Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
16/06/2024, 09:23
Static task
static1
Behavioral task
behavioral1
Sample
b2c4f3a2405cd5025566a73df0c7b62c_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b2c4f3a2405cd5025566a73df0c7b62c_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b2c4f3a2405cd5025566a73df0c7b62c_JaffaCakes118.html
-
Size
28KB
-
MD5
b2c4f3a2405cd5025566a73df0c7b62c
-
SHA1
fecae044dd870bd6af8a0f21064b1e1682bb6569
-
SHA256
bb5c4ac310d5462e082ac336ae63998a78369cad87422fedb247e332675e51a7
-
SHA512
79f0586773076675325c2b10037aecb4027bcaa16d94ab103bde431644157d549534996ace18e9350698ce5c686623760ef0e4073960221993efd13c4f096497
-
SSDEEP
768:m2h1QuVEBdlGDlJsZIaCYMKFLLOat/qXMA9:NauodgoIaCYpFLya0ME
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424691701" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80e165facebfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2600C081-2BC2-11EF-BF32-6ACBDECABE1A} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a03905000000000200000000001066000000010000200000008a1b03cbfe6e9c2fb4a22e1f9d67c08be0c17e2cd7121a89144545170abc0afa000000000e80000000020000200000008085f754279e6042c39f00c2f7991069e52bdf2aa79a15ca063c5db42eb60ee9200000004546b3f67e813d6338d8d3ec1bddd0627ef02ea956c917e200f98282868d7a23400000004d4d5decf5df57a5e0bb583a993c1c1365c92bed6424b00da61a5b63d30d269205c51e8dd0038c2c5b5ab8bec5acf3396199d5b9cc88b57aaab16bd16f21bcbc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1216 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1216 iexplore.exe 1216 iexplore.exe 2240 IEXPLORE.EXE 2240 IEXPLORE.EXE 2240 IEXPLORE.EXE 2240 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1216 wrote to memory of 2240 1216 iexplore.exe 28 PID 1216 wrote to memory of 2240 1216 iexplore.exe 28 PID 1216 wrote to memory of 2240 1216 iexplore.exe 28 PID 1216 wrote to memory of 2240 1216 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b2c4f3a2405cd5025566a73df0c7b62c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1216 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2240
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572cce9b3d795f17ac9bfc9279252aa33
SHA1c1eafa89c0fa1d4a5b9235b05060758b7d46b553
SHA25696d34edf47ea307d7177164fe53a8c899963079b2e5a3c274dd087555a426f2d
SHA512a91166113ed2a65d58e38a6057aa4881a47cf3d25770166eee55f5b650e9bc6401d37ad428cde6c4cb3471a85ab6b7f9eeb06982b3b9d47345b93e4e422b2017
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb78085400029a079e7fdcbf074df9db
SHA155d4d8e1e306d2cc64d210da8cb652ebb942a7d1
SHA2561c12196d3c81e0e01aaf24eca2e91aa70a2078d474085de0529c6a2dd1b38081
SHA5126a86a1b84ba8481b6704849485e589540180a4cd45dcfb4f53df6286fcd117f4c44a01a3d7378b3192e645e2b62e99cbf1a4124880564e951a89c38a7e6567b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b0c9894ec4947cfa69085a0b9ca98b7
SHA14cd202f87f4882834db7a16e903fe67c420250da
SHA25624c1ed9e11cf5df436a040377f2696d8e763750c05bb72b8927748157df466f2
SHA5126e9c4c9f54ab1ec9d79d73e31d1f5a8ea6fd511c0d44e3fa24933fec495b743d70005b3aa02a1e2f7813296b101e5bd89c6acb6ca4720a75e93fa2e7e60958ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bf6a12f10175646d2eaa3584ed00a41
SHA1742961c6202d447ddc46c864caeeb0635b0d1937
SHA256bc6fbc6b4ad54ef2f60da9ccb688891de11cc901dd5e77e0f14b67f988835c30
SHA512693307f922deceba382dec15e0fdda0696e78703b4e190205dc7f123cfab61e13b4db70a65339b63eec0a8a774df8c8b237dea742bdc0253ec86a7941df00a79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff157037a119d5b2a9e8ae835fcdd3a3
SHA18e83106db6bd91ebad50e0b58adb9417aba0740c
SHA256161ffe7ca7e0110de9e0e87a40d66f32b2fe651c04843eb4d94cce3ee15f9f7e
SHA51297f109ceb3b18b3bc217422011eef9c45b8992e72b3223b955ffe9360f4ea0e7bff2e122d3686ee494b2ff5f43b2289794fe216780c1d73d55cb87cef20951ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c11761bdabb1ec117ee023326329fd8
SHA12b267246b4a2aaa0cd71d41b5bbdb518fc481ce6
SHA256dcdf717aea32a09ec9723f456de4857b9ace009020fc49911bc4e8df692c9383
SHA512aafed223e0fd56b885c803cd370d8d2558d77a538ed6475cced5576b25057577713c6eae4b545b5a9f8bb25c4bcfe90bf5ba8368a16798c439e1ebb942f3346f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af504aaa35f73289115ad8fa6789fd0e
SHA107d5e7c4357f8e7504a8948144dd16342a70858b
SHA2569f88dbfc809a0127c3ee0aa23d5ff7ba1bececaebdf9371a64db2b703bda1a80
SHA5120808df216947b2a1b66cac4354622e7fb9f6a49338150b60470b303e2b4fb0bc002825f0a459d3a34cb6915a9185d782d8fb401702e12149fe26df16a351a504
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510df2ae7745887c8fee6bcd7998f2760
SHA1fe1e6e99481a2ddcd290f45ab5213380b15288da
SHA25630e808702e7136c495af8cb24eb9995d3777b7fe00968e90a00311a903395fdb
SHA512a51a8eba7f608aa7cee6c74935a80b1a0ac194fbd483eb058b588ec5d06f71bc2d685673aee27b9e94dc6d86822dfa32122e781a692512550b69097b841b87fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd621f560894b226f8ab4098663d37cf
SHA10dd321e60cadb344d624319c5e6fc54dce89f78f
SHA2560701fd5a8da5cd0b98332cc32dcd3305b4833ca184799209f4c94471ed4b14c5
SHA5128611a438e9fd58e86b00dd9fc59238185bbc19b1b3afdcb55122d7e6179d8f6cb705b9e67bfa69718691fb1887e49214d1fefd0c96ff52a3ee34cc5e60857bac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586d621913954a4b84135f97e0925a882
SHA1bf6d08f3b3cae3d18c531555aaaf38b00b16cf43
SHA256d62632a539601b0503b373bdcff15c199228885a861cc46ef1277ff46c581f24
SHA5121bfb698a7d2a18405fcf0e23e9990f735037e44806b282fbdfce16719ee163e659937cbd7a7a20cd0dcc9410dc28f8c36d6363b5a3434dc8a817dfa1c63aa8a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d551717ad7fdb8c6851fc27eddd9c735
SHA1e8c595701e1371c7006e00bae2dc3d7d0dff580f
SHA2567c1407136154bbdacdf995ad3d19b18331256913ff055f4ebe10e61d18a64fb1
SHA5121b12e8eab32d564478f3203121f6e069a4eaf179a1335fa66bdbee32b2ece45f1fe0bf096c08b12ca6cf702407b3b92e027359723204b8b843f03099d5d3d7b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562edccae496c4fca697437a2ebfdaf77
SHA151ba09a46c5f7cf9a8a5e611770e095afaca3d53
SHA25667457fbcfcbb44e55cc4b6a34c61bf12d8efd2d64c2c8a8421420f9182040110
SHA51288eebd3b429b0dd29c00740ae413e3cef623d2deedbf57433f8168141e57a2578d7660062a8be921aef0dad90fb8521c2f080a4700fc2009fad6583deff2eb78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507062560558038044ee9149ede9bf18e
SHA1a07db788c6b3baa7eccf89a5b52b71fed91c40fb
SHA2562dd46bf9ec744ddfd6bd9f1c3c53f15a2f62d9f1659798af5146d93210d0fe6a
SHA51289ee9a0c8a3b97c3ef83b4941ae47d0acc89348dd4aa4ccbd8356d8d13d144d1c014b18b2abbb4d63272dc6e24f3bc7a7260c3aa71f39b8f70715080e21381bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5133bf70a2719a3176aa53e6d22853167
SHA18a33b6b40c8c6b4b9ab10533f8af960667a5394c
SHA256dac7b089da9e480f638e40198a6f77094055dc0b59c6fe325c2adcda4b84ae14
SHA5127ea79fe7e5f3417846998ddf13e984d9c94977b7b79c7de77ade2ef9ae49084c7dc08f9ad49b8f32aa3e24b9980df218fac6a3cae3745d915943ed8be21d46db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509dec351e335dfd6cf0dd4fb1c234fc8
SHA1189c716062f88447401cb73dc0d506fe4bf92b0f
SHA25681c1ac94381e745b6b9fdf39083637183c78d0936f8ccaf91bec2a5204c707ee
SHA5126ca4ce7e2b264c6c5063da421cb7ea4c1b396496f0042af42deffb3b19db1f0c34215a6aa371f139fc2f5b02b78c175f86665f8e3d4c945e6675bc84d747f8af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d1fcd66a5af19db2d2c2eb8ed23972e
SHA1b0ee92dfe25b09a17e53e4aac5967a5006925922
SHA256edb4ecbbafd66d047757dffe96cdc9128500a5b5e2094f178b11411df2a422b5
SHA512629c19ef89ec7ca8a8dbec0280bafb519231ea4ad04c2b97aa28ce749acb02eb61eb575c38413c2126af9646ef7161e7edaa4d292c8c00beb098be66214e5ad2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b46778518043ff9241dfc12366b1e41a
SHA12f0033c02d5f5180443505f9ee8e24661b3f7fb6
SHA256e919d4c4f5abeff63f413c9037137d32afb30a4ae0605b47365c455427b724be
SHA512cb8d56288ac05ba33efc2357433651247cfc4083327bce892e1ea2edd2f46f0bdcdb852c7d9e117d1f7b874a8453f6e9e3122e127531ffa9d32f5e1dae8dd9f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea548a9c824bbacfb60a7d8baa9cce21
SHA1e6e3032b461d215b68e4e89b8e6bee152e9d07a6
SHA256abdfc4c6699bd4a6b9a8527b71ad240460da1fdcd2c08be46ad0bb4d2feefed2
SHA5127d22f4693b08833b46b3dc39f1556491d191b2e49a0569d7d5f5232861b55995ec6aa8ace1f073a13dc92d40094e75d3b6415abac2d2aa23d22898d54c66434c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6cd5202d9a600c0317b40fae3b50c93
SHA10c16ee28a35832e9c5ca92ac9de171ca08549e9f
SHA256f1c52266e975445ee3fa8a786a751f6f16c2a20f75e35b0d034c71a00797f25a
SHA512e3bdc4cbc3f372080e680239ad078261bc14f93fa6d31264d91e9c8814c50c249593c4afc451c6dded4a15676beac6787cd228c29f6146586ec6f32b6e9a77f9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b