Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13-07-2024 08:51
Static task
static1
Behavioral task
behavioral1
Sample
4100e61ea25c8a9941fb582ff1cc1533_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4100e61ea25c8a9941fb582ff1cc1533_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4100e61ea25c8a9941fb582ff1cc1533_JaffaCakes118.html
-
Size
140KB
-
MD5
4100e61ea25c8a9941fb582ff1cc1533
-
SHA1
856468f7b555f1f87fa1882eec92c8451e6828f8
-
SHA256
c251ec4a64321c8dac417f76dd0476f3427171a99803d49323fd3e446592d391
-
SHA512
b748dcf1023c9aecd53cfb3071aedb6676171ac49c3ba54d49c243e50c8dedb945d40aed0bd0e8807231210ef753d98a2514b51c7cbf38ffb334b364672a396e
-
SSDEEP
1536:pbMjw2fMk1D3O9Pj2fc/riHA8cGLuyE+cZNMMK0p:s5xXLTg
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427022582" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c000000000200000000001066000000010000200000001c7b92db346fd5522627f137fb9798557b5fbb957814b5693461622885f1a057000000000e8000000002000020000000fbcccabefe80982948290b55d8aca95665ae1adee139267a58050f61506426952000000013fc944ed1b0dbc24629ef28fb6c2ed8fb0de6f2ae6b84659870dd531d96fdc0400000004f3050b99451a8dd34b383fde4d1c3afc83cb998348cf71fdd7c663b3d390053cc1e446754b18562f15bcab8f0baf22f29e0f6b3b11eb235ff97a07c03cf79c3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{27546431-40F5-11EF-8E00-526249468C57} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 502c9b1602d5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 328 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 328 iexplore.exe 328 iexplore.exe 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 328 wrote to memory of 2424 328 iexplore.exe 30 PID 328 wrote to memory of 2424 328 iexplore.exe 30 PID 328 wrote to memory of 2424 328 iexplore.exe 30 PID 328 wrote to memory of 2424 328 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4100e61ea25c8a9941fb582ff1cc1533_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:328 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:328 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2424
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5aa072ad1a6dbf00e82654664e0ace960
SHA112538855a58f22aea0c83c58a3c06ff81fd73a33
SHA2568c4008720ffaf9e79fd779fbd1389ae53850165d7bca9ac76f22ba3f750126ac
SHA512765eadcb7550241575f9c16d6aa31d5093bb028611ce0a9b26efd795aa99722f15ba661c1ade08526ca673c8c37eb8b3379141143b593e7e3102bd478f05b2d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c60bd4c603991a2f21230f6dd57093fd
SHA1bd5a65852c84ae3c31e0761a9703720b2487e393
SHA256bd22ddf9892acc7958dd184ae99d0d7f0264664cc01875e8613b256e06f0bead
SHA512d0e1f2fdcddb8aa883c9ac4c27adce1a30391308d8d86f327ec43104806ea64fdfcac000fff71bfa62fdbc95636c1bc5700adecc7f1de2315661d8f27d51c01d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cef67eb2ffe0cd7b2df978ea46f0e28a
SHA1b98736c13685c68ae61897cfd949ba93af33a94a
SHA2568ffd1d95206f3eb18fba5490ddc25d31701af86311c42a36094ad65e87483d9a
SHA5129b5be7810b149a744b43775ea6e1c62a6a945374a6b211ed15863015b6686133f5f0c6dca0a160d8bc5822b3e0900462ef88b79ad017ca6f636e6ad69c649df9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51e6e37f6aaceea675d209bb67bcc93e3
SHA153a7c782a995de187f5a1aa3f4b8e82034f5392a
SHA256ffd0471f99069d4d3e312d8154167c900a65e4c671b661dbbbbc485840ddaf9e
SHA51278c4f86305828c1de5ea0c79b972be79415fe9c55ee7e4bf8e8f7fff68edbbee7534455e5d7bea3d05ad5224a9b8a74f7b998b9ba0b0f1dfd8fa2308c39f6a47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ea4dde4f331132152d0adfdc45427fba
SHA11611697a020ef9cbe8fe59d1893875b2dd9d1974
SHA256f8c0481f142e51ef6b706db0d8f1baf7716957442f57a29bbc6c5ba3e5c91dea
SHA512cef43cc644d4f185e70d48c4990fddab952869ef54f0167abd993b08979cbaaa04cb39ba76ffe17e895d702474c40e2c926b75af91191ce552354f6262bf9c6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ee73f1a086dd18aaac70273357e9d5f8
SHA1adb9b4d8915c29b2d5bcce5210b274e3b304fd3a
SHA25660e9a4dc5fb2e81961a10af1cec22dfa43c4016f1673173090ee13ced7b9269e
SHA512aa7397a0b39952bbad2a26c74bf63659a7816585f10f347ace2f5814125e7ee2ec0a8fcdbcc6bdb7f12796d2e28fe858a94f21369302728a891dcd7f59eb1082
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55df75d5bf0af1a67cfa83e382436ec9c
SHA1beef921a93582aebc2389739e7976a0cb8ae69c5
SHA256802e28722f6d1097801d09ce72211d0faa7dcab344dd20dc5aa060b18198bf1a
SHA512eed71fa00f7cddf1ff9fea238d4d5a036dee6347d5be4774ea514fc80b5c62c4446720d8728b849b69473456119e4d3d9b692d8701d5152bf7db20e5f605d045
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD565bcfe4e8ec3409d58c49266716df99b
SHA1a82f88f564e53781cea1f3fa8fe174d81bf527d2
SHA2569c3aedf49425ceafab73b57531fc461a51b184f0da933130df59b6318bd0c0f5
SHA5120c395d28563a92673c8153a571804d6e446cc2694f2a8e313202ba29cc6e9fd19091b48d7cd6ad13890f1dbd3e15b0ee54574651c99095bd0b1c5daf22d3f653
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5610a3d05733844abfca55ab8aa3414a5
SHA1d9e96445056d3ff320f5c2a0de483374d314ba9a
SHA2562d64d1669a14f24726e0c52c4d1e91d126ca77fc4dfcea2e483a401eafdf2ace
SHA51258a706bc43d11560bf96c82e70e22cdd25dd7e7f61d20f481e2fd467b5a281ee70d6099b46b4f6d759105d2b7b21521b403b61fe5def405b7686dc4f8d83443e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55986edc619aff4084f96470ebb2ee531
SHA14a7eee32ebb5d7e6df0cd4b7a88c584dc3e1849b
SHA2561a1be1bc42df9372c2a0589db0ca162ad15621a147371ba75bc3812031b78407
SHA5120dfdb9335df20ef5366124a21397fadcd59ff01c9f7b491af9dd32ee541ff860b44dd2b4febfa25be2172e7e05c3b59869f2a22ab9c05c9705faebb12979c45e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5be5e9e6c7bdd9e0f559d7dd0f4cd9f2e
SHA1f2242b5480ceabe97786be728da6fe26ff3d8756
SHA256748049646ae1486aa4b237ed825bb166765c8adb146a76d40d5168c65eae5975
SHA512208b4208c04c05ed38526a7054d05572e3887f91e45bf0f328d11de03187f699ead925b854a7c2f1434220f59bebd07fc27b626979561d1887be92fd413b3c5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5281373e9d786b2bd469a089fff74966b
SHA1367956cb6963bb8839902d0051b1ebf6c504574c
SHA2569bfaab63b136b996067d546b92a06f3c49eaaa314e2b2529bdfd33c4b3aaa908
SHA512fd8ef3558b3fd1ac9e31714f79c746477d245869eaeb12873fea9e506944f028a9f9469e226a86200f574478d7092396859e0a7a0820c46f1a208d1b451e2ff3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD598874703daf9dbf08550a81092caf883
SHA181e9416ce6b42f59a115049c1e7e75e926ba5c59
SHA2569f55219e0beb566b87aca2c75d560497d0622200c75504cf2e687df303bf28aa
SHA512017e5982985b48fd275ae877816de0560116fa5a95ac66e0c258a23bd5d7338517dafd27baa39763cc85490ecad6af6ed64fcc9e4849008afe9c92f535b4c4dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b35e58fa9130b5be70d29d3fb91c9074
SHA1489a019a9f85282ffe2d44fb4899b28beccf5708
SHA256616ea60ae0657f15c5c12698ed0c88565e2d5a637a92ee43817d3042fc344fb3
SHA5126fb51ae07698b16fa047c7a1ae100552c72e13628d4756ecc640e48847dd969c07a12e3d1d7cf1986ec54876b8d1ff9a4405c1d9aac94ced893ea3f5d6370b63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5534acaedc0fa92c0da79b290ef92852e
SHA151d620af151db7e593871fc7e4dadb5ceca4d2c3
SHA2563a5803384cd0d6c695a08514b16acac1ce51333bdcf820effeaf3ed7ed856f52
SHA51293708597794dbd6c8147ac9cb0f66a892307c75d05bcca19c227b91b0fc8b48ad79f478ca5bf43ea9a28d29fae6690da3ede65877be8628ced686ad4746b5512
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5255a117ce3f4a752a2685c451cf76cf9
SHA17b7719badd1a4129cffa2bb33e4641e1238b6f6f
SHA2560a65bcc00a03334524d80916402b4d303b34e6e4c4c27f6dd6a8d8cc35604931
SHA512cf4490e84dcefe9cb8c03e17a72db757f3f7ce057d5b67c849097c6c4257194c018faf073ffb5f9b36cb2330b6abee0ff845e89259c6e11333707dbbcdd4e548
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5dfe77ba47c61e90d0262cbd3b671f51e
SHA1b6c51ccf869abcb9aa6c3c2d0e40deba0b2791e2
SHA256340cc92cc3263e8fd5e51e7c0b6a79fda2a3d7d2baeb827d2674604b0de89a07
SHA5125b8dafc76d4d8d543b0a3064b92bc42208a632fe6d87c1e05a924ae3f4371c3348ec6f5d84a011c4e87bb575d87f48a195bfefa90c810183ca5ed7e1b175edab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e03bb1bb6445f1746d7bca33ce855c22
SHA140193d3d162637a314dcd3dbbfdfbe1a91559783
SHA25674158f6423ebfdf8ed764448dffb6850b690f235b19513918345268c90635970
SHA512d2427e808dd7ff5339a2b6c9f629b284b55f845f2a907af19a5c181ae11c0577061305384a06b359d316eb4ce5892b51d611247d008d84a34377c74d6dfa0532
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5eae6811efab1e44b3f388045932fb354
SHA13ce7735fea28d43f26ad586f71ce3100fb0ab26f
SHA256412c2bac6661e197ff5fbf6d376fde9341e5c6fea01a4e28a4054136ed3002c0
SHA5129471b4978c7252df5225bc03ce2caa42a1e99d89fabc0e0c193d5c8f8b24a7ab144fc323f8a503de31e1d106dec3d40de0277ef3ffdfb09bb78a2847e66970ab
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b