Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15-06-2024 19:20
Static task
static1
Behavioral task
behavioral1
Sample
aff4c6140aff65840c019339e6708118_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
aff4c6140aff65840c019339e6708118_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
aff4c6140aff65840c019339e6708118_JaffaCakes118.html
-
Size
94KB
-
MD5
aff4c6140aff65840c019339e6708118
-
SHA1
49db75bd1d09803b610b34e8b47c01c91f23fe3f
-
SHA256
15b792b9a67e9315b2a46a2ebd600518edf84ea766d944413606cb42814280e2
-
SHA512
31bb27c365e3abe72668832d2e1257eaee3b2081f9fa0dd70107efdcb7560a2632f5168fef5d07c348325f0a29624ff1a2882b40d4c472a2c1323f5e8d5af78f
-
SSDEEP
1536:WMLiNfUEa7L8FLj959n45C0LfMyByUfV/Z3y4nJBdkrY8mgHC+qpEyW:WAiOL/BdkrY8mgHC+qpEyW
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{472F7C91-2B4C-11EF-92E0-EA483E0BCDAF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424641076" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a02e8f2059bfda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000eff37aa380e0d24894201d5d769a339600000000020000000000106600000001000020000000212ed50613c60156b50759517fe363863b9a22228eed8b93d79e802b16c7b09a000000000e8000000002000020000000f6ca8950f69c6cd0c421c387e9f24140a27abbe48529ae40840ccffbab57bcd920000000d3ec9bc8b032b6f071a81d756a118ee227669c1d14ad921015d172b9c92d58d1400000005d3db4f835abd6ffc6581d236fe80f29d1ce5fde2bf642e21c19c6efd7fff3144dcb6ea64f5df4ad0121bc811d78d05d0afa33088d6b29276ed584e49729318f iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1740 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1740 iexplore.exe 1740 iexplore.exe 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1740 wrote to memory of 2916 1740 iexplore.exe 28 PID 1740 wrote to memory of 2916 1740 iexplore.exe 28 PID 1740 wrote to memory of 2916 1740 iexplore.exe 28 PID 1740 wrote to memory of 2916 1740 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\aff4c6140aff65840c019339e6708118_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1740 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577ddab78b5f33942da680dc064be5896
SHA1a586966c6a25a97f05b2034b74c009e16ab30db3
SHA25631b10148b96faf488b89dba4b548917909f5f3d014460c42dc862b657af4cbab
SHA512f354a8717c802e532e5934bd883bb4100d829f54b632bce2901e5ba6efc23f9994c8337db5865f1bcaaecb916694f1c983d10cf5f038cdb839554d4a6990afb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c2225c625cd6c749b2663cb8624c04b
SHA180689d855697d107878ea5b50ccf60ec31bd28b3
SHA2562aa130b91866696e89632e0de67d4d5705021615de5bd222bc3514146ac269e5
SHA512c16ecb5ce17af13ca5907060069889108c5b0b2d5ac98f90f9e4fe761fe53f6f2fc90640707c3a06c913f291942b2d6cd5326d4823588e1b41ef1f4fed97a34b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5177e7dd313427de9334ecbf4c36b8f2d
SHA1408f9fc14c4308668443dd093fc2d8dcae6561b2
SHA256cd5cdafc534ecc2f93693e39e625b585e7552949e44a1b334c5dbd44d070c8d8
SHA512a628ed755d2e94df8eaf41179a1f71a381fbccfd3b1e636258198409b77ebcbffd5b35b72583ea507db1822cff460b644835ed2679282d106a4ee530a0aa9f35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5899c0c56b5655e59abfdaadd470ec7ff
SHA1916764bdf432294f55353e674371957f1e8d46de
SHA25679ad17fa732962b9ffdb6f7b0857d537c9b450105e2f691311ad5af0d0631e89
SHA512d0ccdb9cc826eaa871c26070e62f1ccab8933cce954fd87f2ce36b66866369e89ea79e65d2bbe3f3342ceb7e2c7a4be9f365abaf08f1ae78984d10b500661efc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52de76ae3475262312882fc4712a04b9b
SHA141bfca606b54a967e95e7696d503a27d4563dd78
SHA256ac042fe9a71d7d18391732c0db1652a26a713d93da660feec269aa6ff1a695ad
SHA51220aa56137aca97a199bf22736986f05a47022e41076e5ba1db5d7001abb8ff00bf3b5c62e8c7d0c6dd119a7376ed4b688d96fbbc1580d2802f358212b6fd1da3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec35efc19d12a8322a802ad530b158ad
SHA179a4eb5d691c5532ae6584d632d5dad7e19ef67c
SHA256f278609359c1aeb13169ad89c313dc21fde57d1246db363c51a46e1cab3c185b
SHA512859961e7491ccf3bcc32d7ab0fb62421c79c991bfdfb4d589ed5cab4d0da3cce10ed1c1a2faf217826fbcaca40dc59e2373c2a4e80c83b58a7e4d1a6d9d00703
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5188ce7586f3189699a95c961c9acdcea
SHA176afa8da4e708c4eb8f8b37f00f8eda30f2be873
SHA256dc6bff72488ac3858b89b3c8a82940cebb980961e763526a523931ea9c24c757
SHA512e4dec320604caa090fc865a952fb17b98e29f97ae095e061d071b5d8804035f9b89cebf41cae1761624ac1df138403f3807a44679819a0ff84f95e03f241dbb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffe6f5a12cb69ed2b6386dc6726077bd
SHA1ac30384f7e1df84a11dd09d0dbf3716642852232
SHA2564d4f3e8ba649ee676a2c95e607461267ba40077f0c590c669df6f1177933140c
SHA5120114f2118625aab3a3b1c979eb261e74ba30a422e722ca7891f50281cdb1d367eb6d02f64c1832bd3cd6a6e1be3f31f4cbe883e620e3341b005c526b1e7b1d2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57927993cd52d06371c4668c9c6a376b1
SHA134d04d2665feb8dfe94dcc02cf3e967b044d834b
SHA25603e5a92f30b19930a0e138b6bc7f6941f71d7ccacdef4aaeb90a3daa7335ed56
SHA51243485c81695a01b9f48d32358bcfc04db2f97c754fe12afa6edc74b19bcbdef810c7ee6efbf15bc031880373de94fc7a7040697c3726763904c4182a47a2477d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdecf3b4526c4d1251ef30828c50b99f
SHA1f0e3eb1dcdeba44efdc4fde031eb236f39c2c886
SHA2564cd3955bb073dd9bb9905bf43840798f7cc64a8ca3204223fbb1bfbf2483547b
SHA5127b9e4ecb7f05d7303754a582ede841b53ad2dcf9344e5644bfc8c1c88d5eb56fec9801a25ebac2f5c4b038189a4bd9e037149b76e6f9458de4eee23a366a16b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ffa5b61176c1e78e55713aef67c2295
SHA177b3817f68113bba4d17121408a928c564d816ec
SHA2566cfd7b251858b2ca56f111c083789b0798d5d4bb50b967cb11d4bb0e5e637a24
SHA512cb12cb21793b53f6d086fa036be07d381b703c645eddf604f708ebb59c2a35f849e5ae2256e795250e20826b280adb38fdedc543dca8eedcf5fd639f8ff89248
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bb55592fb68798694d76a1420b85b28
SHA1048d2e470e61e990bfb7b298798e5b51054b2499
SHA256a4341290a8355c1686b7012217efe97077227f691696ee7b23097ebfcc6e98f3
SHA51207e8b009e193976e649409cbc8649cc46e83b2e95996b1e9fd1a789676d3966e0aa83cdac20583c703972df2aa8be5654473114c2e4c6cc7884465400fddd1fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9a35425e35818c53ae56e4feac52724
SHA196ed4e0ef7c8f308bc49721c98bef1f2a710ec71
SHA256cf055e3405270e966eda74c781c7ac2b55cda862d1cc0c358f7ba602b4a408f4
SHA51232fdfa0e4a7d43230ed614b20899f0898a15ae7b5ae61930b3d9594579f86ed819488e7c05cb48f1dbdded3cfd0acc71f91bc94683658a717f741bc740956496
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e962fd630d72cdaa8e2ecf6e5c3a82d3
SHA1e463923e0b259a28198bf140b3fe524af01bf787
SHA256013635f0f2f75bc7b2718e253ea344dc950aa29f3d3d68f7e5cb63f37d595794
SHA5126ae8377d498bbd20dd2156025b7cc2da2ebba3196f90d3fc3ac1b7377028d8a673b09fca40730f64762b861042f74f6d33f8fb59f92cdefe188540887cca28cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5163fc856285ac0087862942e41afab0f
SHA1ed24b9d5590ce2ac9d527095d416e458dc87abf5
SHA25660c73a7d6a9797f413f085251272ff8114153a111de34bf792f4a2d3137de500
SHA512587ead76ef6cbb7589c2812115d47432992f81e1fdfda1550c0bc7645905227ae7c1f68ee160f829dcf9514434e34a809b1b19df34c5a687c8c69203f26b559f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9324bbb6bad9beb21a50f5faf065e0e
SHA1d387ab00b2980777dd107cf907978d5f1d5cd4af
SHA256364d8eea1e810ea41139fa0432f1512bf9c2042ea9adc517cc595cad40823bfc
SHA51279abdc3703adfced3f6844525a280e986bd09f62bddfb8a02e3637d90080a3dd46901b307ec336e44a62dbef1c2e606b964491293c3ab83fa80219076cf7d8e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504842df68f20e08832fee745a63fd1a0
SHA1b72f25869ce06a4047e848f32e2f16d212acba37
SHA256aacdcf5eecdff83ecbf75f069226c288b16b9e5f489d682dd514e383942da385
SHA512bf655b88148e3446386473b5f204ec8a5d737cb9b6276714605b4a0691f4d9866296a9a422f490084322b81bdd34656b3fc8f3f8fd3ebea55908b2b07bc669fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50479b118a363241ab21ab2ff46ca4544
SHA1f35a41647fdd62cc4f975ec457ca1a90ee01ea36
SHA2568ac26b22b01f772cd637fe481cf3b73b6d1a7a451e9612340873d4785831081a
SHA5120e402b111eb83175d3c2dd411ebfaccf42976d8100cbe40c8bbf92eee33708a807fc08629514d4289d4d225011f59b20e28fe9b010819e4dfee3054eebabd384
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EDQW9R5V\jquery-migrate.min[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b