Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
17/06/2024, 11:17
Static task
static1
Behavioral task
behavioral1
Sample
b852b82e247bedd3a791995cab3f1838_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b852b82e247bedd3a791995cab3f1838_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
b852b82e247bedd3a791995cab3f1838_JaffaCakes118.html
-
Size
76KB
-
MD5
b852b82e247bedd3a791995cab3f1838
-
SHA1
6f1a866f41e4443f1e28d75e3eacfe240711d617
-
SHA256
6087fae9b3dbe1939a5f873179aee62b6800869853bb369330f8a189c7e1782c
-
SHA512
530f6e3583c6ad5b67e5a45e74c388b2dfd2806ce1f35a477b49de63881c2f46c595b636e6ff839405a5a36523eec6a2be1f882fab38d32a7f26e4f621f0bda9
-
SSDEEP
1536:S54P5nCJdJRJWEPmmISTRCKCJCmC3JQ/G5OWW:SSSmD/G0x
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2B7E4FD1-2C9B-11EF-B9DB-4A2B752F9250} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a09c4803a8c0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424784910" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb81000000000200000000001066000000010000200000006815c28489853c70a2fcda18224dfdff2ec03e666db70e386b453ee1210878a3000000000e80000000020000200000009aae55aefbe24e25736e5db2e6d59da3950815a56e7e590e833142cb3e9ecafe200000002e576d734233a5577df261116e6797c98d7d7fbb1a621e84487f78d4ab6c8e9e400000007e2f69c31e612074afc263b503381b53b160262ceb25776f5d8f74f89e11205cad9dc4ebc663330bb37f5240d71a4e74716204c3c9d6b1b4a8f533596db6c5e3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2472 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2472 iexplore.exe 2472 iexplore.exe 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2472 wrote to memory of 2632 2472 iexplore.exe 28 PID 2472 wrote to memory of 2632 2472 iexplore.exe 28 PID 2472 wrote to memory of 2632 2472 iexplore.exe 28 PID 2472 wrote to memory of 2632 2472 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b852b82e247bedd3a791995cab3f1838_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2472 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53feb3054f100d30fe2b2e1f70fe40845
SHA10128cd75e8c5ff2cd13915a3c42cd4fcccc4d6cf
SHA25618a29e60c6b9072496b5476d6341626148af45f5f6cb6be42205d61d4da0aca8
SHA5126bccb4290f21662105a110092d03d42e00c539897c12ac8e10f0bcb1d6520b5332a95a33de728ba49aa4d166218b78c1afc30834cac301245b843b433d10e003
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8644ed0f79428b37596938de45f2a96
SHA15b23c5942dabce11295519c8f01e1b9a3e5c1031
SHA256efeef49f19b1978fb4c382871960396dbc35250942188bfc19fdec8a0bde9961
SHA51299636f21b684d4d7cdd2cef482a4885e759fb5ca81d3092c543c0882cba9ffd16317efa1c8bc8a9d176dc373358e8433b3e1823edb4968d787a5bd9579d2efe8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d6d6cfba082b99a45674aaee2e1a213
SHA15a0b0fea9ee60e6133437646183013e8731d7b1d
SHA25625b414ee4ef81971cf33acf4af35b09d482175c59a159f422514557fa7ff95d6
SHA512293f127f2067016170c8c9eb0e90223cb1851f5cfcd3c212efcc5280f8c889eeea715174c7a7394ea4ec22fc7a8ecf9c894308b5b36d59e5873a4f7a057b8be1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558e518e971b85eca05aca8d439a23539
SHA125dc2de0a64a47c3e76e07ba838707141d80d8d3
SHA256f30e6a760c4c100312dbbba85ec97ee4e1d441df8ba63c513893fcfb97183bcb
SHA51240ede1c474cd75112a82c301a280b7cc2614ccf3af74c2d7239b83accfeee44a7f46a6cbd884a2cd7f4d2df46510fce65636a0ed1fc3712bf7225faad27decac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521bcd94c6eb66d4d2fe62a414b2ea495
SHA19273da2b6126dfc65becbe4420832d19fefec4fd
SHA25654fb98aea08883e0f175f8b8621c86d7943896600b11bafe5cf5704c67d7a752
SHA51206de9a29267a089b4a4b7f6912d76b237b5b6345e1109e4d49858742a7b693d131ae8a90b30b0fa54366901d4f28f97bbb3b080d23daa90c48ac562a23cb5f6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568747b0876f313cb2c13cdac229b62d2
SHA1a2135abf73db230538a316d67156f806dc47f01e
SHA2568cb4b08e3cdbb5a96fbdb6b18388f969243794138813345dfff57c87964008ca
SHA5123a642cc4a6f38892e93cad5b9826f84edc823716b94cdfea4483d56b6dbdb97b6f4444a2af605da5c18bbee761b55412abfae35743e8ae524c427a8bbf11c31b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acc927fd765e0571cdbe4d0b9dec9f42
SHA18b61da2d3383e6593fd34cf1f06f0d37345c59a0
SHA256c65456d4b4a2d7d00b07feb45e60f47bed7c3b6ec149a9aec1304663cf6dae8e
SHA51222058ebf514efd705322d8a82b3a94a91e9a7115bf0fffe51cabebb234bfca214ce538521a22c9ed1964f73aa6f9e1bc0b23a7d4b7a28d63c23971f4fbc2b34f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f517fb90526b7d6b065784f805cff13f
SHA1fead0ba2dce7232101f282cd6328e85ccba5848f
SHA25664db29fae8b9ba178942e9736181054696fcf9ed787862b4332df4982d8e14ee
SHA5128e93431904ecec1747f6f8586e8af9d4377759d1efe2190e33e388a3d4a6c395c2ef4de6f70b6138d60359ff2b397d8717320eee91a7e8ccd64af8d5f444f8df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c401920fe4f3f5d88c64a1ec1bee15ae
SHA1006afaaffe7fb834d7d917530f5f66b93493bc38
SHA25674385acbfff2812efdc2ef292d370e86b4eede66d6a040aaf449226dc01376d5
SHA5128ecb9ddb17efb78c85c72edc501a6a9968e673fbda15bc8e5058c99738715973b48029c9ee7188308fa35d486b64676f80d96e5c7e314ebc27da021cd1d48647
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d4ad7be26d501dc2f4ccfa1f0248b7e
SHA10bba25bc728dce1f985ef22e232caa57e9fc2a9d
SHA2562297dbb0cc73d823f979c1df56596db0e37bf522aecb813b8e24fbb56b5fa57f
SHA512b6b4f1243b87266412563d57256a175e8812b9ec61ccf326d262858d8359b858e0dffddeb8b7cebbe1ea96c2c62ec6874c94fcb7251309673fc47a97325de924
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5ce7c662a55057cc5eb727c3ef7c257
SHA14be6d28a09f7fce17a11a79ee9dd40c55357b723
SHA2569861ed1c1e0d966522a3fe6e139ee4d34c9d07b99e9e332fcda00bf9dda8d52d
SHA5124b3682a24d7aec166d39cf10fb9b1c9568df87d33f18e863635b4fd5c75f371091736a0f5e6e073fbff5449da9e257ef8dd902ee2f7080ab26b9cd9e121f9d73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a145204c48cbfd3be88f68af39216489
SHA14d6ff76bf6376dc7bf831f99bff0a26f68dcf1da
SHA2569017eadfa4c9aa441684f0352bb2d443caa593da1e0c4ebfb3d8b1289cc946b6
SHA5126aa1361d513a98095f8fa74da27981e452c420205e41a350ee15205edf0a556984a7ed29efd1f36c0c34205be9ffecc739e5fb5ef555e4edbe6dcfe6a13acaec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d686f93a6c037fdd798d3d5a793583eb
SHA10dd2ef4219c656e4c96fe66957ee1428e00cf984
SHA256051e619631ab16936c7076791b6f1dda8bf2c147e5839ec068ffd29ea629be17
SHA51291f40dc7d9454eaa9edaf96ff0f0c9112cd5d6a5831a2ae1b8f59c65d5bb4208675254eb9d099f8ef55e34cc52b5cbedf37ccdc18aad550d1e5cb27fb6186b56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bdb427a93b9f899158f37e2bb5d76b2
SHA14aa34305608420e0a24ae9e78a8ee498e4efaab0
SHA2562a3443ffc8b9b93aaae7180cdb922884106b3867ee02a8b0a89e7476f7b29c4d
SHA512265fbac704efc49219585e51ef9b23c8cc2326f0d69a0acac6a65967bcfce340054ff209bf072ae2212420e6cfdec8bab86080df682e719678e93bbe30672ae0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4e0b91801315f73755efa490ae273d3
SHA109d503466209fbf1a7aed9819894e693b97e1f47
SHA256798e6babf1f3249c8c4f13414a4fa58a9c2307807502579c2b2075c33615bd0b
SHA512ab8c28460a557f25002a6aa1a1b1783c21eab0a835a40cfa79bbaa5ffdf4bfaa278c6281431e8790b6670fbd53464fd3743892a9cac2d61240064ed35e781069
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594049999ddb76e8a6aa8865d1b1f486c
SHA19d3704248d819b8ba879c27065669a78e562cce4
SHA256ecf6c3993c948a8d291166214fa33ece6850102650d4e7aa8725fa0e9508d93a
SHA512a96da4f8169065e30a1e84e3cc82da09ae3d19829fc830b8b2c7c009e8c6bcd96d049befe58ee91a9338452a3a17dda0560923c748f501b598e7fccc8106e0f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba0a3459e5b6de8def0f2b667fe4f029
SHA1daeec8ffba945d373aec86baeff910ce756947b1
SHA2565d0bb37d432ebfa531a625f2a712db9f4ec5dd4b2da4d352015631d75f03aa68
SHA512f461481e2ac76bfdce2942dc14b9fd8b96240521cee576cc89f39ed05fcdaa86627fcbc358f205f4add926217fc88d2d4be7e2ddc25770c7717e5fa27067b8f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da51810866c7b71c9bd1d34de54f23b4
SHA139fa757db83515c8f1c8cd054dcba40e1d3cbec2
SHA2569337f6957d7269d4366a9dee86273890a49db7f41d7d3f9dfdbf6294b7736496
SHA512b6ece4ea6eaed0a9256229776402cdb8da945708591d0327935dc6060e2b450a4375b13cfaee5ba5bc4f3866f99d9bc76894cbf347f0841d25f889f3c40b2bbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2174788b06290beb3373bb5444d5c29
SHA11373e95ee14db52e37f3ca70b54b99ba2c050062
SHA2562642210771e4d01a644cff6b40a41b8a0f16a96ea1f41f5d01b45d0d3f37a158
SHA512161a1693fc9c2e8ef212e7af351a216e447d0cb405a1a18f881cdb2a36f964c809e887de94b6d6623722c0b63ea736f81387bd555eb7055f2da699621ce77b36
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b