Analysis
-
max time kernel
132s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 23:47
Static task
static1
Behavioral task
behavioral1
Sample
489eb2e1926b4b7abbe42007643b14d9_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
489eb2e1926b4b7abbe42007643b14d9_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
489eb2e1926b4b7abbe42007643b14d9_JaffaCakes118.html
-
Size
26KB
-
MD5
489eb2e1926b4b7abbe42007643b14d9
-
SHA1
12f004716cb4867fd0707a8503881868f0a2c527
-
SHA256
242621afa520db3c30ca7c89762178180c838a2077923c01eaf12dc90928ca08
-
SHA512
f1293b76fe58e5ab4b5863c0d0c5a7e33bfe941f32112f694ccb18160fc7cb4ee822fc49e4c43c0362b2bba37023d424b584b8940ca7688a88a397995b475e27
-
SSDEEP
384:ipUaj1vb9iHdTJNHLAU2MpO7vf3VxaNY1/oPJQhnRHipZEW15e:ipUobw9TLHLA42vtxrQPJQJ1IfLe
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0e4ca5f22a7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421978739" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e93610000000002000000000010660000000100002000000071d250c8e573dedadb2692c98a73f30a75eeb3a76040480b261e5af906491955000000000e8000000002000020000000695e33adc0865a65c5221e97f74ce76912e4cbaf9364e35162d9e27ef576c10a20000000ade250ce82b32b44f773079093834043d8defe8d92b00e8a720609bc91a8236240000000be36bf0aaf2d7b724adb8d35a3246df6530d1a9f4a00b431a992df89f3b65da0d99855475a95210a18c75aa5345f8a19f7e8f8ae47aa973a6ec715fcf6c2347f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8B3CA0B1-1315-11EF-A5B4-4205ACB4EED4} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2040 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2040 iexplore.exe 2040 iexplore.exe 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2108 2040 iexplore.exe 28 PID 2040 wrote to memory of 2108 2040 iexplore.exe 28 PID 2040 wrote to memory of 2108 2040 iexplore.exe 28 PID 2040 wrote to memory of 2108 2040 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\489eb2e1926b4b7abbe42007643b14d9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2040 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2108
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558aa78554a94d9cae5348436757d792d
SHA1001e1febb2353d83fa850132050828ceacc3e5e5
SHA25676ae0d97163a165907180cd2aa45facc26d61e15579be8811691145bd472d110
SHA512d578e202c06a2438fa01c35074f9fe6416f3971e2ceb09a0d406869e097e7d52dca88a169908dd424a1eb3cb81bcb0dc42f422af3036bb8c4b76655049723337
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568ab1aca1bffeeff30d85a21fb73bb02
SHA1f1dce1b6e789ad21b6f5c4fc40b587e8047aa135
SHA25692df0338dbffcaf110cb273ac41887350c8c9b330b05a856bb21a6112053d444
SHA512a60487a324adce3e6ba8c332e60060307a64db62fef89499309b51da168a6b3800639f8e1a559cbf2a1996b8315dec48a2fd695f239bdbf0f635ec6deb23d245
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5270e03c7f08fdad0f7808955aea17989
SHA10fd4b2adafad5d09a088f5602be57fd2373d3d6c
SHA256f6eff3e9fa20a4e82493997c88c1a8dcd57a25636474f39681f45925045dc462
SHA512a17e86b47f4994b444993f25e4efa64073d929c3b4274220b6a874c625ab044ca7c3fd0914bf1bd75bd5c7528e3681246761514e2cac1e65ca28c16e1e210dbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cdb73bbe7ed270b30a55d8121899598b
SHA17e6ea6b7b729f7eb6b2ff959f0de341854f4bfc7
SHA25663f0206f3a37db830fb890d7b6ecf3d7f391d08e0b94783b8a327d49ef79f5f1
SHA512d19317e82f4661b8be589fa77cfce7f5750d6ebea32b8f7480b600af8b0c2b4a296f64b8d2b667456ecc102f18ea6a42b50965fb42c10f3b1e7d2622d5c1abd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7fcff4c37ea8b6f2ef5b87c5dc2b1fe
SHA1359dfb438cefa73be509e2b622f95dde839703d7
SHA25627b0fe3d2fd327a501f42009e12586d7afa35ff3768edfc883a0541787c32b08
SHA512c60eeb4e240a76c9fbb7e2f0649215206d9480760e6c37f315c1d7ffddd28e3692bd3fb8128ed48442849b08493610fda6661db29d37544e6d6ca20a48c23caf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545f8aa3e6e4277afb4920e37afff3aa9
SHA1a222db8801aaaf1c086097517cf5332a06e8b4d1
SHA256ec96c8115a10c684e8e441122a85c985aceb401293b7be8fcaa2bb5132dcd5dc
SHA512af71bbf9ca24d7c61605dd3bbb33a97de07c129c322e953410123bc3ed02438ba5de629d7cc4ab7cc4720c5d8f2ee28b52faeffbaa9ea6c5d02a51dab63e7927
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58570fa4b67736a18b5087e6868b694d2
SHA1f517a945604fb0ed00d7e159aff3b49f5c9fe218
SHA256457acd5b80aaab9d7e80d9a916679ce6fff9de18e660c840f101d2e9371d1f6c
SHA51213f4243d76a5fd942c191aeec51e8fd8a5f1e6767f44ecf10e8fd2141d9d769eca79c014f7d1100388c3b5f1aaa1f10fede5f86d63daf0dddc667f8a4c1c7c84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ac726bac5a2592b12756c8a8aa98670
SHA14421207110a298edad2818232fc37a225944994c
SHA2567ca15601bdc0c929374e62b355f56aaa14b1eb5e48a37fb403c8e8ee07868c63
SHA512fb4cc7968a8d3bdd1436ee95c4e0d90f996bbb12e2201b2dbf0e89fd181e08332c7f4aac2de44ed1db301949b4b7094c55b376209d8f36c92b7ff8842ba6076f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d82c7691dc19bc409a283433fafed33e
SHA1441240d7b407c977aa3d12d4fe3fff344fe7d200
SHA2563e753dc411119e929bb33630f44b7e04404c0997ef63be00fec03098f3f63c4c
SHA5128acc17037bc263a78dfe4c8d5537509a8cacae8979acaf990b2e6db7edf4bda04b09057cd9f4086f88683c6aec896f336f99c8866873abcc01983f379cee2dec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59cb1f39ee6aa544206564ddfd5a7a69f
SHA1ac096825301930d5681cb7c171dc277bb58f6bc1
SHA2560f82d72bf81f689379f0249ed08ecff47e979ca3cf6e28e91771d840ad7656b7
SHA5126f56b21d6a958baae6209f8b2173bc166b0f6c14c87dfff21a919f4c56aee134880a71aea4df2223542c8272bc599fd72362803d0fbf9564ef842852744a7a85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51dc9487b8fa2376314103b4e8c7f3ad7
SHA1f5e44b49578e3b28ab5622fc20d53fc35cf09525
SHA256ec86e9fb4f352d7a5399bee8d87ec757b2e5172393e7f8c899bceb7ca8da1347
SHA5129cc87c67a3582ffa5d2d0afabc1593acd0932871b0352b0b86e99555b02ad8d8dedab20addcd8f74b0982c23ec0c41ad19cb5e8c5718dda7265c7d31734bd2ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59241d70636019ee4bfa55a834f16223f
SHA1fa58de632630cfe0e50238752b1bfe446a6cdd92
SHA25676a326ffdbe487b1485c439c978647a8e3aeef83d70015a460cad6b5a40594dc
SHA512413aa31163d56fea4861707cb9b59f56ee89b5b39188d7ec5e9f3d3d99d05677507cac69b85151f34c810a503a59a65c31bed65bfe872b94debb15f76854f1cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5edb762ca72659ec473b5b024c101a1da
SHA12aac6687b86ceb60d5c04b79a38449249e42b813
SHA256477c8e20c3c02c181d0ff59d62674ae941b6629fc37689e10d5e0d073f344cce
SHA512ff8632779bb475b8872f406087fb6806f073ca9f36c794f97b71525c1f34516e421c1c8968b99580ff54dd79c7193f8ffca012163938a994c7080678aba536d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51700e38b2e0fccb788027c547541385d
SHA196f49b9cae6f11f4b8ec65cad536be1ec517be53
SHA2566847240621112f0956852b1d3855def047e09999be933d60aff629a2dd3122ca
SHA512e26e78fe24e8a895a7850e9ec44971403361e4cab173f7b3ee8360ba7c627913af34d4fba9fba905eb86fc6b3a026053cb95e24b3d3bce0e1cbee86c36b476e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575f3c6d9ef3440b867cd369735966623
SHA1b4dc7a433c39ddbd7050f7a55c2de214703c69b3
SHA2562d7571b7043745709b41baf63fa818980e7c21371d30ac50caeabf8607ad9b08
SHA5122cbf264a05991569cdfb66159c07e610a7baacb88a9cfcc2c736243212ef875e2716300762b8b5486e2f9e6907907b136e0a1d70bee6ccce0e97261735cd37a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5613aa9967225cd3f095a1dfa641a4d58
SHA12d183d8f9bb9ba6fe3ceeeda757a02fadc14c5c7
SHA256af36c7c3c96fe89d04a93d002fd85f94e409ed91160bf6703400a8dbb56f3d82
SHA51268631ed448246491a4a4130fa1457b994797d8f9d4ca46d801a96c34a13fdb8cd788d214908c29c50362529634845ce42625374792c665709ef2f0722a68362f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5878dabbde548a216b6d25be9e9316dc8
SHA15138f0dc07b54f9be89b96d849a098827ae59a3d
SHA25653ecfd8e20b653923d91db504af73a1e7537651befa7edf7021030b46d8b1872
SHA51295db4fccca9fcce82c3e6bf7de5f6ab1df8654fc03f77cfc66bba7cac487d9e0aae6ef60b4d45839b44a075425b5b6c6c0f9f104cc995276a028994729481532
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8e4d5612dbb05d4445657e27c004036
SHA1330896666a64d81d21cb2dfe1e811b3148102023
SHA2567d0da6e62968bdf2580a2d6bd71bd1fd503bfd3e3eaf0e9c76bf5ed541b4c6e1
SHA5124c5821e000a41c0bf90f1a64322b704d3e86b1b9a3a87c6daa83dd43b4278f9f9b99c36be8cba60e94185975fa04f9d323ea33b39da0b411a56224d0a7086e9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5638df10a72e30b7f8a458918a5063bab
SHA1a5eed1202ae2771730c66f23cd6c4b68f84e1150
SHA256c6f5ee2d4173577c8a805de57e692f2f9e707d68db5a0b676091fbfbac09499b
SHA5126b7acad9d8648eafced37b3cfb158cde74f130d8ca85bf79b49ccda365530bdb695d59ba873d1f20259dff5ad6599461ef3a9fb068e7296af90ded94e3916c3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54cee678b0bb80e6c459603d66332452c
SHA11f19e357b596bc3300fcc39b785910ddde09d6ee
SHA256992094520ad582d7d5cb201601a870d7f5e7a6f140816336a08cc0318843b353
SHA5127e1104bee7fe7814ce0281732c3f5a398af964b4753218ccd873508b69d60c40724a168d84027bffe17564aa60de320ee71244fbbc4c9487c845b69501587a7f
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a