Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
16/06/2024, 04:58
Static task
static1
Behavioral task
behavioral1
Sample
b1d353abad5ed22267c90d79e2049dbf_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b1d353abad5ed22267c90d79e2049dbf_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b1d353abad5ed22267c90d79e2049dbf_JaffaCakes118.html
-
Size
11KB
-
MD5
b1d353abad5ed22267c90d79e2049dbf
-
SHA1
7e51075fcbc740c79d04c3ac14cd9192287ee049
-
SHA256
169a95d83370b7905c06b96ef3c08ef1c10879ad6dcb383185e9c4b251e49e2e
-
SHA512
b3168d7b23f8f98d482d21c8d9e3c6666a57247bfb485e0635e0a185566fb8c2d45367871183f51d9055029d2c07d57b0ab255e66944502f3234f052700b1880
-
SSDEEP
192:/FCu30BtLWS0H7XUINMcSeNUcj26/mDV2GWGXGOvOVXU:NDgCS0HYnqp/WnXn
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0651be4a9bfda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424675771" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000596b5027251d13469702c604d5856685000000000200000000001066000000010000200000008ef5cae79a673e737ac5d51c27a14b0ab789faa15f9cee5d043aeeb233e1fdf8000000000e8000000002000020000000747407d5bf26982d6e1b0ca3ac580c42fb1d76a546494e273c01edb7bf6f088020000000c1e9c784b99f87c834989803f4fd988966fdd18c57c8af42f93653b41f8964ed40000000dd8545d66dc90b02f871a92ee2a92a430366dd0758fdfa4b9ea475e16cc9cb81003360c956d5968f5b07c32882ed4df4b6cb4f32c268f7d1637702b7bd8ad80f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0F962A31-2B9D-11EF-8F92-565622222C98} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2860 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2860 iexplore.exe 2860 iexplore.exe 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2860 wrote to memory of 2956 2860 iexplore.exe 28 PID 2860 wrote to memory of 2956 2860 iexplore.exe 28 PID 2860 wrote to memory of 2956 2860 iexplore.exe 28 PID 2860 wrote to memory of 2956 2860 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b1d353abad5ed22267c90d79e2049dbf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52537d8a8ab05bf5998054bce0cb1da7a
SHA1214e2510fa8783a093d56b56aa22c0327d4b02ad
SHA25622ea15387d96c4bd3f484f23e5668534081bdfb745e36066c51e7c45e985dec8
SHA5121418b6421f6efee22fa3050d496f87935ef4bf4c16381089fd37f6689e1225f57bf3bf6303800cdd7933ea646cd9ffb52514f1fb2a93e63565c03d86ad69b2f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbb8aa3ffbeccc064fe58d030e02b8be
SHA19190539cfc4f65411b85cdf1c0cd728a4eb4f15d
SHA2566b00efb4a3e8b2e11c4fe33e312e1a7c8a38d7358ae866b4d8fc5548dc5890e0
SHA51250498ce476d26d29cb05ca150938c0b2024fea26dc8888b1c147caa16051ffdb0072028134849c4bd737b3a6e3b3487dca1619ecfb7191106f47cf09869ed9df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5389d7b3d1faa4d3ffd6e1d8149c258c8
SHA1afc477767dcbf19374befc82ff095fcd42541761
SHA256d522da8f97810513ea668551aa24729a2d692f0fb4fde9ce9497330759b098ec
SHA512ecfef26f5fe578d161f32d7d189907c28f93956f81a9a4ee93ff87b8f2903c46dadbfed542fbbda79f2b4e436c49f8e83c2eecc0deaee8a9a54f7fc3e46b8916
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57da6140745752db5c53fb98826183f7a
SHA17fdbe2b9c3c0d573121470e35cdf6012e8468372
SHA256f0654ea67469acba369c46c96a3030f374632b1347d863a2cf0c0c237b3b4a8d
SHA51208e4c2ace538f214af2ec9693dc1aeabd6e1abf15c6f00b90fd577d173b34b273c02d174a1e17daaac2b38821c031000df24f18f9599a5f77e713ce4f7db08ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d19f75ecbe271e81fda0ac2ac79a9202
SHA13afdd9c97aa1c2c6dbb452608de837f7d722b90a
SHA256cd748d8ca8b256cfd3a8d937a0a200a76efe0383810bddefbb77ccd818fa0305
SHA51290740e960874755dbe61d5b5da22e89a2273c220edf11aaa1c5aeb83d5a0b2ecd6e15daa5a1d47e39777be6b35355ced289f201b1a5887a33655c1c05898dd3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2edfe618758e01f365b96cd4dc51dde
SHA158faf10752ef31e638e4772f07c9f92ee04d76ea
SHA256b62c9bd0e52d12be220b8db10abbea63994ae545454f87d33bfeb6054f7589ec
SHA5122f1f4eae61892c804059a1ac4d6e763ae26d0e87934d1ae0ed081f928ce0d71440cf8b6dbd92a4796b4459447ddacb432a83d0bf61ccfdee8d265f3300b8aa23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3b29c65a565d2e76a4a41ed32964f69
SHA1dd71f312a990f5a5814395dc4e448782a2f23597
SHA256ab0f78ef20364e767de6a6413f9646a927bf982964d4bc201914672ea06b2291
SHA512b6f7aaa4d6c0097137b7e7a077fc3e21d19275ff7a7a0828f8f2a3340ce44f60d4d3a9f3c9989cd252cc03810d647dd47c798751ea184ee88a28803a4d6a5091
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee1ebf2793c0a44aa946c31f55bb36f2
SHA1983e95d9017a5b58dfe650ff5f5dcb2d08980b37
SHA256deecd14f782046598467ed5f499fd8d51024c46a3194c8ac60131c3f7d4956e9
SHA512441cd33dd4a6b9b73dd4b4938bd19a7d3c9064228c64be9f3e4a4c94c161ed96ba1b780afe68c158a1bd62e47752fe96dd910e8c2a055508094c1922a7a18899
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5085d2c2d297162b74be8143c027c8a88
SHA1114cf3cbcff4f7525d013af251ebbb883ac51073
SHA256603ec94d9b05d4954c8e96b7a70ef79b71f38381003fba80ae147fec620d361c
SHA512507615c4cf836c9a29f74023d338d368961db176c29873c92412fb1564d3a3032f98e01de0d4c899c4a7cf13780abab1031429a1265f2522c2e568c41387f4ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539f45de5c17f9c9ceb416a30ac090f10
SHA1e3ef37c8e275bcf2140ce0e3c60ac4651a717a39
SHA256631b66e6db7ba754c034367d50e1035424c930efc165cbd365b07861d4ca1a4a
SHA5129cccb628f53993ea463507a862e1af0910422895009f07654ebd46c71cffd2e6a397086d0aef02dbc652587ac88a177f0fa79ebdd77afd0a695e23ef118dec2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a7cbccfd0e0c6b01f50d5359d78d6fe
SHA1bd002078b7b70047b7e3d3e3f89e87f3792437e3
SHA2561984c86edca7c37c77686037eb1e1bb0e21721638c4581ce6b27eab1b864be29
SHA5120d94f62a2b613f6598aa6cb4dea40fe31ec7d09b24535f4adafca46138aeb347308aa63225da7dbc7a8568a6063c22924a0a7bf15bf1c234307dfb43ce7af85b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563b62bfbfd2dc289bbc0198dca18c739
SHA11ce713bdbda2b077d18daaface72988b149f4831
SHA2567e0db61360d0ffe572131d941571a26aebfb62ad01ed0c562c48645cead21cff
SHA51280092a7d4ae68774f0b56521b23e8bd9706d7b7205269137cdaccc13aeb745f6767b175d1768f736e4dc4bef2db92a378a88dd758c69127d6dd5a90960a58e1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cad95598c99b13f5498d37820bb0cd3
SHA10885c14dc3a29a08b246f52fe4324675109ca80b
SHA256b575d5be5bcdfd935a2dbba96becb891e2e0bbce78d506e099545b27bdda8408
SHA51298068d973ffe48e8505a77ef0db364999755d41d56bf704538196d0a6a3f8e8ba3ac0f07fa70baeb2bc64b534ecb4fbf0950e034f4f0e6a7ea5649922b80c076
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3dc8c3593ff16def8cc9dfe0c06ecaa
SHA1b8f8726b3c101a360247c475a16128cdc5f0ba3a
SHA256aeba001087eb8b6a17696f2aa2b96858904882fd8d3fd721f8f95ee22cd0dbf5
SHA512ea5bb642491c5f61295bb8a8fbb636a68c6652b1d3a1fe86cc063926b3ece6a1b1fd1b86e22273511d63d5ec55cb2e085b6c4bad3f9fb184c44684962383b4d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505008de884c2c8a377d96e998b0fb53f
SHA1661e6934b950e83890677c2f4005270035f1c7af
SHA2562107926a0879e176ab89e25ae0fcfdf2469ecfd5f22829d0e1e0f257faaa6572
SHA512166b54b21723daea8d5de7f0bb1d9bf4981fb496489d39175302bf5d7aa6e8ae5ec72e7da45b8d7df5a0453e8cfe5cec9724064a88d865bcb75acc5526e028bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53372241fe2fe43bccbfc78ebb6653a22
SHA121624f50234980e79ec52c42d7fd313aa60c2de6
SHA2566da7df43e926bdedbead023aac3772d00ad7eb0916450f5e70ead886f6103e75
SHA512d7900f2493c81083e35764c6426cefeff1bc86b92f5f8dcb73956dde5cc6574c13f158149828a5ac5a1a8798f0e71cdf078632bfda31d8e4c05240a31645a2fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1f32d676bc54878a0995924ef7a13dc
SHA134e018cbb4f480cc04ef2a979e347410506fff45
SHA256e1017ecdcc1363de4fc6ffb2d11e8776d9b140eca8c0a31b54f69fe155a51675
SHA512dcca09b067503a161d4a323aea80f1e70cf9d203ea743ffc2e3f2574dbfdb499f1e1766c570893dd25894b8b62bd5ed6d32fdccff5c186c47078cf0e424d2bb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5681b474e725e3a3f2de9ae431c7422
SHA1bb6c569192cc2fa77a79119e01c229f9cc1f4186
SHA256fe82f774661d767d70b7b152d2ce9d428cfd3fc91c7706985eea715c5554bba8
SHA51205b379f0da930cc638416ea744c693bcf2ed69c5bc20d3481ecb5faf1ef26f9b52a23abd099dafd049031c5a861f5e5efc1595264341eefda2b93f14d4ab6bd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0396020b45c284bec699ac9009420df
SHA1b2ce7560272e6f92091a7896ff33c1ec7c95ec6c
SHA25632271119b172548a445fb7399e151d4cc1d2d1805dcf5451ae343f050d3f9f0d
SHA512cb18bda3e5ca14bc35e529578eeceadfb9929d87ac6338c78d3c01bc4fdee19b781e458fb299683631e6caf7fd8512dfdd249dd4f1b1879ccd3275087230c4ba
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b