Analysis
-
max time kernel
119s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 00:21
Static task
static1
Behavioral task
behavioral1
Sample
48b964543dbafbc5dd439aedf5b3b9a7_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
48b964543dbafbc5dd439aedf5b3b9a7_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
48b964543dbafbc5dd439aedf5b3b9a7_JaffaCakes118.html
-
Size
15KB
-
MD5
48b964543dbafbc5dd439aedf5b3b9a7
-
SHA1
fe6f72ac58016f44c578a64e4a62517435deb3d5
-
SHA256
47f178770e55752dc4e7ce85f5d04c3bc720798e2f4bfa495805c1f5f0fe6c07
-
SHA512
268f4228a18d013675d12a3aae61a666b5c40360398ca1eeef403cffd6f47e949cc041425d255976065d3bc12d4b81f443924a4bf555f1148ba2b3a6db7758c6
-
SSDEEP
192:iocBCwamU9ZMGOUH+4sDhKdDMXePIdeY+4wQ5e/SszOOwYKFrz:ioECwamUgyH+4sVSQM/SszOORKt
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{392A8CB1-131A-11EF-A7EB-E60682B688C9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 803b4a0e27a7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421980751" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b000000000200000000001066000000010000200000007501cbcc700b48e85a3cd4861ed6c16490e58c3659f00611ddd9137900ddd7c3000000000e80000000020000200000007a64da98a5f254beef83cbd59286ceb1f457154122fa3c76ad9e2cc9e963533c200000001feba29eca5cbed510defa86c8ce55d87010670762ffd9a082c469cce79a7d4f40000000441a5be3bd935e2bc3e9acd2053df6f9d622ff9540eb4b4c0d78c8df9631eeaaff0225f7db20e23e6773feddf2d16710d621e7161ad7abbe2da82f92f5342af8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1400 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1400 iexplore.exe 1400 iexplore.exe 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1400 wrote to memory of 2520 1400 iexplore.exe 28 PID 1400 wrote to memory of 2520 1400 iexplore.exe 28 PID 1400 wrote to memory of 2520 1400 iexplore.exe 28 PID 1400 wrote to memory of 2520 1400 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\48b964543dbafbc5dd439aedf5b3b9a7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1400 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f5ae354cdd93ebd29c2031de720315e
SHA16f811f4bf7a3e93837dd583b0fe4f8fb5c6d4696
SHA2565da7c918fd90490c13cbcfcc16cfd8217aa721fb7d1c1eadf9a821ce2f487521
SHA5122ed3612c57b0949420b392687bf9d213e52929fb4c0ef25139461d703e8d33f8c3c16a6e9367d57d7fdddd7a88bebe2d7216f78d87f9e605000d19d94d070ab1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec57987d40659aa4f9723c0a3eb582a6
SHA13ff587c64bc11bb4490d5ecae9405684de93198b
SHA256eba5f16b7c149519ac451aada3348c775ea0f2d852428b4b40a6b6bf77f308f6
SHA5127d290bb604a308ff1a90132a38f7b27a72adc881b7c74271066b5a65e9c92b7b1593392ce9a0d48ee714d291d9f5ae417d7b1d902687667f485201a8fc5587dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc242b776e77e069d3953dab8b903ea5
SHA10d5eccd0444fb28f683e4bd1d4bb6fcd388721d9
SHA256dddffd8125c054b0f55b4d30551ec1053da5ea177a7728dfd461aac7472396ed
SHA512eaf79b13c5cd922390c7e36b28674e567d78e7c643d4960a827c285346572115c1181467a764eac9f4194a66ed3258019eee43f5b34822d138047cc593cd2b9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5561b635802d3b5d777799e4c4ede9ff0
SHA1316f9d5f056fa5222c268cf0072306024f23e80b
SHA256360e20bc56ad7c7c182b1ba4407ce8c1117676e02d7c467372390c97d9537a6c
SHA5124112902aff781d6640c6b03c1146f2533ec914430112d5d6103e63b0932b3c38c8be799a090c8f7f0b15438cf4b67b6fb980dbebe98464d7316a7b8da62cc404
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5daa435a9da3d042b6aee26e37c727491
SHA1a3961d7beb2cf3004c8d4dcf38d68e624f0029e9
SHA256d63a920bcd798beb1f81e88b8ae54965d406aaaebd1b38c83df961b1ca46ea9f
SHA5127fececff6066d69ef36d199261e6e8e6beb3eb171f4b25c99cdef50ebc2160ebc28bd0e63dc3434a31ca830a3558711649e97b4c4ce13e56f8e61524b0f28dea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a563aeeec103af3bc61a4473e89a21c7
SHA15082cc3b99a397819bc10824a5d5879b65b58f80
SHA256b6cf70408fdbfbf52c18f254623233eb6dacd11354b97d89af48316828724186
SHA512fac17a86f7bb5ec905c2e94521a1fec52dd321ea83960c4adac7f96e71f7ebd592eee28104a44f41700e743886c46fe939666f7329573feee91bfd703bdff988
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6396554f6cdec3ba739353e83d7368c
SHA12e5f451006b817739ff1ab176e1c0e6c47eb37aa
SHA256ab2799a0dedeb12b96c6a70337b3b1d013edbf789379f0a6650d0536f428578b
SHA5127e35ae47f031e4286f7ebb744a15d6ad97664067787e50d753492170a43176259517a4a5e6e3a62ea531820f923ee427a602b09277c0e0d54dfd9f99fdfd7e99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b11bf0da19823e6acacd31f3484465dd
SHA10b0ac6ecd108217eccbd4fa3c0ab9609ffe73f6f
SHA25682c752445378137bb14b1fcd266be8fcac6e7dbbe6a500dd04272cf76785be38
SHA51251602bb17b3fb0bf2fdbc55766082f693a34403f2b4884ff897931c3f3fee8b8d4c308f5c82ea2d5bc50ab07b3d968e9af77b2ef274ed45dcc4f4a42432dfcbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c60cff9c70dcb91a2e04f05eb09431c
SHA115a2477f43221cd98f43f4338c9da6c67120fc1f
SHA25655548da2debdf7087036970dea5cba43d728e146c4590cdbf47884b3882b7e5a
SHA512eafae54f192ae8b2b1b67f00d6aad9a3badfd1c5b6a29c0d2f98e1da0dcd3d18d0ec4ac85c0f55d2edecf2d686309d587407add575c85c1d8a654078965b25f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab47b9ff85fe65dec578a08f3241f028
SHA1018da5820c4a2d45f5abb8328833738aa8728906
SHA256c4d1477e738a4a6402e5ad37aa07f42657c55f6f798c00e44d188b3f050972bf
SHA512427799eb4514d6ef6001fa04a3df9d065a86ef7881b5cfb69343929dbcf1592899ac8449b810ea03f4ebbaddf06fd53247635359eed48b74700132ae5d3cc1a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59408fa947f4f2a4aeac144aa25022653
SHA125a4172b76304681f53a9540e4ca83dd52eb5f65
SHA256f3df7483a2534aa047c5bcc03ee31949e6e9326b3fb7bfa2dcc9f81be441192d
SHA512e1e32f3732404a1e892143515709c23a0ce46589942c8778cf61d57045156c36a63760e104bf59d88b157c84aa87af705e3eb805b1bf8966824e5494c2e6e8d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53afbd2f5efe7f8a4a0056f3e6498b488
SHA1e4dd48da986eb4b645402ed27c82682de921f380
SHA256cdf483f1b4da72a657d0f8546a74abadda4a82206cc60a89bdf7c720884c944f
SHA512c6af349eece5e486a6aab6db25db63c4d3af2e822df5688d5e1c71f3bab61d3c3aceba044680386aca865893f03e2d68f85cbb503031f95d3defc819397676dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574b07ce9063cbdfebde0e15ab3e2d254
SHA1d4d56ea993cad532fb491b1ed6ff981fc9334bbb
SHA256763e883697ff2ade01cd7b31e591b325494d5b035dc426f15606ca7018d72b37
SHA512f68f35e1f27766eb3891660bf27a2a6033a6041b7915618f721c165042a1dde919b62195483d9303b3051bed3afeaf269effcdd65bbc29eab398bd58f2c2d4f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f540d17f57a53c46050c64ecb8454f1
SHA1a7ef31653d76c2c597c2cebd5729f4bff1dcae2b
SHA25678521044336edc653d08cb1fd8224dbee375650da381c69d471e62b53a8bae14
SHA512340130fdcfba24365852c81516bf6868f89eef52248342fa355b57676c568256cac06ba6b8540a2f5a65e8473fa6835c6414c60347f80f8a319cfb5195fc0016
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55df9f8cc85f621eb64cabf494b007ab4
SHA11b063ef6a255d031d513a72054295d60f731ce5d
SHA256376aaa5a19da65bab33019dd8d884e03a9cd53c8e9bddcd4fd357cb578637a1a
SHA51235245bf13d6eef05fb7120419fed89f0b33415d0f5ce45291d8ee7d65340e7bc69f70734211fb634e0a17d08814f62f916efd0b254fcdf5ff3902d871394014b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515cc854b471dc66c581a323a48158190
SHA115ef0e358836077b7f9baa5b43bacf08ac6aaac9
SHA25672ab8f5573c7af7b96e1fccc52e135b45ab1b6731275500182360457d59371a6
SHA51228ee373f39f3b7ddfa45baf0e7e8bda71ee3606f13b58bfddce34f4195dbe9e104e31ad210159e1b9df2bdcb727ce4c68f7a8239444878c42684cc33f72aa13b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543d5235ede4c2db8c1d96077ebaab728
SHA17bb05e9dc4187552bee70042b1e94fd746101625
SHA256f4e3f3438c87308e7d6aec481aeb852071c0b712b9547ec28eb0f27374539b1e
SHA512641ceb6ccdf17c01cd1ac2bea706d67473b35071eea7351adf2bb54a2d08ba0833a1b612cd969806ec27f6f806eceb7c4ddd37d6ac0ad0bcc78b94e024e769f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51aafcc6549147021ed01f91211cb06cd
SHA1fe94306fc6a34b6de860e439964c10c9a69518a7
SHA256920bbf5b28d29e4055cc2975fa72595b3f55fee236040651c7b9da14ea3425d3
SHA5128471eecca0e59fc785b294556841352554d38fd19e61f4d1abfc2ba568f0b64ac61addd0b201d6cb5012bbeec621a25a3f81d268fa5fe5bff66aeeaca28086b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bae953835c792d04f6ef14d0d83120bd
SHA1afc50dcac1921c70fc0b1b07da5d022ee6121e68
SHA2563092e75a228aba0b1b926e3cff825f418529f9f3c823fc3457f26cc53c13a7ca
SHA5127988dc6f347f3e46fb5e8442b8ddeae33ff6ac704298fe2b0f1b60e7782acd0c9dfd7b3d57e764906f10f9de24c9088a533f9406111390f6975324c636a6e64c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a