Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 21:04
Static task
static1
Behavioral task
behavioral1
Sample
4807a7d7365520a66ef9ac7f0880c74e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4807a7d7365520a66ef9ac7f0880c74e_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4807a7d7365520a66ef9ac7f0880c74e_JaffaCakes118.html
-
Size
684KB
-
MD5
4807a7d7365520a66ef9ac7f0880c74e
-
SHA1
882bd3ead6246ea505776d879de31d8648803255
-
SHA256
c475582eb27c84c3772d73248f71c83462d52c601822ed7bb6f4662ecd7d7deb
-
SHA512
1bc45b8e256485c9e63f71c805cfea1af754e54d16df0ce28490cc26beb30cc48c6507bee0464fcdd94b4759a00e34c50a886b2d578c7f51e42a688ab4d5ae02
-
SSDEEP
384:SfWgAkUqbYGtORfGXgUPY7TF6vNXRuuzhC:SfdUqbYGtORfGXgUPY7Uv2GhC
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421968955" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50f596d50ba7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C1AFA691-12FE-11EF-8706-CEEE273A2359} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000b39ab062a0df81035d7ea19003fc4900118cb5f2be61fc81ac7b233af0d65a12000000000e80000000020000200000008da6f42d444bfedd5e23653a69821e27c4361b4d71e5038094356ffa0f89108320000000a990178752c9aa983f1afcc319c5c66c5348a43d74a9117388aac7989f7d37e640000000d857ff861a30b8db743bd8c04f2f62245bc63b064f7a7776a4d99b41887a977d74b9bda027ce5363ac90a5259ffb2c3762e94a3516d256737c5d9b3e7794c14c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1612 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1612 iexplore.exe 1612 iexplore.exe 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1612 wrote to memory of 2088 1612 iexplore.exe 28 PID 1612 wrote to memory of 2088 1612 iexplore.exe 28 PID 1612 wrote to memory of 2088 1612 iexplore.exe 28 PID 1612 wrote to memory of 2088 1612 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4807a7d7365520a66ef9ac7f0880c74e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1612 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2088
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD51041081f2de82b47ae374188799fe909
SHA11d0a3f4f3385c2d9da5c9d660f923bcbf53f28d1
SHA2561cb3dfe1b2cb8dcafde8d964ac126b71fac9c95a2c624a72380c4508f9d3f1a6
SHA512b3c1d970904a4aa77c318f51a8c33231de87955db3c7f70945a1943b87a3c9bec0a7fc41933162f36d0ed5d21ccdd4752b50a3337e45a093419e8d0f9a933ae7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae00a338d6f0587438c02326f563d9b7
SHA17f36be006a51ceb181d6da8abbdf5e2eaecf40c2
SHA256a53f5bf5299055556cf994bd0ea8307b59e484a31c16e8e507dbfd86624b9343
SHA512c70cfcba8ef1d1e672b20e8c41551aad82c9fc6baab6b2c43ace5d54bc776a5f23de062adc69e9d94e08ac4c5be3b51a0dea250b4f7b67393857ebe524c3ed77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5789379979a731cf5eca89d0c39a85475
SHA17466ed4f5951513ceb7ed4c7a7aa5beba61cf393
SHA2562a54e5cd8022c5cdeef7399377763ebd245b0d5f1899d5bf22deb7ab02806c5d
SHA512098dea1a43bf1a375605d7d79b2031bec653e3df9a100879158d9aeb302f81f472f14f39dc839b24e05b5f1cd1c4df3076250a4d69f91b68f41c14eb28334882
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b893b47e7433e0300cd08965de76aa11
SHA12d5bbbae274a4bfa2d121a16865ca119718d7782
SHA256f207098ecd6576bf62160f26998dedd2e2dedc06720de8d1a269aaad004f650b
SHA51235d3d84f0fb6da59e6d968bd44ffc120cd788ccc279eeab159254f3a905fa2887a1668097c1f6113a4784f44337d6bb0f1cd6bfbc6e70c8cefdf21e22973b98b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c81b907ee95eed6ad87728c8505e38b3
SHA116967cbe52799b3ba43afd523e876fc9ef5362b4
SHA256ba99e67489bae33a18a9ceb9cc818b8f3bef1649935e5027e9409dc2ac71aec7
SHA5121f285db8d3234c50d91716c68e71042fa094c805629b4b72c1778c5a049b0eb15f551dbc31b64dfcc33e2f5a8d6ea3323129030902a78da7317d3230fe29c94e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548ca545aedd777841b1bb866d490f57f
SHA171693edccc5368a2faa70d16852d54f38c4771ba
SHA2566aa8c899e0327dabdb229de7d00cf8108984f59a9bccead54087b709b068e82f
SHA5126453d37887cbca50a27703267558438eab3ddec1a3bdcd083bae344fa297d4a5bf1dc15cf46f43ac652c6e2278cb825b5c443773b4b5829d047a3bbdb98fa719
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0c5dae5cfb3915d5cc5581c53620610
SHA122942789740b37d5e288def853f1a8759f2c4d71
SHA2563833534f434c0821b4e0bf09c23c22edcb769880bf76c6331aa2f079f760eb92
SHA5120641982e1c18cf7b4ec11ee36fa966b4062f16a0477c1eda15852ba04601bcd9dae13b2808b5fe976abdbeee474f1e74cabb2e85a332110aefbd47d6edb3c9cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541281d43ae0a5a4b21172e31f39f6628
SHA1324b7ef32b0fc2f4bbe4a09628905ef0beba28c5
SHA256ed8c2d449a790122aa794d224575b1c829bc41ff35f478c7ae9f5bc6a14720be
SHA5128d48734835711454f4ac7cdaac6b1450e0c77a1e41044d64d13f263f054640aa4ea3eded161b1259874b56655e0a74d2465102a14aade1783247cf4384ed7c9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf2f97a1870334960b76f4c9620fb3de
SHA1f289af4d23864726c2bec688bdef28a66315f401
SHA2567878d45264531c490bf559f751117701cf2f017b4391d5617ef3acb50273f818
SHA512ec1b8603c5580a4aa1196bba872184ce7f627bc67c7f1e70c5ff3e565c1badda30be07ff709d04dcd35cf9668748106291239fe10220f56d4c029850d60f94ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb8e2b867a46049d87e38946e49e1ccc
SHA1527833868046eb47b8784990e9b66038d6be19d5
SHA256712f0b905a155c9fcb7244734d246f2ff35be2f0160b3ad2b03b513c228426b5
SHA5127ce51977faa0e37c193170a4ce9ccc5a8d9db685cde17c729115ba759d50f14617dc8cbc206f35b603c6db8b6e589c67d7b49995d22db1fd89b9e9b5f52e51db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5237400eeef3251f7d9a9d52c6c3529cf
SHA10001335066814af5dc7d7d65c506d8d659d666ba
SHA25670a6e32a6f859358101578b2dce7fc608148776d9e15d6d71524d7a9eca6b1e4
SHA512f0a120a226b4bf1c43f0fbe7f27358d0faed28a5196b9d71c345874007d6bd705ea4310972c031e14c17133b73f1c34b851c5a225985e8ba12aea0feca4f8787
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581bd7d8c38d9a1d73e669639c882e315
SHA192476d94d804d2773acd81de4d5dfd15c708a9ce
SHA2564e745d08f8a52d7df2106988db9a66a7b032650f81db56fac194f565f360baa7
SHA5127de6f203ebc71543724a222f6e4588c345807526aa90e6be300e17dd8499974439b7f1032dbb1a5d4d85d803bd9101849bd1a18bfac7f5ef60205312e7b3c7c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2b938e5c8e5d25cbe996e8296788fe6
SHA1a6919ef6c5ad551f04204ddc0f1349304021802a
SHA256f16fa7e43758dc9ab7857eb7ea68cf4d0457f802a4e9c6d9e76ecd92a1f49f8e
SHA512f4a091357c414994cc54aaeeb36d150b37140e6382a3ecfe254ac9b10ce91b62526cc680c3e710a2f50e166102b085d4a1ed1ac61c27fc88617a753fc15e6d2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59991c46baef9d7eee8edd81b0628d2bf
SHA11e45460743106c11ad851423c4ee87519f99cc0d
SHA256e72a46a8df6cd629d3e69445f5f467ba47068013e822cc5f7de511388feb381b
SHA51281da83ec1c0657a3fa11fdd76f9d5176b3eff40dabbaa86cbd3ab98e0812396cb77fbb7ccaa1fa6d887332741a7775654a8f8277dd9d00631b3f02a194ae3bcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518a4d985c6303ae7bcb6a3bd60157149
SHA183e654698778c49737398372c0af4928f46ae8fe
SHA2562263a7426dfd4020ba8f4d219705a2d33fcda8c86e1f00da52d2ef2d4024ea5f
SHA512363593ef8f1712d8af6b6ea537a5df443e62f6cab88e64e0cb4845168f26443d51df8a8ed38e4b396ddc15302a643961b77257dbc49c3d495ff5f89780e83ed4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b1bdeb8b80eafbef9fdc11ffc57c4b8
SHA14f9cef07362cbd355c297edae1cdf2a155a48049
SHA256c0e5f0f6d0af0fd888fd1c279e281bcd5778887b36f2ee87afefa6c09bbf4dcc
SHA512972c55e1c627a9d67aee10beaa4c287b7b22c75c1a4ca1eb8cd6cfa887932db0d9199e90b7f14012b543a59e89f2d8f9b7fc337fbcc9958f179a19c8b0ee1d1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5fd88e2d5b3a13c79b440db6b3fc73023
SHA1028de59083d4b6c2ab881a2ef9552cf920dceea1
SHA2563fda196acdb09edc48ffbd88c7b34ded5658c28d6a7fed8aa48347e71f6eeeea
SHA5127bb8bcd61c0a2337a5faf0985d17bb7c4416925d34ffdd439ebc93328a5ef5480e16aa577ba4d85a48d13e574cf21d88367fbf3e68165f5bcd08e32fca90cc19
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a