Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
14-06-2024 12:14
Static task
static1
Behavioral task
behavioral1
Sample
a99f08b7d6c2a5dd65ee874cb948ac31_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a99f08b7d6c2a5dd65ee874cb948ac31_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a99f08b7d6c2a5dd65ee874cb948ac31_JaffaCakes118.html
-
Size
187KB
-
MD5
a99f08b7d6c2a5dd65ee874cb948ac31
-
SHA1
2eec01371ae1fc5a48593ca966ff8890528a5a8c
-
SHA256
7133123ee35d9da8033d7d5f0c888383220ffd4ef24639ac64d93910e8c13427
-
SHA512
76d19dabd07ff81fc5fba1e70690cb7f00066f8d403777cef0690cfae57a2d095060bd6063a01be1ab7ac0490a05737dc3c0c9e9bc1a10c07bb1ec785bae90ed
-
SSDEEP
3072:bh0StzzlW7nQaH48jsqbRIdWjJLYxH5Ae18ze56QLlo8udjqBEVMvBISDERchAPz:nU48jsqbRI8yBISDEShAP0XCJ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90b6c09054beda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BA019061-2A47-11EF-9302-CE03E2754020} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a0390500000000020000000000106600000001000020000000e4e03218c793a36883b354b1e99fb7e259ef2ff1a61a06b34c4e0705d8b61a84000000000e8000000002000020000000f7ee758819941fb1e86ab63c63fefa6aa862e12a478685cd47ac35b065d0c93e20000000281aeeae225feadeb29d1605e2dc6b876f9cb732e73e5ed254c40f64477b4610400000004bb651cd521ce32df2c6d066e7e73725b8e55fb233e88ace8ad95f6909d2c1a3095a597c82a9b67fb09f190897f16a341493e2129b25d9eb6ed6c7f7d531c0f4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424529171" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1028 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1028 iexplore.exe 1028 iexplore.exe 1708 IEXPLORE.EXE 1708 IEXPLORE.EXE 1708 IEXPLORE.EXE 1708 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1028 wrote to memory of 1708 1028 iexplore.exe 28 PID 1028 wrote to memory of 1708 1028 iexplore.exe 28 PID 1028 wrote to memory of 1708 1028 iexplore.exe 28 PID 1028 wrote to memory of 1708 1028 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a99f08b7d6c2a5dd65ee874cb948ac31_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1028 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3c4bf128d7281d50eef2bd2cc4893b1
SHA13494ecd38bc6081b510bc94bccf2f4f20411bc1d
SHA256b0c3ea82456002744213e640f28245c808a86f4780a41cadbf2998e4025ff6e3
SHA5124c0ed59501c385a966a0c702040f939267f51cbf71270f08031145bc9f258780e94d44d3658820acdc71a7ac0b9eb7fda444c433e21e58777f17351b32da5583
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572d805a771b8bb709e991d8ff88e6751
SHA1d07842fe81bd63cd41390ed17e46e1c18eb7c406
SHA2568ca2ded8945a00694daeb7299df947f5f0e66ca38c29a85b7362e6938718d6a4
SHA51214936bf54bb81f3acfcd64fbf93d6ed586f81e7b03cfda6744d8ec203e17198c01d8b5afb1d0a20567f4cebe9f2580f6003e70d7b86656f6e844f005c2e5922c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f996037be0d26dcbc6a26794f365a57f
SHA1d10aabc01bf06670e894a29320c649d43a565fc4
SHA2567543f90dc5278ac951121e458ae75edc6a02a9a770931c8458d14682900836e4
SHA512923ffdfb01e0d7408bc98ca0d251c6dbedadbb765f8580b7ae2ca651b18606546c174b8609c1aea47e760457243d19a216dbd41c51b69bf203444111c75511ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8ac853b338fef41a89de4037bd6c562
SHA16c7579353143619d1448d12c9210d9b7d6d66a2c
SHA256632aa1af40c12dab3d1a5492e35a0247ad51ba2db96364e8ce9efcb302598551
SHA5125f2c730f64f21f2956d7e6b6376e7372059e49699d837c0b336f72411797da1964477d354f38729f0e51335270c78c2ed08ce41bf7aa64c4681b34ed89a87613
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2e6faed864d1e949201f94aefd8ed47
SHA13a4f93068f032b4fadf10a3f2ff901a0771f9470
SHA2566f413786a0bbe94c24f5e4185b5427367b131755dc3980c9da5489927bd3e089
SHA5129a3d83c67b4adcf89832b350543828e6cd475f91e6bc5af4820b77bd3ec32b7a92aa8c69fac9ac6e15cb7e02e5330705c220dbb2f9317401e9cc1fb91ac6a150
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521f6546fb3d86421e897f9cb46514329
SHA15f86b6932dacc665c893f51bf39eb910ef679303
SHA2563f02bee8d28c0fbd6fcca19e2b972e62018f3f68dd5442201393bbae8e41338e
SHA512b7b6801b6c2b402405310184770fe82411d65679864710eb9d4ca4db4bad885297d31fd4b044d4913c70a5a5797d953aa8d843a1a2d02874ae4069032cf850e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9aedb8e5e8d7f81fdb6ce9dd61bfa31
SHA1f5a8dd45eaa768a924097026a8184bf3d29c335d
SHA2562b7b5b82f9548cf770f39d9f86cf926c12042bdbb579d39a59b6f503a506d7ca
SHA5127b6827cbeb9ef8f419c8c2c2634daeeb0c178f92789886ce3fc69080d13bfa57b2477a2f222ed78f0da4306102bea68a14d9657af445cf4da093d10e0aebea11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dce16b56215ad33e7a318195df8c7ba6
SHA1d70be7ccb62fe8995e375cc1656971ae000cc8d3
SHA256d4638bc3c1cb451a46985a3b6612604008d77060a09363ea5f77bc618aa6dc59
SHA512b8b41f99cc9b2bab5780d0eb6aab21f70fd1c0a70c036fc041c59619673a652f0a1597ad4a558bfe40441b850fadfe7f26f29c3aa56c1202709a87d9f35eb07c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c7a5b4158a90195cbb639232f1d9e36
SHA1a3bd2ae2ac91fa04acea2948382ebc7cbff9fcd1
SHA2567f0a1d5bd525cb85002d950e07100581a7416ab0f86e465db254eb86c052555f
SHA512e85122b60cbff2f92624df687ee3f7a005111c1bf8275337d19cbce8623e8dd78c5f8d61804bcc0baf911c3eca0d4c8b4d84ac14dc21fa7b85cd465e1861e98d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fed59602353c7fb71a451f964fb5edef
SHA130429a8fb5f83f844c686eea9d272421403bacbb
SHA25654124221fb16e3f96e16abebddab5dee482317d8039aa5f5eae8ec7ea40f1475
SHA512d7d3770d309ad21d6ba4370502b3011f3bd94d3d665bf4d76456ae1385e02a439dbe844e857b4add2e6e0c52ed63c4bfd16fcfde3d96f8b094679afa5024fa46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a123c098aa81d0b26828fedc35735e6
SHA120a7d65787dcf5f4b3d23658f05d5c1170f9f620
SHA256a7f43b56bb83f73a01599e76ae4ae88ff67b45f7b924a3d6d78b0caa4af8a7d0
SHA512cea21ec500402ee3a0e02b868a990f475006da5a0e6d4eeb175273e45e2ab022fe5b558e0bc8f909e1bf5f40b4b8249d33405d61192c6e5adc700d0996294a93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56774c7c9c97691a26c5b97c45b15b270
SHA10556d62904eebf1812acf076b8d8b2fd8a518c08
SHA256f2f6efe03e7c1ecf117e958e5aa675c77f2e300d79c0a434036db2a8afbcde9e
SHA512539cbee7030b015df66b3f56fe0f63abc9fb6f6aa560d4563e32eb679883c16f606e19edc420c7ef6b58037caee721b7a9945c4d749aa86c1db474206f8afb80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5466357fc10915e37c34ada69f321debf
SHA15d2d82b53fc558d8da5bec690abda30ffea994fb
SHA2562679397285a6eb71802b94f8da643648da3112758082e319fcc7f2acb7034e40
SHA512ef3055e3adb7678d825cf867777b7d3255c2b092157459465ab3885d84b5b724531bd8f86417f11d6b6a78a8cad6cad12df98e3d7d5461ede6bacde55064ce09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f149a2700b43cd83ea7e3040b863e574
SHA1ce64f8b162e94b44308e78a4686aef249492c563
SHA2562cecc465a182b3d13f96fc2fdbd5f2c2c579d78d4e2754f38b70034add697cd8
SHA512c3281feffe4f0d149dc66f578ba7e42ea8610dac7b15559e69402e3d79da359398afed43b878c0466387695f26314a5dd8fe692c61e639f3282736287ee82b3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd077a1a29e6c6fbfa6ef1acc8f0555c
SHA1011203c75263677536588aa7781634bc188793db
SHA256c480d3309e73fe5af7e4344a59d3cded61f30a35c45bcbbed9c4ab79213ed260
SHA5123f26afae26acc9ef79536bc6ec043e5a418063aec288d5df93db57343bccfce8a046ac363b955357f874fc825d8eb2aee25d5bb810a8c6ce85e1d070001a95cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e89357dba8c20a2cad1bfee519913d6
SHA18bd50ab47e0478f8a9d5266db6f994e1805d31d2
SHA2564a9c792f8e2d3f21429293ff9f038b2b424078ff8c6552ca2eb758fc806571e9
SHA512b1c5a7bc50a2c9083daef9090decbdb105837de72479b8f51b07ceb8b55d4ffc6a6d72135429a14b9f2c2730e80867e96936513bcbb0827a126aa80eb189a6d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58db9aef268e55c2e6bfa2984b9aa4b51
SHA123bb87d92cbf5117a5feefac50fe4617e7b8dd4f
SHA2561619b8c8b4c12fb258193fbb85377e043867484d93eab2d0490b3de8a6125403
SHA512d40667abf72b2cf1e9a5e406381c092ae62e1007daf8ce0ecdf9b53e33b31c4cc9b13e150b27e340fd9a830abf0f2be504de706b1722fbfb81fba4b0527b3a93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53be6d88b3ee9a7c89a1d9106477a3beb
SHA18c4180a759952abd3921e73fb13a07e52e827e18
SHA256fda7bdf3fa2df7c88ba14aca686f50973f9d13609bb72d7e1de6619eefbf56b7
SHA512fcfece5eae67019d46e1c35f0bacd59ac0b4e9624baf2f49aa9e3e6d403cb5f6bb75e3fab20a83db3f31f64f938ccdfad482e12d9596652b680fe5b30e1f3f80
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b