Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20/06/2024, 07:01
Static task
static1
Behavioral task
behavioral1
Sample
03d9e9df1ea7ee3195c7b1f2ae2460f5_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
03d9e9df1ea7ee3195c7b1f2ae2460f5_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
03d9e9df1ea7ee3195c7b1f2ae2460f5_JaffaCakes118.html
-
Size
8KB
-
MD5
03d9e9df1ea7ee3195c7b1f2ae2460f5
-
SHA1
568f6813f7faf469eab6f6b22e70cfad85d96542
-
SHA256
5379e0a79f8cb3ead96cd1ef8976d8e54f7d81660803d31e0084f586ed3f862f
-
SHA512
a4fdb5f671eaff34ab0f037ad29f09a045c76531547d708d7e12d655d3fa4ebc658b4eb041c7bfa8d15597df3165f887dc98062fc72531546a6619b632358492
-
SSDEEP
192:FepNFo6d2rQTxGcbGF2AyPnk0JHwQ63i/ulsZwA4/U:FUz1LbGFLy/k0p+3i/uc
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000f61a75ed21f1641699553842004fa02f7741da7a16905fe8a62eff9a3f9fb49b000000000e800000000200002000000014dc903c286ee6958f9905f2a2439a291fb5adb5be9e9639b189f5f11843f28a20000000b6405189db234534d7b92b22ed211ac8c8f0d21eb4e9910bd87f7b80344a98a8400000001a2835febfca7058ec41fe651a62d5e77f33c624a85a41690a3a10f403747ac2148aa1aebed8ebae0b70c2053d62e5f44eb04c2b78948226c5a1631fe0147b7a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00403cb9dfc2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E47B89B1-2ED2-11EF-A7A3-7A58A1FDD547} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425028745" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1276 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1276 iexplore.exe 1276 iexplore.exe 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1276 wrote to memory of 2412 1276 iexplore.exe 28 PID 1276 wrote to memory of 2412 1276 iexplore.exe 28 PID 1276 wrote to memory of 2412 1276 iexplore.exe 28 PID 1276 wrote to memory of 2412 1276 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\03d9e9df1ea7ee3195c7b1f2ae2460f5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1276 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55040e2a2a289908cdd1e23448d9b3ed5
SHA17798d455f99fc2dca02d9e76bef55b7dacb908e7
SHA25669b6210ce3e869bfd95476b914445fa23a654cbef31366cb4711c20f3523fb56
SHA512ff478bd03839d160628f24ec241d1fe0585251482ae9685ade211aa86965bdcdb691b92340f164cce8451561d84cd673cead9ee6259d7218c18fa0ab6a4f8c59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50465fab9fe43e05eb35c0edad156b03a
SHA1eeafa39607ad9fd57b119b738370a210bf22f4db
SHA25679ee773958b38108b4147634905f9ecc2290d62fc234380625d03f1bf9ff1e07
SHA5127d2106904e8a6ef2207b5612b7e0253f9ce3906bf11d9c7be9defe55635327e6a53a8dc3c184d477db6bf4e5973bfb4d58871fe85374d0c954701b2961c7dbc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee745d2f7411b6779286fd935ee16c04
SHA1d377cef7e1abd3a627d7048b14ec31b9bdd95ccf
SHA2569fc249f3459a55a80e3ca501fa2b4f836c4763c47f54a02c64b356b3306985ec
SHA51218e17a19139f1ce145ce991ab850b052bdd624bab54aaafe92e8020c4a8bd616613c94924f82d56ef1cf28c7560aa511720a472459b420a26649ad9f56bd715a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdf102ab751edcfc6737c4f9a9e86a5f
SHA1e8e17f614915110d1e180da7abf65af2f06f8121
SHA256afb7135b0b78bb437d81332421168338b8fcc77c33e0a8ea06dbc17d5e11f0ea
SHA512bd334bf9d1ed76a453ef9edce396fa8abfbf45efe6848ee5173b3e7c70ba1c115aa32d145535142f561ca06c59beab4218dbfe5b726723e1960d1db1dfeaf7cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f1af79547d71edf64fb702212b720a3
SHA1cb15439c2865c219517cabfa03bc69faafbd77b6
SHA256dc4078e2c9d03ca70309366e0742c17476ba052279abf7b1becb1393d6f1036f
SHA512b3862d579848b373e6ee0f5fbd6add64aa813a3a114c8ce35a8a6d35b2b299339fa950a730761a88756b585bfa3528418c2312da23ac4b34c84a7358cd7e1306
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ee7a145f16c156620dae78f7431c84d
SHA1d1f6ee8808ffbab5295711d6a449c77454dd0353
SHA25666034105507fc9485e024cf1b45bdc341f055e8fa061e4125b1ec04b1de8c07f
SHA5121c130479a656567be6b08f13a0e5bbf084e467e8bccf2526444f95fa6803dd762d1c9d78ca49f790b9cffc3a62d73bebc2cc5339672d25e8ca77796d0d555bb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccf788b7e3c9e81843b46444b48e2319
SHA153eb67a4c5093627bd4f284537a4631067dd58b8
SHA256037773bdf35e7a3511f923ab71d19d06ed5f55e2cf1fb14625580cd836442e7f
SHA5129e3ed6b38cdf2b15ad25c4dc4c9354d616b024e787ac3759d3890b9865d892f01628f3cf45bd868a46dc18277566d81865dbee0e88818bf870cfca995af6a5a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da8a2376c0cdb16e18f9f6545c4711d5
SHA15e8c13bc958f1f02ffff0c073a3bcf2fcfd1f14f
SHA2565b4197e50c73c7f37fbcdc9878fa16b46f87b7e77541ad367cfcf4d00745bf82
SHA5125b093b6c2623465fe4e4bbf7d522e14e2ddc4072eb9d6e984370e5359c31f70f80ddac7d231a3bada84b878da0d8fe4988c2368c216406840f41ea64e11c4e47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9fecba089f84129e2d3d9417f678829
SHA17bb92d3e033139c4a3dd5fbe7e73518d4f7ba8d4
SHA256617dc83c407fa390af1fa3c3a524d8d8c5a52744c7536808bd21b420bc9e2824
SHA512ac626d66c61b92aed5e8c2ff9b3696189688f3cb90645b1b88309c0280ab476940af0b4048e88d113e99f306cf46fd0484bced5bcacde4499b7589cd2778f896
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb6d99d6b519f4b8745c97605c6e6d34
SHA19b8701d5124937e2117bbd32cc49ed418622a9ea
SHA256e49f4994af66fa1404cc2abedde304c5f3cf71f18fff44cd2ca1ce4db8571821
SHA5123fa5da5cab026f432ab3288edfc9eaa23c0b03e565ada43bd7a20cebe6d7c531bedd1b9b60252141765dfabd7bc1c613b99b98958a5ad41b550d091d5a4f3707
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d37fcdb909dfb73d3b1ac5398f6fba06
SHA1eba166e365e02b190e0f745366b3fee868e9cc3f
SHA256eb40778c09c3b1b8933e148b3f8e9723b4fab47b37738662cca991cf3c985225
SHA512c53b073730c6b79efb1aabed7e928d47c8d99bf7de94e4df13bad31b6fa9ba45614b11403f3fa8a58e9f5eed6c390b39522da1fa8e7c164294ad08c8a5be5848
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53758511c3c2f9fea6a53bc5259d6198a
SHA1ff725d8b11d6bc87f11d3d4850280390a88dd627
SHA2565c294b384bb59ad167a81be82044a7e77a42a2a7694a680fee44b1d65dbef8d3
SHA512112de926d21c517207b906a231eebd3da6747e8bd8ae7b48275494da3f9508a1cc3121a82741e735dc630fb33887e3de15558363f341444b85dd90a69db74480
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583bb0a47fa35d8dbe08c2ab4b0374539
SHA1fc39637c90c902f0dbde6db85531d8daf5597097
SHA256fc100e0965b0eb8a9d90b7b0d98c92f42aa80c0f9a273d3c4399ed0fc049b7d9
SHA512aef37f40eeace83c07a0920ce7f8ce47a6e2fef921f846d07f7c73d297857fc6e87b8838a4f061716d0ecec44216ae1daf8d028f352b99107e057980b1df2557
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5937225fea41ff514acc491b73d0660ae
SHA145d37334618fc9e9cdc63116ef1cc1a10b2cc633
SHA25697ab7eee4037ee2c67bd11d38acb30f834d067af5787646661b734945ca7236b
SHA5125ea98dee713144c8dbb1edae69a6a5c6f6aaf8916c0828ce0888df845f07b4c6a3cc241c20d9e638446f263963814111c1975d3ed55c9e9f6de4a66cd305a28e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f42dbdf6a240ac49795eb9fb3bd88087
SHA120043b2ebb7afeaeae00a752ce41646693df10ac
SHA2560a16dd0e1cb11e8ec7ab53e30a547e02505b3a1e9ae773bade0827452b13eae7
SHA512b04499095e52f8207ab194c661626c8c51ab3a9a56eb9b0402e3eb19b9be75a30b4e34872ee40375054b062c0fd95e5cb77cc212edf936563417e3d56f8953f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546811e6277f8306a216ed801dc0ccfe4
SHA1f64c3c4ea1d2956136d5de05f4496a8bb4f1d623
SHA256e21ad6df49e3e243172afb0d0533997b456788688cff9571315c40426d83aa06
SHA51276b156865d1ce8d7435129677899af69c9f237eea0c54648e81890953a28e268792691e6bdaf08616162ebe837279fdb5dddc4103002b5a0daf3a70c4112f4db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af89e74e2ebe232684f194abc25f4e22
SHA19ae7a174eeac1a338f0ffa13398c654a5eded1ec
SHA256d9c211968ab5cfd6071d661cf16944f8d73410ae9d4fd03ab0723065b178c273
SHA512118e14c94f9432be2d4ff799f6dbf0cf22073d9091bd7240244eae1985264bcdcdc8abc8df8218d8d42251405d86969b7f9f3ef544cea9dc49ce74265ad3d315
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588087b768335bb2bdf06a2e5e1a2911c
SHA1523e9c5d8818ddb8c149ab022144a7e8449a24d9
SHA2561026e6c9912139b412f9eced15509b1cb3094295fe4e09950b89ade5f08cc846
SHA5121376bb5998a9c6d5a40cb4943d4d052b38b3c7b825052341a78ba5d9ea91aaf5be95088483ef75ce9fe96598bd952113a2023c143622f1963579299cc7c388b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cd5eb288358e96e527fde2f1459e933
SHA16b3dfb13ea91d3a5aec69b0323f9761f647bc4d3
SHA2561c59e4691ee3e4d8ff33591c828698f235282bdeb3b49dd1ecf4a0c9f75697b5
SHA5123bfe42ce4ebb325d1f45a6ec7b07008238a5877a4d19e7fe69de364bb813df0dcdc6c474c5d9e735cc49e94c8706e3c8e052d471e0f89a6595e3b8d5af99825a
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b