Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 10:41
Static task
static1
Behavioral task
behavioral1
Sample
45c975bb73514ccbbb84dcac6ddbeddd_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
45c975bb73514ccbbb84dcac6ddbeddd_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
45c975bb73514ccbbb84dcac6ddbeddd_JaffaCakes118.html
-
Size
141KB
-
MD5
45c975bb73514ccbbb84dcac6ddbeddd
-
SHA1
d38c530f0ffa0faf6e2e40df16190d67f5be0108
-
SHA256
dfe1e4e73aed7db81a8d5449f79be2f791bbef251ce7304015dd17cec6ef22b3
-
SHA512
d7635f54e4165f1d03ca2fe93c64ca8bdeb6de3dd2d965cbf11db29f0d9f7c2e7729b6a9a348c7f1708eff30db3d448b228edc395d7ef6998e4cb93e39d4935f
-
SSDEEP
1536:S1S4fE13yL78QyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJruH:StUw9yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421931561" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a5005776d3fbc44a9468b2c7bc3a6606000000000200000000001066000000010000200000004cd6b4cec166d24ba475cb88a4ebf5e624acdfbbfdb6071cbe14451e8bc3cf6a000000000e800000000200002000000062586dc04a97f31059cf473fb439dc651bb3e353d3e4862b5b4a00f4bb2134b6200000002d08ba96ee3ea3c716374e77f44120431bd0b43b1092db5a865b57b0ce29266440000000cea54fe7bcfb4c92c5e5fdba117d65e146d7f0857576e99966003e9885e37cc89d88351b9d99412957bcbe1b65b41b48e2eac106393d73c6f4cc8eeb99609cc7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B25B1A01-12A7-11EF-A2CF-6EE901CCE9B5} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f03971a0b4a6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2328 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2328 iexplore.exe 2328 iexplore.exe 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2328 wrote to memory of 2692 2328 iexplore.exe 28 PID 2328 wrote to memory of 2692 2328 iexplore.exe 28 PID 2328 wrote to memory of 2692 2328 iexplore.exe 28 PID 2328 wrote to memory of 2692 2328 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\45c975bb73514ccbbb84dcac6ddbeddd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2328 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558929de9cbe9dba1ef2e073338ed1e0f
SHA16e1270874220a1e41f3640d637eaabf238070970
SHA2564dbd1346ab0bbe4bbfbea7b9ec3b9ef8c8e7b75854dcc5618594f28d67527c36
SHA512e8b7af6784945d9572989500bb767baf91fe45b479377a9d7e61b6ebf50e67dda620928a4a10152bf080d76ab8082f3df44cf8d7c020db7e074d58489d51a3ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571663c766cf8712d2cfa6edc3021378c
SHA1a0bb5e11f35d273a7062b3f84c4131aae7a3d6ce
SHA256e7b2714f1e16176031a0a93e14eef93ae55fe608d2d65f6ab82ce733a9475633
SHA512d37a8443815beaf9f06eaa23dda172c1720a49761c59fb32935e4890b3c034c47e8ea11096cc5507d66c21dbef11f62e0796443fa256acb24b528c4a9b599a7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51774ddf8c1459668b9c2e7e51e5dd40e
SHA1d0e91625ac6f5813ba179c164aa3b435d58af46b
SHA256825b76dbc6142e01c3898c74e626d20694ad8cf4e4172ead3074d97ce90dd761
SHA512f62a9af924c5ee85adcad98d702361d566cfeb3e7ed730f400f3a2b7be5c86452f3d133957286ce5760c974466419806cdec5dd4da3455f329d0bff62bf7a1c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba317105d8a0e1eea0b2ebb426865c9a
SHA10226223f65df3682bcf02fcc90bb33dd04711144
SHA256f5b2caa35bf74535d079096e7bcf69db4f9b83d6045f3211570767eac02de2ed
SHA512e5d37f15b9ffecf62806e1f34d040ade5d68e73e80716a12cbcfb5ead684e189f01700b62de5c770b7f84c0cf0ac1e9cf3836ed52cbf59a7131bb4ea3e3d866a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57fd5427fd64ee2e69223d28406942fe0
SHA18392a943136a3048da40ba9785cd2a0ad1f1dd91
SHA256e017238fb1b98dbe4de65618b57bf0b05aeba81ef5407739c96b44e406b52043
SHA5121faeeef4fb56ca64fe2d28dabc868314832d6d0f57f127a4e0047bb4bd28448172193af4968cde38175a9b5983776222945951f8f616470e0c9286982e57bf2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b7148cf0e8b9dba38da8287ee4e74c0
SHA1119a62ca94b66d281380860e0340d2f11f735dcf
SHA2566f7ac5a64647a76a90cb70ab7ca4a15905a8d75340c580cfdead8e66622fa8b3
SHA512e2ea804f0814af6fdee113ea3f3fb114d48cc71c72c835f6528ea9d5ff0f409640a4e9e9abbdb0b4ffe691fa3665d4811abbb37fdbb3954451b6471322a41072
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b65726d49c20fbcaf028a292e5e0bed7
SHA14f26f392a9f629181c78494d62a7b467e0b850b5
SHA256f866f824b02b7028a5d51e2fe515db79410043d6ecb1a2484f1c9e5f84e48b07
SHA512d950d145962d52cf94713c2331fd75626aaf6046cab699861a7251f236b57665f246aa6ea7f9d3e02cb65d9b0fe7f38d7c07ded1e11bb185cfc33c7335f6fa32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503d1d22b6dc3b638e36148c009b5a35a
SHA1c6cc2e303f0cb29d0a7a47720091b72a4b847bc1
SHA2560c18c2493fa10441cd67c703a2670817852e9471e31df47a0476338aebb241c2
SHA512e61aa0375f305679a2acc73667dca68750b601c5d3300cdcc4ab29f90736ea8c864d9e23e1d1e8cfb562b40e31de9f1404bdbc62d825430f418825239b4a5569
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505bcd1c6742c22b489deaaff27efcd9e
SHA110fe7db6cfd129c1c889ec67aa08848d9df2a115
SHA256cedb4470a3ac60376707838cbbf7af1214705ec6be7778d24553cc5f05267bb4
SHA51296e3b5acf7f43dbc3beacb778eb54df5e4d6677dc2e7db2707f30a0ed794407c22130e9c33641b6d19057c4929d9b60099109792a8742a0c843ce11b6e7d0806
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c62d5f88270411a3a8b649183287ce5
SHA14017f8246e6eec853f086beb4dfcbf1e945f9664
SHA256532290fd6fd7dc1ea14102c8371ff0d763291f33af5928c8bbb43346c1a77197
SHA512e1d51067e60c3e88b02b0c20bc6630abe4670df5e58cf6c362643398c959342a4e5e5f487ae3b5915e71f05a2de768c149e036106cb22c6974f8cdc7249425b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5edf22c9ef6c905bc967aeef9b111df44
SHA1906d1161bd1dfecfbf7ecc765322bb68b5589717
SHA2563aa42748b4042bf4a8d4a590d31d03e4820bf22be47ba188ea99cf64b12fc728
SHA512aaca8ddd17532a67fbe78a80248aaaa5a97ba872eac41c332acd1cbebe9b68f9cd01aa478362afe46c950f7899fb5add8ea1ae5bf0edd7e967a28568112f41ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f559561de48a3d37053873f2d9b0566
SHA198142d2c884a03e7929af25740713441b07b8eec
SHA2561fb9ddcdf94086000c227aba1f063c62d6928eaa668916a1293a073ca9ae64ce
SHA512be599603b6a41abdee2f1109503f018fb83088817d4563c47df5a2cc2ed7c2cae619b65dc36d20fe10593db084ccb5b7f5731ac116e513f086e1ddf842979cc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a38bdbb2b7c31021dd5f058138e00acb
SHA1e7de237ade481b0049ea5a1ca0a39b872002e800
SHA2566952b6f10b7112a7b43c04362c765a8ccc8ea6532842dfdbff5bb3ee50658457
SHA512fa09d44b0a257ad08524da9e15299596f573c050756e7557793a98fd2b6cb0f4a1e45a9b3c37414c0d118e293d69d35bb0b4ada91fdfb215f9a2a449be200714
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f99e8a357ab88f623b7f3a6261c546bb
SHA1dfa304c8d75bccaa8b0eac7fa60a03ae7acd45fd
SHA2567434b3ff96945fb30350d1e0d5cbe1d6b60c62997537e90a3d577fc64e4dbfb3
SHA512a4da0d59d707bc73f7bcd5aafb766415ae5ec2315241b475de27ca6bd2251cd26197f825a0dcc953de0b973381216c1cbc912016d095dc2aeeb3186197b16399
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b88a05b1a92d8e269fbd40221469f902
SHA194b0568980cff17cb4818d4027b8182ae26ac131
SHA256861eb8f82ee89256a53c947c0906d04b6b265dab88a767c2f44dfb8ae701dead
SHA5125c988029901854181ac7155325a467a5ca5fc9707f24b77fe8285fcafcba303bc0aaecc681ca771ec8e512382d8edf4024350c5efef2fc0588f48603c78c785f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ecb06f67d0e593756a944c3c6726584
SHA1a985deaaf0a0d4638553d0f05b6bb18a77245cf8
SHA25697f6d6e29102db8f21a113872391fa9bf17640fe6d79e14d6f8107b3e555fc8f
SHA5124e22fa623d7276f6fd37c87f298486b3ba37ff12978ca85c943201480a13eb11d4648a2e164b21501947389c02b55a6aec625e8d34c1da72b47001c1503a23cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58da99e311da7af61bace743ddedbe1bb
SHA15a91ba892d1448cc152e24ab1d7cecdf6c391880
SHA2562815cad582700ef14ed705cebc6a01cfb5351bf16dbd3aedea8e285ba8735e00
SHA512adcea60b0e32c47f26b786178b1b73124a86f7db575a9ad93261a9f5acaac4bd3b32458c74080474048cda0be874556d0a108e944f298409449faf6cb6e08b46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5664e00a1a23e72899c056ca05e039868
SHA1c00c20ca689116e16906885013f6542ae38637a5
SHA2567471f954e300fcb287024a2bd04f3b5c8e60becdbd7235c65d0d471e468b8b76
SHA51254f91b9c88085e238f4a25e08fed9ec102bea7d96f4c98ac72ca403a8e757b3430baaac773077534122d7ddc05a95d7d8a85c4084ada38dc24a4344d570b8959
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5355917052b16ed6c664651701550a614
SHA16bd0e39ffd64a14fe5199c6c47a3952e5b55e5db
SHA256c4e6fbc2bfde8649fcc8fb85a0bac5411c17cf9c70b4bb36f00516219036b4c1
SHA51270fda4db62018e5b2f1ea7f2d070a51c1ef6748c00468b66ff5dd560f5f43f9fd25fccfee5bc7360a5e8e6acc4ce5f52c0da40f78e57e328a26b76ef26a2b3ff
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a