Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 10:24
Static task
static1
Behavioral task
behavioral1
Sample
399f90fd449298eac584adc03f539eb0_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
399f90fd449298eac584adc03f539eb0_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
399f90fd449298eac584adc03f539eb0_JaffaCakes118.html
-
Size
20KB
-
MD5
399f90fd449298eac584adc03f539eb0
-
SHA1
a0e49deceec33db892d81fb2ec9f3ecf4c1f33c5
-
SHA256
aee152304fa3a71387ac8d56d9854e1e0f89fce4022f0763d827e33edc6d3f91
-
SHA512
cb53be184af7286ecc4a9fe1cf68a4a3abde3e15f65dbf9f734f4b2eb39abf31a9c7e74bb2bb08aeb1984bc2e9b051b92c6885096ae8c31550d79166eb869f59
-
SSDEEP
384:ji/KcRAa5r9DIiVVBD8cqQ3RDtcn0md5WScfIk9xheczVc9WI:jiEa5r9DHgcd31tfmNOIk9eaqWI
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50494c9856a4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C3AB30C1-1049-11EF-BA28-C2931B856BB4} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000891ab6a71f681dc864040c88ccb39ecfadaa76eb434ec5ed36061b165edda9fc000000000e800000000200002000000028c4a7e7fbd38a6733d765ea7f30058c98a3c7b9bef9762ac7398e02f8f0f0f6200000000c97a47c2bbef457abb3b6f26ec524490664ee8894fa3a34f255ff1c5d85a071400000002effaa31cc48bb1034303a98f4e2c6816b078d7492fa1151e66f632a7bb21a6090349bc7eb768e73495508e28939d2ccab4e8ce818ab5cf91f2f8f956ba248d9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421671314" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1700 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1700 iexplore.exe 1700 iexplore.exe 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1700 wrote to memory of 2180 1700 iexplore.exe 29 PID 1700 wrote to memory of 2180 1700 iexplore.exe 29 PID 1700 wrote to memory of 2180 1700 iexplore.exe 29 PID 1700 wrote to memory of 2180 1700 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\399f90fd449298eac584adc03f539eb0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1700 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2180
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9037295b8431cc544ec10ac05cec6c7
SHA1a54099e4e4bdb5f917c345cfdc0d06faacd439a6
SHA25686a434b9f68ec23d452a7ab45996ec312d174b84fbe55c7990849c454d5c3536
SHA51275c8f15e1f9666d909d8e765b9f0992d069be43dc3f9618ccec330142ae091c7e22a1c6c86c531f114c6919822947f6751c03e11b10f64b3f93a2d669ebf7f46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae50f5733975f7526e70e3780afa4efd
SHA189382e4c0acde068e1cc94fb68852cc7ba792c8a
SHA256047543a949cfb3d83a7861ff5ef789e3b1abc413ff8ffdc9dd3e7b90fc80df33
SHA5128b7ae507162cdaec3459dcb0326e99ca02da8e6470f8adbe505ab81a822a2bfee2e871fce62a2ea2f4502e55f4058842414031a6f19b7488908647863c6025bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53348f858bed7afe140ad1a1a34714012
SHA1f67af97251e34e8ae8013d23bfcfea6997827c74
SHA256e89a50a1595f9d05628b53bf4d559b6359a21ff4831e29c2a887cde799881718
SHA512d1a53037d4f2546bad8e9d451d0c6535260837614a2d018e5d2640f9948ea2981488aa75f630a06fd8d4dc6e63f930c36af42dbc32033af688854ed2c5cf618e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa61eb7227bfc784c3b384307e948d0a
SHA19fa21c52287802c89432f509c68e5ace68ef2e2f
SHA2562b3968ff4e7272b45714b8a6c89e11152819bead3a7e7b095d13f2007423eab4
SHA5122c386b56c3b459824a3e11e219f72f3e29470af385222023a8057b51fac4fdaec167227490a60e2ee01e15189abb8c599b5d16f6329bcb0cda9220ed9d93d736
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f7b8f8cdf13fd55e2d5381bf4c1596e
SHA1e17b043e05fb0860d910aec62b5e37caffdcef62
SHA25615821fb948ac983e55a96e806ed07d80d2b88f9ef5ca8bcbe596af17db7e584b
SHA512da3d38030dd9eb8d516d761721c80e6d5a5268c1dff29fd9867415d3ee045da6bea9315c8abb25874a817d422ba9acef89ec7ee8c0bce1596eb83fb1706089ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a23533f74064e23346ca24e4b7f463b1
SHA18bf5d3b3f66afe26895dad0d8a6512ebf7b73996
SHA25640293b65260243586a2b5470eaa3c15b3808761e22adf2bab55788be05630b76
SHA512156b8caa7492ff8896c25665a02d7c371b8350156bbab9eb02829b3978297bd0d52ab4821632a1891e9df25013324ca9584f212206c574726441ee0fd2a08479
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ceb7198e2f856ff28ae0f44529100251
SHA1e3e16769e22bbeb49e783d6704a328d68ca2a8d8
SHA2560d0f0c53f9108a254f09b09a0a2a85e98bd234e1605491014f29da6309e8d1bc
SHA51269f4c6666654220a1ad4b4d3223bea4234914af5ecc76cfdcbc0cf57a382bef22f44551549800a14e650739c9493df558ced9cda94c68c749713a4db6951aaf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50877cc68978c152c899e97d10757a8da
SHA1f8587ff589d50fe6722cae06329c76ca19d38309
SHA256c5d99df1bcf812a88f1556204fd9ac54c621b5a0e2f07e5bc564725177c3a8a7
SHA512d58d918c2f4110fcbef5e91ee40ebcb85845cf30af108828096a2716d0d0ea20f38258759ec4ce258e96eb73756f1306477fc0711b2cace7034005ea46a8cbd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58305b50f0b7d3d0708e5ebc03c5181b8
SHA1d77cc7464272e453250a61ab57addba0cba391cd
SHA2561c0b484e7c0dfc2c0d7ff48e128d609a87f3318717a88802a2f83144186c15b3
SHA5123b5e950313f89ee85390e2c90185e990457aa11a06bba0397bcbe556de3332d7374f0444f72a2294aff62970d2b3a634d7292251777186d3afbac81e8ee153af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f9a49db170f26c5b9b0c0bc881e8a8e
SHA15e13e4ec8045e8cadc75a3608348b20b05bfd648
SHA256e705fc2878a8b392e155a473a060b9ca8054d956f60b4c72d865cf7ee9d5870e
SHA512112051cf5e687f024c30bfbb2eef6f5221f88657a1e2c28ac95a2a5a4daeed512cd9f7c313e450d8e8006f7e0a1b5220bd3a054b8f952173cc48dfbc64cf031d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5179a7fb7fa16430d9298ea1f51d4e348
SHA1d7e11b11b0a4d63717e65eeaf80937532eeb0966
SHA256bce9bffbc3d3c84043a9d6d554c3807062d1c6525d5e58d8f6a166305420ffe9
SHA5120d9b1359d68adc5b1157a75eb6abc191b814b7e939edc58f37ef0bcbf8080c4979abb22f65df647c89bfbe7daa1321713d5033b7aadb78c2998696063515edfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55919ecac93fd0162574398ebe1a3bff5
SHA1c73f9a80379f7e07e0267095fa8939e3810a1f44
SHA256ffe86588322ed684fd4a503255d7b814a374a2e36c7056b92486406b4a267e3d
SHA512d8703994ccde69264aaac38d99f8d3c16beba864929a9e3f222e9ac5056b69918ae6bc8d06eb5191fb06e1fd210c5f43fb7be7cdadc00808fdd9321818c91677
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500a2898f5a64f0ebfd5de79a0d0f05ff
SHA1763c059e404c76e0c8f669007a8a9a0a4e665d10
SHA2566f3b4339d0313010be62dde85482b4c143bddb8a707c6f86baf14205e87d7dd5
SHA5124b443f88f6900358069a639605de5b05961ff2f677d25870f18bd4cc811477c3477219d5c581bd61e236d8aa85d5a897dd6647c6402b37ad3a9924bed78180fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500133b620d3b82ee8b7ac4d40c3027e3
SHA163f607ec2ece29a85a2a76f7dfe4d35fb45b74ac
SHA256bbb4562f24e5a289a659cab9fe9807de83c0a9df50956d615a925e0a780d173a
SHA512678a47be46b8f8c25629655fe68c7b8699f62ec39780db3cc0dcfa3864b22d0a535c6349f62c9cb218a932d3e23e44549a541ad935218c8095fc238b9f00dfd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b709f7d8364d182f7c2da85ee40a8d0
SHA1d3789fe31a342a71781ccdecfdc1f9da2d52e81c
SHA2563717e599d3cc5278f43d95c7051ae0ad8d14b57cfdcc83ddcb0c58bcc700e9cc
SHA5126c2289cc1abd6f7e5d479c942314d72ce42c5e53b5734ae53ac13093beb640f1661fb3f0837b9627e1d46f66ec101b35dc17b90a7e8a7be98b7ff5ac65ab7b6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d82474b3bebec868d08391fc29f815c6
SHA128d4f3d285f3443b7e1a986ceb30a1c2e2e26c0e
SHA25669e774e6993d08355e50ddb069afc6feed36ab3ff420181047d150fe2f828aba
SHA512f86a9c134d66e11bbf667dc05dbe138399287b2d5490a1b63087fe2e9abf781faae94e7313c9c1bbec4e389b3e7e05ee3350aca802b4eb6e967362bc7632dfbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e27776df143c3570e39dd9e4359a812a
SHA14c561a4f7bf93fe3287706ae114990eba66bb820
SHA2566f8ca0d5da90224599e439eec58064dd6efefc924be996ad72832227a4e3e49e
SHA5126f2cfcda734365654b4fb9dd74071d6bd8dea25ee11c2018d7ea82b7c6925b31ad149f90b425f7f324b3ede192a98359f22021ff702d61ef351bba7e1b8adcec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52547cb2ac1fcc26a671078de1462294c
SHA18ab20dae18910b6805e35801692561a5734b3f0b
SHA256432ed3cbe3eaf42090b96898bc91c93fc96815043ba75ddaaad75798499fc695
SHA512ecc7a4769ede9a5484bd3f24ed51766bfc86044f8f8aee194747234cf18aa56dfa4ccf40502fac9749f5cb967877f87de50bab248f774c57e83bc7b70e6ace3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2e6bcee7e8a8dd85ef8b9897e9d2aed
SHA1be1a80aaf541a38bce456c13c67f8f04eb3b3aa9
SHA256e5c482d95264c2328b256178e9fa05791d1c170a75868081b9606cf0837845e7
SHA51238fe9d632a697da933cab6c950989f4ab4ccd9d22c8974c7d1a08f0e3cac0f0a8faa3496d18df971f6a81208e82904e572031042408c6cbbcfe3a9298f79476e
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a