Analysis
-
max time kernel
132s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 16:40
Static task
static1
Behavioral task
behavioral1
Sample
42807dfdad905966d35b94b765f7c5d0_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
42807dfdad905966d35b94b765f7c5d0_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
42807dfdad905966d35b94b765f7c5d0_JaffaCakes118.html
-
Size
122KB
-
MD5
42807dfdad905966d35b94b765f7c5d0
-
SHA1
b562a47fc4fef344aa7f39bf53d1e45d611cffc2
-
SHA256
62d3502614c5f25b9473182db821a79b9f3e57fb251b88c797f93d8c5cc13a20
-
SHA512
b8fb50599cd16dff91b26ebe6db44cffdcdc75ffdf075f6bce152a2920cafe535271a5d8137e88dd705205b5a534df5dfd72ce39adaeb4b53b9bbba580be6247
-
SSDEEP
1536:kNAKgjZRVjssAUZYTVUbBdcOAuRNZHy1Q2UYNQRUnd:TKgVjjkh+jcOAcj8QzKd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A5853A51-4136-11EF-913A-D61F2295B977} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000d306381a2682f7a9c6483f7b13d4340f0664a0b2fb926e48c8ae4a1b5aa01495000000000e8000000002000020000000cfa6a6dc9cac7997472f6b5e4b4f5691a09b9089c12118c90f8300a8e9fa6c5b200000002a85860b179394fdbf81baca10d593991d29b4f16c1f20fa751e6ae43df6e8644000000016534c59d2594759a9f1d2905e03fc5ebcb1673a47a09ae8dcf48d59a2b431d4895f689f3bafc4d56a80608ab179bbf6fef6fa3c77e71d27e3e0e985430d5307 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 103f7a9643d5da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427050711" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2824 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2824 iexplore.exe 2824 iexplore.exe 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2824 wrote to memory of 2948 2824 iexplore.exe 30 PID 2824 wrote to memory of 2948 2824 iexplore.exe 30 PID 2824 wrote to memory of 2948 2824 iexplore.exe 30 PID 2824 wrote to memory of 2948 2824 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\42807dfdad905966d35b94b765f7c5d0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2824 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b0227d11b3860eadddb6deb0afeace9
SHA1b8ac1add71131c81e2eeec11b6555c643bc605bf
SHA2565aff02072f50cbacafa65fe71e40608613a73d38986671f68601ee92b505170d
SHA5126b10de06ac44424441fe596abf0ced93b667778fe1b5b05412ef65db40d6ba7474a3f57570f6314bd1f2be0d248aae431baab0d4f1b953d1d7dc3f4e29cafe8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3b716dd73ae80cb235921bcc296f676
SHA148767cbb9b80b2e5d963299c99b046df11421259
SHA2564f6780c0901e17d64bdb227eb855cccc2d0e043843ca7aee410a8c7c42c90295
SHA5125d05b2f4ed8d45e430e2d6ce992e4da19e149855c05b5561f459e904a8087e830bb08e055c0436bc60f0329c27025e911fc71b1eb3144b04946b7f42e24e205c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55adf65faa2875df2a77dbaf9b5280c2c
SHA151ca8fa676925ecc8668435f4d417617c9955ad6
SHA256c894402f64cbc1a6c73ab64509b84acc5cb6110b1eaef4e27c5f72672d813148
SHA512440501b1eaf0ec82bed4f6502452ba6f035e15ad94a2016569bd180d7bc7940a04c51d4f2744842bf73ef6a5704c7d734b701eba94fb6c54bc973ddfe9fbe12a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e36f5c213ece6d372aa9837627f674ba
SHA10ff625bfa37c63bd7a08b2fac95778e30dddf04e
SHA25604d451f167e641121aea904e43bd2687c7f978dd6c29e9b96a927e1ee7ef27a7
SHA512a9c8a9ad882d646debf5039bf10e886efe8a10fdd63e64921b2b4c7089ae71468e2beb5065035f4b6f7099e5c2e33e5168a9e37b552e5d83abe401f49d92bb10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fac1a21869adfcc27aff19a7fbf45296
SHA1b773fe808bc61223f08a1656ba96dee67e3a41fa
SHA2567906417f54fed98d8396998f1159425372942133ba5e00231883d86608cc39b7
SHA5125efdf3e57b7380ed08817fd3ac53744285d88393f059689de40be4caae5e7c22b77662fd6f5a7e30aec7a47cc57249d92aaba74dd75f3a79d8de433fd9e32673
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b06a95e1d7891a980866d0cb8e6ebb36
SHA1cdb270d645a796f373d43100a9ad1933ffa99a54
SHA25690e83fa8ecd0e20bb0a93304891711b870a2aff02d70cfd0896fe3b2971afd14
SHA51236a8f1f653dbba651cc1c913dfda2e0900e2020d5990c326d37dbe16f688eb891af3e2dccc6b165ef2c12ceb54b94c6f5266e5b11ab5a2a8291baabb6a531933
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef9f089032cb1f3a56389717e729a68f
SHA1f850fb352ca970947374da6c899b1f6ddf1bfbdd
SHA2561cc03d1e28a3eeac0d394882ea19413ea739ac125713c8f4f9c69c2cf24235be
SHA512fac723a5e6bc734e87b3d13e55d8536e36ca4c050f49febbca2e4eb505d263be01b910fbddabf32aa93aefa624bd301711ea286b31ee5d3cba6acd783341d85b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50821337c60f885eb7a2f37fc408b808e
SHA1a99413359a747a91f4da1720ad2b784b56e83bda
SHA256c1b60b3686316aa34bdea1c7a40c73a43c92c3585c716861ee59f6b479c19658
SHA51286451318108e8e5db0fefdf78f7f4c2855a52640f36b06a3594af17cc4ab8ba82072b7284fa34efc2b14ea1a8c04874314e83b0b222e8991058061684b519d9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560b5d236ef1ef595ea03aac2c961bac6
SHA142ee59a5b322842bac49e87473018bfe6f4d049c
SHA256c2dc6f70ae9421cc372464e39469e20adb3ee547af91155b283dc99071a524c2
SHA512dc4a45ea06274da0ed33fd9f2f2f000b086ada089321cb1f8dd32529d5d3cc365e3bdaddfbfab78b5d3958a3208a4cb487a5d70b63147b93eb2fc052608aa789
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51132baeb3957c332af8e335b9f82da4d
SHA15002d827e62de159d3fd488c9aab004a54185cf4
SHA256a6957c1dc9019efb1d37fb85464c2f6ef6fd03ceb0e3c235eb17fc199c61db36
SHA512e5718ebd38445035670928a6475200df400048ff902d1d9a925d0d711c9cb2dec33bd482cff44a3a35f4808a1a2a5722866f863859cab73b97e6457af384d4b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9b0b8bd1b2e67d0580396f72a3a2acc
SHA1662b52ec48ce09323315c5dcad724c4d3f0086ed
SHA256cad873c55231ee0513301a97f01ed36eebd04d18e60daa21d80ba092b50c86d6
SHA512eca207ea06bd9422f0aadb18fc70c521af8877ce23d86c0c27b7aab9acb66059e974d798b15321af5f2a16ae546b3cc527f4cd27692d64c7f64088333f720bdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59929273c8b32e642ce5ca8304a03fc7a
SHA18f0615bd95a910a0a186caa788c12df9497e0991
SHA256c04e6f67593603e73b2cf5e13d0a50e915a6c7693142a0f44fee6e1830d198ce
SHA5120e8b36592f7c7ffe588a04430a4d639487f596f439a5f8fbe315242f1b5f61f78fb347bfc26ae0a16bb943f7cb7ec51acadf2bf98e1d786b65fa435e175fa3b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a6eb4cf8e7a34c95b3c4abcf9141d6b
SHA1fbdef5a54f8c55db767deeb8cc8bc7c47759862c
SHA25625f757e5e3e33338a953b5ac040df56935bba58abcc5c9d7c8ed9746d1139d32
SHA512a9ae15856275fdaa22b199e2a218c9ce683e859566d9093d7ddf7054ceba3a8913aed1f28c9aeac27a4d8ca111dd0612f7eb7b57220e8885bd3e326e0963d4b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c806085dae05ae86fa1718c7dd25503
SHA1320f78d380c22e0c5775dd81a28077ca09a3dbf9
SHA256e5c331b0e79e8722fa8b811d1a69d2e44229e1f61b2427014546c39fb6f09dd5
SHA5123cd87559d3a61ad4cc34538f9156cf6aea53f6dd5580901f9d947f24d6f9071204cb876032510e22d67c3c02ae9101addb98b2dec60e4892aaee80be84e1c8ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5806523a1c7b3796325fd1fa7488134bb
SHA17003de637ac1d3b00d72fd08949571ea9673533b
SHA256084e732d35aba3c0b1f10581a0d19165d77dc032dfcbd4f2602c1461894ffa76
SHA5127dda4c8ac29d605683ea8abf1ee68ae20a4210133f46b167c264b0712a0f9fd6f3844cb5770308241407d694994df396cdc0f40713056ebfae866c585603cf9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae37684faf5d022d87faf01441b8f4a2
SHA1f4ac807abea3afbdc2aa889a432cc0592b823b2d
SHA2564cf08b3e92f24e8e07e669564993304a1ec16eaace5ecc465fcb3f9c868c11c3
SHA512d6de9e0d472affd241fb0e5755bf04af30f178405c465fe2b1fb8f92339b2ed64567726ec3fde68e64da62b390e6e51b6feaed8a2fecb8402e48ab85cebdffa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d68cda523e907b3ad8a2d36ea9fccce3
SHA124de6a573a4491415977c077c35c3b66309ffe44
SHA256d94b7899d1d6fd14ecd312afd1ea09459dbde5f6c0ae080f542f4fd4aab6e92d
SHA5124cd8cfffb45c290a284341ba565f09919b37669663e46da1b10d95449c844b802e423c29a7adea1b5e4f94d7831996af6f403afe1a07665d81af162e869615c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5735f24b185109af0fb2cfb96bbc10ce1
SHA18d0afc7612514b59ccc42c26243489225fdf0abe
SHA256cb0d3ca6b078d5a0e173ce1b2cfef1a835618e2aac8ed865376dba394d2d1f00
SHA5122fceb40af6ddb283302413c28bcedd85a5b1c0ae60550aa5a427deabd96793828bdbfad6693b6fc902c53d1c903b9c4bbf0dc09c058c21cb068ecad2d17ba8ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533696361ee15a0ccf5e9be6642ec5c33
SHA109e1a3cf0153b001700a29bb4bfc0bb2683b60be
SHA256a902d707cb7d09dce51547efd966bc96650b2c75dec395c3715ac90fd615447c
SHA51252a382fceb5bc982b4070f478378093160a304529b653f9ef1c4dc2f5defa547759fc873270ee4cbb70830a671bfcefa45d9a3b34de7005814bb7c7936063280
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53dff3cd87b56f6b30d9e0755c9f221de
SHA1ce8dd48e0f420a20335be87599ef19f98bc60d34
SHA256ff873d019ed5b64d45f053bb5dd91e65e6a6acf5534f4c598ac580dd35721362
SHA512eca7f8558db90db1ab248b719c011c44f8068fe58468372f03198e230c1800db7c761df07f41f42e5327439b75e7ebcfe2326186dca5789b6694bd765f89d086
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b