Analysis
-
max time kernel
136s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 18:54
Static task
static1
Behavioral task
behavioral1
Sample
172291c7c0cbecc0a669a94cec92f547_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
172291c7c0cbecc0a669a94cec92f547_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
172291c7c0cbecc0a669a94cec92f547_JaffaCakes118.html
-
Size
46KB
-
MD5
172291c7c0cbecc0a669a94cec92f547
-
SHA1
f71a5f6558ab9124988eda81cfee1ac902cc133d
-
SHA256
49cc490f90507966512e6dd525d8634c8a370a3bdf49791fc84e5d403377a5cb
-
SHA512
79dcfacb4b117aa7d47b2d56014c9bab144ad694fa2771d699a2b269d51cbeb19168f0397b778d9285ea4935a01c5a48e7f2f1725e3b0c20c571ca022427c055
-
SSDEEP
768:SqVlT5uOOSS9cGwrwN0AA9e/PeUnASILJnPRLqUSAEFw6tEHp6+c1CY+iuq5/8Sw:SQj6SS9cGwrwN0AA9e/PeUnASILJnPhd
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425676323" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000006449e0e692672c288ae335bce96d968d0d0bdcc33936e11f8f6f2d57e1fba04e000000000e800000000200002000000086e3997b38fe39370524041475b1b9d1fdc4c26162139aad397ef28844e8de8920000000b1b1df653a09f37bf9d18d104896b46160deeb50264035f8124fa9385b67c4fa400000002c9a10ba1b639c9a83e5e893edb0c3ae6a34790109bbf1052ef20fab125a0fbb68755b18805dcabead4d24dac009f20ecca153f684787be95056c8b9bd078be9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0e44f95c3c8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A70DABF1-34B6-11EF-8C71-D684AC6A5058} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2208 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2208 iexplore.exe 2208 iexplore.exe 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2556 2208 iexplore.exe 28 PID 2208 wrote to memory of 2556 2208 iexplore.exe 28 PID 2208 wrote to memory of 2556 2208 iexplore.exe 28 PID 2208 wrote to memory of 2556 2208 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\172291c7c0cbecc0a669a94cec92f547_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2208 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7079f578b27001c96e5209629dba6a6
SHA1120fb3128eec7ca763856317baf68004bf84eba5
SHA2569e12645f6dbf32a3f7e078d2d0cd8a58d651211a5f92305630deea60490ba9fe
SHA512a5ed859fdde143ccfe2c861001418d8eeea129485612b8cefcc244a5a46408f0fd0144076555f81c2c7041eadb856f9dce8a9b6680559663080ab5de195aff22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5224840b73cd7791332052d07ea13629c
SHA1df1fef1911144465e57b39bd83f8960ddb99f632
SHA256bdabe1d514dc3341041cce4c2038671830e220da3e34015787480842fc66cf2e
SHA512cb3c29dbca0a9f26b1991ace207a4d5a6c1c5a5f8d16648ce42959976b3465defcf2a92bc3090084f3f339744dd58a4b2af8da6b83559ec1636f2db80a26b4a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0fa1f26e5b3074ff583623a4c45b4ad
SHA1adec83e5baf275ca603f490028b735e91aa85345
SHA256b47ec3de6f00dc7033f943fdbaea0893114afcc883671e6918d9a15f5f982e42
SHA512de4b2b5c087a6bf1454887e7b079754c77b5e96054953afc42cd7e060b5fe55f1a690a7da329af6a7c7dc9355c72283f6777f7c10437590f1b1a60bf223ee2b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9faa8997be238cc9b35f57ca385972d
SHA1a44afec037fa27db4b4fb800fa8f93e50878093e
SHA256d21cfd020881c324082e07f934ed0c0caab14a603085976080552af3f03d31c6
SHA5124d2df15d1b07ea821da0c0a8653ce9898e6bfab20c8b98576a4f37bfa5267e7f16e6a85612e338d3ee39ef985aa04a989fd5d6556a6c2496045c917cdbe0e165
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578358d51d88aad416829f74205ccbdf2
SHA14d4bd0a85b105da02fc4f88f7804cffea1d05ebb
SHA256d4fe03838e8c3e0b75f10267030fd67b4f78a60f14b83b0ec708ef01e2be3705
SHA5125602fef8a5cf5fef782b23e6f4a30a71c605a82fba44bf5b2d27fe807a89405e21784bd0de7caa424fa2dfdd101485d6b79bc2a831d589d8b24789d3df5b020f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4e1793d3b8dd7e153a55c8d83e0024a
SHA1d2d33873b3e73bf70ce0fb76d4bccfa64cb71578
SHA25631f362c33db3492b6b5b5856b0e7dbdab79054e6fdf3384fabfb2bf1e662ecfd
SHA512ffca9e4cb45008d26ce5a55ef843e8be51a911f3bfb806f075f27a632a3eba7a86c68c789be83cc9ad00f5af0abdd260328473e61371fc08fae10fe93ae5f65d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f81b5217302d2d3a3799eabeedd7abe
SHA17661e8dc17637009608c0412637e4c15a81a3ea7
SHA256a71f5b627db28661bc00aff668d7b90b5a8c15f8c153505ca5dec047e09949dc
SHA512935be288465b956d5d284a0ac22ef70a462ba85fba5b75169042bf891312595e5512aeae57e96479ff8d7b4a0aae8fd70d2b98d3b3a96b0db7c8a76dd1edb6e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb79810f0dad632496b3ac5ee7affd05
SHA1140c67bee826f5e699ac1eca295e9fa9b550ba9e
SHA256a376c3f60b01fd6c426a20fe48f13b082e50022d341db77ad78ffa8677d10002
SHA5122d553d4b752ea0e8f2e33b06ebc7098908336896beac9c4fd21aa724d16ada6e18f1f133e2f5026a590f7b9f9bf9da44480a6ad2fbbbf65663a96aa0d679aee2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5580436e81a3b3670f09146b725569067
SHA120db3b07c6df54ddcd0b65090f8bd6cc2685510a
SHA256f5c992d4c52471371811a9fdeb3dfe35396dbbd4f7c48cbeb803b97f04095b57
SHA51206565b70b1abcda0bfd6f132a1f9782ebb3ffe7d4acff0ac3a6bc5635ea1be37ce9056270638e814c5e5323e6bfa100a1212850d94f293fc93a8c95c062d0e97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1c9d2b0584201afb67cb7cdf6d6f9b1
SHA157274652ff506de3810dfda187dbad11b6f9688e
SHA256d70bc19464a16a2e6e3f639d317bdee68edd7f16ecc4fb37d71e21f21faed7f6
SHA5123ad21ab9c9739cc2b7cc348fb3e840ba9d9363b0ac9b80a0ce230056bc2b9dc26d28fd2474126cf0b99e4b0f2dc0cb829fe4c72fd1c46e848cdf9293e076b249
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59696ce39dcc9c872e648044299219a82
SHA1d2be6d538ac6c13384163b91d8dd20467defd9db
SHA2564cd63f39ec23901b88ddd418429f4536fa76ff36b3fa7f153d2c669ad1494620
SHA5127d3747c8fa683582dff99802ffd7f3fa363eb2b367fb1be52a19b6b3db397e6dedc4b7a2e8a49ca492889d51aedd67584f9e7d8761a1db20a5a6378026a595af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59df0a88e242f0e7ef742958e04f470a5
SHA173f1230eab5520a5c56d7840200c8645e461775e
SHA2561ef53847db6c1fa5a52e59125f78520a530731e6da3466c38301a9124077e68d
SHA512e6f463ab93d280a9b4b464be465e8d7bc02720c9170898e43b505f625e3a02719a72b812c6a9614850e24b216e34230058984873d480b3f183b64dc49bda448d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f0fed69e8b2b03f55a213c2db4165bb
SHA159282d788c9d5b1b387ba468d8d35785dc3d7d31
SHA256a91c8e28595e709820409d33896ad906bfe51b1711ede029b507f58105d1963d
SHA5129b0dfc97162c33d679e219466a517386d61ea9dae01090560ac5dcb7811248ba7f3fb372494be62db6ea6cf93b2c6e190fa06911b883f76d2ec89ae3a2178f49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fb2323d8eba23f8d0d741aa12de14bd
SHA1aa7b2276303a1e7204f6555a955ace698c6b89f6
SHA256db56e5ed013d012c2bc4c069c66eac00f415bb17c049949ccaba604485f9bd16
SHA5123c9896c6d644e80e64cf92a50e6d06627f6e091057fcf267b03acbf38249f7ffe16c3d08cb03f7ebfd805655bbcf1d9deb72a2d6d9bf5e62af74490afcd24cd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d27e70927dca601c776431175755ef14
SHA12cec7d84dabdb35bf273b637656e957566e25735
SHA2567b052a237009fd097dcb011c9e4e7d87e44342e3054f2343bda831156934c50b
SHA512f0ca402a30bd1ab05341b15b1f90bf692fdb53fd810ae233b18c290e602343877a2f2b0f698d11df8d62e13adaf44a91bb7eae0228415ec4d32980a3b0b3913f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b38325e1f5c759d5e78b1ed94f73b07
SHA1789c4b7608e1c5049705e24a4bbcec4bd5a9e407
SHA25612bf9988a0f7eb31e2ce6ddfef4657ea7dec51ee74f1fede101b926dd0b3578a
SHA5124cbc4ea071ba2cb1ae77adcdb91137fdf7254e80d08a78b43e71ef631f91f7447ec7d936f01deec530a91b664743d35a38a1eaf4a586cbd634492221795c8a7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527aca6da2f4bf17d02d60fe4d19aa4a8
SHA10946b6a108a528f62a4a7999cd95d012b724604f
SHA256124fb1510ef4a580c9bfbd2548237bd4490bdbc32f5d0ed1bf1b815b5374acca
SHA5120f6fea03182796f581606165117063e93079804092451c23e33402e0957eebcf71693673b877f932ef67b6e2e2be92c7979a2bf720fa23b9b6658ff3f5be9ced
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9fbe6cd2a1edc7929579d3c9f29f1ed
SHA1616817ea9f73440c42f10724b06c08e97510541f
SHA2560b981a99c526ab5d833bc7f2e77749eb90242648ac5a5c1fecb9bb7f0b2f9c20
SHA512571bdc998e75b309746a1420991b1a5dc95895a88c321632c771cc1971fad63fca25097074f3338516b64e1ff050298c3fb9de39733d753dbd06d7dc5cd1ccbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51df10a4aee47b85765a86db674eeb97e
SHA1fc7553c07a71e68a07ea021b5d257da8a31ff8ae
SHA256b08ae41a9d512391957dc45d32b6e9f9e46ea8fc38abb91ba7e27e535268a009
SHA512b9b97f72ecc6d3d42a43e945e1e922b7f5c7f7cd085080a0e11d7f35971aec5c47939763d8d155943666a1ce4daea74f8382b400acaaf0cd90d715d4e4623f7b
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b