Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 18:43
Static task
static1
Behavioral task
behavioral1
Sample
4784f744a86904b9a530e79b610ab07c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4784f744a86904b9a530e79b610ab07c_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4784f744a86904b9a530e79b610ab07c_JaffaCakes118.html
-
Size
460KB
-
MD5
4784f744a86904b9a530e79b610ab07c
-
SHA1
0f3dd2b7515bb825dfd4c676eb86e79408d9f020
-
SHA256
8caa1152347f214b7f0fe0dd270b65150ca1f204d6b9b8032fc777d84aa4f33d
-
SHA512
67fe8940a1a369f899ac6ec938e5c7a9aa2a9e9bf06de24d78c83482ab81fd56308d6833fa9b8ff8caefe18f3c5c80de6c61c8a213ed4074bfefc86c2a4f7e54
-
SSDEEP
6144:SxsMYod+X3oI+Y6ysMYod+X3oI+YkRsMYod+X3oI+YLsMYod+X3oI+YQ:C5d+X3ww5d+X3Y5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40b33ed5f7a6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a700000000002000000000010660000000100002000000063aaa03c600db0c6e0cb904dfa085408131142260fa88dcb73aa207b2f4d1bf4000000000e8000000002000020000000311ad7e3b85fc2b7a6e3dab18cade7dabad2a248c8bfd961364d1d81d58df2d42000000044f90191be01c2e3b7e2af0403b61b903c058ddeaf4f055c55751de66715c8a8400000001f1091a7f23d0278cb42bf5a3fbb4785c08a2680f651b7d9657f82558e56996c7e000b8716fea3902ee9b7717690b736a2cb17f2943c46be4ccfcc29d13546c2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421960462" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FCBBC4D1-12EA-11EF-AB14-E299A69EE862} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2988 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2988 iexplore.exe 2988 iexplore.exe 1256 IEXPLORE.EXE 1256 IEXPLORE.EXE 1256 IEXPLORE.EXE 1256 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2988 wrote to memory of 1256 2988 iexplore.exe 28 PID 2988 wrote to memory of 1256 2988 iexplore.exe 28 PID 2988 wrote to memory of 1256 2988 iexplore.exe 28 PID 2988 wrote to memory of 1256 2988 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4784f744a86904b9a530e79b610ab07c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2988 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1256
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a346feb1d221f5ca066047e0217dfa2
SHA12948322c15aab554d158d867c54855b2755c25a0
SHA256ad1c3db203392eefafb13d93e270b7518ce6d526d9ef88ed6cac65a6d97464f1
SHA5121d03df9efd00a3d26276c9e2022b1d73717469f4f1ffc823303def1a6a7020b3f14c19bab443c16756958c5b60791abfeb8c7fce41e22474c09fa0943404d9f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e04c14a60c9217c377b56285ce3062e
SHA128596bb96dcbd77a6e9fea1c4893b652c3da6660
SHA256b630135aeba35875d279053022f009e13af4db73dd7d79e9328e153796f71d07
SHA512fa2480992f65b70ffa2d05b17312be198ebaba34120ab36f66298b5ae89b417ba7fa3362b27d73c454df578cf5d0d47657efd40cda311747d78999d76dcbc06c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539a5e20cd42c3ae2a3bc5773a93cf70b
SHA1ee90f0eb4081ea6ebd938d51faca3dab4e409a58
SHA256b59efef3496cd68a23bd42efd692458566777d4229726192e365e51e4da7e04d
SHA512217553fdef31330fc19c011464348d756c630f1b819d33477b9695723b203011a2445aaf43fdb0810f6e15b855c3559c93ed3376dc17c95279504782b6fdccfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a82a734763c5898fd82c30544726115a
SHA1461c1c3e5eee03f88eeb0d8b1b5df6352ed2ae27
SHA256d1102c002e682633094a5a7ac40815c0d97b0be2740e7f610fa5ba07194848be
SHA51231c4e6920bb7f3b65f2809dc24715c6e1aefacc43c3d663a3f85afe7c51b7e4fa0153e567bbe4572a739e3ebda3e2bed65a153f3912e22499e3e81494751e592
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2f4654bd5523432550357ee08ea1102
SHA1bf38a3d986f256c6cb062de5f5337f6b09ace195
SHA256ffb704dfbe8b329ae5477f64c5870777f50c9892a70b90f7693ab184ac09866f
SHA512fd7a49530eeb78fb3719861d727d07be44e44c4a058546a270e2e57326d30d1da1008dca20b44507f9b5a0c1972e57d8bd035c53ccb362a83b5e9544fd66bed9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a23756391b54d1f10e3c0668d1a4e2b
SHA131148d9c850dba662e2048de44ca33b7f7a37925
SHA256d1c17e46714c8e4f5f6b6122aaf0cda9caadcdea4d46ab9a3bdd0b95859b391e
SHA5126d959bab1bf788dffc448c62da32b32665626b4a6c550a0cb3c0e2ece08e9fceb43b449f8b6bbf6bbdb6289d3f4e38d935aef9d99cdab9077d532294c4d82813
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5202e20034e9f200c9a73fdadcb7d1c4a
SHA17926b0b51cbcf37f73ab43f72cc6ac97e56ca2a3
SHA256085e2c02b82d953ff134719aea8131d3af0098e3069937d4730696bc9c4e095f
SHA51278004d747426719f482667743127c39f588ccd3dcafb42902fc2877e48b7892a5987dc4f8951e08b57ad6cfdcbfd4d17cf58b51d0ee5e1ec51c9fb03d4c80a4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d77593cacac7cf8a79724c9a477ed91c
SHA19809c2c311d7b087479901fc281d8500bf112b84
SHA2563497a6208302978c93704033c7630e0459e10bbec8d0f35f908359b15c20c50a
SHA5121c624157ee73d821f375919183d92b246d788b7db0a1f8684f5a6dacbfb99e44056211eae105683ef10aa5cf48bc18c04002341c8131ffc23444e96faf4f217a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be4daf78ee2a0896542c654ecd98f97f
SHA14b4f52756662425f6c1dd1b9e50faa41c62be6c7
SHA256312f05eecd6eb4f4dd8351fb866dbcf3c0d91548e367624a003fda4f08e7664e
SHA512826e24cd7186c35b48342d0bb667abd82ad914ca422dd4a6156069902b685ba1dd933bafdf4bcc4890ad7e7084b5788c3a5edd276bc16d8ebda3da91a5001f55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5457e5ddf97b077092ec458f0f7deb081
SHA159513a7849c33cd4d6970d63c389e3839dd84154
SHA25654c446e437bf10c0b73597da146664ca1e8864af4692d6122a38a059455406da
SHA5123a9a29919c35208f542a5aae6cfd42cca0075d9b5cf433f0e18ea70212926cefc37a003a77aa362e52f494de8bae0964378c261347635f789b4a96559004f5f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ff3c3fa13e5d128891ae0314ac3ab48
SHA110c6e8b4abc7d105b643686d2b2e2152596a60d0
SHA256877b59cb3b702c02c449cb90e5559ea69017a1cbe3b5c1a4d4fa5e7ebe949da0
SHA51295a4fa239d55ef0536c2930ba78cbdce98cbc979186ae760604f122f0a963875f7429cc28dcaf10649c30d265e8673ba7584830461cda42ed8f9d699fd38f350
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574a09e65e873d80d9556414d77facd03
SHA1a52fd0a496b6bc67bdb71f0be016574502551bb7
SHA256e4b80b7b0a93a2939992c029d4cfa1027ddf73697b107d50896d0ecbfa19bf7b
SHA512b1f9589ae0838e05f7df3fe76bd49f90049d10ec2d468be3091a23c58b59d20e7b6559f208500d892ade017dd86e353c2cdf5b1a7423f368158a72fa245d94f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e54e1559e9b9b69379074ccc691dc73
SHA1bd3d61a0bdbb5c95998dae876abc3b888f210f55
SHA256a0c9e8c8660642eac56c9ecd388044fd6939a482a9175244c73832a1f68782da
SHA512b133bed11e096ed6436626d50cc862a737acbd60d0e694c5ee9c91d22329ead6fce1da017d261338ad89e6ce9451933b0ad2e3e8c6c7330987d3745662d47d14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5307cef5d72f2e6bf1e8a3f0c7e4bc91f
SHA17bd98f3e60e58daa23963fef90c4547fe40885b1
SHA256542ba6bade96cdc15314b909b7c231b508984c2a5ed80c65d7c03e720c238773
SHA51264559489380a528690398bd4c5d5df44021419a71f5ac9e12ff7ca16bb3fe77e2c6bcedc9468184c5d68978e8e106ccfab1327043d05a92055d45b83676aabc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c57a0659465495272d437bfc418f6440
SHA1e6f9e01fee6298b838cd797048e5ce4da75d3616
SHA256c83e528589777b80e24b3e7a20d92e16d0d9da675a38aee3c941370f563f12ef
SHA5124aea003e0e7a6e358d1561c18daebf8ee5df480e4451f5b761fbeecbbcb843e3de53bb35f6126bcaccf41a497e4bdc6ed8beb94a9ee78b1c7332fb7f195275bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ea8ea6bddb3d9a88a8eb44eb0c28f0b
SHA12b899e620141554717ec87ff1861573754b835d1
SHA25606925fb0757fc5fd2c6e7f05dda4285cd8e299751d748b0341bdeddf7298d1af
SHA5126e8ab59751a153c5ec974a8d726426f90a5633448c7d1232c02a55628835b5fe622fc8ed1ceba13a157b9e7082b474e2e07d916b0814f00fd012b34af0c6ae40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562db59f8a50f24c37547a757c78fe6b7
SHA136af58ee3a0d89a042cc05052c8a3974425406ed
SHA256861a1236040e0bfb6f7ecfb9ace998802d95324410ce749da06b8100ceb19850
SHA512d394a398c4c54b66475566b544cf656b696fbfee29a1953e7156191bd0f3f7921ab17266eda3b9c542d00903a7117c64b5819973e4528ee2e1f8ecaa4baf8c9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b79a36d081848a48132ea7416b34cd0
SHA1837fe9b47d07f9e739ffe2837508863a06a6d762
SHA2562bb6f430de11958cf41442cc545e1a74c0beb4562a536b330a6c426f8356f5a7
SHA51276b4fa6ea412c2987f8999c8e8bc0adfe35fac2d7c0643e86e4878b5926d6184ed23bb7387b6e0393465a13f6186f12d46587ba222fc8b53ccc4cdf4145e7927
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588c2ff320f093efd28950617a5fe284f
SHA1a10a03583ac83d74778909fe9223f63919701076
SHA256c8da1f8065c47dde83761169de1ad964f2ead3d7a6f8624484409f408ba57f55
SHA51275d5a486aca047a275cb8e79b76500a81190b40c021fe1d888587d6583c2cc50a250fac639c0bf49a177e9ecf3e082a092867e4abbde0131ae325748a227e028
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a