Analysis
-
max time kernel
118s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
26-06-2024 00:06
Static task
static1
Behavioral task
behavioral1
Sample
100783ae1c89873b22bd786bf79d028f_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
100783ae1c89873b22bd786bf79d028f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
100783ae1c89873b22bd786bf79d028f_JaffaCakes118.html
-
Size
53KB
-
MD5
100783ae1c89873b22bd786bf79d028f
-
SHA1
5ca9f09b4b3de1356227c2da315988af21d4c8af
-
SHA256
d04567591c16de4d33ba58e1b3eb11e0d1a7951677d93f5f77adeddcb2e8bb85
-
SHA512
f673a97753e6a55796e8b43ab2627c452ad21c04181719f8bf5d2c33915283859cfb7d125288e75486eced0ecbe8fed56cf4617acca68de9248e0d0b7db07092
-
SSDEEP
1536:CkgUiIakTqGivi+PyUurunlYT63Nj+q5VyvR0w2AzTICbbnoM/t9M/dNwIUTDmDd:CkgUiIakTqGivi+PyUurunlYT63Nj+qn
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb810000000002000000000010660000000100002000000094138c118447f3726b537b04de3ecdf802a0db0d64cf7941a4b601bf3be455df000000000e8000000002000020000000123246d4449c4f8e2d4f94ff347f2735d5791c0a41719f38415139ffd60218752000000096de34d16deb9628f843293de0946a61b83385df0a10661589638d6a207c6b6140000000492d99483b2b939e8d41e6b3fe5189ea89f1a23235b92ff79edfd58636736a670675ec2c5d6709042260564119d41ee570141d2f5c8eb25ee4468ba541faee1c iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425522256" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EF711FC1-334F-11EF-B9E1-7E2A7D203091} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0f344c55cc7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1692 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1692 iexplore.exe 1692 iexplore.exe 1780 IEXPLORE.EXE 1780 IEXPLORE.EXE 1780 IEXPLORE.EXE 1780 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1692 wrote to memory of 1780 1692 iexplore.exe 28 PID 1692 wrote to memory of 1780 1692 iexplore.exe 28 PID 1692 wrote to memory of 1780 1692 iexplore.exe 28 PID 1692 wrote to memory of 1780 1692 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\100783ae1c89873b22bd786bf79d028f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1692 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574e2e94cacf333485dc265a96376ed88
SHA1531afeb0fad3da16c4ca074bccadfb352e020cd0
SHA256a6b9d4d5ff9243f1ebfd2fa4f4bc3374d2aca9b5d96566ba7c70cade6c272f07
SHA512ee2705e0595d3aca5c86e32c40484e658dbfa455690f442f78f75f9f3ccea89216de45a4479e951b7e39ac944542375849b5505800671b828dede26cc5afc09c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3b212be76a99c46c428da6d9368c094
SHA1351d5e9b2876798fa24154d666c54501ebea4e41
SHA25651aa7fe2e5c12633833eb832438a1c55ac4f31d0badc4e7e1a1c3d43204df547
SHA512abf10e9ad11a12e36786dd3813b01c511efd17462cb9398a1d0514c1df290996ecb375d621505e4018fc60888a3ff9b44cd7cd9a8fff000cf8e7e964ad9db91b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a111f6c9608c11fc50ad3bc2c9faf907
SHA10ec6c92e77a54f6aed1a61414a21c88132f35842
SHA25653e4f86cce2608121d2d03ffe115115beabf1a83b0507d9e54f7d35d2ff3f7e2
SHA512b8413aaf0f923b3c96fcf0e997ce01b1a7c665c20a669d421140bc8cdbd2347eb04684c2fd1a57316b84e61750796b13ceab42d23331a8ed30f9e1f1f7933b6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51770768f532551d422a62a55c5a632ec
SHA1cdc51d5f096bd5db81f0f0910c3e209efda16420
SHA256939130839408ae2a21ca1c3a3ebaf96c9eb7c77fd26011df18e081bd473bab5d
SHA5121f7736a607d02dfb8236aa54e491a9616919f0c1dd86f8bb1cafbe2309295744566858e69f43a09341071a42b89be28cd546b7f28fdff0943cffdb5dc24c2f0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542c5e3a3fc1e4c0032b4bf47cae7a69e
SHA15416821949e9e79df5e25cdac450450d0b040ab0
SHA256948b2340a8b32bb3e9652bded3b2989d04203d095e9fd926548a7632307c2daa
SHA512add359ff9913d62918885dcd7810eebc51294675b98fb75f2ae90b2569a3796ad47c4ca5b5361ed387da27f17bcb1db4a5c2e00fabd13afb7955bbbb474093f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf35fdae3a657945c6fad3883dd60b44
SHA1d345f0a94d2c927e4fa7faa24b69d5b39be82dea
SHA256324313c0d8a3eb0e02354d6c7ee501aaca45c109711b73042ca8479d9c531a46
SHA512d4ebab92bf05e3572b7c55e0b924dffb9d368bf1327b122d1061dd86fbeadb6d30fac283f02e796a00ef235da6d4f1921e62ae3d50c004cd7d1f4b33bf9715a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551814ec43e848ffa335b122a80f99b67
SHA1cd2868964aead8bf4ff815605e10805ccfe3f42c
SHA25686e6e1f096f7f1bafe2681393c099f877bb6e04f20bd3567fa2d3873de4e6618
SHA5124219ec618e1dbcf9b1e9064afda1c01a1e339778f0866e6363d1b4611b6e96113e461d974c11467c18cfe111d32d196cc4948d4611595c31bfdbd506620ef8ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52205759745953bc8e45e1b9cb4d6f8b7
SHA1841d5a4df35dd4717d55ee07a5b82f6c4276b9b5
SHA256f01292b4e3b4aa86e5fb5a2f0573b024f67a950e307a7338db48e0fdc6fe2d53
SHA5129dccef1749bddc91f700dd6a104cf03b59470e0d7c9399f5d09a2ad72a41689c88622ada598d9a0c34fa6e72f2aa15b2763af84f83738b2abebad47a630b6ed7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4e9585800cb6f4190d3cd04d9af2032
SHA1a594ab806994e001dec8bd46f99c6ab7fb29b651
SHA2565675964cc05dba86489cc3db575ca349aa2da0237c6e447bbf489738cb7d8413
SHA512b7e825009ddb7d126753830066f9c68817a568deea3ef96676dbd48dc4e6d947609b5f4fbea077dee1a3f6982262ef809ce9ee22084e479c34b470dc2efc2055
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53207c78d30d149a8bdc782ce983c2bf6
SHA166d581fe6041d932302f15d97e0031458619af98
SHA2562e908f129f49db4198a30b3a98dd60cf84be39ce998052f0671f3b76f3fbc8e9
SHA5124adb874d45034ffdfeb2dab7be84d52f79e7f58f8f16a31a6a0e4a2188c60cb741953c2e2e6e376c435fc25002f2a7139c3fe495ca160b02920f650b8eab2aa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554a9d7fce2f4b07978f134b7812c03da
SHA1bfd39740283ac54b7a7d354b90b12220fb441f2e
SHA256fba73c809985d9bdc4c1b5b8d594f42dae67cf19fddae1d381b09e257777bb2c
SHA512a73fb800b145bbceb0d44fff04b730ac0dc48fdd6a2a693fe6780f018a23f4f462f7265ebc084e38dae7f50a3710d00dbd56e4fec195ceaf43c1bc67d2c20355
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545824a9a352fa506dc998bd2e70d1e4f
SHA132e9254ea1eec29c3c3df131c4565b01f8990da1
SHA256fae385a89e0527840ed505a34cfe1eb65cef25f35d56a580273a634cae732578
SHA512ed0f21b94bee48dd48d25c91b2cd6e197f9accf85288f0ac8fd54b089c1724cbab29429a809410338edb397ac69507cf43fd67a4acbf88baa29705b2d388f4b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572076b0040fa64fc1a3eacd28326cb31
SHA1a7bcbc9d44be267a1ef86d75b9112a3fcbff4061
SHA2566bb15f70ecc7174395d9b738ef1e0e634a61712ffd74ec13ed1b2b044124616c
SHA512da88264584eae2f668e7d03848a6a88404f3785013eee29359bb001c162ce2b9c6c98f398fbe8bdd97026f7bb30c9362bbbe63551f0ca0fd2ced411cbbaf09df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579e069583d24f2ecb4308b5f1b64565b
SHA1497911e8d7b99f1a160bc4119e0f256068c96d91
SHA256d140e07af7756bf2e0c11bdf388c029c5e8e800dcdd3b30bfb995dafa491e764
SHA512cbd0cd1051e6a304d9a2d27368e612261cec79530551513802e77dabb8150d71a75ea920b856915bb295da121328df2d9acd78f965cd549e2b59be1ecdc2d661
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fea2754b83e38544b18ae4a389f247e
SHA197ab60150f69bc3dd2999471b20c6b5c456b7553
SHA25693c180d77eb72c1f4adda9c4e7158c4b4943ce4a86dd302c9fb63ef17d6e6da6
SHA51297bb5b42ca41e586446aa7a3c92d4058adabbd32d1c35ae75486ceee1f9c75eca1b56311c9b6587b78d8f5be136064a3f408491923b9e127bd2aaaf2bdf6ff64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530e37a7b33c87cd6b2c6f62404a86248
SHA1f135f2622a974bf8963d891dfcfb37d7fa6a7ba2
SHA256e5aea15ef367c9cb1701494091516cc8dc5ab2b8c9ddcd4d6ba4667dfc1f072c
SHA5124a12f6bc5e381be51d039175322e720b6ba9f14047275478793f58ebb8919c01c37b9ed2f176e2a689ec9392ce4b071f46dac671e0aa9c0c38a5f6d9b7224d9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b2732bf2eb2b444c3e68db59bd1f00f
SHA18aa807e755cc6508f0a0c03c1975d36e32c28adf
SHA25662e69ab99ad5239ee20aecd93a0a245db36ca2cf873d09fdab1e6bdf029b68c7
SHA512dfef3902e1a551937b3270ffc911d2ccfb5366c9df03e4f0efa48f1594ac815891030354373dd750b8a6eba76fa43d7ecc2d8630538a12108864980130e0d970
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c866e69e7c23324b3a34a6191c475180
SHA15bb3da88205db0e3c3d1e1ef04ee6cb09da67353
SHA25676659f1eb0d184b7741238c9767fd5d1bb7b7e145b3e5c74a971547b880c9e0c
SHA512c94ac6513b65c240b6f5f906d8f1a43fd8dcae65311e23749321c9ba6429042dcb825f1b6470b289cbd832b844fe00ebcfa85c54944df563deb8e735b380df24
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\FY3LN490\glossar-js[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b