Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/06/2024, 09:01
Static task
static1
Behavioral task
behavioral1
Sample
198c51718af107b08e917497dcabbff0_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
198c51718af107b08e917497dcabbff0_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
198c51718af107b08e917497dcabbff0_JaffaCakes118.html
-
Size
7KB
-
MD5
198c51718af107b08e917497dcabbff0
-
SHA1
bcd8dc7aed373914c0fa115e7bb8d77c414951a5
-
SHA256
92bea1c893ca580be30fcadf229e23bd7b68a9b0432ee6b3de32c924197c3718
-
SHA512
54a3f5925dcc8cc266154203b23a8d9a950be03cec9d4f3b397c0bf101def1601ffea6301eca0d0936a6cb365d8816e814744da56d210bee2f619150151511b9
-
SSDEEP
96:uzVs+ux7KpLLY1k9o84d12ef7CSTUSzCca1sLiQcYR16cEZ7ru7f:csz7KpAYS/ggR4b76f
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{05898DE1-352D-11EF-85B1-6A83D32C515E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d22d2c31ab5e974d9e6007dcbdf7815f000000000200000000001066000000010000200000008cf9d1b316d67a8e4a71c0ed936e8b08a143107c232d45872640a83228c41d84000000000e80000000020000200000007eaf1c892afe8047d29d2e016c8e8f594e549a369464cc4f5714c90e2d76cb6020000000c6377bcb8393cbe4642e89d2ba74bc8c894291bac4c5286b4558fd6444fbf8f840000000db090e1f98e04f85c1f516dc2907140ef8fb66d3a6f05b1e7b5a1dfd01843f11b37345210f2840fffed3571d3a8b50599437b4743270e13256d5f8a571693f78 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 409282da39c9da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425727163" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2044 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2044 iexplore.exe 2044 iexplore.exe 1216 IEXPLORE.EXE 1216 IEXPLORE.EXE 1216 IEXPLORE.EXE 1216 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2044 wrote to memory of 1216 2044 iexplore.exe 28 PID 2044 wrote to memory of 1216 2044 iexplore.exe 28 PID 2044 wrote to memory of 1216 2044 iexplore.exe 28 PID 2044 wrote to memory of 1216 2044 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\198c51718af107b08e917497dcabbff0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2044 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e403f7e3bc07245ea0e9b7b665e536bf
SHA16525378e8c332b10b76ad8643b3343704f3ebe25
SHA256b5005a6fd26db5ae07ce702ea3a4042d95958fd14a888ef1db229b3047eb3c6f
SHA512e7d3b1298b9a7c5faa70144443b137958759020bbdabf54ca59e5d125812a61b0648900ca8da20d6a3b9d697cd1e94a3d785c02c969efff79632d2b023b559fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59516842986f7f4c9acc4ade6588bfa63
SHA102f99051b9a062c43a7492044bf5ea65c976d6a9
SHA256077efa8d35eb52142cb210b8e7f69278513f1c551de3fda5a65e25bad46141d0
SHA51259eb51fa3aa518bff505ad10d60068a1342516589219750d34b9e5c1877aa2d69724d35c91da6ad5520b54b6b459ca151d4b4888ed2699b0117cba1a98449a21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ea37a9112e91075139c2ebfeade20c1
SHA1e280e419689c24eb5afa527846696568685236b6
SHA25684d792a53672c3a26455f373cd45bdf5c70a3694012da34e86db0df36abf0e36
SHA5127d973c9e3545b9fcb9d63a485e90aa49603a0459c7b62172c2b5d55a5e073b7f3e5e3af224dda82a2fe520b44dd6a5ab691341a4cf1fc9798d7a1e2f98638fe9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6ddb88c858b84d05150d4f0162adec7
SHA1238216c131fd13a2f758e6c8d890929a1c2fdefe
SHA256b6869e26684b54c5a28b2142bad2fc9ad3df1afc7aa8a3e7e3156d8d013fc79c
SHA512b5683ee387751f5ea03459fd8949bf025514c2fb1b0e016a9574812eb8745534200a1833ca7e0127f11ad96193489c4f1f5e285b14e5cf590ebb160889495ad4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d24b38024182bb4ba60e5f5daeae966f
SHA1423e26aab39f624a42509ead13111f61771531d1
SHA2564a2520f02dd4361e4b9d1fedcd2242bee614d52404aedb528593c4ec44df651d
SHA51232f0b710639725b5a704fab5c31726451322e64a51d5a6682cfb25462e64cf89371523b2bebec07b28a35aa84e03771d914b1ccb1e86d2968f46e5c230b3c993
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b451bc8f87906572a68f89e0ab207fd
SHA107f00a3b707a6e82b0b21f72bb233b3b2e20f7af
SHA256456ef1361928d498af902b2df2a8a5b96bd999cc5cb788b3997e6e6510c30551
SHA5121731360dd34ca674cd7e4901787f911941b97945557bcfa2a28011966ade3aa77c8aff13a629e67661a2da2a7421dbc661a3d58949c9f0cf369c695757aba2a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a984a79cacf970ad53073158a56cd410
SHA16bc58061d0e050734b5a75063385e38b1ebb0c76
SHA2565bcb02aa306d5e9978c5077257ce9b076fa71bf71e74e2e5d78f84da4a9fe1fb
SHA512b816950b59f493954ac6f59a957a1b9bf002c0a24408bc40d919c23a74ac40802410b30874e8d74df81b0956e0d217bce5f5d55498b3e03f3cb5e9516c8bbb6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3ba2e3994a5f2c74a14ac6d0bcd6c09
SHA1ce9fe40b48807a604c75590d1fd8f5a76e99ee6d
SHA25697dbe800b91d74b8cfa53ef424508e9efee8010d5b81932cc4411eac1bd4bfd9
SHA5123ac79cf8fa75132ff7d7ed413ebc0054272468f98a796981ffeea120a2f79c3e44a27b515466b6b0c9ea7fa533071e18dc0ac672165f9497b5ac0827e118d788
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e784a4d3e41dadea4c926eb26d7a901
SHA15e52e97d8c57db1e5ab532954fe0a36faf4add16
SHA2568e71319a4a04f840ddb1f365b1aafb9a29de1ec2f9173fd74929e2238ca2fdfc
SHA5126f85ff57c9ede3f2ca5952d9a38c83efa80960a1df1c491d534f6579f62c78a505f986a39df97c7ee55a1bc4540071bf52e0550b48eecd441357883bbaf74b6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e72695efd4800b72dfab63277c6983a5
SHA1bbc0ef6ea9bbb9ca320177f7159eed57f090c6c7
SHA25686c59fc6898b228bf08f53325dbd8f4a69334bbee12726d7ee0e01cadec643e9
SHA512634cee65fa1349e85c340197debe5f354211a05f0cd495f14741e42a77525c1c83c7892945c657c3b554ee8d47b006608b23b76300ebe694afe491d4701d5d8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536a310540f159ab81150e21d5243ceab
SHA1d8d8e626f5b50c4958f439e2b0e000c7a66ab636
SHA256be69ac2a99028cd9de3cbb3fb723cb0a454374de03b75ff3a3cea4bae1d42ac7
SHA512f59ff1847ebe424ed63f67cb15b6b03380e26068d8cda46f26c54cebc480710b4df974a417b4de4360409a3d9d3b662bca5e698492b257aab5d5b08919a7ab29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f68e3ba14bee1cdb47e9b994ec55a3e0
SHA149537dc6111433ae0412652dd975f04f43620e93
SHA256372a6334957556c873ce638fab9d36f7504a19d4a2894ff283ad2ef4b01cbffa
SHA5123c72a56e0e6fd1b3a30ea578ac6ef5353f2dc8d4ab8737ab11541ed27df4a9e7f9e763600d0141d56da64e6e85c2080a045f78f86823c176db844e2166dd384a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a43d2e45bd3e7ede52b36012a7a1f91c
SHA159222b3b3d3886eb17134f9fe3d43200faefae4f
SHA2561950575814aa688de54060550f7f4715c9157fc651a410e71ff46a23628c9bd8
SHA512842a55076140c81ee90754c2337dc0032db1500121849a0639b1ba6a43564ae7a9138712c960826032f38ad39adfe35c02f8a5037dae848472d489fbdcb55691
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5623bcc4aa42460788c6155178524e6dc
SHA11a4afd2599bf5af1e663900c3bdc4a58587410d3
SHA25648045199be444578cb2d72b18531fe6964224a3021464a43395be426eaa1d96c
SHA512fb14bfbeaa4b0b3e1b660fe0ed3f13650b18e5ad2fc2d44400e367415475efe87ecfcac0990d8adedcf5871e3e9022462877a723c4f3c83fc1c8ca4054b3ad82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52817eb45479f3230915bc4dc5c4e997b
SHA1d0cd8b9b3faf8f3a0b27e99a95290c18fdad5ec4
SHA256a2a46437825fdc38c04b959f8961e4a1397694b0cbdc91293d981ce770cdd22e
SHA512676d8dac2a6dcee24d4ad2a502cefea671656e24c325a6573beb3f2e62211f76e38a4885e45175e3a1497cddfee43b697a53b112bf0ca036cf85c2877c88a94e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b85c2312b3242a92b91fb4843a831ba
SHA1b419e43d29abb3ade696cc34eff43f20b48aedcc
SHA2563004c6ae90ff0c392f4d2071c662883796d6b0f6e98971fdbb1e78b5260aa4d2
SHA512ed51e1d8871308058e8d37fec9b1e09eda67c2e6be10b2a9cae6968d40e9cdeaec071eafe6c137af2facde27a7922075b96ef9ec9dfd4b09d70d83874155c075
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5665354455018d788af391094517bac1c
SHA1cda55d0757330417106d6e50c3abefdcdeb6ea97
SHA256936d5f2a05d6d705a3398d47a7bb4bf7df2b9ebaccfdbb47ef9a6680e9ce395c
SHA512627a882d9ec1e12b20df909b4b9f0eb661786924757d1cb14d45817a8daf6e6c9d1934619e6cb7707929c302fa81f887d3222189df371084763fab057d0f9f13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563c4d055394306863d8a0f0f215f7a3d
SHA163d5dd74d79eedb5c915124514aea6b953a46070
SHA2565aed9e7b8d2e3d2f10a65473d71102b20a7ff7f7bf8530d3f27c17e73c7fc774
SHA5123bf5c80983bf07cf81db2d0588a1b818f37e8184714f907075a6c3d7f965d6d08050b05a2dbb0de47a3328f21187898775db6ba20eee7c149a2cda9f26b2b543
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b