Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/06/2024, 12:01
Static task
static1
Behavioral task
behavioral1
Sample
ae55b60f5a4f7118281bc0bb2ba65759_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ae55b60f5a4f7118281bc0bb2ba65759_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
ae55b60f5a4f7118281bc0bb2ba65759_JaffaCakes118.html
-
Size
8KB
-
MD5
ae55b60f5a4f7118281bc0bb2ba65759
-
SHA1
16a6709d7a1245edbc17e024d8d9022f4120d026
-
SHA256
46bf310b07a92a4328bbb385b7cd904257633c462beebe88c84248360f1cb806
-
SHA512
debcafdd304af5515d12c23b40f1c79ee261bbd1be464a13eedbd7327cd966717d51c34c4e75e37e7c0e9669db1ac340b415a0e6b4f3e62bd3f14d8071be878d
-
SSDEEP
192:CpbTDOLxhEyv+rBBA6JH6Ftc2hEggOlkwL:uq8BA6VWtc8LlPL
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0FE64621-2B0F-11EF-A965-CAFA5A0A62FD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d692495d8eb3aa40b943493147cf49010000000002000000000010660000000100002000000082e15d05c5c5ec40dff47a2fcf851270b8769946f98671ef65784e9c6c5b979b000000000e8000000002000020000000ee3ee880f452f4010f1f7255802e80117e858ba3f1b1730b1786012eefde4560200000008d55219afbac059857b547f24951320a4a0bfcedeaf509de044e9041f2c6ace44000000099ac7483ff7134b643f3d53cf51d73972446d81fe49cf22f9c8601c1023e28be36c6897ff906553a516e3c5766029b5e24a0159e603d0e9f1ce9e36c0665ed3f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80bc30fe1bbfda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424614784" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2872 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2872 iexplore.exe 2872 iexplore.exe 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2808 2872 iexplore.exe 28 PID 2872 wrote to memory of 2808 2872 iexplore.exe 28 PID 2872 wrote to memory of 2808 2872 iexplore.exe 28 PID 2872 wrote to memory of 2808 2872 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ae55b60f5a4f7118281bc0bb2ba65759_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2872 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcd31d6881f25383fc7d6acc90f814e9
SHA179047651736ec0d19161bc9c195bf5d81e1458a3
SHA2562339ea28a44ca0c3bd593c2be990bac3ecab5111b90bc3561933592c625712e4
SHA51260bada59f461d2df126a36b9c78d654ba55549dc1846ad53ef431c1d0305f2cd800504844e4314b28fa87f6dfec152b29bcebd69ebf410d7d521bcfbaabeed50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563d320a076fd29fd876f22131c225567
SHA14c30e9c5c91adb56c894dc491eb242767275c7a3
SHA2561c7e647aba6fd2cb729543002fd934cbd1c1445bf191c3d4536e40c404efe2e9
SHA512db38410d303449da041c50b72ce2167255ad3cf475a7dffdd70063bc6d291c9e261e80ddc6fc65ec30fe2aee09a39dd29a7daa6f0af9dfea22ae3a61375060ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a73850739e9217755e79aebabc9997fb
SHA170e9b861da21cf857fd443523b4483dca0170145
SHA2569ba9fbbc818e2246a92524d91ee3012f921b9f43d1437273652b7be3d86411a8
SHA51230742378bdec25fde5d63dae148474c0ba9887961c37d590ee75d067e1a75d97fd0a512eb31de37aa08d82348a4b0194894167c61c1ed9f6cc7347ea9ae49555
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d8245e4cfadd35de5139d41eae3afeb
SHA1ba33b45c855e1905b277c8aca55dd41db392d8ad
SHA2569dbcdece908229455a2b3e710c98507032af790918071b9929b779517822f76d
SHA51295c928491e67b60d39a609f4643e6239dae59840a014e6a7adf9ad64c5ba1feab8ae6a3955015edb902e39ea5cb4c5dc2eff6fd57c7e82a7bb2a29ea0549c59d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cdbcf49f9bd9afcc04278bf18978082
SHA15f4a9c8ac82bd626ea4986d7825f3bd30aaf5826
SHA256758518a5805a44ac1e0aaf445c74e43d1f47e8a0fc5688905e5008147622b77d
SHA512d879eed9eba2709bb6887cdc6e4c9bab7d7fee802f4c81ee7f85075b516126f0fad62794d855faf98bce5af02a624d52470b16641494fa5d95d577f27c31cfa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54334a5fe6ef53d57058d1a6d10f3437b
SHA1b9b1f4941865026b27ddccc067e8b662346dd19e
SHA2567f714ae3b662f5c6db9905fd66be0ee6e441209aaf5072b06951769759df164c
SHA51220ca78ef6bae489480b2ff75d095594b5a530134a48ea4e9f6ddce8c59184d9bcdb1ce5c820b7e741996b5d82a91505da64de0f060645928e7a26f3fb8208a2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5999aa2448b3d65754e00ae29b7ae5906
SHA1a69f823d2f87bbd82ab65e886dfea4d6518cb750
SHA25695031b150ac9c41966a5348970b63fc93e469da52e6d4d2c47826a4ce49ce203
SHA51225de8c599e6465c13f5b2078078a251240592145af294c4f80e9a87ef69bd12a09cab31aeca31c6348252a24e8c740cb1a76dd014163fda8181cbf795162bb36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af9b933d22ae58048f050541ab9960f2
SHA1f1b43d11bc757c5e4f22e5b9f9256aa34040fc12
SHA256262276f1bdcd3f437060655e903c04bd8beadcf94418640770218ba6382d6a2d
SHA5123a32e0be70d0c988f8f4acc394f35c187bc706b46c5a05d8027043802a5c06790f501f61259794e53458a404cb0932b78c9c54d1f819d4983893ba194f6bb79e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cffb9c81caa3d8e5952ab86083ffecd8
SHA1bf9f6cdc0de0669a0e630dce4bb6724821b0efcf
SHA25692aee886f1ee22e210b1088380425aff008364a4e2a5536f314e70c484fe7985
SHA51283ad7da41bece4745d55df11fdaaa985bab6a313cce60fe786eee65f846b68b706f3e85ad357f2ab20e0705ccd10042d2edb74aa17ba871ab94c4e9a0cdbe3e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f6c8017aece168b77aad69c66b50665
SHA174a4aa8fe40971f18c660c0b1b28dcfde8e2664e
SHA25685f9760f38a6a67fe1659933d94fd8a3ed7441c96b68b2a1a56e568db9de88bc
SHA51230d6370628be0c790c90d13f6e59137480ec66a501c980fbfbd9e11da34089595f89f363ce08cead5ea460120e58b1cfe740fa51178182355ca1e7705cb6d784
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6e13caa63fd628dd60ba8505d23323c
SHA1adefe3ea00185c8eee9d9be798558287b2d45435
SHA256a85a0179089b2ebad581e9e67db4d64bc087282edb9667c14e85a83d40194a54
SHA512c5ea7d21f8aabcf1c690fbc7a330c4c9cf9842348c77196229cceaf411ce884aaafb0b53218a834f7c5c32ab55c87919bd7dc72c874444cb5b13b56d09d60f0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557e6a43d2c12ace1f992f1f596a4647a
SHA1210b8363f88f573abfa850200c1a63655c440b9c
SHA25640e782f801b7a49f327125b37e534f7da54fdf634f2b6a4fee96a1f5a201bc1d
SHA5125e8bffd836f18c85ca7f13b48965575732566312283770a585718e52bedab77556ae3c903f046570a60d70b26d1b6e5af0d2d6f6f89e6a70d6f776281b42934a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdf5973b5876dc95dd6d0874e26b1877
SHA10366e89dd428587b287daed611da12a2807a6732
SHA2563a9ccd384e5a47748366a171cadc050cf28210388d60159b11a4c065d7dbb3d6
SHA512dad1280a25d0723b0cfcf141bcc243d4b2bb8483a050419070e046b313ba738f5b8ba5286438b7fcaf406d3757ef378607ff8d852ebb48091b35a95ddcd86329
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d905ae86ccbc4ea95682801bde3c5e61
SHA1bf006aaebac4c9e23356176d19860a0b1bf7d6e2
SHA25619dc5c7147068f770ea40a1537700e23e458aad79404d62aa1ac13550e9d61e2
SHA512a5e6bb058ffd747c0981281f3bc8d2e5dfee82e9bd10ecbf7fac63b85fdeaf9d3152c69e49ceeeeed95afc143e9be3e9ae880e0a38c808beeb05ca974295e98d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54629611184d50b13eeb39318530d5a73
SHA149a015943596f821a6f46febfc661875efa9554b
SHA256de6096c40b898aeac7e20983e82b0da6e3cfd39b72039c0a0ffb1d9f971c7c69
SHA5125141617c805065ab375acf23f22baa5de3eeec29e529df72a04d2f3962309abdcf9522ab599b00bb4eea6f78f793b2a064c3f68cfe296597c6931fc24e8f6065
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53051f316a5d755d826cf9cd8d552b2b2
SHA1a474bf18f40a99db1002f0ed0faec5184055a8d2
SHA256fac96cbf760b1cc64c70e9cd6519af295bbfb942a4e91c1fc068b1dcd1c1b9c0
SHA51210ed07813b4b35d9400a7518f89882fd0039ae6d1a9b5c0671098bcd691e8d2197605ffe7bb9ee894fc1b9d1ca1a8a1491ceedcd2356d3dd52cd804b0b13a844
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532c38aebdd7dd625270d517c3fddb560
SHA1f76ef520e4d36bd77505d5d730fcd8afd977d3dd
SHA2565fa3890200cbaf150f5dda72632328c15c447b3ba638d1179316c1d78e973a3c
SHA512cbd80f92a0b17b5ea350e2b484537eb4acbe04db56960ea8490a5257e46e1f3261e049d8e2c398f2c1e709751fbecf4fb9d41bd90674fb0ee3cd2e8aedd84e87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2ded968f41e296ae4e002eef53ca497
SHA121d223b0cbc1c12ac10b652e7ae29ef5086fe827
SHA256b40a5af80467187d45a30f9080afe335bc0bce4080e91ad162560c2445572975
SHA5121282b28d252edad15f02021a334d62697f9fc73672bc1f786c5bf9d27c44a4b074a700ccf832efc6103ad3ffdafdabaf17682b57ae4f2e70534c58db8f2b678f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ef0d2912bd3ee4c8c0370528cf8b47d
SHA1fd0e1a6e79391668729087de65936c034dd0f114
SHA25631310b0759fb5b34b37118935e07ccae24cbc0b86547f3068409308aa9a49c8b
SHA5127da8efb11567edb943c60ddeff489610bf667e8d0c495668bd8161848c7425b2de13c4f2ba5f5aafb07a8e9abbc279f06c8a92f338732ea536307763b509d2c8
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b