Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
06/07/2024, 16:30
Static task
static1
Behavioral task
behavioral1
Sample
28d5462e1dbf74ca2be344b9428b6898_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
28d5462e1dbf74ca2be344b9428b6898_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
28d5462e1dbf74ca2be344b9428b6898_JaffaCakes118.html
-
Size
119KB
-
MD5
28d5462e1dbf74ca2be344b9428b6898
-
SHA1
133931c94c3c9fa99b50fc11c0385db5f0b68651
-
SHA256
d5fd71affa8e9e5bffe2a6378ca9aa333842508840e3df378f7f85ce647b60e7
-
SHA512
f095f7c12eabb8d49eca96c5ac5b7d31cae3d6f96b53edeb4ca00a93615629bf1f5ac676de1dc3770d6a8833561e3c791c553a97c17c6dde9ef0fae83e0c4818
-
SSDEEP
1536:Gnq8BXkRIenVITdjzu4E6Q8Ds/fekdHGzUkkTuoKW+iOaeGkv7DDkB6RzW3UvwIH:GayzWkvwIH
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0cd8881cecfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426450671" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000930ed985b08cdd4cb38e38023150682b000000000200000000001066000000010000200000007fc1981a900e85996ce5e0dd2046fe8e054bca58735e7f4c4ce44b2ee3ae5666000000000e8000000002000020000000e028220085a65726cc8d7e5ae61cd53c13a936871c7f8dc164fa2172196de7b720000000a7c5548be2c79159afb3e138feddec7b87c25d1627a900af9d8744ee8a0f184f4000000065d8255b4cf2b160d230222dfa5ff928dd730897cc59d3478b581210501bb321b06ec4967d02327c2ea369d209a03c305696b5cd52542a4e80071ef053fa85cf iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{926A2721-3BC1-11EF-82EC-E297BF49BD91} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1356 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1356 iexplore.exe 1356 iexplore.exe 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1356 wrote to memory of 3008 1356 iexplore.exe 31 PID 1356 wrote to memory of 3008 1356 iexplore.exe 31 PID 1356 wrote to memory of 3008 1356 iexplore.exe 31 PID 1356 wrote to memory of 3008 1356 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\28d5462e1dbf74ca2be344b9428b6898_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1356 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4918c4b3196db3cf59496fb08187685
SHA1e2fb483ffc2d58794aba59abeb75df98e943df90
SHA25668e7e31acfaa8dc5fa0bccd8040369f5ae7ef4dec0984fd6869be665ce8f5c35
SHA512af4651a337352f63f49f759c35623036483bc22293bc85875f64f7150581fa027470d7fdea2a9915e58f99d77b82bdf0e6fda129f149a859a7e2ad3073621d22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee6660b5f5234babd82611366d78bb9f
SHA1f393bef63c966b82cf99a5f54b74c2567bfa6eca
SHA256bafc9f29d4e628a1e22a216941a92d0de0cff61fc4e4743f63bc963f49b20805
SHA512df64e39f9c54cc228485ae683b71dc21441596405018e28a2b488a670d5207104523c51fce80fe2f2c2a505587c59ce8e82174ca396a2d08991e21acdc566f05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b53b11c3d4ddeb439278a65110977ac
SHA1415830db57f38348a58b3f1f51b0c17fe7915781
SHA2563a9d7c4a78bfc05bd633549e0a2f7b503bc37969dd676ac8c83c0979af0d4363
SHA5126a507f13e464d5f39a5eabd85fb5b4afd60b58b5ad201e6eb345223390c294a4dfd72d02ad2802c9953935b131abf6864f29bfeef38cc97b4aed01b3c36f82e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58832b7bec23a5c6300976545ebd43902
SHA1b9df70c12052cb68af852204405e0d11391c9cd4
SHA25629e344ab28aa1698e7fa7e2dc354cc61f516e8f6411d8b6d04495946c3a5ba11
SHA51210eccca21ba42b425bf79d66e041f14e45099c44ef27764d391356a84bab6cd0cd007823c02ed414f702d5c6659f82f8c8e5625c2559a4e930b03b145ea3e6d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559468bca260245dd8e92419705a80bd3
SHA160bd81fa07741ae68420dae5f09bd4091af0a592
SHA2561e768a94f6c2e07d187ecb8bc7261fd1293decf03b240ff962536dc43547ddbc
SHA51270c3109ccf12c81dc275415a2fd82622758c734671d88875ccc7103791b178966f7043e0fa4db814bdcea487b79a21210309469218b9f3dfd0d19addf45c061a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5935f43a00140397b70a14644422b1dc6
SHA1bf630a3706f5967f50e6e70443c78d3c3e025429
SHA256e1e50cf08a93bb1ee3a8b0de82ad397b8cc738e7577b737caa6274c25c6ffa0e
SHA5128fa881c31ae0f3cdacf9824eacae1f159fe0ae106c6939f7a7bbdf0e6e1f64054341ffb3da10b9d06e4b0970db67184c25cdd5501aaf7dc5e56183125b9bdd22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7d38f430f8f5aa416b38ab8037f7bdd
SHA1b62e4ed2df54efb045a5f299db0b6219c3d6c8ba
SHA2560f086c81bca7362d5c73534372d9b15719453c20d2bd0b19156a5e10ef69e621
SHA512ff988d175059bc779300517ea2becd1794154cbb4de445ee865a7822802ad1c2bd45702762de55ae5406325f5a1e9b05ddf56a7a7a63ea02a925c0091ea2a392
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53dffcd2fe5d2db1ebe03f231db50b07f
SHA1d136a11808d2c3d0345176b3083c0735daec4bab
SHA256934dd837c66e23877a7d9c5d0eeba074fb6069da955aa1e91dd0bb81b0ba35f0
SHA5120b36bd0109b44d9b9bf4b94215397d7b4c2769f49d93b62bb8c61421b8532f1d6f97a7f2d5458d5e6e785506f962dac76faf084d6a77dbca8292e78c911e9a06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e9de5f9c2b2bf06985766f3fad46dd9
SHA19cc47a106d086f19c9b1dcf9dff5b030beb3a5db
SHA256aa081f14cf31dc8f5389a733d718a4c787d52c46ee187fe9273eb4e576954d9e
SHA5129f35ad136c953ebedee2bc5bef6461847b43b77c2184f4a9279d241d9708bf4b30a7a03c2e236133df35bc8d549fe28923d138adcb9a08f1b3caddb990e76433
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caa152c58a22d1cc662b9145b0f1b95f
SHA1d3987ca094ee00c471a9cb1bfa94591c9b5c8daf
SHA25642032004722d4bc87e2fc29aecda96ca738e9e9938a45248a0473dc7c4441506
SHA5120151552c93d91a68f74cc0b3a4324d1e837aad47d4527676cbb8242573582f52adddb6e2e57bdfc218a31d4ced2daf852bf7250076387c77edcd04d2f5a4a1df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efdbee86865217fe1255c00a7ceb1b74
SHA11053a5cdeacf2cf9a0dacb19a2298d89fdce8264
SHA2564a9f8d7687c083cea2da465e4e6bf13b36412e9bcf72bb5b0eded1738f81c2cf
SHA51224f0267cf0cd71c390575dde7e644d00910e786767a734d34337bf1dbd80e28ab42a464f723db42eee710510074c901582895da332b30c859d85d9be4ce6fe46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f387e1038aeb6e5cae31ce3ed3ad7771
SHA1031f63fbcd7a9958b3b0c0c4cadcfdc8c5399674
SHA2567c05aa89f8ecf85a308350218f68469a35cbcf15bae87e8900a8299909032419
SHA512087c0647f174d5196d79c6516337ffe2087b53bad6d8e3d236d56857ef35b9d6153128104a795caf05bade87b7a0381087e5ae87cac7c4447eae79f8a16613b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e01240d9caa27da3b5f01e27ddf8af3
SHA16eea99ec37145ae6325422e78c1e0d63772f64e0
SHA25607037de8fe2a51eb396e6e548ef012daac939c9c9aa643ae16c460ece15b46e6
SHA512de7579d40a445cfa7cb472f285e09db6d9f9db137c666e82617253a126c49bee8212d5a7d513af3d34e36a904c539d44a5b112b93f5cf1b686e3b81aba72bd2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5564d3771e75a7c16d8f4b50ec7215d00
SHA10b683ff537119464bb6d18d48bb7e8327c9959fe
SHA25653b477c05e5da7edf00b32de21f7d41ef47442ba7a4ad10796453743e36e36ea
SHA5126b91ca7f7672c977b66df4f972288e230291b297b06455493a5ac57edb7c372971889dbbdc1ec1fd9ca2176f27144bdfa876fbb2e19b898226ef24eaa6ee77a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d448285e26a0dcc8136c57ee61a92b2e
SHA187871291389236898a4296c986f7eb5c6f277f3e
SHA256685cae0aabb200ef9c9f7189c2abd03c3e4f5a763912f398d5dfb3ac71b5d447
SHA5128899bd7f121938fe2243a974406f8abb138aa2ca9af72f0eb3cc0b0f69b7757f2c21fbe0632b3d4e6ab93dba80e01fce05bad89790f19a08c4bb7c11d31e1d44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56004ed1ae3f550d331ae1c620670c3ab
SHA18b51b81f8c434068b26df5c01e8a3dabab156f6b
SHA2560f10bb6cf2bbdbb21fa36f091dc336cc9a91e6add91691a3b2c927f5965803e8
SHA512de543a33576f826e03fe5f64b33479ef5d52ceb84e1503006cd848887fd650c542f26fa5a4077a2997c1ccc3f281fbd1aab36d085ee1d9eb8b14826205af2a60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8fe7bfee0d413bc69eb56adf8516626
SHA11b8728ac25f5abb0e324405653a9a17a0a88a4f8
SHA256fa8839df09b2d4d9fcb6d29e5780224b93b5efcfaf070f9b0fee0170fc308d41
SHA512a11ac1b044e2d7ab1f54e21cc2916f9a4f7870c3ebc89a2d9f9886495e2dd2e526edc21377d92cc624bfefdcfee6eb923e9c4a70e19d9b71304051df96a5d8bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb257f983050bd749050fb886ee2d579
SHA19849fc2186c8bcd7fdc7a534ab52dd431a64c9e1
SHA256ec616abc39ec07ee2481b7bde8b95187634b18456615243e54a378c9b218fc83
SHA5122236583ad519791df67532472c5b56094d8ac728141a14e01acf828f87602f37809d626b87b46af72acbcda3d6a0c0c4919a81e368fccf50cdae45b73f56d7d6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\KJ834MBR\f[1].txt
Filesize40KB
MD52968e7f379b80418dbeaa827c1799723
SHA1d6ab91a0cfbe1f1021c6863c85de33b24c29c567
SHA25677ac1c0da2d74ce780e4c67be7a1b264d5d644c4bc36347ac1597d603b74fdc8
SHA5125f191430b2a46ad85e058f03fed6da5afabf0b378af181b65c92d3eafc2b86f881c99481ac26f924bb3718385df5b9185a560bbe29753ac82cc3528ee01028fd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b