Analysis
-
max time kernel
144s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 07:50
Static task
static1
Behavioral task
behavioral1
Sample
45303001a8429407e6d36b95cc464729_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
45303001a8429407e6d36b95cc464729_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
45303001a8429407e6d36b95cc464729_JaffaCakes118.html
-
Size
23KB
-
MD5
45303001a8429407e6d36b95cc464729
-
SHA1
20655336f4884adc48cee9579c1090150a046de2
-
SHA256
0bb53f7c4092e4fed1d413ce8b1486af210e53e16641f4e3f5226583c6d1d4cf
-
SHA512
ccb4037cd6e4f88dea73316e4491542f88fab4c018d220a942d26ad14e65465cce0eaa85d4af28d00251bcaebd861504bcf9bad1afb8670b7f53da9b87f5da7b
-
SSDEEP
192:NWQo8zJb5nWnQjLntQ/ZnQiedn1nQOkrntTAnQTbnqnQWanQtKMfnFnQ7Xn/nQTP:cQo4xQ/Z6
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CB60C9E1-128F-11EF-B023-6200E4292AD7} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000e496016e55ac2ce9570470f35e3c4e3bd11cecb183e87885595923ccc3a17962000000000e8000000002000020000000fa750ad71ee8cd49136b3897c160fada4b4d9f4f038850512a729e38e19fd31e200000006d21fbcf453af594d0c510535a2c18552d1034a8d3b4034279305db7c3c8e570400000003e5615e12d999596ae5b3b691e6d53740b7521160f105fa10383c7228401631ca2edc04c4fe5cfb4295720dfd0fdaf7ebe8bc07e7999ca294aafa472d9580c06 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421921294" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0a833a09ca6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2188 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2188 iexplore.exe 2188 iexplore.exe 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2188 wrote to memory of 3068 2188 iexplore.exe 28 PID 2188 wrote to memory of 3068 2188 iexplore.exe 28 PID 2188 wrote to memory of 3068 2188 iexplore.exe 28 PID 2188 wrote to memory of 3068 2188 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\45303001a8429407e6d36b95cc464729_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2188 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c08332044bf7d9058a866dc179821b78
SHA17d0b106413d35f4f3db9ee9cddbf31d0a6f45d0d
SHA2567b7400e224f2ff5f861e308398e5fcb98bd121965f4f944a890b1bb14ba60978
SHA512d0d2c515b2cae8ee0daf8d9f9e0ad6b7f649f1d51fc6802e01a19f48a64b59b8b4872fd9b5d11823a16c9560d5939fb9617150b8f275d0196ea671b3cb6ddeee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef44448b266c3c71204cecfc6cfd3958
SHA14bd2370a4ab8605e9078d9ba402f12a1a11fd409
SHA256314eff7b9b928cc0a113f3f24e83d2dde82624e3bda24fe371b94527045d455b
SHA5129d1c703781a62cf8b2391642e79263569ebd00ce8ef24ed9c6a81b24875d6dd7d38525df8c93f277edc843914bec501fcbbebb25b03ada2515369beab939af53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5707fcd4631f9a6fcd34d5f0c2b5fb50e
SHA1e7a5fa277004807b4f8ac6c10eff5585a0f77e48
SHA256b741f72cd59ff909822fc7d775e70e09eb09474519e6f3aa353845464c307c9b
SHA5122cd349e801cec4265b97b83ad72324b80ae42cfda8ec48ca376f8f0164649867d386f492bdc3ed3b24f57be58f7b495747584d8ef34cc1ac0144dbab3ebc794c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a91ebee744648c84e5d88ff65428e51d
SHA126b6a658af8a9532a1ee0a505564d2f512429b9c
SHA2562e5eea04549444f2e8370203c9ebf3de448029fbd73c3a75d9b1650d14bd8296
SHA5120cb54dc1bbd650328c7abd9ec8e7f2c2ce0d0d6330534604497061fe3cbcb623d46b434a943367fa9fca4a0bbe6d9ee45c2fde73923ca91e9c4d6e456faec1a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ef7bf73ba47cd35811733b4615ee388
SHA172d5628eac0980051dd94fde887b67c6c619cb09
SHA25681fd460906d5d842a08be77db34332ae34f6d4126ffa5d570ea87d552cdacf98
SHA512efd3a20fe30c8304d35209daffead5d6e56b791c56635ad2597018fad4f482e2e73d02552437bc61fc631e827fc1b014ebac57d5cdf212b97c693d9b56fad620
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a286ac579324a42dd91beed3d6a0f406
SHA11aa0e7aad420356b7890196e478c82d6fe11d0dd
SHA256fe3f31eb7539c7f5280066c75fb8fe4c0d55faaa555f0166fe6e6a0f902e2cd7
SHA5124299bd9cfbda6582c99216e1c4aeb95ef568470f8fd70ee8b63c1dfb1e79faf0e581be6e38bfa74b27b0d855c1c7e366f8b3236bba4c2d7069ba9d79914b4ecf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5564e05224049217cb81ee0e869caeacd
SHA1eb78f97b787b37ae169bcd051718dfd668eb9abb
SHA256445bc410904dff1f8c84f2824b31b1dc30ab4c473e3dd9a506efdbb541772a10
SHA512d26cb80941f6a656488caf96ddd56fbc0a55bed8a39e6092e4dd52d7b67b63bb2aaa00aefa852a5f73843989e2a497e3c254dbb3b724c53c9eb5eb69343955e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5904e0286da46cafa4991a316f3519d1c
SHA139c7988ffdf9272702f00ebe37446748fe6ec1fe
SHA256e4b55d0f58647ef1647d4c20ae9780be3e9f0383ec412f5a3ab5927d4bceb380
SHA5127417b8f4b4b38cb58389b3d55f6067fbb51608605110729e68ec230954c4720c50b0a8b5bbc05d8d1dec61d081d1a004879027b6e51fff8b49ad51cd1a284547
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574b12377f88c8ef0fb30b2e49dde35c8
SHA105961afa58d26b6dfd623756cebd6c865c2dc018
SHA25650fdb807eaf83bd3d83d2a03b6fb3078204c0fb4a8b9316f1c0203a903b3fb7a
SHA512de372f3ff4241f697d859ea7c9401b1e7bb0d21537f0c5c6a274dc21b890594b9e2c3577676fe22ca9a56ed184013daf89514a8e7911b16206acf2c0314b8bdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da39c00270c61ea0b92674343f47373f
SHA181b9c9ce17aa9dff8476abe894b864fcb83fbc78
SHA256aec024bf3440299a9897c58da37ee4e67bde043087a65ebf795a375526bdb7ea
SHA5128706a2034376edac1e589f60b178f82e40ffcd904febc2bd6309ec812480466477909dc96c8bc11c0b9add54055ac43bac0147c7a76cd52f9a23f4811305c5b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5938f481e6db75571bebbf707d92e9dd0
SHA131b885ad051fd721646b4fc8c312f07f307cbefc
SHA2560aeaeb404eafcd9d802aace9cae40e6e10159d46eb43cc8ac4aa10daab030ddf
SHA512cfb0b5d43c5a438c7454c50d43fbaa5666912e604d130c0d39c0a000246bf7c5092bfafeb54e69e4fbe272ff3311cbcb3af85ae1a5d08131d628fe92ef6829ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56bbfa6633b8fc94e263011e837aa8c2c
SHA14d19bd4de249eea3193c1b9448c70041412a6fe9
SHA25651ee75891a0e6acb8bfb051bdc19e79641a1d41487c88300ba32a9472935d932
SHA512759de10cba5146b1940f8e81484d4e8c290f272a3321fe3ed99cd9bfc2e20b5d8d487f46daa4cbe209925b532a7a616d42dd0f7ed69be32ef114c04193f46750
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c25929b1a227729bf83ff0213f13d49
SHA1235c6679492da99c480c41c4f50bce7c7621af25
SHA2563189739935f247632845031e470de56dc2ce812840ca8831bfa8fc232b120a42
SHA512bb6e1c93fc1866ae162bd86a4472a78940e53ad00a44248fae884568d3d97bba8171c0bf4c8c425880b5ebc96d15ef996886a12bbd125406f146e2e7f85342fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56847d909e9a99dd3b1a6de1ad4159ba7
SHA1e97578448d7afebd5e57750452fcd19e4fb53bef
SHA25631c19b2026768468fff419a5907c2bd224e7292746fcd9b8a7cacd587859fa2d
SHA512231bf0013cd4f70576e3d77898bd42e7ac5d397a0cf836da1094484e8e1b4a89af52e544e7beb19bd3e1d317d5f2c01929344755c2734198bfbc9cd97fa7641c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5813b2475e58905dce72cfe96d931948a
SHA150656efc1ae02643d0408dcdfe432d0419a3dd84
SHA2567ba4caa59120efd6a78d6e09a9be743d78c879c045eb78eed6fb0d30386971fe
SHA512d8266287e78437913e7d0eebd9d6a8db599b1473b4609a344482bbb8bb0917503fbef058b3259b8f0579ff43b01194d8bd8790daf9a2aa90200ecad6f0615d55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5816dbe7699bd705050d70164ca78f486
SHA1e8787755b684f7fd00b883bcaa032621677326d5
SHA2560413e373bd835470034a5b79b0befd87312a3794ad3dac4b931df8bb752ab553
SHA512144602b2aa7a407081ef16ce90deb08e04a59a29e9d09349ec6491e2af4b669f2ce28de8b763ced6ace902e2849f3c04181db3fd6941abe779de4dcc72e71a1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541ad06dbe21991c58911b62d79bba4d7
SHA1753e6c3d1231e75343e872f8015ead461b279600
SHA25676a200b98780795e772030bc4271eb0e16bc592f4a0f58856b944f8b6b61cdde
SHA512cfe07a5754daced589ce6c58cae49e70eca2630eb1c6505c7da2ee496700fcebb69026a7241f1a174885ca958cd2fd255c3711b24e2c8fde7e7bdb55ecb8f9dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511dc432013a3d058136bcf9eb7d34b52
SHA13152ac96ef48e0244b759c1e61893793389080ed
SHA256e5f4f56dd1e9bfbf201bdb95e8b807637a11b09c2a96e173ba5f6bee8c76e7bb
SHA512de674971b5120fba68b38577190fa407a548566d1a623cba49f204fded3a3b1d84182893959485a4b8b4f939f04552ffe43afbaa627aa37bf92e035f6413d3a3
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a