Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/06/2024, 11:46
Static task
static1
Behavioral task
behavioral1
Sample
a9829fb2d9182dcca2625d7f409692cd_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a9829fb2d9182dcca2625d7f409692cd_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
a9829fb2d9182dcca2625d7f409692cd_JaffaCakes118.html
-
Size
460KB
-
MD5
a9829fb2d9182dcca2625d7f409692cd
-
SHA1
fdce12b9e08e494e76d7721818712e73907c9cd3
-
SHA256
75e3369874fb573ec51eb872d43519e30a69132266666f6c92ce8927e1a5f6e7
-
SHA512
b23a79bb69a937441af3eb81bb897abd0845f2045442ff7c9dce002635a2adb21d5621548a75ad09175c6beec3bcc782d2e5ad8d90c376e92c22d6fa9cfb1725
-
SSDEEP
6144:S7sMYod+X3oI+YDsMYod+X3oI+Y8sMYod+X3oI+YLsMYod+X3oI+YQ:Q5d+X3t5d+X385d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424527461" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10fee69750beda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009bf6f5488c39ea4e99be3884ca155e0800000000020000000000106600000001000020000000df33110dae96932aa3284b520684ae34cae7cd7bee0400325e2484e28a215d23000000000e8000000002000020000000e0009832f5ce741bcf688db90b4697764222eb5fe5727982c95efe57f7ace44620000000c9538e535e98f2ed89929d63ff64af4f998cce97b9231713de269ae228758c3d400000003732af5036388425bb66fc8f6889273fb79b164370ebf87e5306fec9138ee949cd61d664a70a5c25d7c7264e5cadc7888baacc9dc858b550d02089b594d00bb1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BF657ED1-2A43-11EF-9F07-6E6327E9C5D7} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2084 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2084 iexplore.exe 2084 iexplore.exe 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2084 wrote to memory of 3032 2084 iexplore.exe 28 PID 2084 wrote to memory of 3032 2084 iexplore.exe 28 PID 2084 wrote to memory of 3032 2084 iexplore.exe 28 PID 2084 wrote to memory of 3032 2084 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a9829fb2d9182dcca2625d7f409692cd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2084 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa06f1afc0cbbf62fbd27ab518553a6c
SHA161361db667a24231d4cdc6a3813f661cbbd7ec2c
SHA256898ce6d2d274eea7e2644105e6e6d6f24cc7d7b61bfafe4b1b3f74e50986a8c0
SHA512184d9d8c9bbb758d693a0a5b8d1274e50542f1b3a660de7a61cce2b4e487dc59736ce5a10c6b65fb8ca43d91b29f0654c8e680080aad136f49740e2f02d65250
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558fd14f98ff0273c7dc46414c17069f4
SHA17076a83a7d60b55a2f632431cb33ea7fcf847e46
SHA256484c3991c17c2039fc2ea7c22cbe20914ab354088e48652bb0c2e2531e0c85d3
SHA512e0c2bfdaa77dcd06cf2409c3b3dbd3e8df80021d6a512b888c9faefcbed883fa6fd12aa6956f7ce7e2416ca58c59c97bd1229f2add23106f118d409f4a564756
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569f6da869178f3d7f9ed4e7f66706634
SHA15f679a67a0cbc5d4bd94b871943c5cf34b612692
SHA2561fa87fc2d441500a80099bb92be41e065ec0f319f37c85bc637e21ecfe8436d6
SHA512269f448f2f3c45b8959181dc4aa9520ea10c18be08d80c65aed7d945da36077e1d050dbd32332ebff63ae5feca7b69485691b80c6d4fc75e2ae467a5cb9285d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c7431b0b69018968a4b2d59cb72826e
SHA172f4d22b4768713a328fe313032bc3e457d8b6df
SHA256d04f55ba6114655bc3ef3abbaa8115b0ea5e8d0f19d0fd4fce2a6f8ce267622c
SHA5124931d522f2ba04521b246b6e348a8c8f9e167a251f15af1012096cec2e588c5a2c1e414834cfaebde6eb91e119d9caae5a653a777ca9cc2721e92b1abb832bde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567d15bff0379206ee86f32a2d3c5c911
SHA1693534cbea92ccc5da085fdea36ed11c12ba6bd7
SHA25696fe370ef40999fb3b97f0bb63f67904172f146c44afb1d3fd3b9c575f327db3
SHA512d27a43b729efd76f99f730a34acc39936b00f2eaff0cbed0da4666af52783620214088bb5f58f3a12a25692d632922be01db47080f86ebe5050be2dccb3e4d38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dfe63d83d6fb71da980440395c3af00
SHA1fbfb1e4148adf02fd675edbee8c63dbee6c38d54
SHA2561bac9360ea3a4ae23192165bdc4524251d60ba961810452ca081c2bba7792e33
SHA51260a13b1c63573abfaaf94e8f8b85739d7155f0523d72a701e69707c246ce3cd63233787e3588380843600e60c1edf2d580ff1f1f223313280bcdadba7acdc62a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527b0cbf264b1f87ea0e2bab755902590
SHA19150835a76e5213ef8f4cc5e91b6e67e241a8281
SHA256a89594fea6b8d11d4a48e21e96a69f37a62834b17afddf3f40e2627dc03ce6be
SHA512a49c7671595961d0be18049a29f38b6f1fd12572d365c4071d97be7903ec2ea1d863139c5545281c864674a3ed1584b95f78f9aba01a5323ca848ce0a3f0a12a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549dd4563ea2bcd512d05ec0aa3ee0ca0
SHA1d430a5900f379804afa03b292753a7e837987014
SHA256de1b47bd12a7a2ba760ea1ba164d06a3dd8d50d93dd7591a8be073b038fdcf76
SHA5121c2cfabb50b348134ad2288328a042cef1ee34390b5895102da6da3c1baf0f902c8307e69b73af42e0908baa8fded15b7810e2a2eea9f4df09a5499c002dacc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef0c619815a192584d6da9028ca35d18
SHA11572ac00a13973f384d7fed20ed5b80a2912d0af
SHA256d35c2c760ced7706fe8f1a6f0850f22eb9d92b299c51289180ce12b349b01123
SHA512b16605573528e528cd88a562e22964c2ec6899cfac8f82ebd207526b1e1e273cc23691fa683d1b85ad358676f96818fa2320081d98cfd79a14bccc2c5738d630
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58edb20493f56c6dc7c72cd53aa93ff2a
SHA1010225cc34a155a3d2ea0cf28a753157a4617901
SHA256590e2700235a2e0df72abb560f74ae3f8b8d4da8f1bf022349e3188560dea161
SHA512474c08ae1534a2c88bf3f8b5ad2e7d1f5fe4cdf6ff9b22e97173348345c11c41345dfc309165d7da893f16810c06073a7a05b7260c1564a94da6c08ad16ff4b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc18542c8bfaea5216e8ed9844b6fb3f
SHA13eb4f89c790edfa47724cd8d4387420e06400ae2
SHA256ffe747232aa86476110c87f10a7f74ae1f4ea8c7db89e7dae58793450ffd57a5
SHA512e807543425c26e8419d74516e178aa5ad2e05841badd8611331e84bd36964c7e6b22ca48097e9c0715b5a9155425838f9a0f650e1b7f729ddfb66fb561f409ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9e2a4873dd9e543cc2de52d8223cd11
SHA18cc0d1dbe56153b673d926b38ff7c11a257f8d52
SHA256106f056577d33f7b61d54a08098f99c6a1cec484b6667d1001dea2a18d8df8f2
SHA512bd500b4fd03480bad61a7ce01f66396971a98f22c2048b138cfdfc06fc5d1e568c93fd864acd12d102d9ac2c08cc992cbfab2cba869e704fcfed2c3d87f3e640
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f299aef4adf501755dfe77fbe58d825
SHA152e8feb7eb250eb2195ed138268375d9e7be005e
SHA2564eef07c2304e56fc216a77c652852b98d84072d6a3251864386de376ef0dde53
SHA5129f47f8c8c75a6e02d8c78d789d6a4505d4e1f8738a5b7a0115ea490564a203474ff2a359aa679ab5b67220ae075a6a66a219a533c4944777507083a9d6e89baf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5280fd9dd161039a0988dffc0143e2f52
SHA16bf6ab40c5692fd7535bb19eced18dfc5d6ca25d
SHA2566c898821204649bc97901b2d2c4da1ef71534f3376320db26550e90e6556b56a
SHA5129cd2d39589d3ce5754dfcdf9dcab8d9615d732f1965e13d94058c4a1a3bd84afb64d5db84e6d053babf8218cc0161d87677f0fb5a4ede9d463e12712ec1f22fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5099cac7039f8485d5e9d4e00e6a6ee5d
SHA16fed73f2c70cdc2f37dc946569d8074980aa257e
SHA2564040339eb5bc7aed7f7b61a94468ea617c7cd5991ee6aa7d3fa16bf4ad0cf4b6
SHA512d9eb1932f6a032b0ea558f5e35b1766ba3ce2e4c341505bf7208fa892733e6d40e504171ed055d3a229b6b3672e63751e786d97e3a25a65f1b626c48a70b30b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539e336b84152c2540267a204d9b0d0a7
SHA15bf81cf46a747610f4c13bc3febedc483180ed24
SHA25643a8009e11cf0946f290c66631156f691de898bbacb2d5895c0a58cdd77b9b3b
SHA512cc7ba60d52d71800ca801a5289deca66b8092aa40f6002a041874df2df0f746795e0196efcb80e3171f5438604ac7416e8aa832fd8c817aa514e9e28a1c41fad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac97e04fa2062a8a9ae61c7568e0f4f4
SHA1da71c5dc0c61b2b74f36f572ae15b2922784ceb8
SHA25618209214304872332b296e2afbf64bb4c3557228753b35b7d12b29750af7fa21
SHA512c4f92f0281d50aca55a75c4fe0fffd76edcc0db41964a33862414a3ba5e5c62e34b06d5361d4c66443704ea9b3e36fbc1815ad8b0951f4889547096b016157b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f8e9b96a19cb8f54d89233e9fdc446a
SHA17005c5acc581a02bf1ffc67ebf01325831697bf4
SHA256a04cbe1f8a0fe658b0184d5b5f49a6902ee5e9f7c87ebb76ed0a726bcec9ca69
SHA512ad1dd3169bb42ba69d7160e38dd2e0af2d40cd13b13b23eb8075cfe9ad18ce16885cf954b6ee5de3e12227798a7f0689e47812d81945bc8130b6cc0c3ce7821a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513a78c020c4e37b8ce398de73310d143
SHA1dbce958374dd6bcf477413acfae4aa79030bfadf
SHA2565d6808ae354deb5d3d60727cf2d38385bd12442a3f651c791f90d5d6b9db1ba8
SHA512348c880a2449c750b12bf6045e89d5855ec7ac4c56db1ce308f9b73f7e526fab8f20c7489fe3e826232bcae624650f0558ae10a19d791181a021ee994361d8d0
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b