Analysis
-
max time kernel
139s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 10:40
Static task
static1
Behavioral task
behavioral1
Sample
2210ad1fe3234c627c7d56f876424694_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2210ad1fe3234c627c7d56f876424694_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2210ad1fe3234c627c7d56f876424694_JaffaCakes118.html
-
Size
44KB
-
MD5
2210ad1fe3234c627c7d56f876424694
-
SHA1
6fd2f685af10306b6e011426420d7d666d033d14
-
SHA256
441fe0093a0bf07d4fb75a923fd692a8aae46b090cfcb56f8e87c0ba30b5575d
-
SHA512
edb186a94314ad24708f309c6d7f31f1e4a44911546318fb3fbc0a01d0ebf31500256098d1704e6a4b3f7271314a555174a4574d5acc333bea2438eb6944b9a9
-
SSDEEP
768:Zcd9QZBC7mOdMUTpC5I9nC4Y5hPjE6QPd:gQZBCCOdr0IxCh5hXQPd
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000144e896db5cea68c6e0534f7b36c63eabb7f00bc06d4195cbd6cdacd805edb04000000000e800000000200002000000033016c618e130bedfb7b05c6db7dfb77529d00bba9915d9b13277f75815f7cf020000000799833cd0fa22ae16bcf510b6a0acba50f042cb8f3e943cae87e93c99123e9e6400000001078f5e396d35942bb4695d87e7e6fc20d862f2164d459b6383fc1adabf0e5333f3f665769f80296de3f704748c5df9e3f175481c068715ea0e06956dfed52cd iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90ad678035cdda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426165099" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AB0D5721-3928-11EF-B6D8-6A387CD8C53E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000e8de55dee2f9876325050de1b650866b371731feac80c387f32afb0897461a8d000000000e8000000002000020000000a45047de40685eac57d4fa6819f36c1b5410ce78570bc92dd15b5f0f7ceeadba90000000e0bd0efdf6e4ae618f2ab9e3718b69062de62f558d91b3c1902b6e6a1d773670f4b60a3146a855593fe82154a94621fb7b12e55c3d83a9383a72b6ba11572918b377e8ca5526ba96b2e41565aee84609b1a7104d51c13f4356313320845b373ef1b835ba8798c2f3bd11b65763a2e2eac2130bc752fd7610f67d993717400050c24455add2054e4c28f4728a76537082400000008fd25b3d58d977889e103d4b55d32cb3699dd5b8367db20c920002fa88e2632f36d7cf666ed16b36f917796d960977bbe4125f9015ed4df687606745ef1f3852 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1672 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1672 iexplore.exe 1672 iexplore.exe 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1672 wrote to memory of 2500 1672 iexplore.exe 28 PID 1672 wrote to memory of 2500 1672 iexplore.exe 28 PID 1672 wrote to memory of 2500 1672 iexplore.exe 28 PID 1672 wrote to memory of 2500 1672 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2210ad1fe3234c627c7d56f876424694_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1672 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2500
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555c29accd56ae580ca870e2d4f12e837
SHA12432c39cbb8115cf18b6022868ae6099efb517c9
SHA256eedb32308b5e903d50cb673976ba36fd85916d6a4410ec0401280cfdf1a5966a
SHA5124d243da57b61aac5871394e0534761ec3af14a2de3e51e109800c5357e076db546b38091b3aa33a75a3256f5d7e7edbcaf1a9f3cd0ec4fa3b7d4eb256a2231dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5165ee563724049f7756933b631d4c39a
SHA10a7fd3ea77c8af2df0ec7a11cc51af925dd0c611
SHA25654b22e483e3aadbf91e27c6f1f3cedaa2e0ec6f6f33657f40232805299865d45
SHA5126a6b51b293987d0bb214825dfa9aac3d414c9b373b0280abe295b3800120e5bee52059900aa588c4414e745b0ed358b7307b2d5fe6e7c997a088edf8d444bc4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5214324ecb746edf0e2f479d770190d51
SHA117b7a75db117153494ac9844fe2334b325337276
SHA256bd4a34765dc503fcd6f44f39a6acd007dd29efc00809b7fac18173c0c9a2b37e
SHA512c1f33ba2da7e5b510087cc3081669f8f6ff77b849c1884b95b115ebae8e83cf91dc22e88aaed64797120843d279a24365456a859bd85d51309244631115a0feb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52152a204f2f3923691871d025dd68b30
SHA1b90c7db5ba87b80e3462fe30062528e0c91e15c3
SHA2560703c2241acb15cc5dce4e6214cf37d730608e66c70784725a0a7b35bd66405f
SHA51295043c10153e65942e498c80b36b03a86f49d141e0598e00ee86abcd86e01434e611b58fd6ec4581f6a722561a26e82f1fe20069630e1195c92dde4da72a0b87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e882028f1e9851391785783506c4267
SHA1685c9be9acd6071928bfc7888f8559f25b1e0d0b
SHA25678dcd06e627fb5b221554a7f1ef9b6af6194406b12648676266f1e00e9dc7717
SHA512e588e3b2862a47f07262ed03efaf7f493474f6f563ce15f3e773f020e0338c05a070e8075e3710f559f461ff6edde134392ae93adbeefa0cf5e95a2e565c2d25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b005539ad566c9fbf268fbf5cc0b90a1
SHA1f5b6d9e4c13cd8decc0fce0c8ff8abd72ec61b39
SHA256035a2795a96bb80e34224d825353d0087a2ec1f1677ae71ffdad2bcc71bb79da
SHA512bb9d505ce95ce20e9934f1d030438ccc8e1713ec52673af9a0a83ed0da63cc062babb01e86c5fcb8835b4a280be9b82f9532e78850ec05a9e086ac23e828f2b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7ac5059f7cb157fdc1ceaaed538ceb0
SHA16d881889b32650ee0119c92b36c049eb33914586
SHA256035f06a5d904ed78923b64da8b99e7d4b3db9c057a064ca4a2749e6d4d3e7f42
SHA512b8f2c55ca91a7fe352f8fa117736a7992c77467d532a476481835123b14edac3df51fe27a70341b2d9b02d738914e71c03d1a0e590c146d9497367673ecc840e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fe43c7b629470dcb52a32dc16e19191
SHA1221ee300e1ba6fc7506157ae20a5584e073572c5
SHA256b9a468219a846a5770dbf00c9d6d5fb0455c80718207d42703cea479df3bf7fe
SHA5129f3b48b0acd2ca4878430b33c8f8eb4d7a32d2e31ac5c337d42a7fb3ed09b85b95a620caedf0690211800d95da46f1d0435c7c4b0ae6ba60616a909853838122
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586743147064c20663d1782c61c7b9b30
SHA12386b3607c9ed9cff91db2a4d6a55ff09e0dc493
SHA2560cfbea7dcf4cb9a6746b23d42e7f085d2aa3c617551800a1bb27327cf72021be
SHA512690827997d0abc5597adfe31a4869e618192bed0fa5351c60b89dbede7d848fb8c27774ed8eaa8a01d82229d9743808b537b4ba6388dbfea43d6108305b29b22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e88ce64a9243118a3cce3db2d1c5ccc
SHA1c58b4432e105873adae1f4897f4f4a3fa1d57408
SHA2563f8fd85bf04ca566ae9c9c5c5f0cc3a7cfd9bc882007f35dbbefe6a66b780967
SHA5120849c0259ecdcec7f2a265fc72424460ec89434787b71ac513b07d10a0fab00f2d20a3109deb18e16f81d7780de24f3cd97434320e30c21c7b2b53cc79989385
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558177b33f307a757a83c7caae3a27c28
SHA1cc86aba67600cb9d756d4d359b88b65e8e16d534
SHA2562129ba7d379ac50415ab30875ef227d9dab091c13d3b105320b42cd7a08405c6
SHA5122d0077c8928b1539b3a205f454739f3397c38cfe83809ee8d712309010411d7985b007458253f29243fa744dc9ac7681c1977679b3c7f5edf4234da97ee0e63e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569f431f886e01bcd8b80c2af1948179e
SHA117a87435b9353e9545665a2a129571a6379ab17c
SHA2569fa0808c815a7bbde3c26bb9554a912f3d52b9f193bb8d61b767aa8fc1bea4b9
SHA512881f8c99051011d3ed9e8d0fc91e3ebf7a27a21130793eb7b7af8612495528d47ba0f9f9b1b3835ca04c22755f4ed7967c995777e1d8dbed64eac2e8a2036be7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525dc7bb37dd0d3ac992bed3b54023c33
SHA1a4e5f9947f0251350d39a2f9ec1459c15e21974d
SHA2564cb2dcf16b27ce0416af9faa1364d1c013ac395e271b63db0cc977285d5712f6
SHA512558595572848d3047f06e40210cbd73241119456bd135ca32358c9a67148ecd036fab7f6bb40a0531e21db1dee4e27e45d92e6121e668fe69cb3589523bbfe29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5908f4e19d1925894e03b0a149c644b3b
SHA161bd3ed05dd6ee8e133d634be40c82033abdf044
SHA256cd0918fc02c77265bff7f4d4c70d4eaa8e3dddbbfa7d6cda29f8ff56d0041bde
SHA512b851587ebe48d1ff4d5203a58ba2968d4af670b0b382ebf737bedca88c58e7f4f7c0e1fb0d221b2c63c4c3f6c7401fba5e82fb6a256e454e239d15bd8900f301
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b30c4cf99a83fd2f9dde2604536c0d7
SHA18451b4b4b21c90b60296f21e7c17b6d01549d96d
SHA2562ae457fadd8a9480437c07e06c71e5870665393e7fdb7d2ec7a3e3ab0cb9c428
SHA5126a40599392d2076feaafca0b6b1510027f68cceb35c1da3de28b15e53ed55f5d321bf06766acdf58e97fb3e6be12bdaf7c0e20b875f18afd45598681d9c7bc5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599819b659a2633cf298b7035a36a521b
SHA18a2f71ddc01a51f96f2920163a6b0c7e0388b745
SHA256fbd4ae084866df3f2a930da742f2a6b127a1ad641321be3059ac85d9552d3fd0
SHA5120cd2f3830879da5ee5b8558c71fe85ba3acccb3ccbdd86581001867c3d2862cc5cafdc58f4e3e89680703c49491ab465d0befd5e11724d6d2ad878c1e918e111
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573752c57f109383409a1fdba67f5ceb0
SHA1346289b5d6b7e40cdcd6e78db31ea9264bbbb659
SHA25626229f6e2d340c5a3292228e326c241c7d0f41a9c475604283f7798f94076cff
SHA51201da6bd0a2a6cb729c953bb74f88a0d58ce61601c5b17c996a18cc7a742da571c886dea5716de52f7a34c3a59d247f8761bd709f1e26026c41f7a5658d6af86b
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b