Analysis
-
max time kernel
122s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 18:30
Static task
static1
Behavioral task
behavioral1
Sample
47786dc14f87ed76decd230c736c8d3c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
47786dc14f87ed76decd230c736c8d3c_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
47786dc14f87ed76decd230c736c8d3c_JaffaCakes118.html
-
Size
461KB
-
MD5
47786dc14f87ed76decd230c736c8d3c
-
SHA1
2250688c29b325ae0aee93574d8d4f2ce0c6620d
-
SHA256
c626047c1775cfd1e325d6c87d76961109a3156e70f906e3cc56f98ccf7082bf
-
SHA512
ae69912980563f70e1865a0ce840d38688ec96358df588c94c5270b38e4980c2115cd5bc755c2fc4bf641ccd4b0be117f829a53f29630700c43c7c299b8f7e8b
-
SSDEEP
6144:SlsMYod+X3oI+YZsMYod+X3oI+YPsMYod+X3oI+YLsMYod+X3oI+YQ:o5d+X3T5d+X3F5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{440A4B61-12E9-11EF-ACCC-D20227E6D795} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421959724" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000b35dec6b8a2d00971ef20633b80110e4c2a2c656c987729165147c267a64ae23000000000e800000000200002000000049af69b9631fc76409a5cdf0fca656af9836fc6c1d01faf0d4e98c1c3945dbf9200000006df2617e8ca1bb16d362f92b18274e537434729bccf76e388ea59c9b6858c699400000006ff8b6ecc0373b269f2fc1bf20a265b386e66e0598af4dd3e68bdbece6b6ec334eda03161295431dda37eec1ea1d24baf463a077fc364fa6e9e6d0b1338a5f43 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20b2d81cf6a6da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1784 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1784 iexplore.exe 1784 iexplore.exe 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1784 wrote to memory of 2056 1784 iexplore.exe 28 PID 1784 wrote to memory of 2056 1784 iexplore.exe 28 PID 1784 wrote to memory of 2056 1784 iexplore.exe 28 PID 1784 wrote to memory of 2056 1784 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\47786dc14f87ed76decd230c736c8d3c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1784 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ebbb78bba699139ec573138de32b1fbc
SHA10aedeb1a2b11ee85da6c02d4208bcdac157a5e23
SHA2565cc70a07115ab7f2f907db6e2bd930688f49240941924d21c141a897d2c0495c
SHA512478b589c1e6419f9709f1d8189f1d36a59353031de7b05a8915ed4634088cdf628c6a3cda3665d1b3622e7373fac41e2d4687608ca230f5b993e2dc6015a18cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c80ecb99bc42910f41c368c748580e3a
SHA124f0208a9c78793e1b72e19037114b9fb14cbf11
SHA256969099a07a3a56801760f0b85b17f8577e3f9f2541eac40a7fbd42f2cab177e1
SHA512602b36b118126102da443aa4df019ed0cd3fee736d155bc3363b004e7c7b3171f09ea69b6bd560bcd197950a5e411bdf723d4bdf2668b48f0cc3fdd13e0c4442
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534a55b2398b4ad9236f245ebfea008e6
SHA16d85a19868bb8eaf052670006716a823a138ec70
SHA256b87ac78c643a2ecdc1e167b0ed8d3eb89999e692ef5c9e143267de5eb1cbff15
SHA512c52621a6cac8c57f93b8292ed08c00385db4364891ce412aa7212db17bdb7cc4b735cc79d46c27bdc474f96d00ebd3206dab6a55d26046482132ad5bc2693a2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569b08acc216f72f5ed9e74c51beef02f
SHA1fe682db73553415cbb04ebd9db66b289650b114c
SHA256dc1bf8aa6970123d9f07605fd376f1d800854556a28ee1693db5aeeeaf476c8c
SHA512f330df8ea3d8ea360c229a02430f48ff5657f6879694b127f7ac59d177612000a02bef230e42d65ac232e22d0e0bc10f4f090bc4026ce20248703d57c0ea4764
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5222e7015f2d222cc28521913c1210789
SHA1acc5e9e5e6ba0769df05e5d4662d2a1f848f6b0c
SHA256a48167e7c0f9e2ec10c9a9c9bb87caed99279e82bdd0b4eaa78ab749d87f78ba
SHA512741c0e37517b0a60d9df44bc7584d0ab05f12e88d6b2ea2839fe458ee90d1ef431c6d2a2ae31e6028ba1f8ad2dbbf32ef1083e675e6d85a5f5f8f2b83b9c48fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dee2b9303cd4641f783ff965232449cd
SHA14917a940aa7792047290660f8947738071a97386
SHA256f03ae551991ce6ce1f567b375ca391bdcb1511f961dd71a7b6d141455efd0e39
SHA5120410b5b4937d622e74a121c618e6c158a24cccceed1782fcbcae5a6428de8cd80da441f64dffe866d79fb4fed1d02275c315a544302189461f4133e661ca7f3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5174179dd61c1771969330d2d64587da3
SHA1eba972f9db6420deb51aad1848641c741c468910
SHA25612df6ccd7e0c16d0ebadcbb564e7ced835029ccf489f4d7a925a609a4b03deb0
SHA512e0334de4f2652b529ca118ea55e97f34f60e31cd7b23487ae821731564a7302ddefa2e758ca20183065ca58dd328ce39b9e8496ebbac5a6204be9270dc4a9cb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553ad8c13086ad243b937694f6401b785
SHA1d1ad937ecc7ef9426e132fb08be12140fbe27722
SHA256579fe6e4f673f31f2bcc75f99df23151145db8a7dd2fa1334f7c201f9d0ee3fe
SHA5121cd42099b6ee468a51f4eede7afef65489ed812f79faee44b89841ecf0fe7885819fc8bb045584fa48b38727c04649285ee56adaebd8431ad390291e4795747f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b77fc16a33e2114965c5e2c8fff8c1a0
SHA153f9d1fb019e6f73e465a1b89770e3fb666a4e4c
SHA2560a65161d3c26196e1024412a9272a596451b5433a7dbb277934b2edd44d52f44
SHA5121864d315169794508493f9c2f41840466c07eb11f157108c2bf3435e79a232907988e3ab3f8591d05ff798e3ea50cd57682032b55bb2bd2155f2dd09001d266f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff8034afe8f345ffcd89dd6e28fb9b31
SHA164e7d2c15199e03a9e06b2fa1f0e07881241e004
SHA25603cf0472aa1821410eeb3be7ef425b41cbf9230a5a14f35da4cf8838cca4c1f8
SHA51260c2a46efc54f5bea0a8e1c9fca732fb71067972103edd9c2f79169e6636ad7b13a74cee8f9f6091e2ad910692326f45ffdcb7ee516c721c64aea9899d6d9318
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c611a205a8d4e3e331046a1e97c54724
SHA17aa71510d752a062506e77c0e59bb65fecbba91e
SHA25695aa34b8fae70185cfca24d010aa2d176e4859185f7e13caad66bb68bb69d6be
SHA512e32a3fec707d0f470fe6504e57d40b0a3235a24b7a91ea75a1ea6f030d0c5ef902a3a99ca6fc6d636dd2376cde749fecd6ea868dca3f196b93af87de1d22856a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8d8fe5c39375eb19b698e1d6acf8620
SHA181917d7edafa13beeff916b1b1dbda9bc040ac84
SHA256949bc9ef75c694bbe38fecd10dfd33f12463aadb3745561e6dff0b5c3ad0aef6
SHA512a859aacff5e03889842d208577f289c55ca9a0fe6dc820dedb6c60d7e8d737b92bac57b7c2e3e2ff4d9d2947be8b461639b0104d746e380fa5d63efb9cad7072
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c19f4a6dde964f85be8c499ac272e64
SHA1e53fc1bc29384a894b3303c983ca17fab24a5ab9
SHA256b664ca4ab39f0f481eedbabb016b763a2f42ddfe5ded00c3625e9d2ae56ab981
SHA512391ed6d16c684432cb57baa2cfd178b7f23729f342c693ba1c9bb73077b28bb401741a5050ee126566accf6d1576bff3e128c179cbece2d41ffa40b4ff5e4ed1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5974df322a4c79b39f8a51aea6df76292
SHA152a65769c3b50d882475a296d62a47bde7284ec4
SHA25600f8ab43a9800563de7ac87d32e0c132b653a8e65358185faeb5c34a19d893b6
SHA512e49d64083f9141b3312b1a9697145d45e46eef28cb3c6305a334dd89f6a96f3c3150db6b9a8002b385eb2d4e67fa6295fb2324fc5ec8de5f64c7faf904782696
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595ae16750e78dabe2171d3c266a1b757
SHA1137cb063cb1d5e80548b9add632f8e0b8735dce7
SHA256c01830f8be436a8f6854f7fd1c4e1097ceecf9b1376f3300e8a36d54328b08af
SHA512535c4e68c5fa66f7ee4b262e03c009f14f6cdba28ae50fd7c5325da812549c9f5ebe5afd9ff67b1c016c0cce416f806adfca07a390db4bb14ad05ba82f3eb04b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5518bda97370900f8ffcaed82627ac6f3
SHA194888f65f52f989d8bbcd5c0f652055770752151
SHA25685b876f3b22878fa0ae972da4e902df33da988c421d36989c71b579abf75766e
SHA512de7fcc17ce267fb94122bbee8910a18e70f45cccdddc667ad093e0bfbca21482ae459cf9e01fedbfcabe2ef2c6954738571eb701ae3135dee1b17691159d328c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e5593912ff571b05cff8a7521f64dba
SHA1b8d58121e8118718dec4bcc1be1f8a70415c7582
SHA256881d505adbb25d5940fdb99efd8e22fc076c981c94e587d7ac8716eedb7dbe8c
SHA512bf4649d9fa7db6faf48aef83c8b39e8397dc599bc27f3255cf85c0eb11c5940e0b33fc557f3e3cbf75aa333099a2e929f8b8b41cf932c8404501c5e309083703
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2ef5dc476e5b152d0986cfa4e7bfe27
SHA19e0fa6cdd7facf188a6b8b6d8ecc823390c37dcf
SHA256284f10f4549ecccdb02f002f6c9f65b25ed9fd2afdbf9f4a834df387b1f52c98
SHA512a382fdffdd6e56383c6910c134077707919fad7fedff93fd8fb2bf5dd878e983c6fd24a3b19e9843fe091041d8b665559833c8547c84954aae02cd1a4269e58b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a