Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/06/2024, 11:21
Static task
static1
Behavioral task
behavioral1
Sample
ae2eea9cb2ac23b7cc2a87eab7ba7f2a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ae2eea9cb2ac23b7cc2a87eab7ba7f2a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
ae2eea9cb2ac23b7cc2a87eab7ba7f2a_JaffaCakes118.html
-
Size
12KB
-
MD5
ae2eea9cb2ac23b7cc2a87eab7ba7f2a
-
SHA1
4ed6e4ffaab86c4106ea8214cfd1b481d08e1419
-
SHA256
10ac82ccddd6c1788b16e86db291b0dd65f81d932008cd6239fd4c9305212282
-
SHA512
86c38c85b478e2d5723ed9d9607d0340dedf427814051b6f3f06e78eb7b66bb177c19b788e296368610f2cd4074b1320da49bb493a5bc9f568496cf8ab081bcf
-
SSDEEP
192:Cyi+TEkEEdjbXQPuCpvbPuCmwQFCVCf73xy1w34MC2OqZ8XPcNtPuCouCldP0Vg3:CyiEJ/gRDNQFAi7hy1woMC2LIOd+jMa
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{77965681-2B09-11EF-917A-EA263619F6CB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7f195be67b3804e9074838b7e5c98150000000002000000000010660000000100002000000004ef410a7c331a340a0c5c9393c2fbaf18d10a1922c215c33131631516f34307000000000e8000000002000020000000b585b0e2217a80dfd0862aaedd4387c951771f7ac6d8be864f99d897c51faf6a2000000028d2d63bc74e8629643d98e8080b28e1576c58b286ff2eb31263f734fd169a8740000000a7f05521ea272f4abd0ed9ed426a81af0da02dfdc377616630d0c3583567d162681d7f1122e7f4ba0dd480e6401d410318401b95ee2574fb0193f13bf97dbb30 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424612381" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7022564c16bfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2884 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2884 iexplore.exe 2884 iexplore.exe 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2884 wrote to memory of 2908 2884 iexplore.exe 28 PID 2884 wrote to memory of 2908 2884 iexplore.exe 28 PID 2884 wrote to memory of 2908 2884 iexplore.exe 28 PID 2884 wrote to memory of 2908 2884 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ae2eea9cb2ac23b7cc2a87eab7ba7f2a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2884 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54617b5f93f42720619d2dd51d010394a
SHA158fe0bec5f7cc60207af9c5593ac8e881ea522b0
SHA2566a531460387c496e84e68e062bcee8c31af6e21fcbd91dc482eca67874f3d25d
SHA51204230c70fedbd9f5972ac6fca6dc292fac26d40b08a8137ee0f479145a5964c6b6734d0fdc9a467fc4cf2c2a4a1ef34dc55a9c764e65a9280541b15fbda93c33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565715ab8e35c3455ee576a9e23f421b0
SHA1449c725fa169d60d61f2f384a02f12dd0a357f64
SHA256b86db4af115a3e15f9f038a49f71d50e338454278c3f030b6b498cac16362fe1
SHA51256b0a3d73fa41e6683151bc6e4a64184bfc7f4499dc04488c29e5b409af4a2df7ba62e6242b580fe70bb6030447f63c9152b8f521cca2a5cb167fa3cd9435870
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57413b2ffbaf64c68fb82de65f499f6ba
SHA183b94ad2515450b1515a05c037dd555912b6d30a
SHA256a6f2459b3c864f894317b2bd7a2e445fddc7415d0f524138d808b5dd3a8fc787
SHA51285097014b755aa3f05664a12c5d7abc74107b1789004f17194e9c7b202a8f217e733875c6944e48202dfb57e54a10d970c02f4949efa8151183ad3bca5abb815
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee578e06ec35772f298582b5b9300c21
SHA1dbe0657269959a13ccd8b8687ede6cf42114c214
SHA2564b489cbaff92d85420c99ff1655c873cc0a907771c9338c3f08a45cfa05693e5
SHA5126a9f1511b79535c18a7c8ce92e204c2e1373faee1e50eba07f545f22997519cccd75aec0d2ec1cfbac644093368f74b85fe827ed2552cdda423843ecfcfa629e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e7c93ac1b5840fc1fadc5a86a0e8322
SHA1d1859c1c116e887d0c8bc78b8793a1e98c18e551
SHA256f69dc026f70969d168d062eb92703061efbaaab60d6c63a5de5adfcec9380563
SHA51298a3d887b85c9d9e45e3bd9ac99453dd974e2646ddeefcf044053b6f7d843f3a553c7282d67ac99f4a8e368cd218a90915954c3d6b04b06bdb32daf090c4feed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5363a5d88bb4ee52dc7121cb9df5e99e9
SHA111e3a5accd831feec65e40fbc8188c851182cf74
SHA256e20f3b14ae9663b730042f5d524567d324821bf151c6618f38f659a19701a0c6
SHA512fb81e964c16feb54b559d6dd8dbab176a6cf7294d31cb7cdb3d7bf8f0b51f45a097e5393c14a6ce7b9039a317629b2fd9afe98a319d76caf743d84f6de291894
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524a2c3a26d9c6119cd5212e225e4e1cf
SHA10b0b47c0783ed40adc52f64fa8b1d20e838c55c0
SHA256b6d3b0bb87bc9da4f734c8d2999ccd24602f224547bc5a0e7cd4a30949cdf4a0
SHA512bba704a7326f1f561a44c5bc6792bc70495b135548db693eec389273aa4cbd344ac2667be0ccf40ad93f2b52c18eef5fc84f511fac16b33fe51f28d2cf4dc43d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516902c320a0af2f53635949a29599766
SHA1cd3444a73add8ce0cc9a314a848e7d41dd89100c
SHA256c64a046ab975a24124b58797c931ee3c55dfa585e8b0cebdcb94820ce3eec7e3
SHA5129f07f571abe2ebef28781620ad09200eafdae141f59393b2d700b406b157c552618efa103e3dfe86b2d0c3c0c68172f854685ed7397848f41d3ffeeed3e16abd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a60248276d4df059f18a833e14c338d
SHA13d5882881158a487b15e36a21ceef5efbb7e4e2b
SHA256356d7f3defbfeb42dacb6bfef6dbe73882d384fa76e9c839b661339a6de1f7c6
SHA5122032b0c7e484c3f42376df5147ad6d8bb1725fc02e3a13d8bb23c1dbef5aea3a3cdb2c03bd1efcf804ce8752b0f4474d78bba4cccd7ed9c0f15097c629579ef1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be01637fcdb019b3b1eee16e9bc560f7
SHA1c49a72369874501daacd66905b0e13d919279a1a
SHA2566ce3290dc899a139780f2041327081c1d37707639a10eaad478e31071c78a63a
SHA512ab4deaf7398671f6226e3e2f6d9f4f5092a314c14b16cc3de49022e4c7926d371231f4644ad1fd7a7c0ce03121f355c2faf0a27e9e2bef223d6ed0b3d0c1a168
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d92599141a8b00ca8e2782b029872974
SHA1276d0c1f20d6a55ea9ed9b037df107e7e65d0dd4
SHA2562caaafad6e9515e6d2031d6e5a87d8b11863f35412f775f8513aec3710bf2e14
SHA512b97b2f5f1476ab17c1c756ca16455ba3af687960ab31eede9ea23b77d7572cbe4da571da4060e2af73fc6a8f2c14bbd0f5b2703e55ba03f0a18af2e038e58194
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8ddb2bb6c6748a38d06dcfc7cf959e1
SHA1983eb1614fe7850cb35a98276746e0fc64ff299a
SHA25668ca3e0ce206c52b3835b16baec67dadf09c74c7c74ef9f2f570fc141626a5dc
SHA51292d9b0f2658ae269df0eb8c155a6360c3387232e467790b19bc2fd611ec0ae3c55b910ec61616db23a2ee6910b0255108ded7f7ccc0a8a5a3ff276e948b75baa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544984d89837320afa7c171fd1bb75e50
SHA1dfef223847e7d4d7647b4491c5c85f20c43540a0
SHA2563b62ef3339cfb9099a2471a1206d7b60addcefc50b71796dcdb74bd6802ecce3
SHA5128c60d6d4d003e74a6983c89238cc6175fbfb63aa54b7f1d4ad65464e647d09702761933af0afd01cbe70375ecdd03f0bbd7fd3121478c92fcd576906fa2c9528
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e03b3e353b69b30694962888cc08e03
SHA15a904902024f6d1c9107176c8d5459905f136be5
SHA256df723f44d4071ddaa5d2f24fcde9110cb18a91a83e48c3430dbb277d7b12c04e
SHA512e153bc9d418ff9552ea8f11c80b0af977a55c0acc1d0194eb661f9e09a9e53617ba6993f704c0e6e7fb06588149a95093068cc69b6ea8e92826b8eea03938c94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567c12bdea5c361b96e4aa9cd6d05b965
SHA1cc3fc602afcaf7b7ba71bd170670b18b5cb7813c
SHA256cec56b34f5afe5765ef621c9a5f7e865bdb80f430893e5466d9f06fa39826b5a
SHA512ab11e239787fc59167dda5b34670baa8000e04e2b3abf6985312aff6652688a7d86260d6b6dc6deda9e36d3f25b94d7644cebcfceb556b9429fd09ba36f6559d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de930267fd6b4682b81837c26cc593b5
SHA11812f099633fdc8708e75d3629cb39923156e469
SHA256133bd2a755994cd53a81d434fa3a70549a52be5f9b9526754ae566567d88cd00
SHA512bfbc3a0617d2439dd08fe8214c75caa878aae09827b7f1a22c3e1fab5008748a415f5c7467dbda6366996c9546ee5d18ed39cfae79f100ceb2fa0919ba839e6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da6d70ce4295025e94b5174744f31812
SHA19914b3892c98e6ea04dc514b3ba7c58c74cdb56b
SHA256148e686d48284e135842f41fd2b90e1282dcece0c9ea2e5d5b7a4cc7f3ce6c4a
SHA51282da7b49a979e8b8600fc190630b1574b5b5389757915270d60a5c1abede6dc7e1da9a3dfcb3b0562446f41775121fb6430b912c7f942b5941d580831bf2574e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aab02f54b22e2a8cd0ef834fefabc832
SHA1647af0f3c80fad3c29b92ecca3a0a32c61cd6a76
SHA256e934f92b4921d1de05e359a4103422384d40c04a4f52c34435d76e7f3a625e3d
SHA51209873d5a8368cd364dbbcc895f89362d767d4aee9701aa91fbddb888fb3074fb6d7b17880a82eb97fcee4b8ac9ef6706674d245cb74fe48f3d2ddae6b4a76a00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9d083557b5b36f56bf9ffbc7cb3c9a6
SHA154a45739b6d6c8da289003814336e8340abc545e
SHA256b0e0bdc9ad755d443f8311944a0ce739156b39e849684cf6d0db5ef2f1679ae0
SHA512f37a90eaaa9d66ea51b13b61a236bd9b0b59e99d4b3aabf2048bfe0e424eb83c8308d6cbed474f00accf6a532a0ca25fb3447a6652dcde4d3fcc4829ae830952
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b