Analysis
-
max time kernel
120s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/06/2024, 05:59
Static task
static1
Behavioral task
behavioral1
Sample
a83bf761a9d66ddd19f9d23d6ce5eea3_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a83bf761a9d66ddd19f9d23d6ce5eea3_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
a83bf761a9d66ddd19f9d23d6ce5eea3_JaffaCakes118.html
-
Size
461KB
-
MD5
a83bf761a9d66ddd19f9d23d6ce5eea3
-
SHA1
5ad6656a11dff9ac3e4d35c1e66563d43c34c234
-
SHA256
718c58a4aaafbe95a2cad848099907976162c5a216077bf9e6f1b11a6e9aaffe
-
SHA512
d92ea37359de23e22f420d2d6c2cff4cbb4b87a56633c6c631a5c60c3fdca565f0f5c0a637c7460739c6b6beaf670b079e48baa6940751f914999a8390aaeb33
-
SSDEEP
6144:S/sMYod+X3oI+Y0sMYod+X3oI+YzcsMYod+X3oI+YLsMYod+X3oI+YQ:y5d+X3U5d+X305d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424506627" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a2fd07c233ec3e488b3a8873a80a51b500000000020000000000106600000001000020000000e239d79552027c587229b2077c5ac94b0f0666926d1801300fd45ada042eb155000000000e80000000020000200000002d9b67ad57ad9096ab9dd75c26ab37b32dcfb0fb75624e77de591ca355ac3ca220000000a31e155c503b56e825dc4775874f009c927d5cdfe6900a28f3fd18b808103c7c40000000bdec33ba45f8ed6506f1485b08d7150c0836be1c9425dc4e70dab1016d602524963af966d2459a932b4d92c04bdb934762f3504d85787b0408d682e1aba19cc5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3D72C661-2A13-11EF-83C2-E25BC60B6402} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10cc201620beda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2524 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2524 iexplore.exe 2524 iexplore.exe 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2736 2524 iexplore.exe 28 PID 2524 wrote to memory of 2736 2524 iexplore.exe 28 PID 2524 wrote to memory of 2736 2524 iexplore.exe 28 PID 2524 wrote to memory of 2736 2524 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a83bf761a9d66ddd19f9d23d6ce5eea3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2524 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c58d06972d1a3b9c97936a8ac9af88bb
SHA106ee0465719a3ed4ae7f6b3ca6de5fa7743c4c62
SHA256e4ac5ada700eba627ec5614989e34032e00c546ea1cec7e4e6f448e8ac15ed61
SHA51218f3cb6c001b5215812d017e89f00fd839796d61a84e29404b78f7b87ce0845aa35d8035be8f37337dd802bc6ee47e687beca44be848f1831ca0290251a95fc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5333ad6bee7b83266006b391041294ed7
SHA1c4db2656748d4b87d602923b01558194d617c706
SHA256f4e5c14f2017693dcf30b7c4a497f1a5a248519db0164c5a95af212aeca97d63
SHA512dd2a3a5177cf4e34e86f9a0e8a0d62d863f23d26f9606a1cb2d3c511211ce3f2bfe4e4b551f99f409fe1664db15906b060cf96ec947b4a85314f32fcae246126
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5049fcbc0a73c285ec47e24ec9f06f0eb
SHA11248ab2595862bbc4659945f46f3945541c1dd6f
SHA25610b44fde25a8c586d46b0689498c9edd2c1bf6a7b70fd30d571fb19b4f79aa68
SHA512b929c18cab2e92753a8498403b7aef35a487321336aa8ede3100becc6c40d9084f3394ce7363cf328fa59e74f6ee3acaf3702ed5f2e9a95c3405feadfbb76faf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9c98e483a56e2cec8308628deb0d166
SHA141e878499b9bc535937b80d1eb2d6b0de918dad6
SHA256488b964a4a09d7178f2a547a428a2dad0f5b4fabfa6ef6bad29133f57c70d690
SHA512ff4bf88aa26198f7fe95a34a8796b3848d0723384a00d0d65a9151192ec78622c05bbe5de272fe3223050190f6f70d92efa13a47f21b51c00432f014ad7d9961
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a5aa38a4de9a98dc47a410237915fef
SHA1d960d38575cb969d28ee33564d71f8744ae12463
SHA256fd57bd6ebee66fefb6156f212b2584679cb075439a272bc0cdec08c923d8ca2b
SHA512d6d26af114561fb0b459a7b2e229ebadc798abc5a6b91ef1bba6e73f43c17083db7915c6c16a1413ee1384106f7680fc074be8cd8008bc8027e1002cd7e59f4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5757bb5a1be4b05e118ec4eecb60cbb77
SHA1f3a226e08ffcec35ab76517ccfa1acf8d0c60f2b
SHA25670610bb46325021ae24f812600aef26255d3552e402b1960c4827939ac176869
SHA512398af4aba5e67f0113a0e91e252df2ad6f8fa6259035768c35ede410e14842a6a8502273e2cdb97ab22754c1d3fc8a9c8905759b844f83f3ab853659e716cf1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a23ba4b40f39a17ec2f602130f686727
SHA13c1d63c89e9f976bdfda0410b5a8fdd3c3d2ea23
SHA256ba78d65bce7d6f0c42e7f0e1213f8c7713d77ff37ff28b25ff09e668e5e10040
SHA512889685c710768bcc5bb99dc0f8399c72e17d60a08ac8bf2e0b1899d89d75d5af7cfa68acbd4f97ace95d53ad199bbb8bba300c29dd30d66839b5554c438da387
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fb3c19528acd5d064927154dc14619b
SHA13343650b4a29a63c85f67cd704efca2f0f49784a
SHA25673b87783838d6bbd85ff10eea76d5815c3524e5e438d67b4ae94aceab808175b
SHA512c3a5488191f8b602cecbd50b066ae13b315f23c9c0c3f4380883fa4e4cbc1c585aed621b08eea7c92194d28775cc9562d25e79f807e5a34a8f2f8f49565e7b5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a124c9d139c4ce086a4791a378f21905
SHA18939a2b783e90bf817ca531eed8db98c1aba5954
SHA25659afedc0a32c8a2d529730524346a0479c7a9b59055b8402c11a294dea4fb88c
SHA51257208e14995ab0c9803423fe6486f56c22ab0426279d7fedec2cd122fdbd3dc6f00c5a8b06f85e0124e40f8f855f1d3d244c3c6921439f1e94c6a75b66078b9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56942dc8dd53cf76c639f376cf43ad5a0
SHA194ec75677cb2a7df9f3530c83c4e3c6030a388fc
SHA25642b85f1be817e2b5206e5ce0ee518f04ed49a23c30621ec7f87baeaadce1208f
SHA5120b40e2ceead6cc8a1ed54d223e9d6e2e21bab86e0605aff027252bf5480fe22ce64684e14e35b408249dc02e3de8a688b34acce9114cb84533b6593bd60bbb98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594ba342e08257361be66274c893f473d
SHA1209d7d2a98d12007353775a5c41285a4bd5bd746
SHA256836507aa895be10e622d5405055e313af0a3f7cbd12d76e5f23c3c6817893dd2
SHA5125a65966aa8a99d9eec8177544ec478ab68087c6411416828cf62a37f456717900040253da386032bb9838e13c5a7a34ed4c9858f1de8ccc5ef66ec09e9b10eea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2f8616682e68ff37764387d5d7031fb
SHA1c1131a1487ec8bf55f21d6f05158d54c9f68ed68
SHA25600622e760e7fe6f05cbdfe293f97194e8d8939b834e2541a51df7c83ea1a0bc0
SHA51285174112f92390e12823999c80b02e43fd9b11db9e3c13ba237a6ee6c39a05dc47c66153a50c98fcbd8d4dbb8ab409c5f6594743c717257fa8cca124a004f823
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59eb27adbdfb7c99c44a23d53794b9ca3
SHA1c5eed2f15f9c1f3f12100489f86c51511c81caec
SHA25681e9e33673c46ada72b6177d51adca20e1f0ca92b01ebdb559f0f189a2fc2747
SHA5127c9ab674c7d7c46f9a07b3d5c9fee5afa5d787024191b97c8000879e4e9603d655b854d3c3dc241363ae1412df3d835ef2d6d4527d63d493dec9b7295e108464
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2f2469d3dfac45020ca2d136e02567f
SHA125c6cd5d28787769f52c67b0004bf707e7bad127
SHA25615bb6600fcbb09801a29d82f571f732e582ef40c20d61887995ea50356272992
SHA5125db8ed44a7d60f1b9c30f5902777a1eb8f9c561d3d7f899aced3f13b9b8943e5119019924d552f9d9cc9d4c9a94be365f619893866957b461f366fd83e8c3ec9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511631bf1691dfcd10a1593998f84be5c
SHA161190e8a3e1272497da919de393da747b5d45d97
SHA25605af91703ba626a932a18793050fd5b18d31000f77817138eebd74bb0a0031d5
SHA5126389dee3d6c6ea73507c64c58d0a5bd1cd70222e778e637937908516c888487037078650f6746bda20344673e527f270a4354dba70f02b6153b80f0eebef43f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f46a433c38c6aa0a4b96ca2e560cd65d
SHA158da786ed47408cc95bce4a8ce70046106bda73a
SHA256540ef1375e1d72042f0de552451a0be597d8433cdd7263d476d72be2018d6bb2
SHA512d53a8ffbbf2d0e54a801772b1cb5f66541316e6e48df691071d229eb826b7398e172367adad44b84554a0eb11c0805fd2fb4d1e4397f18c23514a954b6253db8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb66a9c7c02a505f0910ef5f96287369
SHA149f6eef33edbfc0f848f31b9ef2eb06efb62c595
SHA256a7859095db800dc7a2ff4685aa3570b48032f0599fe6dd83232ed38c9dd06d38
SHA51261fee811b664a46ee98550ddfa7a641d524a53f4832f37a58f2155fa35961a92f8f8c7e36c0282457fe36ba25eddacf58d597ab0c3da04faab2940b3b1f100f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59237d551359544bfae0b5b4f1e4540df
SHA1a497021f04b5929c407c52c6c5e2462fa41222ad
SHA256af28347c6780fd019bf7050bee2547123b56322430c8891d9e20846c5d919a6b
SHA5128c0c7589eba386e10e12cee4c0348649e2b17636ee44f09d0fb1228680bfc4969530f6a1392634d4312211aefd6c04ff43b2a3686afed005861838abfbef7649
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5111b54349e59752d13b9c677b17567f3
SHA104f69bcbf5d1dfceb7baeecb3653c3f111b05211
SHA256dbbf8a962ddf48dfedba990119be5d1941f88bf7bc463196081d4f2a9c103a83
SHA512d69b5520ab4c40765b0131f9d7314377f3f63b4ee6749bc7d8c210ea692ef5520c19eb6fd22ac4e6feebf99f87f385bbbc04cce205658334dee03d74ab1af234
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b