Analysis
-
max time kernel
121s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
28/06/2024, 05:13
Static task
static1
Behavioral task
behavioral1
Sample
18e682756d5fb1c30dcde58ff17dabda_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
18e682756d5fb1c30dcde58ff17dabda_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
18e682756d5fb1c30dcde58ff17dabda_JaffaCakes118.html
-
Size
106KB
-
MD5
18e682756d5fb1c30dcde58ff17dabda
-
SHA1
27cb749ed8ba175c1b7d2337ca65ee11ed092d62
-
SHA256
4171734cf0f38229b6bb09902d6d4567c8aa87d44ffbaa14accacc3fc4883355
-
SHA512
0e1889c34c4847b2900de313cefa389e4477436881f97b358cceb19ac980a2f4bbb5086ffec128513b8efd5749ce9db9f197e9a41a408395623706e80e2a7891
-
SSDEEP
768:YlEvOt65zp3tsLd4m+hxcKbKkTOE77Bn6eL:YlEvOt65zpo4hhxcKbZOqBn6c
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 404556231ac9da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{262C5FC1-350D-11EF-964E-D2952450F783} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425713474" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a0390500000000020000000000106600000001000020000000f90b71877bbb19581f3e6b787408e8b4ebe340e119474b7e457097dbaf8a784f000000000e80000000020000200000006f5066aced2eb1aaf2853da87f22f65f4c907f503d9f0d9d1e3926cc41287b1620000000fc993d7e7e197d4a5519e07e0a66b6630020248232b2de56b1060240590cad7340000000ac4f62658e4267c9260171e516ce68121954d54cf6d9c2c6c09a424c93b69b981edb51ae9211f4478ff664edc80b8b0ef2ad7c02b25154e1d0896ef9a55316c8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2076 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2076 iexplore.exe 2076 iexplore.exe 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2056 2076 iexplore.exe 28 PID 2076 wrote to memory of 2056 2076 iexplore.exe 28 PID 2076 wrote to memory of 2056 2076 iexplore.exe 28 PID 2076 wrote to memory of 2056 2076 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\18e682756d5fb1c30dcde58ff17dabda_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2076 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b159c816f05f93394ba5cdb98997ab58
SHA1658fa82b71e9b8df983bef350c260cf75a28deba
SHA256443e5a8e358a2a10cc6965f8dc8625c303e24bc2724fdf3e27ad5ba0120c8450
SHA51239232aeea06150f1d2790767a549961b11d55f21e009c36c8c0d8ff3747366eeeb79960d9d44b48c05415c976c6417c206bec42fc0d4a652d3ef6317ba6e32ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5260b7196c4c7a559d548c2baaab8e3ab
SHA1fc8995afdd1287957d2b858b10abe4084e69c9aa
SHA2562d567bc49a47286a4205c77958a468e1aa3a32cda6055c2055729694e3dd55ed
SHA512ab1cf4d5c94e3b8529081bd74419ecf32e6f69dee3225e65c066ca10a7834fb4fa4a21db8254658df86f375d4363cd55581cb7b36a4bf4218f6f024b43ce0e5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e6ef9106cd8966126f060d16a62a8d3
SHA1dd4388d7d1734ea588ea67a764242ea17348a20b
SHA2569538ebef68590d186e81d28d11a01fddc4c468abb989a4be546827394a13644a
SHA5123afcc8dd6ee1c562ed4831be6be3f0c229542f323d7a9e8968740d45e699cf0a27b7ff039f1af65091ff945e6fbe934a6582bf0841104f85f2a97b17312475a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568dddd3392d8db609249e6612fad97ed
SHA198b68cb7a8c837b50a5a46c62a356734d0235eae
SHA256769466d171fbd22a535db0e795fd1d1e2392c30b34d071d5f534f1e79286aa26
SHA5129529268a0a8fa29fcbfb8f2bc0c6b243035539b40dbfd6383884ea9b0faedf8dfb309a36fbde0dc41f13c0bfc6e0535f0f750586b8ba3c00370012c20ba2cb37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6629fe5e648ab21cdf2e9c283486cb5
SHA1755376ada34314af5163759269e66b4ce97e9265
SHA256ffca44f1edd1879adc42f28e71ec90a595f3a3f93cd9185c01b1688b88bb9f9b
SHA512aa8552e4fb3a07583793e32a20463fa8a8e9041624e40ecaa5cff3633b5c0d9b1ed6fdcf44bc3702cf0c12a261ff924bf13e7fe278e879a67cef750f2511ef28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2e3b3e0949f94e765ef302f677d5f03
SHA134ea2404799380ae76710d6b934a74c482b4b3ff
SHA25655df2f95ea568d458aad9d0fa580104e73ff230861081af41e3c891b5878ee96
SHA51292040e44516782ed2b5f231c8920dd1034eaa57715cd90484463b9744ec32b693cd4301a4887404ccb067732e14aab194a64608740176e4502f0698b18045bc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce855c82b3eab7ffbdbe153e25ff7882
SHA1ba2a5557ebe7cb8b2337a06b72e2c24c2e8d2cc6
SHA256c237f56bd696dda876bb520d27cbc3e8dd99c5e65b7d5197f13db415d0e8f552
SHA51236622e4a5ec8e2fd9c7e63819e90e0c2f1b102a598c36bfe2250cc83461796acf22d67cd2e7991a1a99cc05a67bfdbac185c6b1d1a29dfbc68743a4f00ad0d05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532821d188cb1b310f02695e5ed4a5b1d
SHA1fa233b007f2b97909fc9fbb1e5a76aa35ec92079
SHA2567e88e5903bbc7b452aab0bdb62a5ce6d16d7db4b85319134732eaa6225ac8196
SHA512c5fd57cf4205971bc4cd2beac4cae9d100e99e3fc3394dc567dcfa02b63db01624077eded5dcfd975119e739ecbd2ce9a60b24737a34419140ac837c26b6f5dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54609b634c0c005f05b7f3ff21b24b677
SHA1ff4930c69375a505202f207a1de018d7e1c446e3
SHA2560df1e07592220064ad879682c40ccb7b41d46866df0e5c19f03734a4adb3fca0
SHA512ee40a47a23a0813ad4b75db817d5698dd45df9f842ba4a78592e586f18c4b9f5df55d754ffbd7539b31a589fe9d4275eb9ef6fb09d6e849af3cbf2fc1c4f878a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a4ca46af8ecaeeba0d85e739be27631
SHA141b858af4fd558a7ce6665e0a5d81662728608e1
SHA256e822cd3c01df23d838ff9ebbf59be0b71f75a2527d38cdf5721ad536eda34c3a
SHA5127557c390cc643d3d241c47dfa0768f6710619430812e72ed7b4b80941f53132f78966f753a47b8b6e43edd446b41de8484d6ca3c3f1c631b27ca1d052eecae2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50283a2a01c500860c4d2fa32d4f647c9
SHA1a3d184a996665a323f2ab9dd664f249e23936e5b
SHA25688c0173d8d93b3943eed46e9b5e2e8462e9cbb75115e45b44b5c81082f12c698
SHA512ece9f1c1921c84fcadd1b1470a7966d62cfba96443736f33db6985bc44a8529e465a14f7b226e7d7b809a161568cef25c6703435b99db92dbc34faea3641d838
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac083650bd18617663f0eb07976d9fb5
SHA1a439a10879f2d54ce18febe9be53d1a152f70e09
SHA256e7ee2b86227857454a87d62b5f2e1edbd20c6348191ea589dbf754746b2b526c
SHA51254e5247f4387fd42ae52f1cf20cc394c2281467aebe31dfd4d7b200a7f72329dcace5b78331122387b8c22d4c001a20ba83ba74bff7405491b556ae51eba6a0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505789219ee5a5c18d30a561f071e3bc4
SHA189aea73248dc80a4118f17665e8c60539c22016a
SHA25644b32dae2d7de1507228284a4275856e14cddd80d100e7ea99a8404f33a0030a
SHA51205e73a09af1ce04f2f85f9c3b502a92363a383f203518e4c434a37af841ec766041648b601f0922d903cac0148b14fcb2026ff9bc41953186e857a3d403996e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55174ca1758f5b9289c2f8d86fd1e8886
SHA1dd1ad4f4b1bed2dcbbb4399657d5cd9c540459be
SHA256b157eb5861c4b2fc8db41915c8d1b0abfd3e8cf8b12871e9590e8d798e5bddf4
SHA512ad2f31d9857b81f2df53d382c5fc92639f022844949869c642055f07772296dd520eab193d63da686f361ed0324b2d453f7784237aad578059e4b43d63361751
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae82041703ca6d79ed48a7669f313c15
SHA1b5c8bbca2d0d88c276be378437db2d61380dae64
SHA256d7a8cb0902f271cd1310779670f09367874fdbb5431d8ce7a9f6a1f686f7fde5
SHA512be71342877a21bb0f9b56fe5013177129a1626e700650b2e20df8018a5dadac7ed08b826f4abcc734d37e7183184b80b1de9be9ca5acdd6814288a567df50114
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fe7232d8a14f8b60f8fb8a9c32c561b
SHA117d197fa76f68b314fbfccb99faf0562f9c49ac4
SHA2565febe41d848f49f3dfa374b6ce5a78099184825819160e95b4392b27fd350fd9
SHA512e8f2b0438f9cefccb79ff8e5408459524fbf920e9e79e493d7fbd7750dabf7ab0a69b8676575513bc7973073f68ab86198df59a7aced89695cece03fcd9cc307
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e9f8ebf91d56472b930e7daf909f7f8
SHA1b2bcab127bc7b1b0b1ea2f9b46b2067bc4b6a7f6
SHA256bc37982f600960fe895f5c6cc2a6c1f4418fb7509e5a7494bab15e015fe8bbe0
SHA5126fd8509640bab7946ae6f51b50136bd86e6b431387e53286fbc42ecfce6d6399cd1d7aa3bedb6a942c0a016d316d4a9f9f0dbd9cb796e005020ddfa4d31c22e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5023ca9a79e92a253441ef42bba4b7e56
SHA1a7582aa0a1689defc964b6d67f14ed7deec909de
SHA25690ccccf7177c5fe13e488a09bb68326ca84ee8fda76f6f585497e92ba2614a39
SHA51269124956bfa887e073df5ee7ca6734396e0f7fd181b359094b39cf4d2746dccb4a6a4501d1b5baac498dc6fbb3cb5ec0e87fdeee4e37c1138a4744ce83de9a85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae233319586a2e9bb0a75b5313f9f8de
SHA183de62569216aeffcf3330cacac99541df8616ef
SHA256873b6cd6849cb988057e164b62a71360f323f0212c129940d9837e919f1eec66
SHA51291dd9ab0dca1751e68f0b496c02fc8c3af7e714bd6f0ca18c00ca07d130fb8d81db626036b05f955c1bd04a8796f53a57ab6cceedc595e8a0c59b43f96341939
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3815cbe56420933aa6416fa3365e24c
SHA19156198aad2d621864796e9f98903d66405c916b
SHA2569219a43bae45cbe339b076591e3151edb5e4af2268f7a72b44fa1fcb1a8226ad
SHA512ef30b6e62333b84626b4c4f8f009f19df6ee475383a9642971dda9e0ae78af172c622837c2403a805433178d0c4516039f56554b6067599a93f80a20ae969126
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b