Analysis
-
max time kernel
134s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
16-05-2024 22:18
Static task
static1
Behavioral task
behavioral1
Sample
4d49237836292a2adbe89689ffa8e014_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
4d49237836292a2adbe89689ffa8e014_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4d49237836292a2adbe89689ffa8e014_JaffaCakes118.html
-
Size
4KB
-
MD5
4d49237836292a2adbe89689ffa8e014
-
SHA1
3f0fa0aeedd4b66a818edbcb5fbfa31da14a92fd
-
SHA256
066aad2fa08d688d1752f972fa8e41e948a14c3a44581af7a4f84b372478aa8e
-
SHA512
613444190c4b2ee9e0da61d0842c617d94c0dbadb07cd20d91cf694fcf01afe45ae79f72863847e657e44badd809cd344f2c7c89befc52e01f1997f8494df48b
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8ohtIBJ8d:Pk7yY1aEFHVKtF37sNjtXATIQFM93pD+
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30cd3f0adfa7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{358BC8E1-13D2-11EF-AE77-52E4DF8A7807} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000a03eb0581438fffbdd7adc38a73626fffe68c68224acfb410e8b1648c2590b76000000000e80000000020000200000009d8421ca7f3f69ef31ed2207847760af52414f026658c379f368d298f177919920000000c8a2bdb460386e42e5b1589ef1a9c0de74b6468d1bc1782d865dc9c85c11948a400000008b2469f22c1e8303723c15a38076a0e8ab93b5917e264cc66435453e2602eeedc98980e748a158181e2c77152cb1fb00ef804b0155e36887d526c1a2f0d1f46a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422059771" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1760 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1760 iexplore.exe 1760 iexplore.exe 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1760 wrote to memory of 2400 1760 iexplore.exe 28 PID 1760 wrote to memory of 2400 1760 iexplore.exe 28 PID 1760 wrote to memory of 2400 1760 iexplore.exe 28 PID 1760 wrote to memory of 2400 1760 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4d49237836292a2adbe89689ffa8e014_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1760 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2400
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3179f1585455e68296e68c0390adfe5
SHA12b787fdd4133a4f10f09a41801d6dcf3f44595d6
SHA256bf1165b5e825c7c17ffb722cb2ec4c695b0276473a40b22f5e65a49cc47cf001
SHA512274428ba2dc098e61926d36c63bd10c055838f0dac9177965a6f6d21b2d92491d7a0048b44d67be44704cf9b30a81277067f53d270d7b0d18035872001a95fba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e8d4d6835780cc1e90640185b603f64
SHA18d11cd3db8b18d9b177327d0f7354a1e7b4cc73b
SHA256aed3b086b18c137bfba3a5e4922dbad9b1050982b01003f42a9e23872b4060ff
SHA5120af331b4b1067e5436272a1260d3434dc93b8c8687c7cd4dec8040ac3fe58953a23183b7677bba85378364278d8f436d649ef6dc50b64f55d5d39a5cc1665f67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c2c91601237fcc799657b852063097f
SHA13c8e46df7fc6e407922543d0dc4e22eb22b20a8e
SHA256a8bf8b2f16615f9e678055379fd3223eade6e803909fb659055d3ddb2a1bd434
SHA5124ee4107cc99335876a93f289e9235537817fbcb538852b90b32e0d33869a26dc7662fe5547705b8e97395def9d16422dfb0ceb5bbdec9afbaa92db2d650b69fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b84718c8b4245a3b64cc5a69c931f73
SHA127dc6899944cf82d609c6a20dbe6125de77021c8
SHA2567bfe0c8283ffc354266f637d07cf9aa5fd5f135bd104cb61dfb0e4e8e13d9720
SHA5121a4458c1fc43767801c97ffaf288f1ed88d91286c1245aa8e41eb3ba0017845a0087fcc23b1d8b61cbddd36b3f38912ef17ffde5a77e051bd1ff554ab319cbb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6cec927ba83bfe964e7ce24fc521744
SHA15d5bf74d7890f859cd163cbe0090a49c41456640
SHA25625aeb705986bab85ff70dee59985d231d241b90c7856bac7eb221c5159445a3b
SHA512c5e31921cb0d6009a93f634c3df1dfabb2e18698b1832eab91cbd93d09ad1b43687e64c218eeeab1f7f178b203a020b058d56010f21d6aa6ccbc29eec55f5682
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fea9469192c1ba32f660927f2dde7c36
SHA14e3e7cc8f7a2463b45276bbf4702c4bde2fd3b4e
SHA256dd1c2e4ecd9e73f52a18799babfcf1cc60207a71ed57fa28cdafaf1b19739380
SHA512c16ca23460bd0c6d7b782b0872b15d2d2d22bc5c8d36d5bfdc643873e9c61c5846242252e8af434457f1811cfded3bad801967f663784cc567d63c7784e3554e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cdec253d94dd677ef0b177253e9ed561
SHA1a564a6352d9f17cce4de0ff00c3a0894f42d1b27
SHA25680ba5b5ad287329f331566670e188f152904910b5bb25f52d1686e56f443dea1
SHA512f5b06a377dc963c66c7da470cda6cf25bfc4d626c98475346cb0d0ae1e6a09a2e47ec9ff4622b7125f9415e42c7e92bfa9f619e5952a7b055d7a5e1492dd9c5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568df6bcd5b274be92f0013620ddb08fe
SHA1a888a67bba837538467e4293cd8259245c969ba4
SHA256161a6ffeb6b434da431da86a023d2a89b1206d9ff51cbbb171790c2d6c8c992b
SHA512d2380c2e92c738c0d2e5b6a030f1f10e5f3fece27f38932d9301d39eaeae0bd716ae969a02c8411b81c9972b680f7b6f0f8e5ebb392c3d335d2207b8846b7010
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b4a0105dcb0f718c924a84c5a4e7e53
SHA1700669aaebb688513fab55a277819c02a3adc4a6
SHA25651cbe512f355d2b3ec3b8cc8621dd380d922dcf8fe0719365a6abc68699fd583
SHA512c0d6145e2eaa8cd9d3567aaf08239805bb4abdfcc54d6b806c16d33d98beb0e9f18327d89cf7b996cd6d0d3aa9aa445d0b4ed03a3513df96a0c9345983dfaa43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577a2f5e7accf3079428c40155f6117e0
SHA12b5d691d536b9605d1b1e04c358cca0d14dfa877
SHA256fbd234fa93884f93d3bfe55efb36fa97fb231a8bae9c1c379d421ad7c0a6b12c
SHA5129c2a4059c1ca8b2c22aae67ae61c328f42aace95bd2ecb4b6cee60d14c77b7a4a41bf2f534c12143160f5f6a24291471fca7850c547d0dd80b1018b2794f40ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4d53b0efc1bc8d52aa0fce95a99ff22
SHA17e2c2a9d09cc07d6cf451fae47fb480ff555136a
SHA2566ec314c0216aeff4c733bc3668a85f45c903895770fd5e471f9c51d8415796df
SHA512081cc29063e4b8ba8b9b8a331e0210b387660a1a76fc7d19cd6b62955c95066aba49201e1480797d4535bc92ce8c49f84142a9e0497f49b8da896e9c81d09f7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c5f2792bf1fd29e70f608eeea69715b
SHA14d746b6baede22d4f1542d8f79d56d01e43d3a54
SHA25603d95bdc1482e43827993bf01b89f0800b872268c37fec022ca9bb4ab65988a9
SHA512a9cc4c05ea9fd7f1399949511bc37c56135719de47c9dc0ed41d57f299f5113d826a3586b0fd2b308a1f423f3b20f84378f14687b5a434b5945090e8406354ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5502c419201d7ad38580320087ae24415
SHA1f3955212891bba427032fc79fa3488a7489dcefb
SHA2568065e6649f64e465a3e7cd7ed14f77d52bfbc25e9e3efa3ecc400083b233831f
SHA51217a854c40d07ff010eacd84ac6eb53ce4856a49851c44b52c41ebab9bef54802e49db2c748a477436043fea7cdd667190686447d4dedce5b928f7120e542a22b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554ac9c41c3e473aa4da79984bf26e887
SHA11370b226ec82ba93024101ecba15f8812df9d877
SHA256fc178f00aabf0f5b3915bbe95ae4a461424b2d9a5b5eb2890c3a7ed3b3ca6caa
SHA512137c63dd1abbc70d0f65e2855f74e8b0facd87126eeb618e590c466bb220e8bf6e1264d60af46f4da9c9f14876b378177c255e7f8bcc49aeed0fc970da2c4786
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d561960ff8d1d161e1e37566796c1656
SHA1134371fbdd9e516c341845f02ec7d8e2ea3222d8
SHA25686de4b897781fc2cb4212313eb090e274f80e69bec0f3c4c5d1f5f51316d7607
SHA5120eccdcc87acc190846a3101308a41d53e14f71eaec0bd6311565f8ea90b445b42751f7012b1d449490d0b605f7de9789fc187ff0039dec650821e773e63af8b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a35a1407ad2578d6235d33a9d3fa35d
SHA18f23c1dff36cdbecab3f4740cf992e5bac1947c9
SHA256fea35f9b05fdb8bc01e65a7bb88fb5d548c2302cdfcff31a855ff67bbf580fe9
SHA51285346430392498d4f517dbba96c0d43c3dbf574e7e991f2071e7213ce88538ab7f7b6348c94babf6d4984da9d6e0854ec86f39b0e8df52fbb7e7c44eafcfe891
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2ff4cd66b21e5030e5d8fdd4534d31b
SHA1b76ea93e1ffbb36ea9128f4f13e5258900e02419
SHA256da4f9814025bdb63f4f90a9490defde728034c388653d498cfd5d1c3085a0c7a
SHA51259b62068ec33d44757a69699a116d0462e60d293b733156feb0c29e41fb1e2e1c0e6f8d904a531e10308feec9d7d2057477950d7a01d411a7198023da9011e4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c54eb4ba1f17eddaddb390b521f3eeb
SHA1013823236f75937ebdfdb1f3c7de60fd23440278
SHA25693932c65a3145bd3c17de99e06a7d2f497279b65881c9669ca4fcfe7403a8b90
SHA512c5432323ea5aa5a3bf3e10133062b46cc99b4b98aa9757688dbaa728fe47b1b341c5903c3750d68808e21b69b72121b9bb45d1e1f42582d5dee7ed141c2af806
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c41eb6b0caf3a2edba54d957d647e041
SHA1ddf101016e16f6fd1a5ef61234ec9d20f99996bd
SHA256205ce2809b3838184b74f5162c66756e2fd898390457b3384f2028868a387321
SHA512c5856132181dcf837d1d73883bbcc9c52c8f06642e54bd00e23a657017c43e6f00d1813f7917695d75b9219129a8f62fe9b3a1a450ef11540cbfdfe21205057f
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a