Analysis
-
max time kernel
138s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 01:19
Static task
static1
Behavioral task
behavioral1
Sample
479dfee2e4023626f788aa9b2f57eb19_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
479dfee2e4023626f788aa9b2f57eb19_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
479dfee2e4023626f788aa9b2f57eb19_JaffaCakes118.html
-
Size
77KB
-
MD5
479dfee2e4023626f788aa9b2f57eb19
-
SHA1
badfadbb1b2646ce516cfd28c56b757e1a8c1cff
-
SHA256
46cd60169188fddd82e7766e6d0f179b761514c5294c12532a768854e71d33a3
-
SHA512
6b984874f9c92fbce66ce4dd38755924b0d424564c12e8c0e3d9e86562678abda09c0ade8832ca11e8c6490792b293014d2df687895702038fe320126cac9696
-
SSDEEP
768:Zcd9QZBC7mOdMwPpC5I9nC4Cybp6cSMdPd:gQZBCCOdH0IxC22MdPd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{59C303F1-4248-11EF-803C-6A4552514C55} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f000000000200000000001066000000010000200000005dddd966cd51dc04f837e895ec62923e2cf0d5fc7745fd53ede06d182ac35c3b000000000e8000000002000020000000af32206edca24ba9f93872c5430b3ff425cf8c7476614e325c645dc0ba405a6b20000000d2ab6614bbdda87accc09a6220138161b835e6ae4b0aea268a41a5df8422dff1400000003f9c84e5cb4177bd9cce7e1a41649b11d7165250a17530b037df49c3e8bc6cf27d0c3e4f4787f4dd830c407316d002d3a518ad524d81f16557580d1a9b2a82d2 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427168266" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 703eba2f55d6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2272 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2272 iexplore.exe 2272 iexplore.exe 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2272 wrote to memory of 2856 2272 iexplore.exe 30 PID 2272 wrote to memory of 2856 2272 iexplore.exe 30 PID 2272 wrote to memory of 2856 2272 iexplore.exe 30 PID 2272 wrote to memory of 2856 2272 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\479dfee2e4023626f788aa9b2f57eb19_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2272 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d64d57d43129e9b4269110085d525c0
SHA1ae1fbfc5dadfac02e167c4d518784796299386e7
SHA256c404758b7e9614a1c7adeb0d831fdfcd2a258ab86774c5b560c9281720f10e3d
SHA5120ca2a944eb025c6b7cb66af52c0020bad8bb5903fd18a11f0131a74472460a716d8280dac85ed0fef784b0a7c75ae4e29761ec1a06fe2495a6cc34d4c057675c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5848025a7ccee33bf7393f201524eefc5
SHA19629d5a7b5b54683042ecfe489e2ccb07c23e84c
SHA256f1311ec0287d901e12c110a79f36bb9e7f590ad7f3e044bbd0235ac1a64183ae
SHA51248257a8a7c2fc8b302cdfd8614ffabf5ba61fec0e491706ef3dd2ce92f46e4ec40c39e01cd1c8e41e811b074d28a86c42ddc451d5cb18e128535a45bf6320d85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538a986c668e417a660118f5dc5761351
SHA1c72455ef68a951e888411c71d2f28b1431a74556
SHA2560105c824a0254d1c750d480eebf0b3274b2ef682702e75e980142ac715941c06
SHA51252098260b657f259423a12de5badaa789e848b818ac15cc0b8af856ebeaabac3125e96653b347fffdedaee048b51a3d6cffadc0f706c9558132afb15b207019c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9be292b37a5ef8be1dc728742d76f3e
SHA1b62db269374d53fba3d846a24c413b14f37af102
SHA2566cda0c6df4d6095764751b1c6a6ec2fac0f5dcac2b6ff0ede34f19e0ddd89eb9
SHA512e72f47374ebe257bf440dd44a157437368262db72e6ac8a8ebdb87d529ef7f858eda99fd000faae98624eaf0e81792afaa3b33e8c5d14b829aafffad3aac9209
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ccb379c9f1bacd5163fd52214e3c550
SHA1bc9f6ed45a1cb8ade54db1b2d3c40d9ab349a601
SHA256a149cec166652695c32b49aabe3d4c2d7d27c44936ffca3bdd1a5a384bc996e4
SHA51233d72813656ac3afe6109377b5ec15e54b9d34790facdb3f9640a89a70db59e6b41f3ae1e3d4191a7d60a4b80f62ab15065d3300444f7686e4ab467db2e420c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc570376b46d5e618a2eb727ef2c5464
SHA15d4d1058f4c6a1ac7d837fa382652fad0ab1e9a8
SHA25689dfb69bdf425e9585ad996063a5347d10348dc355341da546204e62c0417e0b
SHA5124dfd6669893aca8803345a208fd4793c7165804c69d0119a93f7590454dbca3ba491b1dc5ea70b2d322b73b5698d0f6007d78100fdceb2ee8ec097f2197279f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fcf57b80987726fb4b79d3ea7dcdf0f
SHA17dbeb3fd52e7d4a4d592034b863d4e15c9a475d6
SHA256b731f50f3675f46fbe43302c10f5beb3f0c6f4d5abdb4366796a1cada2b916c6
SHA51299fce2171c985a0f8c4d23eaba6b9a08fec23adb199ce95ac2dbdfa4e23ce6bf3710ee385dc5a7592e492e6b19723ac2ebf87f71befe77e47dd39085f26adc33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3e377fcd2bb556f9ab0a9d2ad8c7d69
SHA131b8d345ad869ceda3ee452c6d2fd6431fbe00a8
SHA25646e59a9ad9285596d27fc098f5f14fe36eb4810def39a6a64c16bf4b7d1482fe
SHA512e2ae37e9262a767b0d5457a122d6369fb47cb1e3c464da50ad40e499544b335295fea5b9eb66ecf13d74952b6401007e2a9b69d2e3b60ea995f7ec1e543ce96f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584ef9a2fd73ddbd20bd8becedb5d24fc
SHA1e38e7b0a15377c02cb6079c1c221ca7579c34bcd
SHA256cb02f583f57ce858a9a829d76a53a7589ec8656b60ea0b5c51736e3b31b62ecf
SHA512d722b8b082ec7e191d689574690a3e9228b8020527ec5f4577252b5bb0a88fcb6d91f0340f6e71ee2bd9106af963917c3a650cd3cd7dfda56ac7f955b10ea562
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b56231373892e094929ce6eaf07171e
SHA1387b13d75d220b9852b66bd0156893131a47a035
SHA256c9e1b50aaae4473b3eb36a4b7cbfbdb7490d48fb3aea190cde7a0af897dceac4
SHA51281fa8f2102044f36a7f6ef43f458233a9d864f0bb717dfc043d66d69a18de22a46776ca7f261ac56ad1760c8b6549f5d33b195dfea60b13c60a83e39067ba154
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e3fc6efaf9cf23b3df7413130015f79
SHA1a820202fa5530429aaa07bc0c4444d051a5c42b5
SHA256c25b45c9b2c6ce017f834da65560c5ce8018841d490ee89c3e205b981b91a712
SHA5124303f3fe1dfa1d12f25dc268d5098e039d8f0b6f971d30a1cb747e6c3fc00745548b1c73668cae4517cbe254b92ecafed1ef76b12b47723a64e6732d1385b3a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b504349b1ba8b9db337b90c18e6acd2
SHA1cb05a37104e80ba210d0d82f294b34868323d3d8
SHA25652075bc9bc907352ecba5f6d19a5104afe3b94e43df26fd8828816ca456e6579
SHA512dc5c88e76e9d4272f63a6df78fb804d2f43cb1e6e2a50e1f78a643950d55832ad947265d8553a2b5bdb9247c2e1097b095ef957346d44fe29c464e6dcc5d231e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cb0ad1053970e7dcee8524da9b3b89f
SHA149369883781220982edd826ac12b5cabf5b8996f
SHA2569e524ebfbe4485b296167cc0b647baa30dde033e516484d9a16fdd994f8024a1
SHA5124761378ba13278dbfc3f772753a0668b2a323ea4c0d43bf9817a1cbc887b416e0fa55fdff96c61cac42f99b7eb63d790f2711c2208e1433a31e2df50c3a6b899
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c94aeb52c6e132e7f0b8ff6cc0ca739f
SHA118c23566a67a28fe3d16fad0dea83d28f779f1e6
SHA2560616b2cba431f88082a78a1bc7807629266ddca42edc5f9d8fefb2749f9d1fe7
SHA5127d5f7b42fd2614ac2e1239985ca3dd84acead5aee9c07ae9bdc2ef85b93fbd957ba64ea7d5af75ed013d1e72bbc724896e76910b5e8ac6813cb7c24ee61f00ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccc91582cbb77930e2afa00c042f7594
SHA1f7eab7ddd8105610dcc6afdfaf62b81d69c05039
SHA256320f9c149ae5344fb034497f198d1da2378250e12d0ff4909caa0bb3c8a991ac
SHA512b7cb1546650599b313280d4e69999f757bbe4a7f4c47b1440be48cd6a2821c26d1464793507c98157c8f014a7bf026a5cf89fb29c15dfeaf18fb6d53a5489ed0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b03c97b76072bffc584e3df9ba20aa97
SHA16a8c247296d7fb987033bb3c7d2a1c23f7daaeb9
SHA256161af57a536e4f7ccac012b9c760ecdedb80a083f40741f0d5b8e6964863b422
SHA51289fc3a3873ae2d60e14d6524f55d86af8dfca17d1b2c662bf2296707b2dc84d8f6ff2cf2549a97b42e36809ceae22a6c7fd1506718b0074d9a2202b4e1f7ad0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bf27f975ffb5f35f80691a27e482ae4
SHA1db58d690448fff8c3641e61b7bfc7464b7a0c129
SHA2561d68b30bde13e9d2e5a5d6161aefe659b2481b49262556c9f62467371708df0c
SHA5125b0e11743c48994205284e30ecbe2649eaa9827a397c795bb7306e85c7e03ef68a980aa0c10be13bd09395503ad47a20bd87bae90e88802f5dc48286c427ce46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af3ea0dbbc0033d051a0acb3f505fc83
SHA1b43428f85500d10441028c005f4ce268ea209e92
SHA256fe825baa55543087fa0ca55827fd532fd10df08247324272e719db99e57998b0
SHA51236dcef300c320a48125b60c95ed531f962c2cabeb1f03290b53cbb6d5a95ac3d2f012b4202ffa088f7c5500c9ffafe40c253744d4972feb32d5de4c12f959eb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5549586e0b1d761fe2e0b978a3c6c6b62
SHA173ff9c9692d81648981c5bc28ca384b22353cdc5
SHA256857240538433339c038f02846fd3e82d41cb259a5bf8f8fb6fc6a5227ba8266d
SHA512d80f5c28e4718ac6b62f32728b7e69e8cd6f29fa8be6834be8743ff3f2d6de083efdb7f3bbd42178187cdd000902ac0574b0868995104ad34f262ff3712762cd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b