Analysis
-
max time kernel
140s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12/06/2024, 10:44
Static task
static1
Behavioral task
behavioral1
Sample
a05f3c02fee739b5dca2c98515a3acab_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a05f3c02fee739b5dca2c98515a3acab_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a05f3c02fee739b5dca2c98515a3acab_JaffaCakes118.html
-
Size
37KB
-
MD5
a05f3c02fee739b5dca2c98515a3acab
-
SHA1
8eecbcda36e918ad652a07a41dcbba0205e25e51
-
SHA256
7716e78e601e1fabbc93697af84012bb1f3ac40e34ba4c699edff101e88a1dc2
-
SHA512
b87f12c7d163b77f34bc48078bbfd7269f098e493b6d2564a7a3020054e52ce0f6100f7f1f79997fa287c8dbb8213e6d21b59e7f2ec6bb84bf8c6551a289f539
-
SSDEEP
768:6GaDir0twPNxod1I1159us9ExfSglTE9Sdo+JMY:P59us9EV7lTE9SO+JMY
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C39B14C1-28A8-11EF-92E0-EA483E0BCDAF} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3812b4910519942a1f7b433743f5e9d0000000002000000000010660000000100002000000008fcdae263f163d805ea85dd4cd8325306523a7bdbd7aa4659172d5c020d7896000000000e8000000002000020000000846ec99f995993535ba2bb8e3f6063b0ac1d47ae8117041b9c2246caac4791762000000073ffb9206a335d0bd333d1618c11771b9e248143fc96cadda97edf9a8855e9d1400000009a6f87c517b2d60ee05255960daa0faa8e8b02137584552fc26629ea8297ecf2626f084610356f4c00762f9e8dcdd81e45434cd9bf68e5483600455cc9490929 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00874b98b5bcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424350945" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1740 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1740 iexplore.exe 1740 iexplore.exe 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1740 wrote to memory of 2432 1740 iexplore.exe 28 PID 1740 wrote to memory of 2432 1740 iexplore.exe 28 PID 1740 wrote to memory of 2432 1740 iexplore.exe 28 PID 1740 wrote to memory of 2432 1740 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a05f3c02fee739b5dca2c98515a3acab_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1740 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2432
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502724d378b60644ead748e6ccdddcc5b
SHA1fb4a4d6dac813c6736a10c63fede81772334ebbc
SHA25647aff9c55af89a65cbf4a3d94851e77e9a43446c4e927c8522fdfcb79b2e762e
SHA51224daf8017d28cde976731c3b8bcd624a3f82dd7bcce9e36b69d3e73a8d2ac6263dbe38c0463df73f72c39cac2bc2d6a7af0bb11cd318ef4d15de5555048e8a19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52282c4bf674c44113c18ccadafb60e98
SHA1b7bbf20a07c99918b41d1c40ece94c8ace21b918
SHA25657ebf573fd73fd2b4d13d06b47131b057bd219d3b68cbe633c7e9b4f12cdecac
SHA512c02ff3e6371bf182b92f29877d0319438c05a8eed0ff77d0776fe8d96bdd4a831ed344cad3c15e8b9533d80b0c73a4b8b3b354bdabeaa8e046086b674d167518
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c39148dfef5a24c2d203d19149459fef
SHA1c31f9c4f4953192721250f897126ada6ade97157
SHA25623498da34bcad7fd820308c0faa7a36c11e6668ff5ccd6cb92ba1cc060c579d4
SHA512fadc3409e5bdfe3c916b57b4c07a8327838a52393b7f17a1b2138e3a57b92c2831acaec9447da9bac1d3823c17ec7f4680aadb0817d494abdf3ad50836e1edc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502a2e136e8fa79ee6befbb96ef67c2d8
SHA1c6352294cc9202ec741dd5c482da06b2c7eb5088
SHA256ea7204c6147d4645641dc32222f3ef7c89e15904805bb3c9b3c945b5ec202cf0
SHA51235711fec630666baea222efe9854bcbce8bb108fae526218e08b8a3f447f796fbd5775e68c99d0d91040d77ebd45ee5689ca1a3d5db7aec813525ea8c24f6c78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc70abf722c00bebce6aabdff799e40b
SHA1eaa6b04962f6a415c6c2286c077e63b67f0f257e
SHA256efb94b13a3fea2e2b31f71a76eaa76267f241d1851aadace5db4b7edd56ffcff
SHA5122efa990210af9a4ba745df916adf7fe3db2291db1ee0e28f7446f2eeea9c1672724d036cde27702d78ce762df0d41f9b3b29180180ab6731c0532aa82beb270e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526be9d306c3674687ef9d73bda84f944
SHA1a2df3af71ddb0036363362ce4aae938efdedf6bf
SHA25666043274f969e6f37cd8677f810e51fe389ae427c2025da5c09aa0dc145be8eb
SHA51273e3cf7ed3ede591cd3dc76f8bacf7e3567a4312195922cd39a72aadf2709178ac003b0c8a416d22e271ff62bf3d51be5f3200278d9b1d3e41e0810300e0a545
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557a455b774fe3cf33660cc5cb52e775d
SHA1cc89bd8bec99972db76bac154e27d96da5f5ddd6
SHA25608356cda7aba3761ca4fb93c3e8778e7dcd01c6ec644563366c3757a06f0910b
SHA512ac765a34d0cc3476eed2b44971eec570cc6da5291a32027160575db51f9aae9d81dbefc8ddc1eae583f454edeb0c1d64b8b1894896a3ecd21fda361e60979b4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0ab4d8c0ffd760ebdadfd863c529a2d
SHA1b1c7f2d4f0a620c946fd8f6481a3f4ac1483ae64
SHA25675317459d6ac6157548dd64c5a6d44e9205c889d17d14c6589a8b7221458fcb1
SHA512aabcf1a9ff98955990ab3b57913768274488abe66c96ad48058b45cd1e19b60a847c6b02bda4153ec1a363f33f33e68d2840036528dea1b7f4e749be6e956e34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d5076f51724c60ce7546d5dd77e7f00
SHA18e883eaca9cdb90f199077cf3be835c793851bd1
SHA256c9158068a4b3e2bf2025cb85e307b30d0002d41eabad254665765873051500f9
SHA51267fdb09f422627462cf2806d85d5035e8f5c1f04151ec2b42fa1635e41bef391a08207d5bb5468439c24b0620bd5f732d870f50eab30570f40148b2ff51ef41e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cec456c9764641f052a5b8d1d2a7a9da
SHA1b42eed3b6accba7f160f6b82af9e11421b669f3d
SHA25614c5cdd87240f85e0aea17257207a630098f1826a2173e45d0d3f7eaf369d6df
SHA512f38ccea15f3719d2e2e355d60fbb1b3629a544df5d11acfe10bed9cf994bf08ce9a3a845aaf4b8995933387e374de37b251ccafa170115b15ba98afd38bf3b74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59be8af327817f769b400c9f0487e3c86
SHA14c5560b9662f5671ecfaee696b8cc4aee739e2ab
SHA256edfbd6d254bfa54525a48cb5f4af935b8a8b0527a11902c46fdd8f019e4613fe
SHA5121d23f37097f4da7ed8ebd3fe377caf4ba1ae5d743de59915399d56a22d6403dc6b9369792becc19bbc2b6a488221976afb6a4f96f373e904f61dfb5392dd435d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fa00f2aedb84eef2e218b9786ceba1b
SHA1f97132b4b9d60db6cbcd8c9fb43574706770fef6
SHA256de8b00e2279211da13b3ff00d6d726382926bf4b1d71b0ff559900ddb6d4a587
SHA512c743ecf4b201dbaece8ca12c0f324b97dc20c9dc06b31f5ceef5b2e3fa502d2b9f337fd7675ea1511387fe32d326745872417a80f0c77504835ad99e50e7bc57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3e101492006260a31c9f9c050e4c4fd
SHA1cae80081785fc0b6408df93004d36d0d7911cd84
SHA2564e10610dbe99b2b90c75aaec19886f2cc171ac7193dab6a8799dbc40cc386cd5
SHA512993c6982c4a8e7633e646e9affc576e3dc793fafede88c62c470a54c1470863a971d3dfa5736ff44f56e33d245c59858c65fab6df9f43ecff4cfaadf170e1efc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cabae56ba2ceb96506509150dc066983
SHA13554ff492df1bbb528dc2258fb2f94c116813d0a
SHA256b8745d662131c5edfe16a4b718bc5905022721277dd6b95911402556abf1d98e
SHA51262b9e1db0994b57bbfb74cddc5f2ec848f052a01ca409c793275a9aba85029fcf5cd5624782f8dd1b3ba70c05f66c360748f683794b9c536582c677644da6f1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5559385592a96a9036ddbfce82010368c
SHA13839be11439e6cedd78ea32bc63b8ac71a2a9492
SHA25671b4ca4e9263a8efc10ec6300765225f47a2a1fa54b447b680c5f82951d1bba2
SHA512a775440531255a58edd86c2558c9fc2d25f2f6f5e298f9bfb0412ffd8048b50cb59749e95caec3a3e2628db358ea614b7119f28140da2fd187f7cbc495bf08e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5567e99f318c674e1f1087d4f50a16c18
SHA18e0cd047a46ae176b61c6681b078f2a43bf3dd5e
SHA256fb4cc3ee6f693f917ab7ce4a0a0f036d68bc59f521a180e0a235e6fc78fb9cc5
SHA512f7609e9eed9dd890ca92352bdccf86dff078052e38f4c4474feaa186d77663301043c4ef6d5b269f4cd671df22f406ea59ac0a0f8a5018d5a8c11cadbdb4bdb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a59318ede5d3e31b6d48f15708fd3a6f
SHA18e981d7058da9aea57b591dc2d9118705e97f909
SHA25682bea18298060dea9ba0ba817f60f765cb41f787a6de2416e81c5f13432db5c2
SHA512604287d3408c7a4554cc8e40a74ac38d4640b053a6710fae4e1cf90944254bf9f5a8a7d8fd4f031fd7659e7163f7b9319658cdc872ca2a8d5b1c98dbce67d4c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563e741b4e6f4cc5d2f1b9609c945d24b
SHA1e656c91bfbea4623342df9e60608c3f7f4a17a6d
SHA25610e79f0646ee49e03e60c286dab52afc228e905e18de6337bd427fb68cdf96fd
SHA5124f414e42191a79d2690f9722c2e50a7638c2f470af695cee7468ac0060bec94eef7d1baed8d6bdf5d880a6f61307e424e8795dd4a9322f001f6f8295216d5a6d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b