Analysis
-
max time kernel
121s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/07/2024, 21:33
Static task
static1
Behavioral task
behavioral1
Sample
264a62886d469307ea96f677d5dfb70d_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
264a62886d469307ea96f677d5dfb70d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
264a62886d469307ea96f677d5dfb70d_JaffaCakes118.html
-
Size
6KB
-
MD5
264a62886d469307ea96f677d5dfb70d
-
SHA1
b5e9fc514dfd341bd23eb929105e632158314d8e
-
SHA256
68c3e5f928926ab41d8b0f22eb7545ac51f367e62dcffd8c9be465664a07ec5d
-
SHA512
d9066a4137e29639eb72dbc7d679dcf42214191c3e4d3365c3aba98da6b3145033707d79b3bcb8ae104e0eb541300959e84aef42c994506b154cf31eea979985
-
SSDEEP
96:uzVs+ux7PlXLLY1k9o84d12ef7CSTU3wZcEZ7ru7f:csz7PFAYS/u0b76f
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3099a3f259ceda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1D8113D1-3A4D-11EF-BC57-569FD5A164C1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004582b4ecbd9be645a854c68c4d7213300000000002000000000010660000000100002000000012a511807f764b5b0c1f7157a41d9dce8fb94958db8f0dcbe24096a1bc5e942f000000000e800000000200002000000099767c3d7e8a4ac0503d3b21d3fdc9712a41d15933f186056905f9dce43201b220000000afb9741473a275aa3d7668185b532b365aa72401e39a67eaec4f34fb19c21dea40000000b811151a7b618d4613d101532eb7b6f23265b55aaf3a8f2df73baf3cab56acb5ce1a78701bb874f0ae676ae7fa2f79e1cab1df3dc6b4f37a18f3393fa58e04c4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426290705" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1132 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1132 iexplore.exe 1132 iexplore.exe 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1132 wrote to memory of 3052 1132 iexplore.exe 28 PID 1132 wrote to memory of 3052 1132 iexplore.exe 28 PID 1132 wrote to memory of 3052 1132 iexplore.exe 28 PID 1132 wrote to memory of 3052 1132 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\264a62886d469307ea96f677d5dfb70d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1132 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556b8f589f898a8a65db4e3b22e331548
SHA14287f010203f604663e033b931ee67fa3499d7e8
SHA2562c3dff183b42e97ba1e58c39fbeb0757372b308b135d4f7a0ad81ff05bae9fe4
SHA512de0da141afdcc4573ab517b56cc54e20f269f2a1f97fee1a361d5beee2bd1ed4e6d11f0a8b9bcd1d15fa5ae78c4ef91aca411443f47a0d5627ac2f88d20b7222
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abb54c49bb301b02a5c8eb8820723cba
SHA1ab8198a20915d0ddb432c8b57a835adb30f8ec6b
SHA2560ef2a27834f8a8319e52f90e86df712cdb82ad5a751e8987bbd571eac168d3f1
SHA512a7eb79d6066983c713f411c84259ba1caf38c8ea4511756d18784fa4118d4b906e710a9d74cb923013ddb27606d5a24ae71cbfa6e0fa3f9ff9977150e6af082e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae4e834447aea18aed143e177e2466a2
SHA18bfc05d0059ea0352b460b0000837366f9a40b67
SHA256f97edb5123013e43797e4b8dd8af389ea560d9e5feff0c6a3a030ecddd027045
SHA51231c6b59f83ec66ca1a816f3968087210b373400a97eef0afd7eaed2ffe34533e6b1ad2bae7fff2bd63837dbd5c4f4750a0ddc4ad43ca4ad6a640abd10f301ccb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4e5024e48359ecda0b554d578c00666
SHA1b8e94ff346164097dad2a3cc24fc1f5e8288ce56
SHA256c974e352b4602af90cce861f47a7c5fa5dab1e5b82b1e0be49d815ca759ad940
SHA512d9933589b3da4a1d1f27ec131bc94a53ee52aa2dd1b4377a5a895fa47baff17d3d1f6be258098412cdaa42ed9b6e6c736284f4cf8ac8e39f784edeb9e9384407
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5290c95910022af7837d5295370590301
SHA18da3977462fdd10233f51abaf2274e6cae3a322e
SHA2569b4b61c872e7f7cfd70f66ffa65a2c08886ed551aee32199c077e180132a3ecc
SHA512ea13fa0eb8a8f21d778781438672929076bc431be91564eae93acdbad97b442a1ab7079fceaa4d86bc50def932b0040ab545c2c693892ea50be474a5007e47d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f571c2206b0f0b9a990d04e08ba0f7c
SHA163c6e45c5d78992baed2281c34c09571ef62c29b
SHA256459fd07d5e98b04d2b12fb1e3ca3ccbb2b1812088cb8a1dfefd521e2cff47e0a
SHA5127724193804738bba5a062c1f814f6021ccdba32970d5df54c997943706dde0ded932b33f3e04cb05c92ef7991f0622bcd9a675830c9e2249d87d366def5e1063
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e0b807ad342985ed3f71e45b3758493
SHA1e18caa335669772dfc04d0f5d382cb9a5807fc2c
SHA2566022c7d1bacbea0e7d07e376441bf0504569ffba3808ab7738169409fc665b2d
SHA51206775a829efdc83cae2ac26c8a8058eb14882c0a23eac2a55126736195d882a5f4ef4ddb83ac5c09271981f59e3965bd8c5195cc9a413e8e4ac52b1d06df7a49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5849721e1ff7c7c92eb997b37c9bc01a0
SHA189fb9b74b377925ea42af81e2dc3fa21eb533ebd
SHA256e8d6f8ed4a47f0e9c8dba09bef25b9cba2d52bd7c8fc9c54d047e1918b3bcee5
SHA512fb7964ebcd835fe01098b1bf98e22233747c13a3ed73689164f41b9c055fe4367d1249f9948d969f0e29e0c94b51f42b0427331af6a730ba5255c53da8560aff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a25f61e6d71abafe2f665690e8e89ab
SHA1961fa17c2e707475da55fb17ecba549ab1531cc4
SHA256a77c71ba01d8306da75c7c99f48ea524f514df6c94f461d2c0781c8473a1e48a
SHA5120208b7bd61919c6029bc04abc9fac10bfd21f2a1409f7bb27ff37c012c92e6d933bb8a79256f84da88f1b69c7fbc324a3cbd9685dd83f54b6d388c1828fcfffc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b3f79ba7574491d6346c0a4c66f0192
SHA18d4ffb9f4d42ea1eee1bb5e4eaa5a0cc8de7aebf
SHA256e9d5e3f9e338d116511dfebd633676b24c560bd875df9e02cefc80c1df0a0efe
SHA5129a5544795a086d032ea59aea8c3cddfd38b5bdc19d39e0cfc719fd468bec150f3160dcd9e27e2f21131e117c58a0e870c69ac3c52b486ebb976ae1d37575b709
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59216bc06995184d84544d7161fe813a2
SHA1ebdf6e0b6ca93cd1cbaf126b8ca8f5d5d0c1a686
SHA256e76190f6a558da80baab08138b5c13fbd0350e5c7808b82ddd002f7982051ada
SHA512466dfcc246f3d2ced60ab156377f21d260c48460b37956e6f96c6d112b94f5a4e12f1ff1c5e139f702d504096a5d10a0e9fd9570ce2c2ba0d455a910135bcbee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585d50c8caa5b50f589e446cd0c62aa82
SHA1819343f185f70705be941f56dd692130b295da33
SHA25646f15d1b6bdd621057edd5b8a660d1ab17b261ad03cba645e5bad6f9a735a47b
SHA5123e63bbbaef58eded43c35c3a4f929940fc2b808b67122bf612014f32790f8ec765d3334c409b03ced09e50c004b24b4bc8e43f6cc806c0410ff5747e03e4eb27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56609ac010ffb90560b3bc98b843c8ed7
SHA19bba42a41ff083900a9c6ec897bb13a320a8b808
SHA256f6f954aed91eea8029d8b4a3b3fab6962326e02170d0dbc34e4f2f3650432f30
SHA512b94ccc2330d2be8503057f74a79264163222af16d30857772a29346094a80e394c215f18cc671be00aedf786015251363bfeb9dcde015e305b57add2a07bd229
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e249c67abeadcd4d5caf4182f826e9aa
SHA14bb80b695717a877306a82ca39221ad01cc0fc2f
SHA256d6355a8bdb61f69197806d22da9dc9f333ea3aac9131225c8b755ec3654b6ae4
SHA512412f49deef5e7243c19dda3411e7f8d62866faa206e7c2571519c879a08e5296adf723cb19658911c61c64e061b3f3315ff8d83ec83f3d73a1bb22521954759e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e89d8b0db14153123459412c7b5b25d4
SHA173584da212a2d32bd50a5d88c6179c6285a017f3
SHA256e50cbd1dfbaff9dc55a7714f610b3d075ce6c12d5b6a9fec1be5977a9f81279d
SHA512d1aad003a378d736422f278d03ccc34f4951fbfd09566495ec446863ef31e97c373109ad91f0e3bf039062c08296da784c3498db5d1135cc339797fee5cd9657
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564e721e806c6b86d6acda2c6c513a84e
SHA101538c8e9425e382e81a69fdae740a84cca14892
SHA2564d3bcf6950091fe1c07e813108c405aa2264104863a9b94642c48a491735c5d7
SHA5124978b754d809c645cd05c65f829e0bc4801a15cfbec601fb2350ffe778ca38b88a0d00ecd8baa27fc9d97e37513c190f78fc8012890d0a1242fdcca6a5593082
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56340132b306221ae3e14ddc085cbfc1e
SHA1c2348dde1a4c682260d509229c40be300f4475cd
SHA25632a3f26e7c05a238e766c5b924a6bd268e4473f11f0831160219f72f8030c9ed
SHA5129e948ed9a95afa9a4148e4333d4f4ff3287513c27f0a2d91c87d07b0b283b42fe08edbab82e4c146c1fce550a0901fe49316522b6dd8aeac0493307d9e84b369
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd98ad1cdaaccf83fdf1e0de60e73e50
SHA19d010dc6db75abf85d58b8ad17decb89afeb7dd3
SHA256a7a1725c756a6064ef57aa7f4a88c2ee4177732fc54f50a10250f62d014e3de0
SHA5126649462fa45e160d157788aa533ad0474efe5eddf0d3bbc16cc973f0f137afc716ae54dde7391d644c777951be7cd775bc74936326b491a3b639ea1457783545
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da0d9e75478ed7017ab3bf31da787ef1
SHA17ff121055dabde86125f92901244a985abb7b1b8
SHA2565fc3aa9b7664535482ad2a52dc37b835b252207332ab4d3c683c1c580176993e
SHA5126b735bf79b3d9810f3812dacfab2691e2f3e8dd9c5d388372feab917175cebeff554650183238edecc864920ae724dd6829a8ebb383fb662083152b5e0894496
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b