Analysis
-
max time kernel
138s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 11:22
Static task
static1
Behavioral task
behavioral1
Sample
45f02b76c1d12ed08688e09ef5c0a650_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
45f02b76c1d12ed08688e09ef5c0a650_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
45f02b76c1d12ed08688e09ef5c0a650_JaffaCakes118.html
-
Size
72KB
-
MD5
45f02b76c1d12ed08688e09ef5c0a650
-
SHA1
08a563e672a0f30b064b555240ce176a777bc178
-
SHA256
9da3b0e6a58e9a3f23a40cd79616b6ec0b895b48e52fe16cc81a47c75afe91b3
-
SHA512
dcaa3e7d0523fcfbb046b511bd312b8cd7074e334a03f17b4c54219cabacfea9acf1d4630fd02126e483cd34e4483a286a92b8bb2543f98c361fcc91358163fd
-
SSDEEP
768:Ji7gcMiR3sI2PDDnX0g6s36q8n0/1eue1oTyS1wCZkoTyMdtbBnfBgN8/lboi2hX:J3S0k1yTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421934003" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000db17c46282ecf28fe3182aa0f2cdf54b839b1306c94f892792001a24861c93b0000000000e80000000020000200000005b6e30a6559f2dd4839b798863b2729329d1a75679652172799478f2501c17bf200000006454f7a1ee09d19280f1bd9bc7abee54f2809e8dcd7cfaadebfb870617780f6e400000004b5ecae638258e95ae9f8cdab870a5b0aabf0a6a25bb2b451160b90dea267875caaa8ff88cbe44ce9eb644e32a7e3bf77f5a9fca7aa2193c64b45750937f4511 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 807b2137baa6da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{628525B1-12AD-11EF-AE65-4658C477BD5D} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1952 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1952 iexplore.exe 1952 iexplore.exe 1272 IEXPLORE.EXE 1272 IEXPLORE.EXE 1272 IEXPLORE.EXE 1272 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1952 wrote to memory of 1272 1952 iexplore.exe 28 PID 1952 wrote to memory of 1272 1952 iexplore.exe 28 PID 1952 wrote to memory of 1272 1952 iexplore.exe 28 PID 1952 wrote to memory of 1272 1952 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\45f02b76c1d12ed08688e09ef5c0a650_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1952 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1272
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5607ba1aaf32498e6dc665cbf974c452c
SHA187d17548339ebb417be59fc1321bb9dc111ee883
SHA256752bcf16af13e65ecbfbded5978668cf64f53a97111498437a85ead32916e132
SHA51241c2ff1887e728a7cd8795e5f1e7751fadd06c26d835a4c0425a54fc671ff380be624feed32edd354465dea34b62b6ab9e1f865bbd63ec1eb07b8601c025d089
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57df76f8c9c78a0c3eb837a3e71ff376d
SHA150bcdcfe97979a0661372c8a1062390fb2e7b38f
SHA25648f59a0967c9e8b613453f7e4b7031f022801d4770453991094621fa689ee621
SHA512af1c0dd94aadb37470df75c971dabab2fd121d9b0151d7ae6deee68340074395860510fc2dee9c9f89d35cef8747b15b6f115d26764ba919f54569f9c9063ae1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5783408166732a2daf4cea60694e44334
SHA11de69ac331d014bf2bbbe64fc8aaa6a3c6a6e5b7
SHA2561797428a6c0190d9db654ea7a8adda04657dbe77a7d82cfe0be1fe22c608773c
SHA51202b606978e9755ab59de9cb37f4bebf5a1e94a68c2b6dab7af7fe4f636790bbf11e74bbb6578d8111f1b28abb35086faa6fe4ce11a137be1f6ad823f53b4c0ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5217aa4b03171c886d3781f1310111bc6
SHA1306864fb117f07c6ccc5a53e1f40094c202d452b
SHA2567f9f0bcae2aa2a07ad17f6a3a76a24a572a8359b92e3d1afa940d0785cc7bcc0
SHA5125b851868d3126f33ebad942f015358ef5862c812a55e43f11c4276bab4aea5d98b464c70aaf7ac5c84790f3b4bb0c2d3f4ce6dcfcf32d79ab7d7aba4dc1c9dd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583ba06f756956706e664afff116a26f9
SHA1bc35334cd13ba4e10531a972ac24df404802542f
SHA256302ba0b217f54adf8b3be53946b7e6bfc8cf55a96a3b84a0f105ca67d3cb2f74
SHA512b34901395e3b14bfccd496faf211b15ca922b99dff5e737adec025b9599f4072f44365fa61e5e0142a736e5251c6e54336e87cde5f0d6cdd3d6ecfed27ca9b16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52098d21da2cbbc042fb7fe226d1f1b55
SHA163513212ac3c1167e832308ad61a5f79e3b3beb6
SHA256fa7f046009052375acf59628ab4dfa7b17b5902de1c7a2b219c97e96a5336dce
SHA51204a66931a825a8d58f0c90c5a12c6156097fff9c5adf24a259aa4b4a2aa8ecc7470a8db8d5285b90f18b44a40dfed9428eaf5f1521acde1bd84b35ce1685d782
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58525c17d373a4ed8ff9f14eebdd5b486
SHA134543a2ca85df551cdc55a026a41187deb0786e8
SHA256fd528da43cc0c13674f953ed1f902bd59329c1c7d4954c20a5d4440d7464ff0f
SHA51261f0c7dc18844005c998b7f2d7137470a903ec2c7096717bdfc075badeb14fc58e96a2d144aa661a9806231d303191efaef66528ee93b3d8b8893366cae3dc48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55bde583033f21cf7e6de113d3cfdbb1c
SHA1806bfe523d2b577ab814d902a926f7a4a900723c
SHA25606e972280a3dc209095d1f9a72e392f4b327a2007da2a1a56b7b23b5ee14ebb2
SHA51209a017b3a6969b5fe06e443c46a1d592ebfb6dc8af68ec17e67147963ed9bd19aa3eac8fc3a021f4c70fe36fb6554a65c23808d31e34f4d543f5b8a41d407dc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55657c2e02a7b7937bd1098d629e1a713
SHA14adde3eb757c08013091adc8769890d767307af3
SHA2563a6f08f5863d83bc51a1417eaafd2c6fe9a4cb1b4892604e6decaf7d892471eb
SHA5120b26ed20ed664a63fc66250a760168c06fb49c2b22e984e780786d5e6e33308e616a2af1668e9f03f45059585beec7dd0b21cdaaca2285611ee1788bee34f5ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5760aa83b309c8b86551418ba48129b3d
SHA11339a0640e3e7ec17ebd353ca3c86225c6c9c170
SHA256810fc9dd5c38bf30902c1d2b5dbeb31a079f795f33f2822db2e8cb1b3b828f65
SHA512f09a8bc440788c1dd20a35f9d46361943cbbb12f964eff9c06d26cd0729bba6ae992300797d57ba5d14e0b56d09fe2e6ba6275e701acc3b733a8fbd380dbb64f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d353380839007a047c80cd83534eb9b7
SHA1a2508832b3eacf0f11a4652bac0e1effe7462298
SHA25646dee6ccf0a907ce9d4c1c1671255209b801591185eb4f524e07665cabe8f7f3
SHA5125c814e270477308d9032c1849040498e7fbafe6e63f7aa30fa6f09aa57511975e94cd3624fbbe73b45af4e234e982ade7f07cd75e8e003b7d615a8b61e0ad9d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596b8b5931b34b727774a5a10943912be
SHA171d83e05fd64ea5d5a3d8bc4109f7879819a4238
SHA256e41c799c29855599c8909210f6ad12b8afe2cfc9ccfd82d6cff129069c7d3151
SHA512b6359263f127f13598f95a2557971354f76307f680888cf7d74903da27e294d01b274fac90d2ef6996ec7a2a9db1c5f48fcbf17292521334936509b15eb21510
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c5fbbc18697ebeb7c316cc922a3b24f
SHA111c6e5379019ad5aa21647a76416688e5c068a26
SHA256f6e05e04c73a409c1fe640c1b88c5e979ed8b3b130b9342dcff17bfa7fdd2821
SHA5127cfb35ceab55b479122dc3ec7467fa07ae2348e2b5d21e7e8785b71f4f29d595bfe7a255c7b304ce8a36da13ec00de5f8ce0de9541b6746516318ceb33492688
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a5b5fdb75604717b85866a8e1ef45f3
SHA163847dc85086645dbbcd1c3ca106bec8768be58d
SHA25694b0890e5fd17e9dd0a604db700addd0a19588e215c8ceff9d76095343451d11
SHA512b60385bf4c3dbbd7351543f08596dd125568c2916f5e2ae80ef2edfa3d7017751dc558a94874db035d5b08de6dcb2183939327fb456733994ff2847694beecaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57396e36e33130fdc1b465c31a4974afb
SHA16bd79c7a92ae7044c55acd0335ebfc289b6ecf55
SHA256760e4150df47d85e7f1b6777b2544d010cbf984dec6a4978e746cfedf127904b
SHA512795cbad42ad3858a5ed1cd39b34d70b815daf83b7095a9a0dc27ed93d9d603ffe317aaa153452d5d2b74537d57ce4b98943907b91ccae98b4bdc57647cb4a11a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5caa25438972017a907f8bf45a6064150
SHA126cc88ce86436ed9f7c823ae5e6c6455f66e7b04
SHA25623c6443f1e250fc65720f33438296a854bf5f7134906d1b173175e897f02e011
SHA512e9b437c32ee3e8fcf69e225469253c206aee27786362393edb7b62b562f21e9cecb959b9278df94a6d67efa462c12603c7f8f3478ba0c35fb2cdcc261e691f77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af81973ed971fb681d9bfda517d0328c
SHA1d8717f42e2594de9326593710c0fc033e8cb2038
SHA2563759fc08f348c87f0e57f838001fa0022873df09b072727e3b9980fd0c98f0dd
SHA512700a31c743db8306f79f504e5b0805596ccc8f8838cb22a39d28777f49ced0e1897737d91fa5de2a6a89fb3a1315e82946d6d19c4722f24938fecd9cd8691c3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e987a80dfe38449c963ae2b346db4d61
SHA18915a24d11129b1de10ec959647462a7163d7b3e
SHA2568675291b1833799e4c75f6a56c3219dc026e80fe050888b9b0a160f8a5ac8f84
SHA512d6c4af9018e0ba31c2e9387e10c5230af83d56339628b8f9abc1c101432f7ec2ad2218ea30fd817fd3e7a24253f2c63999ac80996e90f7428c43cb95cf729e9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5970a62f117be49671f4be19e9fb5edc1
SHA1fc5f1318089cfb282f204aaf232f0da72a8bb45e
SHA256235aec770615a40fad810399b3d95e7c349d278ffb74234471e5d3303598358c
SHA512c85012ff96bcd3e7fb6443db231c7fca8708e972d3948a2bca9356c525dffb1a22f96d6ab4a2c58b95065b13fed97837137c8d310329ca3f3e3e27d94a190b09
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a