Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
14/06/2024, 15:11
Static task
static1
Behavioral task
behavioral1
Sample
aa5aa8db3647919c72d7e5f82d6d9cf8_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
aa5aa8db3647919c72d7e5f82d6d9cf8_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
aa5aa8db3647919c72d7e5f82d6d9cf8_JaffaCakes118.html
-
Size
32KB
-
MD5
aa5aa8db3647919c72d7e5f82d6d9cf8
-
SHA1
950e0adaf9365640851985d71c209fcc97b8c64c
-
SHA256
1c4f1cb36b75a4d9ce7ef9ee7110cb3043229361a18e307ad0b79abe24a0e73f
-
SHA512
427212ca80579193c171aaa8bf399363f02fd500d0d567155e555e13a6119367606a329617d82084740b7ce8483114a2a8bd797100c33cac579fba7a8e1061f8
-
SSDEEP
768:oQFRkiw2OP6+gZLe3OAG636CzTnZzRtnSRLN:pkiw2OP6+6aexezHZtFYR
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000aba0275261ca04cb2dec7df6f04282a000000000200000000001066000000010000200000004a0b58c467d94944fd3896c821884e223ffc994c0e1fae3c2a6fb4f6dc26011b000000000e8000000002000020000000242793cc2f2ef605d59ef69a6017e2df2c2703bbd77f206a499f7e945e07e184200000005ed6ac10c9b4a811247d9c3dec2b5e102d6203553e26575bde256ecaf8e7505b40000000c05798ed2f63f5afe2dbd649d3a49e801fe1e4889b767f71d9d02d78d881f97dde1ae6a2ab6dc9ac7877c579925d7f900f7ca988bd1000bba8860d7bb1f3fb02 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424539762" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 006bca446dbeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{634C2B91-2A60-11EF-AAE3-46DB0C2B2B48} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1348 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1348 iexplore.exe 1348 iexplore.exe 2012 IEXPLORE.EXE 2012 IEXPLORE.EXE 2012 IEXPLORE.EXE 2012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1348 wrote to memory of 2012 1348 iexplore.exe 28 PID 1348 wrote to memory of 2012 1348 iexplore.exe 28 PID 1348 wrote to memory of 2012 1348 iexplore.exe 28 PID 1348 wrote to memory of 2012 1348 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\aa5aa8db3647919c72d7e5f82d6d9cf8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1348 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c332ad807d37c7ecf673d019dadb164
SHA11363e768cdb063157ff17fd777250b0bc8096b56
SHA256e9eaa1ac891a82430d199b5c2842f38817adfb19b976496e312af6529a9877bb
SHA51258de2a4e69899948f9e823761b1c45db3c82169af125ccec93ad8ecfafffad607a22f79da991b5bcda063bb93e6b0b86598b58490efd208a1a617cc7423f906a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff5031b82b7ee2c5f735b80f7fedf7a2
SHA1260cd6b1dd5972e90abeee9324b3148e220fe0d8
SHA2563701c8035e1e8759957b1b166601b2e0ba78c1b31c2c9b28bcde90268546e758
SHA51281a5864d0c604cd7af95325079ecbaa42f4de89e3cd5a2edab0f1173b54dd4ecc623ce96f08bd7722b00d616dd245c7f6e4617b04a5adf56c063060148db2ec6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553eda01476d1666b96aa2c8432dec2d2
SHA11b598f496a0097b952ca7ed6f2e3b07bc7c81578
SHA25685c7c3cbacf9fcefaa10d04dce68eacfc81e789e232b4288e9105192bac840c8
SHA5129cd41b3f0fbbdc7fbcbce57c5f8e04bf59b4843adac2245b400360dbee19e7550ee879bf95a260b2e6bd1902e9d7d85146ab412338ddfbda82f5c1119b64a349
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5f9ee49f2f69b627d7fa1bb5fa135da
SHA1ba0d00e06aa4a4f69e591506409ddd5fc4e28849
SHA256f7327a16962105f98b8e2be9b38665d6045a7850e356f2cba6c99bb0cdfccdfd
SHA51292a2a3b513f8444fc26d8a4ef687c5be62094e38d8f0a791c5d3637464ac0e1bf9f278bca1eadc50a1be258dd58773658494ed215d6468e5ea75d4afe82b80b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b6836b3ff69867c474a147ed862c708
SHA1bcfb9ec34a1d080fe2ef823b8f0043224c4c4bf5
SHA256664f9718a09ac89ae2c0eec4bd6bbb253c59bf6d381131bdf3ea2017db2609e8
SHA512bc6f7e78868048e87818e0ecceea3d5fa65e83454ec0f845450480dd8a7a41d1c5d4cf6850dd6115754a48c857ba4dcac68b0d11879397fe014980b11467f8b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555b074be3c5a3eb92061b1e633d84d6a
SHA18f601c5a3f6c171953a6d48288840b45f4f022fa
SHA256995e38b2902da044ff752042133bec87b28d519fe687249555aaadb3314e1867
SHA512bb8f4299db6d4e5cc5267d8f4120e6c6f0b1cd1a90451baaf74b9eaf69514c5e230cb7900d180f4704587001ce975fc9de039bb3cb18e93158b65a8139c68532
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a46e36fd5c4ca6a7bb3a8a5aa31bfb6
SHA1fa777a681be71a0746f1bb23e794cabb731b200c
SHA2565709bab306916036e7dc8801df33973d041f97a51773181712ea7ec229feebed
SHA51246d3dee4bc44ee34b2c6ad9102d9d47f997853cafdc87243a09589331d819767e1bccfa2e8d2fab0146e2d0f8f69a5308fff3835207a778f09975d4d03b01f5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5deee8aab98d670f0925a650dcaa7340e
SHA16c6b6dbbcaa5fd8fbdec8d70f2a50b97cd81705f
SHA256a7588b80f65b8e87af7742c5f5ee311f249c74110ec0ec7937e5e714e2e51de1
SHA51217097e7593ca9f897602bfe708544a78ad0fdcb6de2a57e5f6ff32ffb2c2877ada3e0989784fe7d43421551f1e076fac76be017dd34319eb5490ec96eaee041b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9e8832725fefa24edf733db0af37c65
SHA1149248e4d7004f83720d78bbd0fb4a20519a6e9d
SHA256bd4088f6e9ae83e2667ee8e2fbdc83b44a4dfd421f05f8a003a0575a902ba845
SHA512c5bcc0f1483439a9dda60f3e01f1e359058fb70be6c6ae74aba0305a6035b7123d6508f69bbe296ec69e5165620f87e38de755fdcc2520d5af56013a947cb53b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b458c9b931f26c34d5833ddbd16cf28b
SHA1409df09ca4e40722ae9a8cca5b67701cd4905796
SHA256fb1de86e248bf767de40139cd1e8174bfe8bbf9717525b84449d43551c35e412
SHA512810ff4e539983dbc862ccd56ee13972aa5660ffcaeb21e4cc54fd8cb2f789898c7bf5f45575fce3bb25758fa79af193829f112e05b7399bb9f4b38599e67d4e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec8559f1a38d2090cdb2982dad09b541
SHA1b51496aa95ae32a1686f6943925137d5cd16e658
SHA2562a76ef95602c5dd3f658f64431f0d84c3a5ecf68a2d113f20ab92141c38675ce
SHA51241a31c4858a68b5875b7bdc2e939cf0a47bb66279f6c378c9dc6c14230394ed98eba07e9b566a47b0a56357eb26a6eb7d35abaf112dafc0fd1ca6ddd848dc9b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e16afbc8c3b4fee99d88b39264801db6
SHA11fdc7f62fe15ade36768d597be7d80e9721783bc
SHA256343eaed4c4a37914d117d04ded3fc1a58b7dfcef09e07135ed635ab0d474f0d6
SHA512573a0f27900174fb334fe274b613597992bc74f74fc425933cc1b5f6ebde76359b838a606ec7449e0839bcad1a404b45c1152ab6b8167720dee6087be8ec6b75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56730d4c1a56dd132117e949483624e4c
SHA1eb28b0c6f4aecf05e8736d88b0fbd1feca80671c
SHA2563d0b3e49e18754a419b9e121f0e674a3c5886d9b28a94dacdebe74235e7225b8
SHA5129b9d9bf19733370965f9303f683c5e86f844f9dd53e84a37ee4a8cde67bb3b2b448efe7b254a44c5fe0310a9d0fb27606fd343f1388d4bddbf569129bd9f64c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7037d1d39348026395f3cbba7167843
SHA1dba5da99d77f69321f804aa5f7cb9c056031490d
SHA256441b0e528204363449a516e7f7d6075a0a0b16107b84553afe20956247a72e85
SHA512c523bb6634ed7b61db03aede431d61ce7fa3bb65a6c6e3469898135bebd07f4e02b72482d80730447f626c22fad8a6c392cc7cbd219c3caf1fd6be6b32caecce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5754d8c89bcf87c830fd151c37aa7f3d9
SHA17923725346f6b84e554aa9a658db7a84f764e7c9
SHA2562039fce96e35ddc7662608abeffcd40a3e8a68ff98838140584ebc5c9e9cf24d
SHA5128beb52b3de851ba0a7340a913adf9cd94e20cabb99ea26b02c62616ceb84235ec44430d130bf829d9948faf910ea8a0bb5e3f9ec202fa8f5b50c422e792b745e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5effaa710f601bb6342e92817ce72b674
SHA11130465a05b6e3e560355cc4a81ea202d84872e6
SHA256402f5b80d65a69dc1d233b9a20eb062c8a14208eb027be0bf5d49cd5ebc8ec94
SHA512dd89edfa1bb5d6905d23571ed73b5e528534dc6ee22c0a515fd3b524cbe3b989ec0e25a73ba9c66cc64b929850c60c6eade4f9db11a4f584e60b21ad025af9ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa1ea0467adbb2618db4f3638d955188
SHA17b988cd09127aed3308e6d2e2e29d408cbc67f19
SHA256d3ca9524b322f2c3994d68c411bb3e44abe662bb3b16023b9a62334d0d37b401
SHA512e6ef8eed78f8bc12f881eded74e68b4657a434684ce7eed2d889926249d75774686badce0083898cb278697c3fc71447a76bbd203d88e8c51fad2dd402d4fffb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc36eb02a55d3d89454f02e7626bf930
SHA12ce39d3cccb16b00ed639f467e5264987331287c
SHA2566f8ad15cfe6f17d90001461452e214917e57a72aba00d48c4488dc0fec633eb6
SHA5123a21cc9e356f833aedd3ee7d9ef67c586267d3ef307e3b8bb4490391c16fbdcef1ffea96ab7be3c2914b8baa0d210013d96579aec3410057fae765eb336e054a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503e52b64432dacd5aae14cdc6962ac1f
SHA16e98173e30a289e14981a874feada9c3ee8f541a
SHA256040b378c178b7a6b9f9e38e46dfb44d80e8bb2c85803906360fb31aab138c74a
SHA512eefcf7c31e67c461cc810cd287b40a1d3562c5e93cc6ebcf533b094aecbd755fa7a470c3e1902a7756c26456f8656f0b63598a2d46c512708b6bd74a3ae455a3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b