Analysis
-
max time kernel
133s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 22:54
Static task
static1
Behavioral task
behavioral1
Sample
436f6ea0cce28ecd09cb1b6d06e1a048_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
436f6ea0cce28ecd09cb1b6d06e1a048_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
436f6ea0cce28ecd09cb1b6d06e1a048_JaffaCakes118.html
-
Size
460KB
-
MD5
436f6ea0cce28ecd09cb1b6d06e1a048
-
SHA1
70ce47ceb3368dca6fe2fb81c7c979bea4efaa2c
-
SHA256
f875dd7dd603bb44001346eeaa3f0f7f996fe72b84a754ecc4d6354b94b78764
-
SHA512
6b23896d5e150e1e6bea53b17021d17081789465036f5a3fc88c5debab9f9be21e8b2d69b94b4a01f1f7b08a6854cfd3097c6224238e7aa6ff0b25a1f951f3a9
-
SSDEEP
6144:SCsMYod+X3oI+YxcsMYod+X3oI+YssMYod+X3oI+YLsMYod+X3oI+YQ:V5d+X3m5d+X305d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FB318791-1244-11EF-ADEA-C2931B856BB4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421889162" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e93610000000002000000000010660000000100002000000097f5ab721e63a6a400c601417ec6fefc5f0b263acd38cdb88f8d9261ada93c0d000000000e8000000002000020000000762e721b31e5166308c27d3b273919260367a1a29d9eecff2d60ccce87ba6bad200000007bb113c665d0194c9d45a4fe6a8a46d89c1aa53e024ed9ad28bc1d44f8c2092940000000b2c2cf7613c3b06bd52e816e537d6d47f79668ac9a44e9dde345574b2fdee71e83efbfa9d27b84ea8b9211caf2b2b874aa70049f42e9ab2b437cd4d9bed3fc1d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70ecb9d351a6da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1068 iexplore.exe 1068 iexplore.exe 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1068 wrote to memory of 2092 1068 iexplore.exe 28 PID 1068 wrote to memory of 2092 1068 iexplore.exe 28 PID 1068 wrote to memory of 2092 1068 iexplore.exe 28 PID 1068 wrote to memory of 2092 1068 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\436f6ea0cce28ecd09cb1b6d06e1a048_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1068 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4eefd765d115faf96944151727eb240
SHA1b81b08d477f87870c4292afb161df8090507c250
SHA25635668a910552b9779e61c79e0ec900cf611d59396819aa0c86f6fc9ebefc46d7
SHA512e43ce38f28355316321bd4082876271d71d12dd9c5ac1bff82478a346a93ba2418b645fff9edfd2d01e377af5bcf28e7412145af3ef6f617b1c12b7442f4dc4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7ffe4085407a65d7636afe216cacbca
SHA1b5b829d8a5a2a1cc58e78feef102cf93026b7d10
SHA25635e0e66ab8db9b71f80b1d016b6c1d1f9017f66dbc9647e9832f8f512b7c83dc
SHA512c937941f690f998a5279a7b84dac8bb0e106012f0ddacafbc3ba928f163c6c485530a455ea4b104f0d593c121da667ae0699b465bc48d100aa817404724c2e71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e333ac08d1b15a6ece9562f806024c2
SHA1c5680385bb8b28ad77ae8fe731704e1a2b150d7d
SHA256bd608224a000600026db00e0ab41b5162328607ca4606e506af82b7d450e8bb6
SHA5120b60115f0fa1e92ce687b52b9040d79bf8ece715079905a86d64fcd67783973d0303bdcbde34d4f416b897cf68f5000ded9b82dc08bacabaeadd16bc1e1a78b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9e7ed75cae37b763b6f443d81b8e81b
SHA1a4524ca6c264e70cadc002e8887c382b9533dfad
SHA256d1c79a2239a129b693ba92fb23d50e8e51d6d0d9fd7d3e28e498fab000256a53
SHA5122592e806d70a568f80d3972768ebeead991a2834e2d39b8831a54611310dec6a3246d99964e7f702c1226b11def53d9f38b5335071f644c0d184cd09367278ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3fd11a33315d61f3ffd57498f75bcad
SHA105f3e98c567b0c791980e630f2ebb1d18842f0b5
SHA25651365f7f9c420e2be2abc7e513be290ce39bfe66a3db8caa7210781cfb9b643f
SHA5126275d41fa8794b3fa7d5d383e095220b1e8805ea90fbe2c3655fa9018355457c8a9a4f316a8a468c98bf44ec4166d5ccfb365b55d7fa122147bc57b623eaf9cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57eaf29a43c4614542a640ddcc173ca16
SHA156db96ffb32de509ebb38b6731ecd95a84d64544
SHA256236b7d78d73da4d6bc39dd15511e07fc71d7ca304348a45d24ac7bd52d9a0422
SHA51234930a3c956c64495b7a460a461cc0a614c4c9409cb50c152994063b187ad8cd56c88ea6f4ff3e2701160f4be9b6c335e749254e6968cf9ff4f77164aaf666d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb91cb1afb57fe60559a291567647bd6
SHA1f261befee6afc26df3666af9017dbd0fdb4cec03
SHA2563d79d9bbfaee19e8c1665755c62c05dc3ad70588192b98668ae6e5f579c2a17c
SHA512c8543f120a8fe9c8bff60b3b2e7805a5141a58cd2c829273fc6fe5eab57483cb6aca5d8e1e8fc21d0f2e40b9115d368dd775d0f2c6e15c189b809b40f950df6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52830188895c6e1cded4df0d4ba92d5c8
SHA15b9b5730fc5a8053d3ddea450d65876f7aecddbc
SHA2561db07fc5d314dbc6e0e18bd57810f273c36b7d5088a88f6070521ef0eec3b0ad
SHA512b04a08e9e92a2472340b5bea6907a9f581de40c5ea0bf6eb279525dba10e856f659e88cb78106f7d9f36ef5a70edc8e3045614e5d91dfd109a8c877260b092e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf7cb026dd9b1fdc6585fb18ad060c0c
SHA1a3460f832fe4ede791d262a9dcf157e7c70f4d16
SHA256b1fe7c67da2914dff94c4302da3856a590f6a23116bb85ce1c1a7bb33a60d279
SHA5122321d5b1599aace2ee3e84026f51809ad6f07553f081c500c198bce6764417c150b33bdedaf42cca2babbba273ea310e4a7019f526a871eba3df2e1a9340d3a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53cd6a4fc7c8127e92505baba6b3459fc
SHA18f086615c004c425a2ab6f3b14ac47e594faf832
SHA256abe6d12135364282e38df2606bc9b9ab4c900c074703f781bcdabdd349a8873d
SHA51248ad69083db08103b8667c324e0de69fa1d6036230d1fcb2a50c891f22b77e6a42a1f15432fe8469e170f86384211088cd4eae47456ccdf03943e97e83cb788a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4eebf31f5ad9f64bdab1c32bcf3b16e
SHA15a59ec88065cbc5b7256abe7d3dec21667ff3ecc
SHA256c99e7286e99782f1f102886add34e845036f8cf4c8cad251116ac60ef012a60b
SHA51242fc7fa67378ec2623e6325e4c399ac9c0c321b6f50edcb24c8d15350360b982e896d917ded66af6a4c6d1c369858af948500b482401c7d108a00f120fa7fe19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5f3241468da7d0e41a2788e60a38646
SHA13b0810531b52d75e1aa99b4f165697ae9ee4ecd9
SHA256f0ab7a12260836c287c48d723d1e1de1093a0520836d03abe278b9cd3709a1e7
SHA512a90ee970abf7f969227ec8c86861614e34e0bd54e13e48f3af4cfb104881ac45d28a2ada8267d37e8cf23091468dc55419d9ecf6510ea325bd30d91f87c41aaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1ee67e874ff0dd4a6cc5d41c0f0d43e
SHA1ccdab4081e905487f5f66d7c0de9e63633d205ae
SHA256d079b1c2d7a6601c61e39fcc9dc73556ebe02b9c99125ecaf138106985e7123e
SHA512f731e022fc80a25760872985e47f1e55d0eb7a9b2c5d0812a673af77cd32d63e3177ab5326f8d8a769a2546b5ee5cf4503aa61f1313d4ee65bf7c4dcdc6d98ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f0953833145b2e7269c595d7f08cc61
SHA1085d77f055abed62ad66e5eaebd131211e903b11
SHA25606d7bd3ab08d13251e2ed0cb3b3948971c2a786b5a1309b779f41ccca1320a47
SHA512db61fd1d465b68450dde556bc36cc8e5e6e48092a7e60f2da7559acca2c6ee43cb03e03f45ba9c512b2928c97df3a5483e0770a667a447f5b0600e581acfe6c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557142b4fa7376a8654abe181d842dcca
SHA1345d1b871178761d78cca2a54cd69fb661166f44
SHA256da8ec940991c12e3df9ee6a1150ef8dd95db586389820d491156bedc82656375
SHA512fdc2f22ebb1f5dd7d34822b0aec54d9da1dbcff20e1f7b65953483e8137857527f5a13a59bd44d4cf69f7ede28f3406c29af508e045b0f28249142c0ed52388e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52eceeaca0937430ce7147e616e879520
SHA1f8161565324ba8652dbacbbcafeed2a7f2de7c30
SHA25634157f6e95a792a261e0ea36612bf1ed8109c0a7f423a649212f0257572f8fef
SHA51258f494f42b61e3a95e5b7b1968f7c2fcfe20c40ec0e8e7a79cce42b6264d9d25dda8053ffd8e85b6c970b5f18859f5dc1c807d7227f9a6058b632c0a43f8610e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8760d378af3bc779fb0a46d0c72485a
SHA150f6d6a289f033de4bd9e82f0fa699a25db8e3ca
SHA256b452da384d878322931bed3a7ecfbb3bae262e7be0402569d097e5a1761d6f56
SHA512197e0742d938acc0dddb475558d4f6dd46e3be20810a4ad67581de156d043de2695f5793c96960f1d1d6e489f04cd9efcafa0d44ff435f11adda87eeeff4411f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af1de6c18f643cecdb78a1aadd6b8682
SHA10855bf6eb43891e441bee60cd14793bf2b804afd
SHA2567c0fe98fce01e4178b91c9824a17982a05bc78c59567b78bb83ae2ff8eca0e16
SHA512e3853ccc23677a79a008616e0a97f1dd971aedd8676c1fbcf8a345bc31c30b6c6c178fa434173dc95bc2f7359b64f7c1b49334eb18d3f87cb967600234b9c61b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3309c82d1923678238582ebadc7a24a
SHA1ff895f0b20a9480f8a29bd28b3776e30cfa2ebaa
SHA2565e6513fdac43e1e0e8b2e8558538ba71fdd58810524e704f98ab93f6df9a7fc3
SHA512c3872e614d24513fe673011bef47871654d1b26b660928fb3aca155451b76e9325e73f225a6de87bebd837375d8ddeee97a27f444c00596c3c1db1c1000bb56e
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a