Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/06/2024, 14:48
Static task
static1
Behavioral task
behavioral1
Sample
aa41be05e22e771c429f0aee3abaff8c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
aa41be05e22e771c429f0aee3abaff8c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
aa41be05e22e771c429f0aee3abaff8c_JaffaCakes118.html
-
Size
460KB
-
MD5
aa41be05e22e771c429f0aee3abaff8c
-
SHA1
8b5dfbdbdfc693c247e6c267af2c6bc9eb737801
-
SHA256
c97e6cf4f1452f79f85e142ebc43258014619c52a16df7bdf4349fc49d5795b0
-
SHA512
6e53da897357eaecece76f312433c7d99ef1f5ccb978904e7d1526185ba3d831c60bdede18bd870d29ed2a23478e9e76ab8bd83e429fa5fa5b8c3ffbe187742c
-
SSDEEP
6144:SbsMYod+X3oI+YGsMYod+X3oI+YwPsMYod+X3oI+YLsMYod+X3oI+YQ:65d+X3O5d+X3G5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424538406" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3B100F01-2A5D-11EF-92E0-EA483E0BCDAF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002cc6d62bf101fb49aba32b9fd44b3d6f00000000020000000000106600000001000020000000772ae1b62a56940fa84856f300a0c3538c0e82cefa715d62b72bf3d1b0eb7de7000000000e8000000002000020000000fda19a06438111480c46e3dd9643ef61107d3d981e4d1aa68f0325a191ae1e2d2000000068271c0b46b2c72733fe0d58c43b93404cb4f93d16e503b50faeb3c4dd73a0394000000016a50d6996f7ba1671f1e6219926860117c310ede74e5555c5dfc16f1c4140e7d6927362d584dfbe1481a5bbc6d756b5fafc96f14b17f304acfb9aee7f237979 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 603b97136abeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1740 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1740 iexplore.exe 1740 iexplore.exe 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1740 wrote to memory of 2432 1740 iexplore.exe 28 PID 1740 wrote to memory of 2432 1740 iexplore.exe 28 PID 1740 wrote to memory of 2432 1740 iexplore.exe 28 PID 1740 wrote to memory of 2432 1740 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\aa41be05e22e771c429f0aee3abaff8c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1740 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2432
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c7278e713b71f1888d1999aabe825a4
SHA16715277c91f159d70f3ee785aac9e6b99b9b53dd
SHA2560a48323ce51f08b2936d9d85192b9e1551ec808c58dece3b306718999fa1516d
SHA51272259ba52bb27461ed89285157a1a8d44e95d124e64eb49fadc94bc0e37fd464118a24991c7fa027d2c182447f2b3221cc6270f4d60263dbb8471ce19b1c5ba3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e9b32ed5082b6f03333581cc8fd6b8e
SHA135f78fd54247f64b255dd7070a6c922275c972af
SHA256df0dc0c64217be19d8878cbaf3e19c1b2b92b172c1b260e019bf090ad6cfe94d
SHA5125b08bfc7e2762faeb420655e589f15b950596e889e12692b233822216d4d94bf53f8040e52cf17a70f9e609604e780034a0172ab579d043054fdc32504c2bbb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b04511944959ef7b3a5cb20912ef3d7d
SHA1355e9502f11a72dd8e08af81548b7ce916e22239
SHA256cce87106660158b5aca9b5dfed0ac41681eb3ad2b18b642e2f5fd6f461d16d81
SHA512cb67f91edbc753b369e8142cdbfd741f8e2947b092961a06a2212538dc954539edfdfb46351fbb5a8337faa71f64a8873e5ae058c4befa9c6e7354c836390308
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529d0ca28671b1434963b8f63474add9b
SHA1b9f879dabe5825256ed215ac13291f7e4e5dbc87
SHA25644e48d280da21f4e49e62b9dce2d171c7b1a6f0f699a0d3854340ecdc1edbf42
SHA512dd116a008d9eaf926667919d54c76095f3e3edbf8fa36dff795a2d93a9c2e6924c955e116bf85cc31cd777690876320a7113496b3b94528cf77e0ee57969c634
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ecc53b61a0a6ba0a5219a29ad455564
SHA1115662699fe0f160ab86be34626a380668fd5f66
SHA256376659cd9c937015a3a928152042ae7674bb0d641621800ee2d1c9c37c0f9ac5
SHA5121c5992f1d8703601535d283b733fcdd1181129fd066ef78aabe0fe2b5225cb5098aeb4902072035b73f4b24e40ab943d208c0a9386b2bd32bdfce8ea3206bfa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d90bda3b7735049d3c3bcca3b77cd166
SHA19449dfcc6161852b59157847a7cba04c3f15d032
SHA25670121b3e7348118ac6c3363b58dcb5680e5ab1995fceed9828e20928da5ac25b
SHA5124fc4708ca2c851e5f89b852c289d91762f1b70faa0d219835b34d22c17f618066c8ee474a58247f8767dec6cf77a129057a39d9e07136548e05feaea6be2c04f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7c115cd87022c2277b7c6b96fd1c609
SHA179d5f77da19447a8b2f888d932f1af8fcbc3e0f4
SHA256a404df3121635699c8abf11d1689211639f8e0d614cf52c0c0e69c09e309dd1a
SHA512f271de211dbfbef1b48e3021fead5d6dd14e93c08c7f84dbe711cdf81b13ca54121fb77818873f96b4a624db4510afc688048cb39e517bec7d26ed34defb8e3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5313ea6a2697da0e7ace3bca868a8aafa
SHA1c5602b77d628d60779ed9bd69ec69def7d9f416e
SHA25668e2936d740fe7b6a69d12462369312138c44d8a6e2cb1209695b305664da963
SHA512b91a61f9860fb244b874fe82b41ad35375002997106fa401283b52ab8ffcab305b635b7136aa4ee2ad7bc8f4262d2ab207d2798dd307d63ad28fc2bb7a26706b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523b724e689e06ed8be5f58bca173c026
SHA108bb065febe6ef752b1194f976e4b182ea9823c6
SHA2566447349bc2ab6b4a3ef75645f8bb61c7f9cd5ff65edfb60fc43ad1e1499a64a2
SHA5129541e2b00ee1bbd8101d6851a563a51086fc932c367ad478c37d86d0e6c504fe602b2a66cc710a99965958d2fb1ec6f6255b9bbe582b28041a90a418d220e1e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1ef4f87b99010db106b67e7737a5f7d
SHA16fe9350a5759906c41b924de3317e21e9cde40b7
SHA256ff2c3977e5966c63175af9557517af3851913b1032b92997f59ab51bae973630
SHA512ddae977a6866c9774a046c797c81a3a3ddf8e669b947dee91dcf1d9b98155a35ccacc41a49740e93f45bdb104100c320254dd6c751f345581f37bc747dc116c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b707c2cac164c93798b86b885d0c101b
SHA1ba608827d8e27ff57ede0afb5fef5fcdc7fc374f
SHA256fea542735db7642fddbf33ea7a8fae44e4e6fe8e5bd2575a2271220ecb3eb4c0
SHA5126500370b3b696cf099b4cacca54096670a7e54d03a554ef595056f358c37aa2711096f2f1c089ad9a352ce1281d315be5ff895ec3837d1bcbe592baab492b165
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561ae34aea9f1335acbf92796f6a823af
SHA1d03f464d31e10d5d29f507883a5918ff494ffb2b
SHA2569d4db4b2d58462c496fcaf0322f8a55999c5b4b2d494746569b8b291af576a7f
SHA512b1365056c7115b7944c1b107280cb35d81c5c191a85f1581386adbc38c4fb5d21e492b318f05e9ac2e24f4f7f43bbe7dc9bc3a67734a7bd9de629310310a58ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec5617c6945ae0d3b4cf7fef40140a69
SHA1ff814b5f8307c7fb66307dd12613378646d39830
SHA256cffc10975de11e55b562037767669e9cf32f4474026dd21612cb6d2646b8b78c
SHA5121ea58a3ccb854c2c89eca591833474e14f70eae9716dd2be54577741ec9b6c5e4b6a5059cce924d0341d3ca4f23cd96752ab073d4e48847bd57a36e2db7d21c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52494bc19c73269a4ade76533568477b5
SHA1d439984781888a843ea6f7fef79930b4a8845afc
SHA2562ad6d9f476cdffcd94966bc94b6412d9bd77dfad476620781fbcea76b6eb1211
SHA5120b213775bcaf056c280338375f0dc50ab632e07552020afe68dec740b6138921d99846ed01fec221314351bde127713bfa7930fcdcabcba3b2c1805a4997771a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513821ad570be35cce3841d60ffa9ad4a
SHA1a12d965ebefb24cfb3141ed763d71bfcc3a7570c
SHA256e66e983a52a31dad8dff34d8ceb737fe7ce4ff2153d67659ff854ab39d747e15
SHA512c1954ad3879cb94872a8d54aa5fc96fdfaa273108fd6bc2c4be06021d55ee1dd36210d3389f6e9c03729aa2287e6525987d86c138fc326f7ce28f2207df7f054
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0dad58867eb7659a7a86d36a6c18da3
SHA1e6e9825d18c3c4f78a377bcef762d61bbf66f9f0
SHA256322b99d5300aa3d5b46fd887f7bc04c910177dfa610b82ca7a29add3f0b31f2e
SHA5124d2bc9bc53b239b575ff0d9f221e87c3a577ddd68b050412154d24ed4fe6e729040b67b862bb6c4b3335834955a37163ea2105e927b8481953c6b4cc13f4ed3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503ec07bc1ff72b035a36ff2a95131dd9
SHA14779242e0542e26333199b5ecef3acb2e484a634
SHA256fb21c8c8e2000c4292ed8e3ceca4b57c3a4ad7e28cef736c71d4f7c836dd7f9e
SHA512c45c5d40bcb62a70a708c938c77088ddbbc120c4c6f0ca7afe675b68a79ca9d9e13dbf6b43d63ea7b20e2b6e4e290dc958c78d78d99d07425839c690688bb6b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1a1689799dd9e88dffb8a38b1a37a74
SHA1bbea30227e4abde1faeb3f25b1b6b0f027f6f275
SHA2568e8c244d56a163df48a3c42454e47423dc0633c15d9765d1e2559ae608bedcfe
SHA512fdcae82d3104bea0d7fe36b83f64009591f8bc998e52bd3d612fd1a7c6796ee8d7e694169933cd0db66ca9f622a7b59492667131f4aa0657a513aa282132bf4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bcc28a7c48cf972bef9a567d5526940
SHA12e2c190a5b6b1c6ad42965a67fd3c79c1844b737
SHA256533ff69eca6e1edf2870a419c639a2826946afca510d254582098561b85fee5e
SHA512266adaca2693862350a50a71dfd6d9d45f6e679ff0b9062e5aa33cb47fb506cd1fed3733c142faf05c58639418fd7b8b2f70f8cdeeb44d473335885df393cd83
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b