Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
28/06/2024, 05:38
Static task
static1
Behavioral task
behavioral1
Sample
18faeb2ca6b44e8ca2138c552d2f13f3_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
18faeb2ca6b44e8ca2138c552d2f13f3_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
18faeb2ca6b44e8ca2138c552d2f13f3_JaffaCakes118.html
-
Size
6KB
-
MD5
18faeb2ca6b44e8ca2138c552d2f13f3
-
SHA1
157be272ddaf005606ff9b68dff9b77ecc8dc59a
-
SHA256
78d2fae56dd6be7e1232c268d2831fcb3f46d3cf69c7a9a4cfd3a1ac9db1150d
-
SHA512
e73a6a16cdabaec7e0095008110c77e193346666691b1a1ac5efd192f2b5a15f55aa52d71a9b8f9cb833905d293a2904a96bbc765f5a54ad03266995b2353f9c
-
SSDEEP
192:qfDWv0AJ47g3yF1PSW4YvnWv0AJOwss7g3yqwsl1PSW48:qfZ7b1rjps7Qpl13
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb8100000000020000000000106600000001000020000000e35c44050c484446171168e44169f924897953d0c8f2b084f1e96cbafd4a782e000000000e800000000200002000000045a8d76722b01b1296c7583a93c2ed1749060067eb22232709e2772f4627324a20000000a27be028c6c98aa8cf81f25f527db239f824b8287550305aced1400f271261cc40000000ff98c7569b4ce8817549fb6fb0c3bc4af0d6f2caf0004fa3324bc6f890c72717e199d2cc179cbafe715c6e002a97ddc57ebc0a735b595519db52df4fa2f087a8 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a04efd6e1dc9da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AC08DE91-3510-11EF-A326-424EC277AA72} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425714987" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2124 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2124 iexplore.exe 2124 iexplore.exe 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2636 2124 iexplore.exe 28 PID 2124 wrote to memory of 2636 2124 iexplore.exe 28 PID 2124 wrote to memory of 2636 2124 iexplore.exe 28 PID 2124 wrote to memory of 2636 2124 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\18faeb2ca6b44e8ca2138c552d2f13f3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2124 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a60f47507045303aedf28f534f831983
SHA1af0acf6bb19e1b848623e88934419ffd615bb35e
SHA256fe75c61e1e309511082823a3c9feebb0efcb11e48c5e0b7e2138c36708a837c6
SHA5121e2617c9de0e34839b738772648fd513707693d8294f7c9e3805257a311d8e02da415fba9f60a919a6cc902cf4f18e0b94bf4fc631527778ffe7757db320c0d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6c751ce0860c8ca62e549d2084cd086
SHA1100b2f497ac814bb7a4c81229f6743ae497b931f
SHA256eb082fc6c37f0f9de9b4c460b76b64d739f23f072ed1f7c3dcb88ac5e6585865
SHA51288aba3d45087c78cb72cd5f85bafcf506e6fe922b8143ae9c605f2b82358b808bfea3a71b581c0fb801fd66f5274b20efc6827f58b4757594af1ac2725f2f2e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52672f9f4fd384421d922b65c7c4b3b65
SHA1f13667688e3d9391d50801343da21b86d3e4942b
SHA256c402175b2997a0747a18b84f3e960b52c0afc8bbf068132c4a09bf8efa9a3970
SHA51237e16c2ddec7b8b64887de0befca28ed421cb823f054038e9f9d8e693c6582b08408827e9c620cdadb0850b4bbb2db48a9c8a44d3fc3ea3ba1f1c864e3e3f774
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549b1152fc2f7322fd4e86c4cc40fc2e1
SHA140006e0541b988b0b955e38dce646951aa1beffe
SHA2563b9d486c4052e4f141d323643a9901ebdf0f6dff9eb358b4abe8ea28d41aa400
SHA5126aaa15f898f18f1646cde63c58490283dfed3e96792c351198e5f605e9944f880d07d0d6ff6d334890a82292cbbd49d896132daf23088bbbe9c0f5f308f1a4a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cdfadd6d3aafad0fbd716fbe12b416b
SHA1ca6a9c3cbcaf936362a4b4fb4f53cdf9b55b3291
SHA256aee260df76775a19f35513a6753fdf62b50151bcc4d9c31c845021f6cb775ade
SHA51224b31bfd818e2b0e647e4bd83347a609a3ee47009ba9123e9944532dd65c7ad4f473f7bbbfb7ba0471470b52a2c46b74d0fd6dc7bc2d628991a117a601ec73b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572fbecdf0e45ab1e7a0bf848f995057f
SHA1314e8fe4cb021e4de5514d48cd7e772c74935471
SHA256eee0dc201b9c4f7623ff066472b034115dbc0cc677b13ed832f716ce8381abd1
SHA5122c45ac57bf307c8c8d65aa19af89f66aa1b49d1509db6a8d0bf6332bbe4898960ff0c534bc024c6005c2314caf002912ae8cb6e8f3c3885d7588fd8f95943a65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54982b529d81f594164972620e9604c85
SHA14118f737493341f823c0d0558d670f4a9f2fa7b9
SHA256ddefb85bfa30b3ef11e5fc005eb0bd1ec357df54a5a744a2a42576c22b69a708
SHA512faa9c1763358a12a7f333431713abbc5e6eee3fe07c6ad55ea4a474e45f6fd4f66a8cd2c010eadacdb6c3583d30c73dd05de304f9bb7ef1158f04ce0f2cafdef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d8c10ce551c2f684289dd60088963f5
SHA1be9ce9cfa92f09e9ca38798852b5224cac8d3068
SHA2567910b5d9a86b1e841daa7addc1cf59d53a3d6cb84e63a2bdaa2a8c81b3410c1c
SHA5123444053c6cc9512375bcb84f0eaa622d3d1af5818250ba6cd71c8149fa09fa4245c2f80a8a9fbc8d6af57960a3279702cf6c2a8417f92881d3cb0d1c029c82bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fff73d543a88431e31af5948f3a9ea1
SHA13c4f437fa2041a450850d4c0eef8bb32f5c39429
SHA2563399ca28a009c7b9b7ff7b6af8b41c02571513092cbbf624043c83d7be9f8f87
SHA512411af50919c140fdb5afe80f502def6c13f91cd881aba1baa2f382e399e63304a2a9b2101ed07deb29b494e0686e7f3904f0ff7d00d703978e15e7b3d72ee790
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509e46c13a295b3b9b76a0cafb2811aa0
SHA1eaf4f83b1292f361ac0b6283af6fc83b526c6b73
SHA2567fdfec67e44cf1b8f2e5b23471155a7bd84dfaebfd1d53bda679d78ca831cd5a
SHA51211ae6470b0e5fd0daed1ee7135bcd2614c593c6371582338fb14f94307593f594e198a8e746161eef4a1b0b3229ff6e92589446f177fb9d7e90b27964069b971
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c00085e661aa17ebb04dd7cddfa2dce
SHA1d288789291487c8dabcc6d378879270e4948c25b
SHA2565b71d53c57071430d456a067be03696b9778dbf4772c37129b65e928d346af32
SHA51298e1fbe8975b13cc5584393e8c05617f00c61244c6f6143f8cf3979a24242380686aa03c61438fe4f0424f26e3d80b956bc4ee8b62c15571a76e1411bca94a65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfae516b7dbdb637aaf75d62435914cf
SHA14e1c29ff0431ea947b346320448e5505051cc44f
SHA256eea1b89b6be09fc9a15aa315325de3f97ccaaafbeef572dd29a514b7a0e61cbe
SHA51200f5e859d7b46e6dbc1bc040351d2c6883a687cfa945a03498f9b1b18cc23b869f286ef0164ff2e18a7bc31dad86018cd407ffc206d2ad37e9e2ab2179f60cce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55340493fa3e2b9d071ab76df81c71742
SHA17faf3bd0018c87e2fef70669db767ffc27f5bc83
SHA2564777e3c719a88c574b34326dcf30d375285cacaf16d90087bac11fe77897576f
SHA5122c3001dc2f36f17ece8ad76e88fe9010ded70054aa9d366c0ad5fa18cc96b8cd6789c97ff7272a9bd6431deda3683dc8ffcf191f9998aaaf277e4edb948e8e11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599a041cd5c5e04ee786b739aefdee52f
SHA1b80d1733a9fbbebc94e99c01830ca90942b000c5
SHA256599ec8b9c13b20e910711bfb54ba8ec89db13192a77e219d38c288bac3d9995c
SHA512f116af10917b552febce7c03f516d8d42541bae000a846e24c639201f6d9c70ab26af07a9f4084ee51ba7526ea568c78c72e52e888c9332183dd26d3f768ff49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58641d35690457bdad770269d82883a90
SHA1715a085961c175ee685b904d643025fb49eadcb4
SHA2563e86e8273d15d5d32f3da10b9c895e2cbb0abaa25a1d4a7484e6c0a49e4c2992
SHA5120d05751b42d793295108843e9dadb5b7bc614a04291ddeddba1c9a72c7259b3becd51e0a952255b09294509d7cf5ecd22d037694be9aa4b4fa32e7cfc3086435
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9dce19cbfe9be6b96f4fb91c66d35b7
SHA127729aaf2f9e019e030b8ea5410657c4cd7b60bf
SHA2568b6acb08961ad980eebf3a5d29f50aa525af8a6b1924fc49339c39bf684bd998
SHA51279390860f0ea284cad6ef7c9bebe0a5d73753ac67c1bcb5a37a72e52a6b2f760b2bc7f58674df4af1dc635cec99f045f993c0684864e6614e5f6d14881da1fa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b6d1cea4e6f128d3dc73fd61dbbe984
SHA1ed3f5907154f61124db352e8eb91e2b6fb1f4184
SHA256df55a11b50f596d294df7d65c20aba4d23c0d42965198ab9ef3ee9f9617d56d6
SHA512a74e86e6340edbf9b9f747fbdb647cd41db26936c4550474a5d7e43731351da20e62f63c9238d9caafe73910ca6c598402ffe574fc8cbaabbb7704baa68b76d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6a8dfb4b51cf7138a2fe862f89c858c
SHA1292085a583cd2d8eae421c796f3f397a1fbc990d
SHA2565e986affa390e1f9710d73f5f12f6b9bc93dbe8119fb5dedc1b1188fff4a9437
SHA5122edc2cb02a843db017d1b2ed79b1d668468f47ad836fa3621e8d9fd3fb1d3bfbaccbea7a8642385c919c895d2e4c30526689e638eeb074f227675f5f95e44bae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec33c0f02ac4892967ac56a217497f03
SHA1b7c8a9d905b4e6cf1a179f5dcba8cfe96becfb82
SHA2566473d7a9a892d3899b5d4f2ca2c7494b49331e0bf4b5122e73ece7db77d948f7
SHA512e5a6a2a8b009adeffbd95073f577bc14372f0bbec6b463f708027a4d538db771fbf03b18110f62ebd58827ce4983e89c29e796883b71a9d4533b1ff0b309e77a
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b