Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/06/2024, 11:46
Static task
static1
Behavioral task
behavioral1
Sample
19ff396b488d15dad21b54f49a8e9d56_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
19ff396b488d15dad21b54f49a8e9d56_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
19ff396b488d15dad21b54f49a8e9d56_JaffaCakes118.html
-
Size
28KB
-
MD5
19ff396b488d15dad21b54f49a8e9d56
-
SHA1
b1fc675e794a49881176f6b78c425a1dcc28e360
-
SHA256
cbad47263023abb5c7e8ff76b3576bdf3153a199a9c699144cc55f8f60488ab6
-
SHA512
2e50e2ccb5410a5d0d05121689268f371c637516989a3a19abad6e66cc15def51d063713c1cc2edb081ee32e9bf88bcf29214785d318222e0256fc6741e578c3
-
SSDEEP
768:Zcd9QZBC7mOdME1pC5I9nC4aj9wWwlwJfPd:gQZBCCOdx0IxC5wWwlwJfPd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0A8EFCF1-3544-11EF-8FBA-CEEE273A2359} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fcce3abba0d98a41a3d167dde9e6267c00000000020000000000106600000001000020000000f14aa3c29ea4407dd5a50688ef9ea7c99efe372a10ffcee3e1baa971f26eb7c6000000000e8000000002000020000000e647106931f78bd4db29272ee26e80634b05928013cf0fceb84fcc75cb08e0e52000000016ea500c25bf87adfc219c15a259585b82c7ffb3645b71dd1784f116cae048904000000073ee93680178c6f531c8432902e10a040d88eec1e952d8b47f8da52ab11ef68d73b4bd188272f9c1f9ff32c2de4f9a36ec069aba312568c8d24fe2c88403cbec iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425737050" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60d01eec50c9da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1984 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1984 iexplore.exe 1984 iexplore.exe 1884 IEXPLORE.EXE 1884 IEXPLORE.EXE 1884 IEXPLORE.EXE 1884 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1984 wrote to memory of 1884 1984 iexplore.exe 28 PID 1984 wrote to memory of 1884 1984 iexplore.exe 28 PID 1984 wrote to memory of 1884 1984 iexplore.exe 28 PID 1984 wrote to memory of 1884 1984 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\19ff396b488d15dad21b54f49a8e9d56_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1984 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560e3a7b43a028095372a5aa34943986c
SHA1ea94bb1350ae067766786d1af08fd35965e2ce7c
SHA256a6fbde4f677f9e973e08e38057a901463a340a0ec3f3e78a8deb9b7141a30d82
SHA512ba1dfba95281f59292671b3d2b7ba1645352b9a31c2e4567875374ddf7e8322f956cac14f02d4f112505e2ebcddf5f7c1c1afb1e046255936a58ef570fc8d4eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582a1d7bf2e278763fc253581e2666492
SHA1d1781a60cc19c8ac86ac2151b657d058165db11e
SHA2568f2a5a562a7483bbdb6d6f175e6e88645b42b6ad1b95e259cc46054f090742ef
SHA51209e53297c1ea51c005371d5a58a6a3a390b4d8ffa62c8f74c9085dc0c41a367af6f2fbcb33d345be9e0466efe49fa7db3a23e1a567ed88834f2a4eff25025857
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bca2a6b06acc33947e3586b1fc392c4b
SHA1a9cc5b13242145657beb7441a6d8195c47142cb1
SHA2567f8e0c33bca162a507db2ddae099e4257fa60d6c59e1cfa63625cf57db61d4cb
SHA5123e01cac56703bd5c106b676f9e67ff5818e2b6e55ab7130ffefc274cf3cbebdf49e0be389c1468877577b12755dc459283afa5fe3026483a9ba5a105fb349439
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7137b7ccbde500e8d22de3548acbf64
SHA17c59bce1e2aece0d02455d86cbcc70ad6477777a
SHA25603bbdd7a727c7971a3817c7c9539a38ad89ffa185805095be41c64624aca9185
SHA5129100fdbebeda85f71c5e827da0063773c2f8e8cd0c1ce1003c6cd6b1beb2d57e0cd374b3e5b864715d697ffe39d62713f3b6777502485c3be2c099ce0fe55977
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bb858cb6bc876a4411cb30fb2ed32ab
SHA1ae3a39bac8ded32909ea6cd892bb2166d9c64215
SHA2563beec14a8e02797bf8b480d751c2e7e7db010f8bcdb3e8a444158ebbbdfd0629
SHA5121235fa7992f8c7f7fcc537130f0669526ceaf935574cbf4241954914eeddd40f100a7a84202702fec057a79e4c94680a096dd400a9c52f8bbb1adb29bb610f52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596ef11221831919ba2f091be2ec252eb
SHA1a900b15a156278973db3dd11b286d17380418999
SHA2564d3160a9a0ca6c27c5616a22fc2b85dd2491bae91f8c21774838055d73d6f81a
SHA512daa81a44399e73b6e1bdaaba43aadc9f60d8bb5ac0b147d7a0165a24d8d7678ed0a59a15455346593beef4056bc8bccabfd916d6212c5efb1e741a176c33aad1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fad70be42e2f748b10544c6a8dde5b1
SHA1ca31800f53bc433590e4b6d9242c30da7f333525
SHA2561ff845b90c2190a5b1cf2393ad6857b0a1902c4fc81f2f048b61e1e8151970d2
SHA51275e39a4513798d5ed69fa6874edb1adf74ba6bf6ec8473966bfca8bef37b1babd2d8e0ce56b093179ec362651dfb059e5df5078e05e9c658d1a102d6121d36a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51700178c3af9b54ed39d6d3d33235ea6
SHA14449e678baec8b529d5be9eeeb4e8692084ff0d6
SHA256369c289d596a1f136225ea0d34517f3f533e0c623f01768646c1e8883d98e2f9
SHA512f4b44216dcc08b27ae9d0fc98efd1a917c71b541b073cfaee6e3dcb9e94dc17d05426dd77ea21334efd2074775cc27f3e9033a735e2cd2ed81919c82ea79d846
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fd3f41a6b4274ea16a5ad739803bd57
SHA1d26523e18e1021969850c5d8a989a771ec427131
SHA2565236103e48564ad5285828350c9eb745dc873804dba2d054f05ae7688562414b
SHA5120013ea1753a3c586aa5d1812759f3ffa146b6885b4f3a18e575e376e6295d11260774570546674e61c4cec1f71e3d2113efb09ad0817030945bf88a6e3e713ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a4234506903d05962fd025d7aef2c94
SHA190ac7cf6e70cdee10781c08c11d4ea767ec8ffd5
SHA256debb0b2582cc41e83b94bba8de1ca31886163e753479c676e14dc5b4b3119151
SHA51299b714a74656990267cf9951c4699b62f5273af598aba8bbe704d96e7b43c4b7838615b771bf8e51ccb955b9e8784598d96c263b512530d0ddc40bf573c1dc67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ff0c4afb5fa84e2ee1432c1b845841e
SHA1e65f641ea895cc818d72d11b3d67c4a21a02c45c
SHA25661c980d2f678b01d1f8f828837606a7af1908a1bdf2b6feae693dc928952e35a
SHA51283d778e1f274590aabb024243f1eb30c04cad566aa79969773b9aedf6af2a9e1e8462118b180f392542f6073d815b5b8aa66851d315ef1d67a301e4da4fb311a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500e93682768c833a976121150ee52feb
SHA12cd84161c52134751056c41a7613a3f16f9b9435
SHA2565f1499fd0712bf5e1a4baf50a5f92ed5dcee0ffba0ef11ff43acaae5a5c90d5d
SHA5120b997af8fc449d0dd77d068d6bd2217f031f0e48f43ad622a2805b29f61c6c8e9f503dcdd849ea0c33a97b04a8dd19b02021da894f8b79da18f558582161149d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58465f6a6b4fda29dc485122aaf05a327
SHA1569684117df97f316171a7b1baffc7bc5b844fa9
SHA256b8cac8f112797aeddbd9d08fb7a01f3f878b9cd0005a2e3207c67d107d74a69e
SHA5123df4323076186be6632bf37101f57660b02c1a1c7ab7a72814c8891f63054e623adc30fa812fad06b16fae0c6b9996b368e2c7b705c1bb46c876b99ccc97217b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5790cebaa989915b63bb4b54b17ac7d8c
SHA150986211ab0882b6a894cb778a0069b195992fa7
SHA25638dba70dafafcc09b82a43b1e7a2eef1142371707d04f0ce96b04ceed8b127f5
SHA512df84166c06729e7788c22ce04cf30e69c8e6d613cf1e9cba8f8ab2149e6b897e419e03cf9b314fba0300538cf966a97fc1454d07905de7561b91f3cc6a5d9d22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1d9a4efffd20ae9519a73e5d63850d3
SHA1315ab3ea6c88c7da011f50d3800a476956cda2cb
SHA2568ab171db78e6b442159844e3b2562c759412c584d896fb83eee47cc7e5c12879
SHA512608f52713503f834491f8647c5591ef8ceff2e6659da2f54822b6977f13a5758c74f1012957f009128a88bdaf7a1af94ce3c72fb39d27fa97a06b77ff97f5cba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7ec159064ffe7006a2d1d12770c504d
SHA1e5e8528c9f85aa2ceee7904264cd69302a94993d
SHA2565ac152fb0ff263e622191098e7a4b84beebd87fc258aeb2521af5a0e0a3a36b2
SHA512582e1568df280c9aadb236fbaf79446c970284802ff34454ce625e0eb50117c760795c600b97bb9c5591885da62fa77ec40c73fb6024bd93961dad41dac81a26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dc4414e14556e188192e55ec8733499
SHA12611f0dcd9b0375acafd7385ed4c89cd361c4061
SHA256a424ad231daeb8084ec6bb5859e7bad01ba87e10da6cb54336230989559d4746
SHA51237272a5a66a8753191e37473315b225214bd104b615228d0538ec4d25eb5ca9c8f6bd5bf06aabc27d7f32520a9e9dbbbc68538a9e88f46849da44220334f1734
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f19d24d5ceaf9c058ba8530d8023a8d8
SHA16c77c4f92a52e7db7ae66a1fe5040913bbdea904
SHA256c26cf75a7d05a5ae714bb092df7075af5ea958d630a5e1e4f52e8ddbb2642249
SHA512287698b8cbb1787e7673a4d4568e22bca60986e3d0590f24bdf8ff30abe2c50ce45925f47bba554ffbfa304ceff657b06b1b350c41c5d68835c491b24776c7cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588e6c88ca2524bd510c2956e79d8e404
SHA19a430e802a51ef6b641123837c93876a2c6e1a46
SHA25669ba9db034e58d28bf397b5457db98f6d1b816a00450c21893e458f68948e3d6
SHA5128333933fde136e12f7431db8f635ce787a2e390442b35d7d26138ad388c7f34ebae1d01b53ce1ed91c4264104ef70f60a5cbcb43fe6c2f9a15f8a0a0ab68276f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b