Analysis
-
max time kernel
134s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/06/2024, 14:27
Static task
static1
Behavioral task
behavioral1
Sample
aedb52eb874e3f7c470ef0b48825d05f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
aedb52eb874e3f7c470ef0b48825d05f_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
aedb52eb874e3f7c470ef0b48825d05f_JaffaCakes118.html
-
Size
35KB
-
MD5
aedb52eb874e3f7c470ef0b48825d05f
-
SHA1
01eb864a8b670de4d68e29151b4302be6209efbc
-
SHA256
6201e7205000f82265769a4f80faa2613112c2f452448181657d9dbfec329bd9
-
SHA512
9c64936e24f25b8d768a2808317c71b24ca4a4819ea41d231b6a2eaefb1f9ecb3b77cb7f17a0e005ac3663ac1485a2beca7e1bb64a4fcef0ebbd81a60cc88051
-
SSDEEP
384:Zf7tDLJx0/e2McFvkXn/2dqw3uR2M8v1J4Tb5bgZjI1No+G3HG:Zh02jcFvwniI/drNoNXG
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{72EBD2D1-2B23-11EF-87AA-FA8378BF1C4A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000235dbf2f1f33a345942c292283ad7c6d0000000002000000000010660000000100002000000070f3e9665f3a4764c4f0c38588d429e9ff966739375a7a5cf4ff5699de394963000000000e80000000020000200000003d49185b438fe1a0f8de11904021b122682dc8a5631f229b6fcbcaefaa8810db20000000de0063341ff44f438defb67c942e7610c443244937c3a1a346cdb784c2ec07bc400000005c4fea6347f5fb5a0ce1a319b8ee8ba358c2a98ec59b23b71f500da7d3188a1462c383c308597f404c7f7aaba7daeba2fe676f2a902f74044c4412bc025c2f4e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424623540" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30189a6a30bfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1688 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1688 iexplore.exe 1688 iexplore.exe 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2660 1688 iexplore.exe 28 PID 1688 wrote to memory of 2660 1688 iexplore.exe 28 PID 1688 wrote to memory of 2660 1688 iexplore.exe 28 PID 1688 wrote to memory of 2660 1688 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\aedb52eb874e3f7c470ef0b48825d05f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1688 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51010ba010693d034a70359e12d2e471c
SHA19af32891319a910ec50dc35bb1996c10ae12e5e1
SHA25637671fb106ef96d9c9937e7d7b7376065adb283c738dfa019b8469a992738155
SHA51276df28283c3b5aae0cfdc4ed2b60d3e49f26568c04611c676f3394f92df490a03edb2dcd395a25d05c98795bc9e63bcb9423b8a013ba476e2be015b9f071dc1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e90568f54a7d57fc6ce6782ecc1fa435
SHA15539b0297f0173a8eb1ed3b86cf84564970b666c
SHA256f878c51dc0cef6580959a779d533358f4358cf19a170629348d76dc5a2ac32cf
SHA5126c7031c6c07e65a730dccf86fc7601d1398b6cde96a7dfbd539e35e5ed5f4ec80e672d667d27af26105da80e18c38cbcad55df7b4f4f9d4394b97034e5b3de9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559e94bfa7bf627dd19fb702d96f9753c
SHA152a460bbdb44002fec4bc6eaef071d998b23a601
SHA2566f0b219fed5f1c4a1d2e18092add97c88185456df3ec4ff963388deef28fef6f
SHA51233d54f58724c2b6beaf87c5f52ca67aace8d4dca83e03fd5418f45aff0737277c01125f855005b8aaa21a91b7a9e17399efb1baf3b117f845b4170c85855d1d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5c52d815fb626a7b237b0b59334d9db
SHA11f2054e3451a23853a6db069c1cbacfc178a0154
SHA256e607cf89faea3d3abc0d00e0e7b4365c44c3be4626b7537e92c1402806817b14
SHA512f187484e1d4652bc2aedd13635f79eaded644383eacb8c8e9560b3c2bbbf3326b2f56a8ee3148927830bfb80537d3a73bc519b67f9c85aaa4f53435bbf3409e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfe6ba569ab2e1f1d0791b3c10e7bdc9
SHA12b35d9853dd34643b735c575588ac1ac91872b0e
SHA256a67414472d193d6e2a0a349650d62071532a2d55da2ab3e5421508537b7331e5
SHA512ab9caadcaafd982bcbd1b530d3eb585a945f2e1eb985be0c782336d402b30e3600806e10fe9595ebee9978de8e3cf363ef1cc1ef7601b7096e6d1d23fece8c51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55110e5201ed222ca879eb457f0fc8c69
SHA1891b0557b4d8961c38857106aec24e26be8d3074
SHA256b667e8c4f5847230c83fa61977d952d8d6ea7347cee72b0d69c6158e7ba9d44c
SHA51211ecb10ae687722adc427f2290b109dbf0251aae34d575d13327a51723b6cf258d99a75b1507a55b94ebfe468dc0668e93f7b837ee24eeefcbe37847db50affb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55387b9d91a07ef07c06cedd018ac31ef
SHA1371a552f42865b0d767a07300b2be22f76f13540
SHA256fefe7fdb5ba9e8879a3fee421d3a27e13025a873c463a629ac644531d774626e
SHA5126629a72202e447733947251f13b2b9c2c88314cd7c9dc10b78dd94e6341f19037b59a7e8975f69ae725e87e568ffca07ce1ce17d26a35c38449530345b19f2af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5164821929a0a2d01bce2a35f25289d64
SHA13e810c05d03bc93e91b204c0126eaa8b911ca65d
SHA2569090d78852e843f4c2e8dfe836258349f2e8c99453721a730c8e165a6dd0c074
SHA512a69b973484bd48505b54d4c0d71aaa548a75f11c564c7486640ea58d8087d5ee55c375c168bfb416877968ccc98099d14feb19c429d2277452301330d3371992
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa1057ba50ec0b3bd0ea50f98131781e
SHA1f1a5e46b861446e42c6654b21f7ded1b9a827cb7
SHA256fc6a233c9fd897432b99ebaa71daa6c7f1e8063f0d766314685ff680b024fbfa
SHA512b8cccb375728dd977d22bd585321914c835b4b9833d3aab3df682ac78ae5270e6b080ab3b5f755f2ee98d829cba98c4a6a7b8d059b5df5fa20cb907b65c20c26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e33235062e336913e11d40502575af51
SHA1f7978376c387cd7164aed92ce7b14ea584ad00dc
SHA256bc5516ccc71268405676fcb13629259697f182e6dd6d67090a2943389908f694
SHA5125a4d8073736f0869ac0b7757982e6e68b347138df07d5afd44aa52856364d5cb06dd646e950d006a86c1526fb5156a78a069db211c6005fbd376825902c4f9ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2b18a6a3e42e83e26ed042cf3a26b61
SHA16b79e656aa773162c8483e247df37edca6f4dd86
SHA256d292b5ecca167b742892ffdf7880424ba6ac9f744b60c3c550b3fa1a7986606c
SHA512cdd7eb7875de9d761ba40f14546d6c8ac00329bea372318baedd52cbaba050b3e5d9cb0bfc09b3455dd9deb6fb5c660ecc8ee300297362e852644bc859171081
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f02cbeb4eedb5ab72e68c2d1d7f56a88
SHA11bb1e935183a0f03330d3fbc61b389c6e9807cc4
SHA2560fd210c7246b93f5f41691ae5ce82240f672078184bceebff48fdab269e4aac2
SHA5127e2cf05be3939cc0fda5d8af2d2b2372c7d6b99ac42c8681113a65eb6f7d732e7cf2e4e422dc2ff8992bdce693b96f8afe4621537245cbd22afbecb540445f9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f366aab0bc88c011720fac131fab20b
SHA134ffaefbcca8911619546e8403fadf99d1496583
SHA256c1294f543c827cf6ea0a5c91b0286c1e9c1ceec37835714a1a12123988f7ff31
SHA5123a75c16d8f3a133ae3cac4ad2c091b5b55478c22cd13ceef070197fad7f814b3e1266637242ffb6e3d39af8c2d31a40de86c3d87f72e684bd937ef8a085bc9df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fa09b026574257f34203659de1b503b
SHA19bb02cbea66dd30ab22e8b8b3f7ff2dcf9b36b1a
SHA2569d4032d23a3e2f35b1d725aa3252182aa057ee7eb5308cc87d8d3dc4acf749ca
SHA51221f6f5a71df94615876b01b4876e9d4458cc8aa2aaaad0672feb3fef30ef5e573384c6ba3571810aec59ec0aa2822014d6c64bef865d027a344deaa3caec9bb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5482d55c0d5288f46b874877e679961d6
SHA11877a518e422d978851f44b77c4bf6404cda3f4c
SHA2568c2ca8ddc57d80c57190c1f86a8702807bf112086032ef9a53bfd574eb951590
SHA512758537113399ace3d6e8c1bae6f8b66663364bbd57f4a4520f5ca4c360bc1a61401f9bfff618f0e914e656642a9077b0ad45ccbdc41f03262c0f34ff02dfdd87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c6b4774526f0ad3f4bf356983849097
SHA183e4e73dbf36c19d5455a9e43ec0b3fe41227f46
SHA256591e67faf489d93cc7b610070d097970fc8a53aabe41ddcee0b10f17fb20bda9
SHA512709eff145435a25153c8ec44ac2491cf311e8c1babcb92d740a41d497623434d48eb5eab152e9daad5fcfab2f03f7b6b7a00b56afbe1882978a5435d869f35fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c90f16e1cdb3aae21594ed94239e821
SHA1c8c98294711c8a52f96d6810426f55cea912939c
SHA256cfd3c7e5f7b4a06555a5c9daa7750332329e78254841e2c1d24994f46e9180f8
SHA5125eda38f9d74806f061dd99c9d6852943155af13126a5a0f2e98aad2feb825cb2bdce928f9226b96cb10306fe3ee6d8c6d619b83f97e4ac10e1f11f7878479128
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5230c2537e92eef7b9b4de4c87096dbcd
SHA1f38b6eaef005eec327ee5771f4a5fecba96643ea
SHA25624ae92a0df25b319d832c9793b706980687cb9acdb749eb37359bebbf51a827f
SHA512f5bc3b13f13831d5f4d950b31926caad9a492ea76c7c07f0d6b7a76ef80727983bcf40c1d80c2c006569060f4e0a6d996b3b37dbcfc909e5273ae9484523372e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de23a7bccffd24c79c9af820110e08c4
SHA1d2f9ecc9ed765e4b8d1e887588de215760cbb3a8
SHA25644ee6e445e5cea691e9aa43e90a212430ebd88bff075a5139fc2feff83450dd8
SHA512377a44ac05e5fafeb015139836b3d3798f362a7a4395660b6411cb6491c41a82bd249f63a3605edeba7cc444162b55c6be8be03a9226528ea5f16519857815a7
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b