Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
15/06/2024, 11:39
Static task
static1
Behavioral task
behavioral1
Sample
ae40a663cb4d12a4730da18c264a10d0_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
ae40a663cb4d12a4730da18c264a10d0_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
ae40a663cb4d12a4730da18c264a10d0_JaffaCakes118.html
-
Size
92KB
-
MD5
ae40a663cb4d12a4730da18c264a10d0
-
SHA1
ce0838dea9206e67b175cee2daae90ea9bae98dd
-
SHA256
5ebcb9ae2ebc81c38382c34a9af07df9fc366e902a2561cab7af4864547b33f1
-
SHA512
c910dcc2012053cc0511b5b5be9fe589b80847cb2cb0609c636ae0a7b0496d977a304d3160f8c63b91f890a4bc6462b9d538841ca80ec19948b882bca16a6459
-
SSDEEP
768:szAuhWK+1Gq+gke5zC33ht/hVmMtjoqycJZ2TVBIA10U4myJ+3nzWhvLcjxpRnKz:U+Kgke5E3GM9oqtLJ+XOIR+7CGFLU+j
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E8DB5691-2B0B-11EF-AD30-660F20EB2E2E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30685abd18bfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e084132423a5694fa79fba4cbd2b0ec200000000020000000000106600000001000020000000655f013c737ef7dff35edd2c9f08c014730ad33dd1fc7739e3b6be692aebff17000000000e8000000002000020000000f1dea0c3d5fba18933a7c11d31cb79ff3ac18ac2594470c5b6f3d53b1713a90120000000b3d06c4b15dc4f3ad8b55f822a89bd40b51a1c83a5a9eeac9999c3fbc48d6bfb4000000010a1f53fd80c2bd0ce437a75683130eccb37f84395488fe8abb519548beae98cc1d7d5d3fa25d72936b08b1c989ae3ef9e6c192a13d8f60fe209f2d8ea50451e iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424613430" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2072 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2072 iexplore.exe 2072 iexplore.exe 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2476 2072 iexplore.exe 28 PID 2072 wrote to memory of 2476 2072 iexplore.exe 28 PID 2072 wrote to memory of 2476 2072 iexplore.exe 28 PID 2072 wrote to memory of 2476 2072 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ae40a663cb4d12a4730da18c264a10d0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5583865c9fc140df4aafb5cf34cfa7c3b
SHA1dec869b1ae2df415ec24fe894b2d4b8e248d8ec6
SHA256a00aebdefa3074ecbf0347d9d1f9c270c045339768a89790a29a5c40ce252c28
SHA51266afd01debfe2ffcd3b2b6680d0756eb273df844c9196596e8a5092b1e2aa9923b404bcb990210535e8b36f1991b8badf862b447009322b1a9e6fc00981c5a92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53941037987500b01dfa00d28206afa9a
SHA117234c9b29eab68cd30f322d01fe6eb5aa1b67ec
SHA256bdcb6502fa3a22895b372446064db6d362e298a2231776f45f55777f60c654b8
SHA51270ec1e08a74444796de191a3e5fd25f09d914a9f0a65854786abb3725de2a2daae0a9f01359c384cb33e59242b5d2189fbb4b763bf2fbe7e68894ef162bb9d99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c7c6e75ce73fed5d1b1c93585adc1c6
SHA1c1b91f7dc1a0568900c40b365510136fdbde6051
SHA256a0d55ef6ce6a22e8bc66f09af59517058174531e9b5be04752215a8daac5afe3
SHA512413c6a04779c782d63ac8bbf64951f4e4af27593e3279d722051de2e983d6ec144190c4a71ade5a53f8fd31b4c66c929519083476ba1d5bb05f4f0c23e412e1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555ae4d17d6889bc268aab3422aa04149
SHA1414e6faa3079002adb895caba8005abcdd86209f
SHA256c378de409b559566c87bc049f3144d6c6a429b3460b4103a604e303aa4753843
SHA512bad6294a49ccebd86a6a50608d3619bba33e033a1258e57f09ba76b0eefe3b75aef66d25bcfbdefaafa027ddcdfb3c62c00e9c514fdff35ee9da0833cf588493
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9009e35b10915e5bdfc0265567c3765
SHA1047eb92aa5939d5d8c0b56b25d46ba75f0d62f80
SHA256d7d2679930d44539804dd60425b1ecf771293f22775435c1f33330791cf8c263
SHA512c03c7a8376e190aaa79c4576238641a7c9a5c6f288298bc00be37a46685f700f45747918c388b63be55fd139ff8e38cf12d7ec513ad1d3f3dec9f020fb8606fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586ada8ccc43969b658cae05ecc1462be
SHA1c0d00acd9550c8260358b3cd45256c3d48c0af8d
SHA25602b7453a6b820529a09103ec5789110f8f241c70560d47ff9e8a9009e8d19037
SHA5129ec3b60ce09f0511e675bdcae93261107d7926d30fd98bd5e61b52af215707a9c9df5e799066d21c9a5dab6867e3c7ba6cbdcf41c6d74f3ce37ba2914c433c46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec8047a7eb57e104e8f4654195df5ab9
SHA1a247dae6a0d9591c87dc998cb3be9f287c9a100d
SHA256312b75d9e2b7b5243d3d9f2d45f19f721889a2d265a4a89f454e008026055ba0
SHA512ceb910b68e764961f4f29ec7dedb6dbb750fc69d4c9d6366104b7611cb6517c991da46c56793f76945bdffa6e49eaba08f2534fd05d0b0859e915d0cad6cf88a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592675c5a8c2e0b402a4cf01dc25d1010
SHA154be83aa5f2ecddafa463053a682c45622ab5d53
SHA25650ad8582885bfb305582eaeb089807feefd9829cad19f64f2b4e7f154273d0ad
SHA512a12acae417e02c4a745b21c1e9efcf31f0a75bc2e4243121af869602d6e265b9d5d3fd4e16bcf3e0f7d9c8ae0c2d39d23bc51a5ec2a8f870cc24b4c5c6021c53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a03d524aecd952d7812779f23511c5e7
SHA11164b9864f4224a1d24f59151f092efa5074144a
SHA25634cfb038226bf2f50ec463fa57d464d171004d105973d7f74a315bf279646668
SHA5121873ef74acedc5a71be9ba6516d6bb01328f7e740f525abe8d0fa0186cb4ad615a15cb7075f9f5dff454f440cd253dd1cd8346d27324c6d0fb94e264aaecbad6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f17aa1a6336abe4937d6cba76c69db6
SHA1bdf0e2f3ac009d6a30fb2e44e730614afd920b53
SHA256e2c227aea2869df784961858399961909c0a6481aabc9758a7b20af5f91a7e4e
SHA512015ac34ceea8aa1e1a4b79335f2b3d4cf788cdf3e469199d80dc7076054fcb5947a3cb8dd4e46adb4dba83f94a2ce0cfb8a9dd55a460ec94647a10491393bfe3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f131b6de036386fa4cce48a4f5b2697
SHA1421ffcf4e31e4e492b67a8526930e4e6c388a578
SHA256330ba45d6bdd9b051f8dfc07327a28b2ea0e3fc1cbeee669956a76a27a09d21a
SHA512a14478e5fd65bbb06f9b874da966cc233715564f7983c7a9444193d5445adfc1e6f7658957334703c8501e419b4e4efb59e7711b29d705c9693c5368fafb9022
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d72478ddb9c1ad48741e5f497fff33a
SHA19091639d07e86f135b84d47062d3d8d0c1ab24e9
SHA256c0369877c2329c1e719f9aa969fed1fbb211d982af4cffe1405c28b906ab1ef8
SHA512dee8f1c15f04ee453b9f70d9165ee31f3d0e9239308d4b71de52d0ec0044646135177de6f0ebbbce63bdd81e79842b926bc492a95b7f88ba14b1ab0eaa7554e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba496921306963c17adfac83b6562c00
SHA100272dd6d7598384f97c26721bb479cbcda4620f
SHA256ecf39fdf474eefd9d0946c2aaa38d39be8c1ed4286a15787603725362dae1e0e
SHA5126f7f882c3219b46d0c701337726dc9b4a9a57fe40fd234c2b83203f0a6068b667713879f16d75a7d0d737bb7ead95fb95bd779f4107810879b182c7190b9393d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563f69b3beff81f19aa9ecc263c450df1
SHA14e3be8aef614c17f1359d78c139a1eea07ae30d1
SHA25669a3734d70f33b1c3e88ef4578cd060ddcc28a92bb2c64ec6f12aafb33d8a8e2
SHA51224cb2d6719381e1123de48891cd4ee58249e452062838aa6f6f0b7189cc5dfb5ab338b080b8d294c0398d5aa4577d3bb1858cb2897943e4706a2abaaa9459d6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57228bcc306dff243387d72032580658a
SHA1299b46670c7768fc5b733036b01d8fd8ef6c68b8
SHA2563758979dd236a8ac1222759fc3d8981e2eb7390744ef189569047e80c550f61a
SHA51237a451b696f30584dd76722951c1bd8b9926f85c8e5feb6437ff2bdf7dbcb79a3f19cf758095b6262c90c79f5cb02d5d2ce95445e29ad2efae023654168984ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bde00474fefba4eeb4dfc17b7a107899
SHA13456b5abdac809673ea904b7ecc6124a2ff488c3
SHA256c2cd15c65d8807edb65695cd5f89d3657e7dd9c83230c2a4a6324218a5f81453
SHA5126568fc258b55288f67a01bdce5cdc182e2ddbf222915feb76d45be5509152765f0dca056cfb0db065c41feb1c443006112b782f68ad51db92898b954dd73de83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5685ccdf4fb8e91c16647a37fca39fe1c
SHA1d8956a41f19a3c975fec1d27227ddf13b5533773
SHA2561dcdf8bcd9a4864267176e0426961574c4e9287f4e4f70c6c82e1a2f0c6c67b9
SHA5120b8ae8777f2d621380fac5851b8256bbf8148f14cf464ad8a265ef50a63587827c1e0746c84c5d752354fbab7c3d618f5fdaaff28db1268259303cfd8dca3007
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ab2cf9b5954df4987a60897d973a421
SHA1262d39741fd2c30446f13c3238c8c07e0ed9ee07
SHA2566a1ff23ffe9f163dee0978bb8ff50f934ad7c2da4459a5eb2a57b2817894a506
SHA5126d175428c209480dc58dedf87d91aeee22ef22d2098783086dd42a300cb65afded23a0c3f033b92400caab017bdf822740245a849e03b426393f9557372e6110
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5604dd81996ce9f81562587341b4d90cd
SHA117e6f733aabbaaa2e86e30aa00e51fd0847cc05e
SHA256fe834a27b2301e32fb6385e216eeea9b7a4d00c4cffb7390e5be758626fa6b64
SHA512547a1d5c386e648619c30c834bad67357853b94a0ddcf08e3b2c7f2bc447df4d3dedfd6b13c7abcc7a670c4c2ab11939a59905b84eabd0573388e2d7091fdc01
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b