Analysis
-
max time kernel
120s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 10:36
Static task
static1
Behavioral task
behavioral1
Sample
300983cd98dc77447def7c95e042d8fa_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
300983cd98dc77447def7c95e042d8fa_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
300983cd98dc77447def7c95e042d8fa_JaffaCakes118.html
-
Size
115KB
-
MD5
300983cd98dc77447def7c95e042d8fa
-
SHA1
5e1a5a26f0a7cdea6a57fc2f137a7945d9ea3cd6
-
SHA256
6ff9c63f1d596aa06ece51446472567c3de074a6705d9483c9fe47d9287d4305
-
SHA512
fb10f4804bc99b1e1fab66b389f71daf9a661fe2f52e7fb055363d799361f6c778ba8789eddf70a4447e5931cc286f26e2d2d3967789a28932db53c917d48c60
-
SSDEEP
1536:pbMjw2fMk1D3O9Pj2fcFhveHAOcOLpzP5cZCNVVLp:sZjTLTL
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426691952" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0fc164800d2da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{59160FA1-3DF3-11EF-85B7-D6CBE06212A9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000f7eff4ef72ab8e11b5a964716899e11c8c92fb2fcfc6310bcacbb870d26f82e9000000000e800000000200002000000096e017137956418ff32344e52b2b9f1dbec4bd0d62dda8f4b6b4f9a2addfa2c72000000039f1e1aeeaa28e15447ff62848c23b5272951c6d426eaeb51f3251df4638bd7840000000ecd4df454aa098617768db61a4697e4a679f6640b922c8b6acc16501009cf839f99b17557b8ecd212893ee0b91c210b8f7823b345dda090208e873ad24b30205 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2568 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2568 iexplore.exe 2568 iexplore.exe 2024 IEXPLORE.EXE 2024 IEXPLORE.EXE 2024 IEXPLORE.EXE 2024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2568 wrote to memory of 2024 2568 iexplore.exe 30 PID 2568 wrote to memory of 2024 2568 iexplore.exe 30 PID 2568 wrote to memory of 2024 2568 iexplore.exe 30 PID 2568 wrote to memory of 2024 2568 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\300983cd98dc77447def7c95e042d8fa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2568 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfe07082d8334811c877c424b04e1f91
SHA1da3a88ddda1728a6d2a6db85124a4233e0487d54
SHA256a065632411c0aaccf276f25a4221a04e97656d79ee1ac01ea27b7cfe7eefb371
SHA51296020fdb1d040792edfdbfecc39b59e27d42ff8a9a44016007c55fd24e6ad1be047f19157815d91801099dab3062e3f440a5567118999f11733b93fcb977a5e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e7cbb5a2e235ef30f2d78d7955ee01c
SHA1a483c08c23956fd6d6a6380bbd07a307decd406e
SHA256a1fc699b0777472e735947af3f6e89b26a512f7fa77e5a3e9cda6b264464e20b
SHA51237b5ec2878aee25bb0214c5cd2598889b8cb91cef900a46125a623ad311d1e9f9d4a3365c1a6e9f3df11fb3f3a16212db70dc867a056008d2c756c0cea0c98a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebbbab1e0792b03ffac6ed56b5f8300e
SHA1cec95675c5cfec4934b61f1a1431da07f09d8a84
SHA25681592aee804862eb6305b1877a088b726e6f1aa788cf20f2ea0724d28f104a4a
SHA5121f947528f968df921438670b578d6392ed56652701ca6adfa6488804883314a8a4976f11ff8101f24e9e71a4ddc5a9def5863772ac7699d505ae4420cd2e036c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554edd711a133ba046f9cb242a3cd6c4f
SHA1746d24514b3dcb73209f5918ee12bcce06c49cf4
SHA2568b827aaf308b431c77a82f036c6d94caddf574334c19862030475c8fed33c12d
SHA5128bd34a561cc6b514266c73f778ddf2d2bac46dbbffb182e2f2a1b42506be272f67dfe9a5985bb2563a9880bc4a3099c793c16e4db3d1e59dabd5e57d5db03b29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e048a9a00dcb1f4dadc34eb784c52e4e
SHA123e7e922111c47d2f4c32247c4fac2025826fb47
SHA256621b169a7e24c3d8dd0420993d04603b44250115a88e35a5f483c8c5b8df5013
SHA51229a4d2cadcf78b537f4b9879e826c71626f580b5d9d7db9317398d7a84f3cfe18146d61e746cba29ff7d4600087300f7f1931297aba29b4da30154c9803121b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5177d306d7f06c896d663141f79cf4554
SHA1e3b0b53bfb49bd2118c87f08bad91dc2f5762d0d
SHA2566f29967d3f34ed26a82cea4e9f00688307addf92429bcfc6d819cacaa6b8a251
SHA51218caa52eab86398acc2c1dc598649b95ef3089212d433ffcfdf8feaded87f865d2bb45300390fff027b0d02c39f0e375e56fea8aae63bc9f132a7152a28da7cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bcdac64d70fb77f0e51e632d840e2de
SHA14611bb5906bbb4f1ef0d50c27ac4330ac5e8ce14
SHA25626e3341080346dd5427130c89f27207fe5a66c1296bbe0c1eebb099b86b9e9b3
SHA512ef7c9c7779af8b6c41a17669154c802930602d86f611bd686043cd28ec50faa30268d4cebbac2b616222c812b7d8d6a5ec139f363378de550d0b43d2703d53c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4273ccdccc0c76c769874b952836c1d
SHA10e1c4665b64278995fb93453b1e87a0f52b396b3
SHA2564b29f36c8599034044b78296830dd573641586faf74086a66e4b1b002049f535
SHA5129344cbe61fecdb880ffcee4c64aa51785bea1b0c9def7f2bb60a88a466196850cc50f82bfb5bd81646de61eddfc6daebf4b7c0f400eccad54a00e50878f26126
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1deae93e069a3a659dc2e41b3dc9620
SHA1d0df9262af69e2670e8070ed7531d96e826bd165
SHA256e3e5cc0d688b44f0c124875f9f5a4d3507a2566f24a4843b266d2ea3f5db9bed
SHA5122d35d42b4eef299e383821375b53c2535a6ff75b6d95f6eede5229b80529bd7afad1562724e2e374fbdae5d17df1aecb6a82000c83a2e6ee03cc5c77da89b0b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56037d5bdd40349cf4f4405dc2d275e96
SHA12ac60d3e153f71246f9ad4a1a184c9de2055a63a
SHA256c660760240c731ea0ce79d03ba663c6844fcbc45009bc9d003ff064e54986591
SHA512fc555bba02534b4ae13c60a1779c20c22e1cc1ccac3fec397de67b426b37661e8c3479ef3689fe37d7d1f8339e5d80177c0a7a878bc31623d24d4f7906e5071d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530ba00833086d984b61f0490359d82fd
SHA10868b11744bd835963ed830b55c20ee55cadca24
SHA256059d3c1bfeb8626076233d2c56456c174cba26ae40157288b9d53c63368ca722
SHA512e7f195b722be300558390ce16af7b72e7a029c6447a27caa9e0fb78bc4d22121a9659b0e05cf623a2a10d1db7126b7f7422dc04474daa10f3a40a6d87812e186
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52aecd8e9881533ea214787e3ccc1cc70
SHA1b7c5c7ea41088bfe090914fb2ad689e26a77b79f
SHA256a4f355f6b2461afaa7347ff138a34867a4ab246de71d713164c92fed055d139a
SHA5129aea6048485fb6c0c208eacd9b988f5fcbbaab0729b3859fedda21231680b9174eb8a707b8deaf0ae2a899232c7bbd35b060b3a9fd1856dcd9817183a83ea863
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a41512fe25be5c696f33f740226414a
SHA17549b5ac42f696b279c9268724ea08d8860f3a6c
SHA256c42f04e4e8a0f345fe619c9d30ff7602098e9437d46619fc64696868017d3879
SHA512f10a66e287892d140d9cdbaec4fda42316ec71b0b207b35cfeb6d638c5ea6001d2c49e94cdc1472203612a0f41b370fef34bf2ac0e4b70a9dc850fa9b008c481
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d8aee0abba3d44b018fda76cae0231c
SHA1898f1ac0ad6be6bafb4ff30526e27c7c90aed9cd
SHA2569faa5f41bc07490d95259b24da0419721266efc6e36aedec59259cf00542e1f5
SHA512e277c335b70d5f47cc2c6ee89041b691978064c46150c12a5cc52565982a25468aad47f23c3ffd0c9e98dcb5ba915a1cf8d15f54564690842c7ebad8f402dbce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ee7a1ff4050bd22a20d491389b2abc1
SHA14365312f939b4e6d939bab66579950d1fa675e03
SHA256398d584582b1f9500ca7d9c29ea4fff132365dec41de4b1e262163fec9ec2e84
SHA5127d204e772b59e40c0c7fc5e5709dccf14f1376e15b6375830422bf0e69fbc6ff1d00d983fa47d67938102d509bbc3fcac2ba84a0bec2af1c4ff304ad74ee4bb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5449c7fd8e0ac5e37ab310db2632f0863
SHA17a41738027cadf91fec4f5d354bdaee2f98eee1b
SHA25691318d6fbd002caff69f34d5ba81cda3a0c6011311b9ce078c6ed386fe22a206
SHA512641a1d9bafe1869f8937d75c52a39beb1d1f8a3e5b48fca081c1d0d1bcad64fef9e36da44218adeb8889c909bbda8079d0b5630e0e61422d60101d69de054922
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e39bfa1977f7dd926f72c75a07d977ed
SHA1b68bcf67b22da7e0436f470213586d3c29d860ed
SHA256597a0f6f2b9fbe9b6d689627f90fd52fbb4e5ee0d3028d37bec7f18f20a178ef
SHA51240a67d660e7f8939c7769e6e7968ba8816eba6223f3e9908590e68f0806e2a8e3d66d6db9d6a9b0903e01c968d9d91eacb23bd4f49581d6a5351633911947d22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5804a04fb9bf56e6000a73d6f6c373a64
SHA1960a2de6ea7462873d9c8412caa69643cbfb3fe9
SHA256abed3ea59c9d15848f0da706d03383f0543737f7681b433ff006d5aac6a72aae
SHA5125e6dc55a2d0413fff1b23c1cbfc5e6017f79974b26ab5ad0cb77e6b64d4e2129bcfda501a03354e5c30abaa7919a4e5e920b41ce457d80a7667e6e8f21b452ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547b6542c261b7e5d227d50c1737ece36
SHA13d86919f82635b312ce6cf83672eb0120c385163
SHA256eb512e327b1a455de30c7419834b878708cf46657bb62f4383d01dcd9c55f739
SHA51278331e039ebd39a3a972f8f47fc0bd1f68bbe6d229f0442ce19ead862d19025b175f6acedb66737281eaa8aaf6662b94a90acbcdbde6355c0e5f8a08f0352976
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550cedbd24d34c59cc2f8492f3aae1991
SHA117ab824cf255621ddb1578e69ba37c93e0439dc0
SHA256a1dbf94d2f19f3e479e1cbcfb2cd885d4cac299d61d683d2d51354051bc88055
SHA512e2463c00c950fc76017f7cd670a89078964f22bedf7873c9bcf2873c12994505601d9626902eaf0d8069b1005a373f03aad300933acd4cf934e4af59ab17da13
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b