Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 11:01
Static task
static1
Behavioral task
behavioral1
Sample
45dc7efbcf4961887d3056878229086b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
45dc7efbcf4961887d3056878229086b_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
45dc7efbcf4961887d3056878229086b_JaffaCakes118.html
-
Size
21KB
-
MD5
45dc7efbcf4961887d3056878229086b
-
SHA1
c0242c7a4ae2113478f607e7e5feef6005812afc
-
SHA256
f1d2373f4eb8cb2fe8ef9104847715e91ee620d2e28752141d89d99be6e0d51f
-
SHA512
aead88786441d5d7ebd5c88550667fbf442be4afdfe4731bf2bdbb87f20a6bae3ace19ee61ccbea13ebd181eef5cc0a4aff6721681e213d4852b998dafc2e29b
-
SSDEEP
384:UpUGUl4JzWi7uErG5jS7Fst1IATGSMH4ISWrB4OMf77W6F:UpUF4NRoy2t1RdzWDa
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e0000000002000000000010660000000100002000000091f8e4ec17ecb04757085ba863a1acbac33b93e6800c414e048ad073bf19dd4e000000000e8000000002000020000000120fce304cacfe9da5259c4f9b8cf435f33a1afe88072fedc882becaa14dc53d200000008bd30cc95fb2d54a3a7370350986448ecc46c5230817fbd11bafb9ddb477d28240000000a6624a7f5857301884c1f4f714da620a62ece91473fda2441037c10f9e69668d5b85e23a5cd28f2c77221c9a2517652a4aa8ada96bf869cb43506931b2f8675c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c099d743b7a6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6F5812F1-12AA-11EF-9988-CEEE273A2359} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421932737" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 996 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 996 iexplore.exe 996 iexplore.exe 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 996 wrote to memory of 2520 996 iexplore.exe 28 PID 996 wrote to memory of 2520 996 iexplore.exe 28 PID 996 wrote to memory of 2520 996 iexplore.exe 28 PID 996 wrote to memory of 2520 996 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\45dc7efbcf4961887d3056878229086b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:996 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c85b763c3b56a4edc5b0e239313d9be4
SHA12c24a7f5e214aad21d06c1c03bd436a5f00c68eb
SHA256deb2dcafa9e326f9bbdf95bbfca3530f86bbd19055541d3ed3e3467acd6bd7ce
SHA51201dd7369ef602cc6534fe0324cfab177af8af34dd2aac627de43ec704d061b560a64e9087f7aa282b466cbe04e2edeaadcecbb8034f4fd67867263dd4737c72f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d29126a90185e407f31a8ecdab07163
SHA16afb57425bc5b7251b5596148fa6f7fbd9dd61aa
SHA2569caab636125ec916bb3a48aeedba8a324d547e607d3afca77502cd8d490d914c
SHA5121a02f6a8f9e681512055cb98224e69a05578989cc3bdf3d38e4f9f9b9f05849126e494e08f5fac875e9df566b10270adbc47353e4a7fe702ea95f83203993688
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568fd8156d6c25dcc748b6161f3eae7ba
SHA1974152fe71ca1442c51f206adf0d6c2fe04ccd77
SHA2567fc9a5bba33378ce644ce1d15a628e50d19f012db53c5e3a5cad4cf0b7987b7c
SHA5123e6934bee38fa07d9d6573b9a9d8f2baffb850b27e1483978206f707fa8f4ab0809ca6ef844f660f00a3b75f4a00b933eb408615395654a4dbce24aca5b34443
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c80d9da37f2ff6892d83c1a4e0310be6
SHA1bfe9fe7287fa7c314516bb249ce671399b762394
SHA256b4139b44f661b7429eb37f93780e8d068c6c59f9bd9161a61f9d4453513b5282
SHA512d37ca3e66632c445ece91542aa937cd0194581b906ef7f3987212a9edd2a3b08d365a3b16297fc241604647fa5b3dada92f2319cb8e71c88b5e15893ece453ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cfbc4c4333d6c62499c29795c7ae1a44
SHA1fd51664183ebffa8d8d24dbef38db6003cb3c72b
SHA256fcdf06057b8cf0c17e1c26c8894fd88729de2abafc6bb72186b33efacacaff99
SHA51225bd26a02cde1fdaf9970731be600e486f0414f18022aa848639a0141f76b1800ff6cdeeb82b88c0a9280b9acc5762c90891f3bbea6d1414a3a2a0c8db754a48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e59b36e0cf050b75c4b70e5de3d509bb
SHA150f435951dbdceceb865fb3b39b1e80bf9f49d47
SHA2565fdb784d1b2663aae59f02e2d6744a14ceece694a8b4a4d70339bc39e73ae55b
SHA51200f1efddd8de8258004fe0bdb0119da05c87719440d999208e3c28b5cd98545becb2fecb8af4ef8ef3ddaa4386232503035a912bbe713624dd89d065668c0cf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e9a05982a52bd384bee2a7bc64ee5e5
SHA10e74e7bdb5e7fda8d70cb4e4c0c1e031e5d0d86d
SHA25640674417bee20053865b8495f38162d7324b4eca8c76213467424ebc93db92af
SHA512d8a66fd3f219c5125777cf425fee467098e02e5caf8d0a98c0f75525707aeb9b667804fe118d54d6da3fbe92842351e393c301c0a85e0abafe21934c7b2307ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1de76826de81d44b02ff688c94fbf05
SHA1ff360a7a2a8bbe2ad18f7e5636543785e8f7235e
SHA256e48585d8a2becf81dc833c0cd01defc82ae183db43612f5370974801eb3e71db
SHA512432e33580077cc63b054bbda76f4a098346b62bc815773c7cfa46c485d0f95baf7b56eeda5f4b1f92f7c04a389f0ffd3ef08c52e8bc9acda57eff104051868f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e030008eaed78761de380d024696f408
SHA1a70bef758e5d6da4ac32514b411464488f3dd9b6
SHA25669606d0e97721248c3d269f69d856dab3d2fbd02b45c0c9d2434481e153e6468
SHA512433ea4fb34b4747a2451d2144c9a23b587c9ae521fdb0e87c18bbb48a05835130519224472457ac08afa7d5b73a7ccfdf3f4354825c6ff692b85418c7de36848
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6656a0e4d256db057f7acf24850e856
SHA105a3a76085b6365be3febfb4bea05142c258b1b7
SHA256ca3b0b7ec71c024b8481b26ac90e22a102fcd2d4f0cf04689f10fef5c40e355f
SHA5127e1da51b20cafc08859fb6d2e9b411c98ecd66774567f7e41899ebe371cb3caf52789ace132d36528fa503bca369fd2ae9fe70b44c1e41c158d37ef37468b090
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5309d36c927b0d5ca1015920c56fd699c
SHA14baaaf460e0a8fafd34e2452ac4b4a525d49e5e6
SHA256655d6a72a64f2e412309ec5961dd66a3639df157a5139a93e2734dea32504120
SHA5121541f36364e5d20b8a615f755f787a668de45a4ad329020026aaa999c4ca0d3fb5d54cebaa797b64d8c3dccf53fefc8b43bbfde9e9ffbfb3dafb0729c90560c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ad9cfcfe2e8af662a22c135e37db03a
SHA1851cd0c2dafe8c721bdb08b3a27b94f28818cdab
SHA2561c7fac426713032a95924f27771c171b325a945b0dbd56c73264a5c188f0961a
SHA512d07c1d17613e823fdcec68ae0b6381c27e1e1776b8aa48d9108f2993577d4494750c34f9f9bc682107d7770b84ee95b53ec07105516e011bd40603730d54ca51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5535a12049f2989c49f289c3e202c34fd
SHA1ad5f1b8e8a3b20c6f4bf9d00dce09135b15a78b0
SHA2560a6e06d41b3f38ff57c639ca59ccabfa996ac4027957a5d76651f0177eb021fa
SHA512c6004350dcf3c884e7bd1b291f73a5d26bba4b8ec3d75643c3740869afc7923568958391ad9b35f7b2d77239eeabd55d88c97ca0ba300f5b8eeab27d0d352ca3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52bc01cca19ac8365cdae6441c0b4a634
SHA1c9dd5681963bc00114cc9a4d417fecac063d3dd3
SHA2562ee2d3ee0d2f17a9303e5da44d15db0fb616d616a7a48de35567df2635094196
SHA512dd2ec38854ec4bcd1d79e6c571a952ff81adfa0ce27a78e96d35634ea1a67cf38dcf80c8dd6aae1663cb320fd3edf6b70dacc6d9d4eda093e8143df90ddaeba3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee483622b22acb0252484c6f125dbee8
SHA17ce9b9c4386c8698554c9f49abac3f8a7fb76161
SHA256494ca8376eca12a5a31d0b4993bd8c4c19e346ce53b3cc5f507872f55bdfc19d
SHA5126b39f905137e4c2fa1e30da6dd5c80ceb8a485067e412aea7531d70fd0d4fcc2666f2d18d6f8f56dc5b1d5f50ecd1d569dde132a42a74fb0130d310fadaa5621
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547678ce21a9a7f8ef405847daad8e373
SHA17f88ece794b5acf6d813afd59990464b5802ea17
SHA256ae289b85cea969193054007c0e8edd5f33c0f8df697d3627732e31546b5a4c03
SHA51283ab0d9885f4fb23b8360f97eabe8a1aa47682e803ca3148e5a5094108ee48778f24832ea2f4def9755b7cf5f41cedc94aeb8dd68a62b15841ff0432cd2298f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5148952b0e4109450dfee5268018168e8
SHA139622fb411ed41c1e5189b5369f4517191fff0bc
SHA2561048d12104399f224c9934ee6a949dbfd6af044566a7534fdd14508260e8f043
SHA512cb223da4884f797ec53abee24258e28c81befe41bfa46ebd6a7039e743f7665ecdcfb1a962920d3717f1e224f4b82b86038d62c4ec7bff2fee27fc8240e5fdcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57bf6b01facdc6434142ad2ebefef12bd
SHA1090ab3cb3b48c7c57b4c1a917a9e9471978dde5a
SHA25624d20c793fed05b524124fae0a1d8d9876ba25889739213195607932a37475f5
SHA51278c1ce1720df56bb3bb514a58611f55712cd57d98e5a7c166e90671f9ab52cfd93ec60c8aa823cefbbd6671a928ba726fbbe383c053404e809df5f0b68e6e93b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50858ede703f25e64947aa794fd148f01
SHA157aa9ee36147e22ac0c7e69e3a0873bc03e1c3d5
SHA256ac4eb133d40451a6cece8e0ec35f7a40766dfb6ef553e91579a76cf2b762904d
SHA5122ba3f5d6234be8d130d2cf067759c00f1bb4b789f68bda39e9676e603a0e20f00e1624ec6689f8e0d96c8059b149e843b45bbd69e019521d4682cb9cba6148e1
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a