483860ba71a4d6022470859ee83e4b4f
SHA256d2cb8388589d478c660d4cdbbc94fac5edd760f37d50604511e57e9993f095d1
SHA512520aad5e38f5ae1e379275d18d16105c2888b8fe8fd099cae43ddf0781a9c08d5cd6d45cc625ea592f71a96042a02d82569ccd32c211f6a0f1ebf5a2bcf7381c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ba74a4a5518ae0a92f2e60523fc6eb7
SHA18ba73f089dbeb0cbbfdee3183e79ad77d0dca03c
SHA2569ac9e467155fbee5797444aafadcedc2c7905d07177fa4fcfe63f805c51cb3ac
SHA51293a4ade9456e2186b4b3bd273673947cd946ad89b1166ff786cc125c2f0644f15f09a27bcf3c9178dfc71e3d081ce7ef3c49ba1062e9ddfd4d6686606969e291
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51118b07c24fd072dd4d3093bc8695ece
SHA16014f709289a08ce9a057a5ad2b3c8dbddc478b3
SHA256dfd51bcf116d124bda1aff300a5b428d8279d1a8c0c1419da87cf5f5f0cbfb7b
SHA512c6db18d19c0a4094620205181b3f659237904854c650af982b2f3ec9d041b1c26220c03a525f8f4bf1f14f94a18aaa22e81a3ac5b10c97e850511d1830d7178d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b01af4a5ceac971187e7d81d5a6f197
SHA190dab5ab44fee16c30d7259224c3c8e88e96a1bd
SHA2567507a390ea78ac2458c004a712afd98dbed1709415bcc85ee4b5d41627b4780d
SHA51278bea4e5747c2246645858439a6af788e75ba9d021a749a9f0d760e5aebc0eb115e554155fad16f1e3856cc623d0fcbd4da8e77aaf2ff45e4bb0c0b811fcafb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5958f371fa149016e7fd4ada7c6ac62c4
SHA1edb010cb949197697a1979aa20cac03fdb739f15
SHA256d7b8785dbb02966f1d7d637d91196007c4f596c99fe5a521cfec6d630d393bdc
SHA51231b663c6636e25770c08b0977de2a9acd10d4e8b22a5c1af7fa4579f7efb9bbb419ac192cdf08b47279a0fdd40e0e07b1b6b311da37e694f66371aafc5de9669
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd3701213119df51563274e519bb53cd
SHA17d347f5e1b86df0159a8bfd6f820d1e73d20d1ed
SHA256df00dabce4d48c4e0ec60ea12c5fae7b03b056e502aab2bbcdeacda6e88ae1fb
SHA512044c41b5ca19198804916233b4adc93adad26f64c418a3019bad96fc054692b2aa3a1d11be56dcddc97b8e340e481d3937c927e76d7d934c19a7701182ab2ab9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1dcde80033ada04f6e1696b38e87b4b
SHA1e3ba32bc08118bb635e7d134875a9869b5a14876
SHA2565ec1cdcb2b072b09cda8a25effaab2f962058a06e541de273651a721558c8c25
SHA51228dda5b7593d0e9c447b05ab3edd4f9eef2302f2d9b06384b17ade6375d035bec9e57234e2761e4db6602180c50957ce10e34dd3ded9163ad55e8f090d1db31d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd76fef3368041864a8c2c5b14f611fa
SHA1583fec878cfd929e5bc814f5d73b9c7ca392b07b
SHA2565b9fe476a084071936c33a75528cac44963106360b661b3a53dfc1570f8e4e44
SHA51225b75ab6513862df762188194bccd596a7a732fc2351bd9519bc3ed99b943185f38338d849f89e5f11c52bea88938650a61ffe7103dc39b0ad0a5816cc96359e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d1d38e2d25102ed17f7987d03f99e6a
SHA11ed6b8a95b7ec15eecb0f1b73d15847e8d8328fd
SHA2567010ba92a231030082edec205a58b9e5330864b74abd7b1d842f588331e9dc2e
SHA5123af16e08dd652abdf2294f5b98f6abf8f100492ceee53851bc93742c7ebc3b3c3a156988bc5d944284d2c8e664477b25fb542d9f996e19ebf4180877cdec05b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc3219bb5abb99d30bb1edce8df135d5
SHA143cd7908d88e1da4614acf55fee64f87548fb04c
SHA256138e0314005cb8b350a4b73b463598e235c960216b2b15957edbcb3b14084f8b
SHA51248a0023d9ffc07a92f875eee8ccfb0a76a698d62ae1d55514158a7200807c54d900294d8f497e394c792e0b5bb41184ccbc425a04b69826ef52526372772e207
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b