Analysis
-
max time kernel
123s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
15-06-2024 01:48
Static task
static1
Behavioral task
behavioral1
Sample
ac7a74839044b45b8820a0fbfa5df0ab_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
ac7a74839044b45b8820a0fbfa5df0ab_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
ac7a74839044b45b8820a0fbfa5df0ab_JaffaCakes118.html
-
Size
68KB
-
MD5
ac7a74839044b45b8820a0fbfa5df0ab
-
SHA1
fb48fc6f16c375cba15f6c8ef5148276da200f2f
-
SHA256
fbb6ac1211271fe100588294ffceda72f4fb4756c63aeeeafaac5a19b99c9707
-
SHA512
23ff2cc89d55122dba025890c6b9fc6824b6fe0011eab7b34e4f2cc9aec5f3c9a30b49071c6a1e896633a053758d4907a3dcf14ffac60a71304680cd9aa7d97b
-
SSDEEP
1536:UzE4ISi4CEosz0MDF1hVITgijygzeW6ZeWjbSOQniJqlVk2ZkbBlsXth2wXasCvU:F4oLAH9hocWWfxilY1m4iOALLC2
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a80760000000002000000000010660000000100002000000066df025c1c929a8faaa90c857e1ef203d6ea5609cbab520173f86f600c29e17f000000000e80000000020000200000001b019bdea232b328162670ceefab0aa0201a259d13796f1567d01238eb66f5752000000088368d7a2713d695fa4058f829869c8562661b72b7406130625b501424879c17400000008f2dd0af2515c54065f9fdcdefe6647718ed61a7264c9171ceffd1390bb171961bd4988b2cee8d13b6dd4cdb9b3ac982802d1545302f0875caaa6b097345bca5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{72CFD451-2AB9-11EF-917B-C299D158824A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424578014" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 207b4d7ec6beda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2932 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2932 iexplore.exe 2932 iexplore.exe 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2932 wrote to memory of 2748 2932 iexplore.exe 28 PID 2932 wrote to memory of 2748 2932 iexplore.exe 28 PID 2932 wrote to memory of 2748 2932 iexplore.exe 28 PID 2932 wrote to memory of 2748 2932 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ac7a74839044b45b8820a0fbfa5df0ab_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2932 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcd05217deba276c1c2ec0bb52d4c049
SHA17d6c6fd9397ecaa75da99da557f278bb2df2cdb4
SHA256caf65b294a3be248d5132f6e726486718c64e44d571e2aa903610c73e525032b
SHA512dee55fc4f65487335f82b56f2e3f51648c9fb7febed1b21c7c16d268aa24d1385a96056ec6ec63a5a53ba0e95d2a6fdb71b48e447c7ecc5812c0d69d19219e6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb91cc656c3b34fec8b6afc8f14f1eb0
SHA1855e955720e484bf2bde538ff3df6f65169f9c8e
SHA25617a84d28a1ef4cac306771a07b751d02e8389406c2143c36a12bd4179c666f34
SHA512580343c8c241ff5023d33ee9aab05a2c350dbe632029abf188c8e593af2dc67e2afc9962e4fdbf003ef9a7097b97e41c5afaf329f8e2ba734faa0891e2b63fd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5765ff03a7186e543e4dd36472d18b493
SHA10184dc0e344ffe9e14986a6dbe0898b7dd5adf66
SHA25601554aaad5d952b1de3d253fdebb3f793eea9d6219e52ffeb6c68dfda396d2b5
SHA512398094760815d310c95bad16f80cd34939713bd7f78078eb5ee3376b80d933dbc552905534a5284a3bc7975ee3e68e5b03e492b149a699f892d0ba81d5754265
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e7571f6636f58f72bb96c1e90802001
SHA1104842f4ab39d3ed18fa87af14e05be952f29656
SHA256af1d31a37165936c20b7cff2a4876f7392dd6b4be912d77f0df41997e1319bf8
SHA5129700eb6af2a352d751ceda1ee9e7ca6922e00da0f3abdb8c4febd5be3bdb67c74bb4a5e47b246e505f7d12359a6729480a0db38c38aeecb1be68cc543f6d0084
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577e6f39b8d5d7778117288711aa24d3b
SHA13c54932fb3f172a7fef3cb76dc2050d97dd92136
SHA2562d81086f290afadf9fa751a70ae904fd2d2fc776021a875b55d01193d6578f2c
SHA51213702c051b01f8e95371ee080f1fa9443dabc927510a60da91c768abd4fa57e3caf8069cb588281609f78db06e88f8f59d1e472980ea494dfd33b598521187d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510de7a16009d826c293ace05115ed5e7
SHA156b609248c6b7fc8c37f36ad7fb8a298d6503cc2
SHA2562dc65a055b51dca687950fc17217aefb0335dc95feb1ef350973493f402a3818
SHA5123351da9c18a1d9dce8167209321d3d424461afd53f2ba18cf2fb771f5431473797859273915660d625ffb5f80a2395794a6b8f7a156017c2f3251c3a644ccf59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb23bd260932898cfe078d9d38070e4e
SHA1b808ff8b2a980c681e489d1696d535e10812394f
SHA2569a0889bd8474ea84be93dfeadd783bf2c8feaba7dc5f9af2ba65f2a36c6a0d61
SHA512565bcf7f1cb9e042aefd2d4e2d010b3ef4ceea4e16a84ef97fe6c2913400ed1c74bfdd6e8dad1720832461369ad7a95745e654e2a848fb03557048e204631016
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5015315ddfdb9aa5dd4e5ff5c228d94f5
SHA128f7283b433a7ca7a3afc78b21a32c9113aa8e1c
SHA256f21fa69f13aadf71c60b5f0f8a00043befb1367579ed20c8e64654117da8e4f6
SHA5129c30c0e9817c7c1da056a35cf6fbb432055e7cca9ec70d39f2720befdcebafa90621cb69dbdfb08a62099fdc19c0a7ddcc96937b68df59dc6c21d949e8a2fdc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572e6f183e481857f16dd5e38c5f0650a
SHA1cf32b2b1c0d14c5a67ff9b2e2cf135ff2edca8ca
SHA256708a3932dc5162b0a8a3484847bfb8d6d2adc534c49a2fc4a63e3382227b49ff
SHA512b095abd3fd821130a06229191754727be0358b72a48c97069e9fadfb1d36a4f655c6e85675fc24e5dd209666d95b63fc84d6325c516009b5d2dea1e497f200e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc8e4776e663ad23b9251e317d30a9c3
SHA1af2b374150d2bb4f2c92ca5f1b087d3b6c99fcda
SHA256d64906fecb48ee69bd9448c8f730a5f015bab9ef0936f51df1220f389ad910ec
SHA51231dec646fa52a904e54dcbe37b49ac7d9eab12e88fc475625aba9c1d410d2c9cfb2a574ff95df8536a1e82fe829f7e873269bf447fda067b12f3d5e0add0678d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5e21f39f51601fbfc3fcf3b22be9aba
SHA1482779c09dfacb34ab8c7b7b2cc857b9f81b6cad
SHA2569370edfd663f2bd3c26aa6ff24b14b80a385b035d5d31d68564f35d828bf36b3
SHA51285210d3b3b50eb4ccd16794b1346da94ad7775fdbeaf1b05867e2c7102f59c41add5634ab17e5f3344135770cdbe696548ba9a937413be4a2a8b875b7e71d511
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598ac969f6ddb168ff629376d0b366780
SHA19227e996cbf35d569b35db5945fbb01df3d8ce62
SHA25657a6f134088ee49fa456154ee37a2f1aaf3801d6f954b191e65b9ebc7f8a29c4
SHA512e11f1e0112f22f79c2d7f1ae6b11fe73856d69a837fc9d4f937a18d8bf42caae18ef352f348e1960aa774e524cf5a54608e87eecab9ffce15ea6d7998716c60d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589fb7c5fc57562b48736b7af678cd6b0
SHA1b95596bed187fe6189f1886f2a5d77f851044616
SHA256342cb1e2f49126e884256d5d4d48372b3acf4a5b18d50770afe10b172b7b37eb
SHA512b628ae7d87cb8ba4df464c40bb55f4f6190a6987d876d6a9c84e5fb8a7a5686171e62ca7dea109d802bfe070dd17052014189a0b4085a2f4bf0912dbebc48c04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f41a13bf313515f17536af6c989e3aed
SHA196e58a1977c8a790dd56b4210d84f46bd049bb69
SHA256acd0015b0874329bfc9c39a707ffa4812b5e467ad70e46998e7040b66d427ac8
SHA512356a21741088673bb6e867acd76e8fc199c4e5b540eea364d67344ef54d4a02e906fb708d496ddca90debdb580183445b8e33cdde4d10bc0db28d4e069c04017
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e69f0c45092c6564ebc9e54790361b64
SHA1556e8dcf53d83fc2d5cb06562ae7378fa9b6b911
SHA2564c7c8c96389eb4f01a1ca8dc1f010a779e77e29198084dba3c3d01ecf7d77e53
SHA512c7431fe451717db3e431731d234577c3c568265baa310b4eb093e36e46aa532e6db1811253589785da079626b1190bcf7e2d259fc239030a6f3ab6dc2fdd3c4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9ce3b49dcd3b7351edec3d2971e7156
SHA18ffeabff0a6651bb58de8cdf37d9817d7ec81d84
SHA2562cd91608c7620dccd132ba837f7d90831e86b4b79e7db763bd9ddc72263a962c
SHA51258084c1ef6a8c1455ce066ce1684db80e61b6dcf24df879a4a74f5cb7ec014b193f8c54be37128eb675a2ed0d361792bd21df4e72ee44e7bdae95ed64399f2fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52160e32da83aaed99c511748fd0bf0ed
SHA1fa7b647ffbf37884b16e2b7d78d287fd53b7ac94
SHA25628a395958982ab59040ceeae2c35409e6dead206f65ed1a93f7ee13b5ad603c3
SHA5128bfc77a7a4f9a9c31ecb1a4674ce01a45d3daece7c401b26a1aadca62f5dffe3af0fa615e51b464ecd1cb1de115512cb799a0a71620c1a1e883c7bc12dc15989
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528ff25dac8c66a62ac9f5bef585b7162
SHA14928008417fefc9acbc1482400a4666e7eb34604
SHA25625afe4a7d5180cb75d553a06412555e85851a670a061cafe92e5a33bbc24afae
SHA512928bd686919c279086a8f7f161ae217360a649c99e25a911af4b58dc90b430574b729c2314861a2848b7809359ebf935195d9d098d904c902e6c6d03b3ad9045
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c5b5eb1d38489f7b7a9d3af36f66d56
SHA1c410398531b69fd1852658ae4eb9b4668bfea25a
SHA256d8c63df702b7f471b8eeba840fa4121c2a7f72086694543be07a539acea5eff8
SHA512d34618b0b796924a41789a35aedaa910cba068dfb589c9d5580aa795fe2f3776054417bde92b461838f0d1c4a69b55c40dff7ae1fcf34a2c7cc3cc1ebf94038d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e4eec98183d63284940d92d13fb5ee6
SHA1809d9f968478d59e44bb169e86e4b289fd19eb46
SHA2561c5aa9f6ddee624a8792c7bdb1f1193d56edff5ef4ffbd7e22a75f5f1ba9ce64
SHA5123daef2ebc006de326ddf02890f62476795f6254106a9c8ee6ba6a7482f7170cca4f0a17e0ba3fb40a4c581777f78ab14380d948209a7a57fd37c0189ba9d5775
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b