Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 22:16
Static task
static1
Behavioral task
behavioral1
Sample
438d0d01e6a9ef7bc6997be92c12ca5e_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
438d0d01e6a9ef7bc6997be92c12ca5e_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
438d0d01e6a9ef7bc6997be92c12ca5e_JaffaCakes118.html
-
Size
79KB
-
MD5
438d0d01e6a9ef7bc6997be92c12ca5e
-
SHA1
5ce130d252d932cf142ff022b5398a33b10d6011
-
SHA256
dfadf458a742eb60964c0f95d7d792fe88099888373b342bd65648cf72dfddf2
-
SHA512
417d0632dc2c9619986496a530f930d6b2ec5aa489d470b257f7ab374c9504212de469495c1313efbd98ccaab51008a52b67a9165da8b839f0a8ec4be7026308
-
SSDEEP
1536:ukaBh7jEYzVYnvCAMqFHFBOp13EGpbDrw9d2RA8LYbzWV:jaf7DVYnvCAMqFlBOppEGpbDrEd2RA8J
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000ec8d7bffb33933851327584e17ab97e2a067c2eb269f4a5fe4478a12db9cdd4e000000000e8000000002000020000000b404ac2c729e3d8048c545eb721a5c38ae9a109e0cc931f4762fda6c8e0aaf5f2000000099af863f63f91b101eeda83ea1903f8bae29278b86155db5ab3902147417921340000000547855e7d2592b321a5efc209b1b717dd38424657b26b09746be68070cf9ebe58dca18c9768cbc7e7b19930f14b68e36c1ed790ef1b3d4023208d9b84045f960 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70fdc45d72d5da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{89504441-4165-11EF-8A22-66D8C57E4E43} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427070850" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2408 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2408 iexplore.exe 2408 iexplore.exe 1252 IEXPLORE.EXE 1252 IEXPLORE.EXE 1252 IEXPLORE.EXE 1252 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2408 wrote to memory of 1252 2408 iexplore.exe 30 PID 2408 wrote to memory of 1252 2408 iexplore.exe 30 PID 2408 wrote to memory of 1252 2408 iexplore.exe 30 PID 2408 wrote to memory of 1252 2408 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\438d0d01e6a9ef7bc6997be92c12ca5e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2408 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d3f7df107354753da4937fd32354a54
SHA1743ca614c7798d2554bf4a250330b47a5bf52f71
SHA256c3ad7ad842d3613d12e7c5971e6956a8adb7caa0efa73d6b724a5aa0a9c86843
SHA512a8d63030233488ca4bb9aa2cdead2c30af1681bb801b82c6a964100f8b6a20e27af4219ff63824d110a3d3fe61028407e6f25e47e02d4ab3b00d8e1b2f582e66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ede683e24a0a1fce99840e8037fadaa
SHA1df65cb3a8a3b37d08130efbd86edb36b4d8a6113
SHA256983e6efc73c200f85f8cad5d944f30282e06f6c9a0d9527563feafb5bbac9803
SHA512378f2873799c56c7645c9f532dbd7b2875610bbbb68a54f5b6d58509b83478f71cb31100429916be9f40e9f75c33cd95afcf3d8df51543552a48d0ac3e1dbd4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8620178ca057acbc648b2e5de54285e
SHA1175b19a8931045c4fa9a736ece63251b83d69b44
SHA2565249e56a508a0e94aa2fb27e78104c112f9195cbf67840efe8a0ca2a81875017
SHA512a4f602a6ad2830d286845bd5b5443c6bf69ba48f2ca5903ed68b580537510c37c4779c9e7f97e4c04abc95327c068456040f4b8e231216ad24ac4fbc458db253
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a746d0bd31df8c6428c639a2e08e26b
SHA16cf0198603708e1d8d1704487f188854a5ec7837
SHA2561c4985818c788b526a66ed6a97047a55d3f084746508d747cc8b634faa38bcbb
SHA51238b46b00c3cacbaca5c9e80db5f1ca86a441e7fde0dd726abd8af2566e7643c5847afc5c76f8bbebfc52779d45778c26af2f3d51d649060b07a2a304417ca12f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7dd2e1d53de2b34f87f16cb342b593a
SHA175e05de8b9994d304cf1619fb3d9e9f272e9fc7c
SHA2567c5a8c57558decce89154ccdf81c147eb3c1c2ec3d5e0b815ef6e40913892337
SHA512627a4b446c10b5cc0a91cca217cd0d9745a413afa1031d221723caff635d210baaafaf709dcb5d27149491cb49e0f5d365f9aaf10f924fc13c609389f1c13a0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f13e314d81b15e2e52ff67fb49e4f1d2
SHA1a0805af5d3a64fce1ccba83f9708b165d7cef090
SHA25669a38a91be337a1fbece39ea9b60bfd383c6c70301bca8cbf2badef83f6363f8
SHA512e2bb8581c0496aa72b887d3f65f867570b2dfef3b73fe0d8bc7b28dd6054c71ca8ec4e8a9b124aede96fd9a4b100e088f059e9710b779af78405ad4e9dd88804
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582e6f4838001e2253d52ffd8e4a7bb88
SHA1dd41eaa868f62a1d599fb6bcf1827036dd7ab258
SHA256f114285c40f6a6047586b4c4b0ac72a830975ce2753036a85ff59b64e3663bba
SHA512fc90cc7bbdf3920b8be2afaf835ef6af6dfff02307bf9c17f157303a1b55cbc9d4354dcbaf666aaf6aa8f5b7f951529a047aeb1603a8894804bfe8d083a73607
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7413b8ad4b2ece00ddf770a51b8b2ef
SHA148d7ddfce8aef5de72c48892f984cae54947ba5d
SHA2563fd012f4fd1909a2111a2d088316316a3c0a767b77a4a7c884ba3d8e45775c3b
SHA512af41fc4222dd97dd1884d85eadaaaa5299a2936fa263d83ca6b68acf66d034e787395128185b1ea5752c0d53a057d89fffd560f3b13780e6ea8d6ad099b53ee8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e9e42855da651b44384d3c848f91181
SHA176127557827ee26d91dd49b674af1e96751d12ea
SHA2562616e74d0ae89a93057fce581a0371df797fcbc19d67c33e78f224d8ee389b5f
SHA512a8aa3a56a9ea35563b98447937f38c0e53411c7fa7687177dcdc80eafab9642c4e8ba27e4ee57dce45e4f58cb54e434d4493b760e8739921abc8366c3a9e94a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f567470a798ab85c21a3e091cdda8df4
SHA1577f5275a886279e1f4994af8dd9af38604a337f
SHA2564d6a2fe7b8c7f0dd3d5f5d0f50f328f7c3518f26478c13b4f677c7baced76349
SHA51287f9f4b557b4ac8cdf18fe148a18dd3d5a1af457abb78e2022c9c24beb8c7db5c9a524be4e73fcea4f1790550fbbbb8e417a157931463512fc1f43179e12539b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50737c41ab24d1c2b0dbe6fd41f793bd1
SHA12c545b3f3ef2c8d292afdf043b4f875ccbb1511f
SHA256621a6583b90f225acbd3d97d8459879cf9b33f57bf0017314bbc887fbd0412ce
SHA5125cfdb45d900b2e5a96ef9fca5b920f81c0c97204078e1b67c0b7ee23f0168721c5c56d841e6c71425f1c9b1206b8f3c3eaddf8463e513f8f8a785129fa8eb6c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510c37261814701479b885abee8e88e9a
SHA12f6cf403c01ce42f1d0268fe34ada6a8bf5b4ab2
SHA256efb48012c6b02c8a8d2730cf0fdf0738a55d05ea2d3e7abbd7d7c7b6d75fd25f
SHA512a5fefe394375c5f5534a22c66b1d81f1e2083aa5a597013d961faf439d7f1be171f165cea8a7e550dddd9006c3f3171dcda71c0d463e138db82bf21a8fe85eba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd18273b73ce99c833ab3785c5d15f31
SHA11b8a3db00d0a73cbd48f83e101cb6e3593fa60f5
SHA256212a6cf55c1670ada4e6051135f4156650e81b78045853b2c1a8111d40cf7607
SHA51288ae142d0adaaad888dc7d33f8add39f1171466258621d4f179132a1955c7159ba452c4ce7906905be5e471596050126770609df30b57506e712204fee8b4d6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5234cded1921bf7634a5615aa62411090
SHA104a0929f37d710353cea652ed4b644011ece0e15
SHA256db0e6272f2c8130f2a75f00e7013098483f70f8940ff6289594c8ed06af83612
SHA512c941dbc48d6cb430b9e18192265c170003f4bf431c21b4177aee3260fcab02458d7569ebe386e7072ef7764b9cc6fc7eb7b52b4205a4e61b5f07e3ccedcbc990
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5312fe37e30dd9b8b6e1d2c396e346c43
SHA19f11a7c5bf4426620641950bb962ce3fad4c373a
SHA256529a9997618522cbfac860614998a30aaa8f24c504c10a7bca631274453814a3
SHA51222b24ea0c752c778742d2ff27173576be10f7e048c16f981820ee1f5fc6c0e51d45a10167b6fe867504b8f0273508c13588f6e212a63c1cea9626a8f17893eb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d091b4cdeca44d11af1dc1fbe5d6223e
SHA1c3089436a7227069868ddeb5465fa0d67b00bf11
SHA2560b34a88072a48bf7f94fcb544735ca47a30231dbccd2b44c4369465d3664dbad
SHA512ddf11f2b1fcde743cc5940ff74ca7d468f00f94d23f60e0739cac2e8e90bf103c5c0adf5da99200625a03508eac2204444c1fe80798aae14599488dd6dd8dabe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdcd40bf202b653cdb44a078ddec408a
SHA1c5b35bae4d28dc945b680a93d2c652b3069d024b
SHA2568daec69f334d650d4ffce4b950043fcf6d65032285ccbee4c0dbe8cc7fefd390
SHA51292700f422dc9af7869186f467661db8e871ce72b356047262698754ab394e4c2df03439e3af01a2c8b40d2e579d718704cb7bbfa7b9e72f91ee78c129874fc16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b24b99391e2237838be94cc8858a2a8
SHA184f3e30fbcb5c6493f1aa5bb08403e2033d5cc0b
SHA256390213086fcb3f6e82a0c38100b373ed9d8073def6a7a457585b65c7bddb9e64
SHA5126833e17c6faf0fb63a97c1afe3d0013c335bd0080ebc64473c9082070c943953dcd30e958e6b4831e9d7f53fb4f1cebcee47fcd487a5ccb0071e2b4cebd0b85a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592c7cfd32b3b322ddec92fd4b615685d
SHA1d1f274f24306022859bad6e25faa1a486bb787ed
SHA2566dce4fcb0d4917475ec83dfeb7b67927da797f199d2033453645ee60e100cf26
SHA5122bceb0d7e2169493b9571f6e32eb14e19caaac36a06be7af73e50283de39517c7f395e271a134c1b65cfc26eeb64c76457ea652e4fd4728850b2e5393135ee4d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b