Analysis
-
max time kernel
135s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 05:57
Static task
static1
Behavioral task
behavioral1
Sample
49b0aa519e481d6ff647dfaf5037be25_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
49b0aa519e481d6ff647dfaf5037be25_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
49b0aa519e481d6ff647dfaf5037be25_JaffaCakes118.html
-
Size
9KB
-
MD5
49b0aa519e481d6ff647dfaf5037be25
-
SHA1
d5df3a7890e6436aba71acbb8328e5600dfc87be
-
SHA256
363fd439182e17b5e8d22a2cf7c046a78ab875ebd35a9e34ae54728606a1493e
-
SHA512
4f0142d648ab9b2722af5055e3b020b59f9c1de3ed004bd1a47bf6364d9dc612d79485af42d2a928ad59f47016b9eb0c32d4513035e0d55eee4d9d702b25afe4
-
SSDEEP
192:J52cKbGFcKbyUTr7ILtGXCRXSUkSRM0rpu:J5nl+zUT+RTRdu
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{31F08F61-1349-11EF-B2FB-7678A7DAE141} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e04f2e4556a7da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422000923" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000474dc8890cb925823bc6f97289681ae8dfd4fb7e655987e3e3ae60680c135079000000000e80000000020000200000005c52f8fbb71372431c6870dfc4820fda64fe669ad9ad857597ebbaff76c3bbcc20000000b128eac8babd3c6ec23ad9b6afe2cad76ab0871e5080007d939c07831e712e5d400000006974b48db4420937d124375d423b08621802d552102324a9286a05c7e8a3849ac52e8a0773c1e327c0d5a324e9ef70c7d13d0714784a68bd0fd240a948761aff iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2356 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2356 iexplore.exe 2356 iexplore.exe 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2484 2356 iexplore.exe 28 PID 2356 wrote to memory of 2484 2356 iexplore.exe 28 PID 2356 wrote to memory of 2484 2356 iexplore.exe 28 PID 2356 wrote to memory of 2484 2356 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\49b0aa519e481d6ff647dfaf5037be25_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2356 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2484
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f357c8482e68fd54b64951efe1ef451c
SHA13426b168f4124c08fa5d046ed23f2daf55c57a15
SHA256ef3a3001473923a85a3ffe02c8ace63ee36a424be41c3d5158277f039a9b479c
SHA51267816ec5df6adbf1c66e9e5992a51e71bf5c2a4caa344b0399ecef16b5697a8e480f1883c7bc8902daebf65890df29c91bb27ad881997a6d0c96a356e189655d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff180b2272ad05fb04ac39e96a3fd0fb
SHA1d52f856bb86cf923a785a2622525c0a161661fd9
SHA25622704b02835a787e0f0bfa392c1e4d9761a23c66a21e04e89ca99b7b741561b6
SHA512ad543f96bf661caa59f129b7373f9124fd2d1f2149cbe714b212d01081f7c15815862594a1e3e92ff4ef946a4f9719ce1d58989ffffca439866875e256d371f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a07ddcbe1edde21d16f61fe438d41f6d
SHA166af6348e649bf8871718ed6cc90880559f6e08f
SHA256e7acfa77198294d8a6d387074507f57f22e668695106b92bebe994e6c2c903b2
SHA512260ece1097a50dcdef79c5b384e20b92a0dffc843e3825f92af3173c92fb9a252bce53a418d7e002b689f0d8b22291ae962c02e3d3d6b2dfac16f01693529b80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c177bd4c08592384c180d2a9481def0
SHA16412682717677b6b3f2014a24463f25c55ce1556
SHA25604d2c2b23719837cd1ca7e63036e7bd3807daa1a0512f1902555c74336b4031d
SHA5122e8a7b088d866020efcc5ed93dca31a433716dc8cd202680a8383b2ad0efe444b5f9665234b18251b8087cf698105535670202c096b4e6de512c4bda28d22dc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56738a94c62113188ba857019bed1dbd3
SHA12d17611c2ed709378fb23402a3a423bb57f6b197
SHA25683dbad4ee75f5285093acd75d493baa348338982df04f2d544742189fd9249f9
SHA512d644b1c963580850911c4fa7de8db879d8d6ce45c30f0a82dd4428ebae0d611d326f1884c92a6eb8eaed8710e85a3a41722b4e79d2e51f1a0ad4338aa4e85fbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9c4de28996c295b1b031c81ab500ff4
SHA1bce6022f3381da87f5ec1e2eac36b3f57f3530da
SHA2563d213c78c45cddfbcd94d79e7af5b67fda56944e76032f283379ad2de75c1a5f
SHA512b80f13781d4865638605d8a2a1ec03cd40c79221da287bbfc00e7440e888dbb457485299fd7bcd58e2e99d946c1d04af7116c6abb4355f0e4708032e62e2f103
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffa96d620ba5c84ee38bd86a079772c2
SHA13e7bd9b44fb3d6b69a9d1c595035b47b216c4cde
SHA2560859405fbc5a863464d58bc0008acfaae53a1f43991a12ea4316ca570c162054
SHA512aeaf58e4a0fb88e6239c885033402d7657ba0f1257933e9560c0710de40a2fc7d143cee75ddb992f5b8448181ce7de333cc57fc62c326223befe9e623240122e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f607872d70b52b1a3f97fcc17ebe599
SHA17bc4679fac02ba11ab45fceb21840e6779d5d097
SHA256388bfc4c409d0f67dc16ffe58e3dc6e786852d394112c1894be4224151f04f83
SHA51245b69fd92593221552b81cf34d99354c1865a9e358a0786c2a1af64e78e555b7e740e6ea3acc0ed9898ead319e4bdf7c4863d34bddbbe7851264528017281d0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b9c5a1452a67e7632d4f62aed4c8f13
SHA1f8c2d1ca5fa0a35ddbf746a367de4ddf084fbcc1
SHA25682ec487457c2aa8341d7106a5bc8c4bdb23ca33e85cda1dc64827d29b1802acb
SHA512ea2de81cfae964a66dce1439c08cdfa20bfd4cbd05d2639a8c6c831ad34fb81703702c69dd8dfc35b7b46a1f1666fb461621fbd201705e7dc09909ba3641a840
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e8c70cce2229636d24e9a355dc64ad5
SHA1b17acd011a4fc2d80937ac1e6bf84fe31c73ea56
SHA256fbd5fab0a57e9f5c96e16ad77ff61ccac8a4905da65a6ef9420241a712ca95cc
SHA5122825fa9dba1bdb15458b3e8d59743a819e23d124867c957e0c23f1ad7c551cc0a42d023604d3fe684bb87b57707c8b7b5a90590970b3360b4f39987271b6aa3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ec1e1e490fe70f75c1f484a9a735ad5
SHA13aea2cb04eba4ea7c4dbe01ad55bcef1cefda7dd
SHA25635ca15a1dd564ecb03ebcc4c1b66c1538928fe3b05f273084a540ad11cc00ab0
SHA512b67ddf2b5630fd025da1c9360e677854a968f2377b20b73e0c06c4fd85b0199cfffb12b87c4052209ba40a139c1bc7af916d7a1bf29f56e9dcfded8a87324727
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52153b9126611a403d0d23aad270ac06f
SHA11a9faa85dc41b59a048cf3829150762b0d51a918
SHA256d72f22bf1e3ea4388725a3aaee58eef72459cce8104a84f0f829f8be7e904db6
SHA512643b68ca5ed660dcc6c658418f52b96d99bdee281c5c1be150a50072b1ac32f284c731c1ac2d5f18e78f2566324aff5068bf274f219bf9202b937bbedeb25f2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50668ce8a9d49f4ee7910cc9539b8f0e7
SHA123260ffab6c46bb490358161a8234f4cdd1235e2
SHA25614e8365f479ea9cbbbb3fa248e16babe98c1bf3d6863888a5807b5df24b81c09
SHA51248729851e218857e7ffc6b8754a9f47dbd77c5f04b5b64af59cdf3e23002e596c4eea68a86c16489510d45dee33f7b809f6e8c966414de3ee33460786c9f782d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2e2459e637e16be549f4316e07ccb3c
SHA1cb22836188091a34467c239beea9c147e0ce440a
SHA256f75f611eb984a0f5209ae6984d28cb02cd3adeb4bd0d56d479a50035c8b261b9
SHA512acea73769a725180c63679997eb8bd5cd9afe88e7a4a232b79ba5cb6e416e97892cbc88353434135e8ffd46382888f2b9b7df2c6a9e395fa949aa58e54c09b5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0f10b57d64d0e476c79e1720ac58412
SHA103aa7e760a231de122e2a1cc747479df591d5ef6
SHA256638c7eae06e93bc9d7c7bf3cf4bbca838d2eeb474fba43f6af7f57a6b728d8a6
SHA512b23ef5f090fe9416f04cead64eb3b081617814c3a9a718c51d9b6825a4332a82d2b1084c0ac5376227000e88e09f5669436daeee289a4751df6b38e53b54256c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a649130cebd0d6dd74c5be1fcc6a0c75
SHA1f411fe2a2a4cda03526bb07df48c05d5288467d5
SHA256a99fd69448292f10cb0bc4920eed4fdc0706e4956f6263e3918ab6863065f0d3
SHA512a0401df4f71e6986bbee952ead879ca1d46cd7255c73c8c5b8dffb1860da0ae261120b27b73753675d5313c199bd0bf2d90d02907a039c750fb41b21e60b54fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b361e11aad4067c0447e4370942edc36
SHA129ecad2100e19a39ef9d9f886752d4dea3229503
SHA2562e37924f9195955ad51cc86d467590bc753b354ae536c4469c2c83b1fc431150
SHA51292273c363a7173528c5a19205b9bb60158dd631f08275dd3f558ed0f6ec780a5cfb790f85f531a1a517cdc0efb8143dcf19a8034ff1d85b3ad9e4a744ccc0219
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec66ae77f1da657596877797e2b73c17
SHA1abe95c18d6b1264b046c85bbb1fb56aeb9e21179
SHA256bb4930a563ffae870406a77965e813a9fc070bac9952558c421b68d09b89f962
SHA512d99a3917da891b50daf73b7e9e507ade4b84b7b4a022e01b8f7e84eb05cbdb285d36db073371f19abcbc07dc1454a1adf444c65260dcdc0d506f662894db4649
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a