Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
16/06/2024, 20:42
Static task
static1
Behavioral task
behavioral1
Sample
b51bac7a37416bab6dd576a03fa345a0_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b51bac7a37416bab6dd576a03fa345a0_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
b51bac7a37416bab6dd576a03fa345a0_JaffaCakes118.html
-
Size
8KB
-
MD5
b51bac7a37416bab6dd576a03fa345a0
-
SHA1
bd4e664a18a5887fd46d0f3c880a2f3fbce28d4d
-
SHA256
0409ea07491467450dd92b491ba5602ace93692d49d57bf6edfd9a3b32c659f0
-
SHA512
00c2c8815c36b87e5b93e78475f24949a477920dddc44b05863154189e893ab3f72ad1f8e47c01c0c2d914d31691f4ff05d3280721fbd7366499a20f0fac9ace
-
SSDEEP
192:LRaV+K5lJqpq/UNlHzyE/GR49G2KBj07L+2mqIuQp:LR4VkE/UNlTxuKyBj07ppQp
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424732409" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000aadfd100cd094249b26515cc84a7f5eb0000000002000000000010660000000100002000000064664b1021ca8b6d32dc9cd94ee2bfa12ba5cd4365a04443885d49e6708def01000000000e8000000002000020000000495bfb719c1c23e05bd79088867b31511f4a93f56c6b3c3a0c53ea85bf29be9420000000d9ff7ed66a836f568b56cdbad0b2790618ac1d8eea5cf821ac97342dd10cc771400000001498f8ad97466e870b5c76f886b28edfdc66294d48bbc5f75bcfccbeb7ea2c7c142ae3eb63656d58947cb3044b4e3135f24c681f70562e55222c068d3b1cc7df iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EDDBD731-2C20-11EF-8A04-E6AC171B5DA5} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 800075c22dc0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2008 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2008 iexplore.exe 2008 iexplore.exe 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2008 wrote to memory of 2104 2008 iexplore.exe 28 PID 2008 wrote to memory of 2104 2008 iexplore.exe 28 PID 2008 wrote to memory of 2104 2008 iexplore.exe 28 PID 2008 wrote to memory of 2104 2008 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b51bac7a37416bab6dd576a03fa345a0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2008 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d46bd7f151f645aa2d5543560c4d099c
SHA1ea74b1c22652c9fc06df1a4be8853c8558304cb5
SHA256c5c3db97465291b3993107d2b87a79487419cfb437c3c50f9176ffb655dd5f69
SHA51260a92b64f9ccc3d55b0934b164f212f2445fde6bf91f3b0d269fd1a855f5faf1d14229debc7d480a5690dc43e9099b14108793bd83bc61130c19511da7998314
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51533e2fd9834998af64ff460fe465773
SHA1b0728628651e404a9be54e786ae6dcb86d3f60c5
SHA256ce0e3895169cb37b35e4284f30de67314d26ac6e55620c789cc0bacddb0b2eab
SHA5124cbfcb6a9f431cb87adbacc79a7af3592b68d2fca708300ede499a045adabdc68eeb1119b318f58cb21743e599c8a7842bf306323fc811dfe36faa17b332b8de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50accbf15e6d67cec78e8900d55a3d4ff
SHA1e2cb06ff6f2ea1cadf348b4a533e70c7f350b8bc
SHA2561923f661765bece67ae1f7516059341254dd5c198bb0e899f115a9a226f28adf
SHA512eaf83f9a79f9353190b404c9064d47d9a98392fee87273d2141c9997ab5ef7ff9726f164d73f9fe5ce90ac13d0b02c3a12c12db93807c46a5beb79712ff59399
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff192fc0e62d128684fb2abee0924bcf
SHA1a9689e69af20330058fdbd861b3f5ab8de9a5fe7
SHA256a32c83a6833dc43829b3d19de82ad31f4db4e40fa9a8a1e9a52efc69a14d12c6
SHA5124629640910c3b18f9f76e2b40b0bd8714f80aa38ca9acbfbb032795536c16114eca44315c9bee3b3086650e2743907584d4fb0eac3481955aefd51f6a6374796
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6eb85bde244d68985bec2bf68e818dd
SHA1afda0b92b2ded5977aaefebd0af9832e0ea16c50
SHA256604528ce3eab093d475bb0ae69d580413520f268fb5d7293db4796e7e6f73f87
SHA5123336b2dfe919b57b0f6bd78611ef40208e5aa66bd344cca508217419540e3fe3bdd21a71e1e6c61b274a42aaa470b2c796071d3c1445d99cc6d581e63914ba82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b96d96794b0e50368e3621617cb49186
SHA19f5644a078aaf28c0c205159177ef60977912a62
SHA2560eef0a03658e5abd000010b0e7adf7b1214a309c71ded0f5179192bb86cdb8a6
SHA512c805a46eacd973765efe1b3ec2c1562bb591d80e3479333a25bd98ccb818eddcc14f527dc4078a498e5027c3b84ff7a001a253c02000d7c12edb31fa078ec388
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed37280a41ca2ec2590c38127def1a4e
SHA1fc97e771dfdf13cd4ac44c67032fc799567f04c0
SHA25605827d0816e929aa8a584bed1eaff9e69c0949af5908cb742f8d82bcb5d81860
SHA512a665484bea02a62afdb12dbe5cbafaf2669858f051529e772f92eb05e1562b9d4358a49ac6868359f39cfa980d588fa1caf0c0760d3d05fb7a4b3cdf36cda8f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0db777b8e3a2748f7a62420906ef19e
SHA1200595e996a65963a7cdb19a5a919e1953a03e01
SHA2566a555bf382cd9c17b8598ce431441fd8f64ce63207d4126d67e1c9b0d36ee449
SHA512c89860f2ae7857ecbc6fc688b2cbccfc4b75bbbe31c6ae4360ea93cca5bcccb386c7c214b79e2fd4e0663dc58b5b6cd277ef8d3907e793bb0c65b6892ee2b4e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5159deead5e1c9a6f64c5660053d23834
SHA1e949ccf8de79be7875e9eeb3dfb29836a5d1fbdc
SHA256546bc88ae4d483138f86f18f18ebe5d6abe6fc2e99bc9f8c2ebc1d4440c496ae
SHA51295984f6d30454374a27b9e98b41584d64813215c76be94e4ce443e81053d109894bab366b163743a55873c679ec948d5c03799416a2fae8ac079ee6c0036334b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bd6805d47e309727a643d060a4b38f8
SHA1013e398959826807e8a884b1e551b36d175e8dac
SHA256c4cc3a5c0387478f513820d54b4f83f1d0ed13a52babc0f92cb1639f0c398f31
SHA5127941fea81e2ddb3889f14c6815a3b1a151883797101a97f6df3493cd9de0bdac4261640eac0b62348fa68fa784b2ddfbc1dfaffff603d556bed9a1091105ec44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52438f1c031890fab5483cc9380d36f17
SHA14a7c40e5d6163c13a7390c0a051af1b58ed99011
SHA256a73bf21d63f202935351cf584141b88970b73c6aec72b181b92ca250d9665842
SHA512603189dada0455c54137429bc664552dd211a9361640c2e290f0d72b01f68eb72e1430eae4dc34df1ee808a7241994f2f2b150df9332d069ef87636f95f20559
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0c43f2f1a3d25d72286497046786ac4
SHA12f815b4cbff46d1116d30df361c184f751cf0ad2
SHA2563154d4fde3f4095e4893c0b983ca7151fce58c25fa4999d195342876c93c971b
SHA51261149fb3807f9e3ba95b5a5df4d1dbb1de1cf5e9464594581b867c4caefc2185408e2e2b6afa04a86f5e62013bc50019674b3afe46b4676574c6588d3be00590
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5966f152cc7947273343d4c3af23ce8c3
SHA1ae2dc3fba1c138db2986d3e76398e3ff4f00f27a
SHA25610e81bff30b476805ed985edbb9cc1410854e94934e2bc3816fcc5823ebc3076
SHA512d94229b943f5e6ce885e6337fcb2cf280ab2501f5a0d03631e4da7c9b3f80dc2c29ecf133332ec649b876cc8b1ff0f309e255d5927e0eee5c38af17ff12f0d20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3dafaf483f8b893a745898210a4c436
SHA1c87f90fc96cfd15d97c8c209b643872f6b32b69b
SHA25634b9c52e9da91c7dbba242225e5deda98588dcda3eb236e98236335f1dfaa4ec
SHA512cfcd9f81150ea0784c5f260efab8565eb0772e19f1cbfb53a8d74900e3803067b69a1dc16b470dd8df947097e10b6949a120d0b3023d337383ee2a46c8b8aac4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549ef9b485c48d4e89ceaacde55324f2e
SHA157536a79204c3662cb25f4837348edb5f881c789
SHA25632301da06b24f575d9af4c869885d7360fe9b642bafe0c4d7973084791502c52
SHA512099ded4cc7cc020e9ba74dc64f79be86d58e7c74a879e9bfe299fbd0849a0d2c50c8dce722748f516ecb093e1f3badde8315c1343ee5fe6c2f5362f5d07c522b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518673b22c1794106d01510286c1c85d5
SHA1db57b8799437e1c55515645c8002c586493b8754
SHA256b495848b297ce296123320b86c51c36623c8f28555018aeb6da2878e2112faa3
SHA512a2e5264fc663d84d90543b06785953af27c691b3279fa9574f8469a49cdc9a97b6f107c9344093c167177fc82878d94eb231048017d8c755fa5c89313c6bde99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50162c8fe2ab1c34dafe9c88e8cbebbc0
SHA19a07d537287646f65ff5f0e3565bd0bc3b59ca6c
SHA256ead359ffcfbcf2fff056440035f545176ecdd63a93adea5df64788bcf173e76d
SHA5125ef6e27b43dfa368539c892a29578dc3581beac22c94e523d68d29d1e377e9ad05cfcdb7f508f0ad3a4b4c000f522d8a0a797f58d7d41793afdcd66f0ffb38a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8647aeb8159296a3715694139e68d52
SHA1eaa31aba58000cedbbfb1cc870dfa02cc6fda6b0
SHA2561bcd960982ff2fa0b1aeb0fa56f29e5cbc76eba2e76b287e04d222debbbb0717
SHA5121592e03a51cb475dc9e09a3b5382f37811a28ce35e33c2413783e551c3cbda4b696ba8ae0f7b0db63c2d1d7ac7cac16e7222d49ae094849ea9b2a1f84ce32cd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca22ec9eb38cba1908b00a24bd0b1277
SHA181171d234ba131067cd644f673fea94b4075ad30
SHA2563630b2343d104d043fe3fae98682d7a42d8cb500c85133a792906ba2f6b1350d
SHA512f8243dc31a7a56252ab40b7ae550da2ada2d18e573a979022b7598ed4290a8f429f9cf0fadd5042cbed178f11ba7e31e737630939c77f9c122f54e302f4c3ac1
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b