Analysis
-
max time kernel
142s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09-07-2024 15:54
Static task
static1
Behavioral task
behavioral1
Sample
3103278668f785806b446f02df195493_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3103278668f785806b446f02df195493_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3103278668f785806b446f02df195493_JaffaCakes118.html
-
Size
42KB
-
MD5
3103278668f785806b446f02df195493
-
SHA1
c5ab2c6b8f395e9b05f731d2e79b2d18ed8e5aaa
-
SHA256
95bd27dde6ce12c86378a21f256209536d403ae7653068170aa3192cd08f35fe
-
SHA512
1504ee9afd7c2cb3500ffc9551e2b74773ecffe15c144885f9f84c88c93e33fa258d166d1db7b0f9f95efa92a9ec7db94265b14011c67525fc8b99f6c557d9f1
-
SSDEEP
768:Zcd9QZBC7mOdMcjpC5I9nC4hFkRLQwBwowRoPxPd:gQZBCCOdf0IxCQFk9QwBwowaPxPd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FEF105E1-3E13-11EF-8A22-66D8C57E4E43} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426705976" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70c59bfa20d2da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000a66d402174e2bfc44fd29b0f260950ea4116b288a4d7a16d26ee9a34789acddc000000000e80000000020000200000007f9feac615dc2e058f283ef2c5b0712756e4f97864f4e44535b88e6153b37a1120000000e759e0863800a5233a3f8547c3daa9020dadf180e9d4af5aea2a1301f5f346af40000000433a2b3cfcd60a8441e7d041a43f922b004004405b3b8dd9e6415e2f1fba90caf7a73ee5ff117f7732a7c665e7fe25d35e12dd0a3700607f921e228e02bd4d4f iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1984 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1984 iexplore.exe 1984 iexplore.exe 1500 IEXPLORE.EXE 1500 IEXPLORE.EXE 1500 IEXPLORE.EXE 1500 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1984 wrote to memory of 1500 1984 iexplore.exe 30 PID 1984 wrote to memory of 1500 1984 iexplore.exe 30 PID 1984 wrote to memory of 1500 1984 iexplore.exe 30 PID 1984 wrote to memory of 1500 1984 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3103278668f785806b446f02df195493_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1984 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1500
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50247a8fb60d293cf2d1cfde7708f7240
SHA1094189017b735af7087bdadf812c13386aa0a87b
SHA2563cfd8dd686df6d212978790c6e7af13b629f19281eaf75e4e2600f65d166f5e9
SHA5122c03a29df3411a3949acc6ec70866311d165b5cf3f5fc524540f55f968488e59c5a0687a980da1b137ca72cfb29c78cb3add18cf6055bc496b38e775a6dd9d97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3585f3abc8eddc708f0aa24e566bd45
SHA17c3cdad102a605392512a014b54283d32edbecc2
SHA256b159042b9daadc01aeffae627098fb1c2d543a46e87f34f82f748216ed457222
SHA5121dc01c0fd44d20f17a8b7a486e98b4f0d2f67708b7917461db21c0c5638015bf8a851841ff7efff0a6d6238798cae607c07b9d1ecdaf9cb1c5b15c0ac1fe9a65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5476434217c341d15c00ed31267680517
SHA10b57bbc7d0b7f49ebe6202ba077360a1bcc4b922
SHA256de55044abab1eaa6e0c704c4bc247bb7b46c636e6b2c089b4044985fcb6a0bb0
SHA51279bb7f3b6b8ba24419695567a6702c945f872ea868bd113692db1ae2e57be46925b7272fdab5ce4b4501fa2277263ad27a3278fde939ab83cfbb6f078be8e44a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599bad378f7ab4cb8be88e2e31de2f0d9
SHA189ca17e77a73a26be56ba15987b8936b9d3e21f7
SHA2566d718f7edcfca64450e48fdd34efb737ecf432ccf6981685a04ef3de570a8b40
SHA5125804c4fb97a4ca42214dc4762581490e4f649b3e07af022a9011b90291315a17f2bad4525ae827c81b23ca9b072afb3af8791c2bdcabd1588c94b072688edde8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e99343eb874e9ab0e19b3f195551690f
SHA135e0204b176dcad793536c707b5de3a7a5abecde
SHA256a25491cd38580dff90b760f8e66ca8339019b649772abe77dab15053a8bb61fa
SHA51265d41c5b51c62c1b6ddaa9876be00e5bde64e2ca7ee7ab103eb94ed4393bb6b3221e4804e5ea8d10269aff5c04e00eee3111dc40adfb7c37910fafa0425e1298
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b931531fea4ab204acabc2aa38df1f0
SHA19c78766e44aebcc425458b9d82fcc2a854107005
SHA256e0340cd8abbeffe8c1a4638a2bbfd6adf5b5609390284ca5e43d3414618066b2
SHA512fc12d5836811272084421d222e466f53a5d689b54ca07c5d209a05ca3e3eb00ff22143ee31d9f836b57e9dcd686e43cef54bfd118e6795d0f4de8a981c49c98d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e348abe16e8a29a02e37cc54efa4b45
SHA15ac2993da18297a63a483a763ba8aeb923a5b5ab
SHA2565123daac481744ffe77415e3680494a97f7084a387a8a496154483018387d1c5
SHA512daf2e4fe0a6c0d17b33d18c8f8ef4bae0633866308c84e226d8f943bb8a82c2173bf106d1678cbdc91830b02f2609f30d9266c30bc92b0cadd87e5b36c1d8d4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddd03ee03c19ae3048fbe7a3428c1509
SHA121ba973ab6caf8c2bba67a1e505fd5a9d52b74d8
SHA25686930ffcafaf6cc8737b2a4cd044d5f9704d142cc81d6dc953b7404df779b2c5
SHA512ab44342a2ddb3437f714bba2fae2afa36fe05e688ba2b5f61f8cf97e381c4bfca834c12cff0b3c40cfc469d0fdba2bc1b81e7f3e463c3bf19c1bd4b4e6d312fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d98671365f5286541105f6b2761c9370
SHA109f293b3299b58ed8438cb9eb879eb310ca61a59
SHA2564a057d27d146e7f291fe68209508b8dc8c650b46f90f184e359ae56619391dd6
SHA5128c8121113579cc120a2dff30b59334920b11bcd71dfbb3fda5330a74f84aafdb1de11a29d8667e5b5333de4d12635e69da7345f98eff0337efc2db92091f1ef9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bac1ee781a06fa52bc82fe598b3eca99
SHA16eecd63a84a471ffe029f8af630dc25c52cbd256
SHA2563cc0842ca77ae67a96648a9b607561d56bc9f08f02eac458476abac6b0272d1b
SHA5123ccc42922993e325ad858e579b355d684f5c92bd38df664847ce4a4929048ffa5cb4ec35e84d91877e981ce6cabb15c4ea82254f0bc792126d8239cbfa36cbcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51298f0e7ec0ff0364283da0dc950a9a4
SHA121fe7ede456af765da900ce30db05eb4175d1e76
SHA25659daf7be255260bd35190891942a75555de8f2a499a3fdf4d8f2fbc5124749ea
SHA5127def8bd885eedff3f10d2c5402c0719dbbb934c8344d574750f17b5a1fbf7d45ad9d7d4b03ea2b551b41b7f7284ba4b0cb347deec2906f596e2b4b0c6032fb18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1658db4e9c937f598d1b95c2ade992c
SHA104079055f2bb4b510fc3e179de6249e3420ac755
SHA2560e0f1f58bed37714405fa5d5fc77d40c7902a7129afef697042833fb25dfdbda
SHA5123387d1b7aa18290b0fb75c041d8606887b00eba47e58690c1d8ea5423feb49aba55962d6e3b5f05bccb2826d4ab1e2921e8ff2cb4fcbcd3aa7bc0d4aba2713d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545ae8675dd6b55fd06d5fc4c08f7a765
SHA1eb58e93bcc433d383081eca40eec5d56ae750c1a
SHA256f685b85fdbd538c6defc1769376216c06fd9f096cc431ac25035840761805804
SHA5127208ac0760c9185835682dde0b149a9759b4dbd17d7b179f7cdfdd1f99703f6bce8bc1438b9dd0a0674a108081d156cc8710fe45678b5cbbf358a2bfc691141e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57565e4e3db0539e6874d317bf69512aa
SHA1cb3a5fbabe9de77ce8228b1c103c3d04b5a92015
SHA25643e7828f128b53fd14364bd5e98767faec6c756e604b039a2283a9115f117c97
SHA5121191dafe69ef30cb374e72abbe08d8bca4abaa7a456c4f901f00e4ce1559d3712126592deb9b6f3540d1c47d6f3b097cacfa80809364be8f52a2587911a3a9f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5feee2987202b9a61acab989a4a5ddc6c
SHA17a717610a0451f176b394065b9d7bea7d372ba27
SHA2567777e77bc3c94cfee71a4435b5d979d257489f78a901b2d747892062dd8168af
SHA51220b638208e6a5ce702d2f776d3c0bc2f4d2b3a54a5d73eb59ccc4e0399e1d80c89f970d55fc4824ae6d864ef438391ddcd13ff87cdef920486a8dde1841db75a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0ee1cf3d149361147d9bae4ca457ded
SHA172aa3e229737954e7db387d2d7c6c005c97628a4
SHA2561fd79ae93d0d79b620ebe4630be46cbe6dd6449e195a964f863985178b816651
SHA512e4f4946d2ce492fe232ac0b3109ee468ee6385583b6c2148e89efd8b270d6f25434647c43d80eee07624ac5d6dfa04a66ae29a980f6f496b2f062de88f78de7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e9a640c82e6e7d592f79868ebd1fee6
SHA1dbe6fb762a7ae6a91fab68815b21ed9f679c6042
SHA25610b35e50ea7af2a42a060d39345329f6e210e00c4e84dfe47660cbc0def46ba7
SHA512d564925e23c85f32f2daebac029d9c8beec4bb2828ff11264ce624db2f5090f90af6fa7b5806e0dddc69c1f0b6b31dbedba3fd71b9ad64825ac47ec3d65bca73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac75b25974ee4f95f9c03fc1bc73b328
SHA11e5d1ded66b556732d45981116d8e75fb933fa46
SHA256e03b82cf2acf9c370a8086a81da11ef305b05d296010cac35d69fcec9a26d04a
SHA512b1ab659ff90dda5bfa44be853badc38d0d49166115cb788840ea1feb6d0c2eff76481dcd8c6360aa70a8694f5406b308ed0ab2101fc493a287e40490d4c729cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d29c430facf55c5c5de3604c73186f1
SHA16c093f8c65ded77e897917e00e03e7510d7cdac6
SHA256d7568aaedbfd68df8f5a3f149795f8dec8f884aeb65990a84bf67473edc0ff43
SHA512a513f341e655ea85d096bb889b0358e0f5031fb28a637755bfae59e968ff6335fa64fe90735ddc581122beba8c97c237437c13d390a32c652eae2a608a8340b7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b