Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 02:48
Static task
static1
Behavioral task
behavioral1
Sample
49291f95c4e58063ab2fabe289575b2e_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
49291f95c4e58063ab2fabe289575b2e_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
49291f95c4e58063ab2fabe289575b2e_JaffaCakes118.html
-
Size
8KB
-
MD5
49291f95c4e58063ab2fabe289575b2e
-
SHA1
fb44560498be1aa8a0c968faa0e0874ca7845e8e
-
SHA256
714ad44fa6434ed8d2d59b19534dab959bcd07219129a4ce050937534282e5a9
-
SHA512
a64ba38db526e9a2fd430cb4a2d66569b94ca084a6b1ffaeb3671809c4fe5a3fb92dc47288bd3f9d2d3fa5f85055ff710ede330e261f2d54b8999bd146de8f0e
-
SSDEEP
192:4pXaWtZN8GmmaQgVXghZPK0/eqKfCZQjj:nORmmaQg1ghdK0/eNfJj
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421989566" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20bcd9b73ba7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000009bc3714bef999b738e28c13ebf3e7efdfa3a3ebd6487b71a0c716fe0f4cab941000000000e8000000002000020000000a33e59e49973329a0cc6049a97c3071dbcd38ddf1f7eb05f91d0071742b441f720000000e79d4d1b8c5512dfdf10a658b5d73f6a3e0ec4dde0373d644ab102286bb4ae254000000027b14155ce6d15b5d0bf3ac5823d9153d719f198d9e2a9710db9ece3a11c44d4b49631e34c75cba1851c3376e13e52e0ebc27b167c9a2d62a18d9d2436be2d6e iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C09F85B1-132E-11EF-8B56-EE69C2CE6029} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2184 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2184 iexplore.exe 2184 iexplore.exe 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2184 wrote to memory of 3044 2184 iexplore.exe 28 PID 2184 wrote to memory of 3044 2184 iexplore.exe 28 PID 2184 wrote to memory of 3044 2184 iexplore.exe 28 PID 2184 wrote to memory of 3044 2184 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\49291f95c4e58063ab2fabe289575b2e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2184 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50ccdbed87fddb1d00f8d9dda0388360e
SHA177ac41cb68d575ff830f2e5d181e416f45091332
SHA25645548c2b033cc1fdc84d29a5baff818f7a96dbf9c3bfb16d234c6974a757da48
SHA512074c1128ad54cd1a2797cf2acba6f329a176f66f4c1521ecc5a6562c7b4c2112a2373673f8eab84f3e72f032b8eecb0b46ad06418b1a0d7019385ed06ab19340
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5314e3126747f6933a0d8f9875f323dbe
SHA15ba35f040cfc6330b13c78b8c04af79b969c0d8e
SHA256908b5e192e1a17a468ad7cc88015d57ca16da5887813bca2127fcefcbc2d19aa
SHA512fed4d854b1f33903b2dd8d22b77cc7fdd79d96444f26a581869c7b22f82e58ef5d7a4b2eaddfb493a9f2e7167b0b9d4f89ed4f4d78c9742140dfb67e04205519
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52844d2791db08a1bbc30948a9a9125d8
SHA1f1e87bf99e77d05fc9137ee59d8e2f2a67600aac
SHA2563286de83347f1108fc0158bc37c1b2ab0a245106971244378fe0a67f72be11f0
SHA512db38b68452cec6ac7885279c4c3ca1bdd46ea27dfc79ca94590c65a19a27837711552649b0a989e29aef6edfc5cec51086453db014d176329271f86ba4ceec42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD537f9b9ff5b3148eb798109489d9069eb
SHA174024117c53ffb8e909e362c70be81e05d7222f8
SHA256e0fc0dca3ad18c60885a7bc804cea7c0d8e3d6a22e6daefeeecfb0fcd572ab20
SHA5123fc7142f4f1836d3d39f22919d3db1613b3bff61287f3a0df32960e2dc6aa6fc741a579cc4e973455542bb523f152631426acb31b29f36ce288fe30276c2f7d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bf72fb4ce4155f94b4ac27344f07f60f
SHA112a2a83431e7270e66a77069cb93a481a1e050a1
SHA2567070bb4879cc3192d14a101fa604514ac22853e01d4f860e0e6600cd7ecfe4b1
SHA512f20b441205505f51a009bcf2849e0ffa8da517d5e1268e0492ad325c2dafb19e78e0281b809ce8b4084572bdcd4a169a74ca4b912f33be7a8ab6a30800d7a601
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f57c8888a237a62e1999547c96fee84b
SHA1304e0e87c45978be03532f6c893a1f40f9e9ea51
SHA2568e1ecdb491401ab253edc9f8534ef24f701643c48a3ce51dddc8def2a61bdcbb
SHA5121a80b371a6477344c8a4f41d5c160fd39595d76f7dc8689d6c5bdba1e09e6ef3153968bb394e75c2e9eda7e48acdf8d51c026a4b60fe2caea7d8e4f28f6d51b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ca8f82a645edf436737578f7eb1029d0
SHA12e83884df4135c6c9de222762f3b2e5133b91087
SHA2569769772cda4af3dd33a5aa75b55a2eba0d86ebabb38ada4e1a6e697bddb6bf45
SHA512fab54a0d8272507cab22c2e7d9f60978fadc10208631f94d4504b1a8e9ee012c3e3ec3b98062352c17b7c419a860ea3347fb31a93b0ba03418e6b848fafc94c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5158ce17725b9a89e45f7a45950fd8114
SHA131da3b25dbb47372be08a9be6ceda805cbecc09f
SHA256669b34c2bfc18905da69c82733abf3b44fe7234a13ec6ef1c554ef8557a3fb6a
SHA5120fa795005de2f1c46c52795292a2f76f60e34e574b57f16c13eca9fa47b46a48eb5016c733469fc19b565f3f6f2839236f7f65dc5c47d2f464006b831725ecae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b77ab18768d8b23c965553f1ade4b6a2
SHA1acd657f17c5c60b55c1718ff9bbcc717ef3317e6
SHA256949ddcac6dc40e5d2ed5f02b3bc30d8efe4e61d181cf067bdb32753af8bb6142
SHA5124df3b10f3e16cc5f8262f496bda6f515865f36e8b6e3505ea4635e4e9d37bdb8ab856e973812aaabcd9e65c859e28407b4e11639d2d632d57145ae98c5066379
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD556aa21e12d1b66a1701273ecb18f01b2
SHA1aff85f630f6368683c6832b3ffb6ad5222aa4724
SHA2568d6980170b7efb778b00fbe62f2676ad5243e611532655ec216291bd8e2e230f
SHA512e11eb32340c9bca801ac5c4194305c6062b8be5eca66726d887ff9b64396101d676521bc1389aee35c425ec3bfb907f66f2479170e9145ca4bd8cc5dc71ff76c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b849e68f40d0ef5b201fe423eace2392
SHA1839ad85220691a49565369a416ae4afbacf7a5db
SHA2561743f5705a124c0ed842ca966a7fcd798da49b7eade427146b91ca597cf4c947
SHA51294a9615d245038ef7496b5eedd9d7eed17cec929dd0a87e2b6b06f479cf75a219cd837bfcf7ce634043a29c339a4e57e2e9fa5994db1022456a7f10f68aeab32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5604f902e6788cac0f6e7377ac99a5d07
SHA1c803842f0aab2d72b6d72c57ea3db18cac563d15
SHA2566f266fae34dfeeabffc8295516e7877164cff01c51d50faa40d914746bbb3e61
SHA51214190724dd49f74b5ede3a168a19e4a85e68a563883e3e67283f048249bdb25faff690baf72471beb79b45a75e30454dc948f9468506f6118dd0bac6b1db0f34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59c9cbac8b09724ebf3d9f3cb50f3a5c3
SHA18b48d686fd5c9ecd735cdc902f368d491e0e31b7
SHA256c4c77d1bed3761c2bd2e2238ddf45476e207380e0b8ae3f13c1958a8d9838a31
SHA512b2eb462f7a4d63e920880093ca3793a95e0bed407fa4bbc023bac758add13a4da8b00b3155ed76242b3be35a0a62fb6dff073696078e70811de45471c91eaf13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56b709ab81a5e0be44b2b3f00b6f08bb4
SHA12e3f472e9ef9f46f129bcdfd814b9c89a374a41b
SHA25677d1af4e0b437fc2eae8aaa2ea1620e26e805a98d5705a98caf4b9eef1fddc7f
SHA512fffa01ece3aa2cf8a0dd88e172b36a4547ea70edf8d70744e5dd0bb5e1f96137aaedbb1b515dda8029e3923f6f7aafdc6d125aad7f4d6dbaf39cdae06802cf0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b520bfe2f05a61376b9c1f9492d964ba
SHA1ee71327aa8bb13fb31025a6c74fd25d30e3628c1
SHA256e049e7ea72c231b8297d3049acd612787ee078ae6421ff2617b7aa8dabf90512
SHA51261570ecc468f624a503ed030cd02417af1c4dcc412f3640f8c140b2010e428585c302b88764c0ec5d31425090363b74e01a677efbfce33a2c6f51f5d8efc2050
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e5670b42ce3a4021aada7dbdc095b0b1
SHA14e9f2c6d19cbb2977e7994140b683976f4965d86
SHA25627a7f759e82378e3af54dc8ff05d12cf0e360155f36bda63e467d14128ed795b
SHA512c15eb1d89d737672f6ef6f856bd0b231c724c12bac4af2a7ec34db8b43585a0aac5e581037f5c7ba22b047c6f1acf018f10f7f90600b99c5a24e85d4fab6e4f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f72cdfe83603f03b98e804c7a7ce0f93
SHA1485f4e3cd60c11e71f2e7270f3c63f44890605b8
SHA2562f5f1b3dc6d63dc57ff19aaac5989c30263d0948f6dd6f5cc46346ddd5579a81
SHA51222dd3d8ce65f10feb58d028b9a00e59d80b3e5866915ecb0b3d25ab7338069bdcfe87e7e77e5d47c4cda770bb4b6bbb66fb3de72dd094c458d521601c718edd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54b3ddf8522b8530d2cbd1f63db4a1360
SHA157ae8f88a5653b1a919ecf95fc879654f0613b93
SHA256763479787b6c806225b2ed95607a4a97dc18e33b34e3c65fc1fe4b6af6744b8a
SHA512c74d3661b940cb88a9071c487b215802c3fae079cf51da3a19e55fecad129627032b46cfaa9cc8553917cac09b6816115b838181322786d88c4a7c47f4fb421e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f8f731b0caedd1121007387d3128d733
SHA1c1ad562e90d10af9bb1247fea7e875facafbfa13
SHA256695d0c1a17cb06e4421ef2709b707de40b72aca586be4b3c9e569ce5822bd9ec
SHA512a76e5b4a6642bf699dfb17854edf60ab5a9680828b2ff76fc596c2a9a5224259e7c1aef73daff50095f4f662a4df1041e45afe0051c2aba4dad4f0be39e4c038
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a