Analysis
-
max time kernel
122s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 06:14
Static task
static1
Behavioral task
behavioral1
Sample
49c0564a519861a5da1760430905d19f_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
49c0564a519861a5da1760430905d19f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
49c0564a519861a5da1760430905d19f_JaffaCakes118.html
-
Size
38KB
-
MD5
49c0564a519861a5da1760430905d19f
-
SHA1
96987cc5e96f8b3e573771c327e6149a7eb75e5e
-
SHA256
b78304eeced1f5ecdd36c4e3ac56e5981276eb5ddaa457e1e9c451785c3f88a5
-
SHA512
ce1479eb731cd043185028147c72f6da35eba73737d9407079e723b012ff9ecab413c6a7eb712ad0c345a85984578541516cdae1c2fa7716fcb0b58a830f024c
-
SSDEEP
384:SHxJhbkHBkE6ehNISbbh8O1MRdxnyOh0qXCSYhtzUM:SH3GWERNbbbhT1MRdx+XhH
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422001944" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a230000000002000000000010660000000100002000000016b6033d2b6f7df5bf3e8c9b3239b361d5467b6a7f2206802ecfa53127bfe93c000000000e80000000020000200000002812ef4de7710dde6c06c9dca21e91cf8a58d339b5d177026b5aafd30c96472e200000002dbad215fbf4c4414e7b08456d7447b856c777ce7d85c0137276967d9c9c06c3400000003630e8d1dca5ffcf5fe2658de32d8380e9c097e4eafb5bf4f66c6590ef2ee1be41ee9f0a793c56c873c7fe946a978720bf2b6103021c25f4ca10b98e78763997 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{91F07A91-134B-11EF-A002-FED6C5E8D4AB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d036818c58a7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2548 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2548 iexplore.exe 2548 iexplore.exe 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2224 2548 iexplore.exe 28 PID 2548 wrote to memory of 2224 2548 iexplore.exe 28 PID 2548 wrote to memory of 2224 2548 iexplore.exe 28 PID 2548 wrote to memory of 2224 2548 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\49c0564a519861a5da1760430905d19f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2548 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2224
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dae745f8df4cd0561c1fe2836a4e1907
SHA15a1a39f707aba7e2197d2e6d5d33816160328cea
SHA256ddca4e2adb77fbf2eaf15ec6f3feef5ba258150c861592112e76f39b2bf88961
SHA512e71679e441b333d2bb99a6585c1c71c1e8550b1fcf4c541092bceb3ebaf529958373011f97d573d72a3b492756876b56769309ca3b46f723eba967eb6580bfac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ae62f261858f48ae4c5f039f9e112df
SHA1e112069ae8bba7e4902f701009a88a806d51719d
SHA2562619f889826c9b10606bfc84c6f100fb618cabb77bae75b8b510bf4c0c177bd7
SHA5122db74ffe77364f5f06729f1e5b21304ccc7f09ee2f3718b179094bf79d1e61813ca0f5ca3142e87d4c850197c6787f1636cbb67e68b7929d5761844233366c19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573d719bd01eb903a136e200fc90be92a
SHA142207187d774f30049e65683cad82d8e93ab2ed5
SHA256d51652264902c8b655b4dc65d49c22d0194c59c653e5540b5ed93d534f98b763
SHA5125a17b78d253d0df0b4813b9f808742371dfad7e81bad9cf7b563d62cdb2e3ef2f7f4753bf524ad722a86c808ca628ca47070f1df32c0421d9892ce32aef41333
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50725ffa9933c5c11b7bace6d0a96e3c7
SHA1f205174e9dbb121039fe3d3735ce97fef028e264
SHA25654f5bcc14ffd482e168fdbb11914f41598230da6d413bb3ecae1ea0daee7e092
SHA5122218ec1f1085c1f17a0f243d5f66cd7a395227aae097dbc7ff8c8e72be042ed5b08b8d0357449b2ed5166d9cb9fb21639cfce78b5622dde180117a8b9ffffb46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f7e26f8d85e8557558a5431bd7c38da
SHA1db748340b6094a769def3dadd22caa44610f3619
SHA256d2de769ec259b0bbabfc4361df5ccad4669508ff86d09d314dab94ca8a76718f
SHA51270eff7d112aeac8ce5e68a1fe926cedfdf9b372e349549757bf758b90a76b864c89bb0dd21f376bccfcab65b41f13ad1d7357eef5b1405088095a29b77a03b21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50158270b05ad45e8e296a851c9b60930
SHA14e6deb52f3ce26a76d349a2385ad5709e71e2fa1
SHA256b95a50b5db2a79c6dbb722f53f56224c17338a991fe3b0725b23132ac3b06335
SHA512d88186a579c2aae19e06d0f9b2f576da3e7ae89902445f2a1e33b4423271e6614f2ba5b6cf5f472cf35e6d1fba22110848773a41b2112779a6372d2e37dbde56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5538f04462d7ab2d37a911499213643b6
SHA131b836aff020f612a52b201d6f37b283ff24d6bd
SHA256b3c0a065efaba3966ef47d880e46d7ccf784d700997d12593d5a8371e41d6534
SHA512d27f22e4f2c1081074861aa7dc150433bf01cf6983a782eda2efc05a1c041e617a1e50383e6dac23db1cd306162014a79e9905e33ccc612e5ce6e45dcbeaf67b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57fe5392ae22e6ea4ac9cfff91ed4ac66
SHA1b111b6065198b15fef32c6409f5c4a85a7328a72
SHA256d5d314d8115767b83605097a202b612700ec61d0564f4310fd214e88d51f62e7
SHA51224fe4e499075312454bcacf2191f8ff9164efa7846a009a7e8939a2ea40de148fe74e9dfc5f90e6b173d588b6122f31d6ce4ecc07eed3a04f7fda80757ffb559
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7e40ab432a14b3daa864dadb1e5e67c
SHA1c69cdabdfc64744242621dd238a32fc976530f06
SHA25601bec369b92e1bf73ed5e8c20ea985d05e1ab1c11c1e7d19ed5f7316ad2aa5ae
SHA512c837ba7d5efb443cd926766b501860a1b46b0dec02113b20444ee6fb8bf5c3f61cfc48ad616320b21502f59a5782739b35000a079d43aa4e8bc1d61b64a1a92b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7e61000784c7064214d8ad806c4b60b
SHA187285a91f26be29a666825f4880c8de1a0bb0d06
SHA256bb39a5d37badf082cedda98c6ad357bcb81f4822e84de747ac08baaefd0b3223
SHA51261492cd80ab8dc2cc8d86a0620c249502fce592e4101d57c1c860a31bd87acd56a3c531696f19298ea82c0e3cdbbfb53a65a8ed0851a7126b561bc7002af0e1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517510fae66ff39f82f79159523d41bc9
SHA10f04589581b1a651838ec96f411e6cf838aefdf4
SHA2568c12bd88fbc29e3be3898e0eabbb4da0b9f5b14bda0d6763034cf408864aaae2
SHA51290eb8f8c9cda52b515c38b2c6b52ea11db086a92abc8de42d2506c83a5b3048cbda59bc5803aeac73cb42da56481e207e86a4bb212ea19fe25fc2b53f10d3f79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3b29ca0e7dd2f24ef98a23df5a8d05f
SHA11005bf7822c316d921ccf99dc3f4ea6a96252ca8
SHA2567a36f10b021c1b74efd54a4e7d28ab4339ab2ddd6a6697f7d52afb063bddb2e6
SHA51285e198e7e3a6072df8f8e5469c9767df75bae7ffe79f1419ab054f51e2b5c915679d7f3eb9eca753e630da3f8ff4fd80558c077b77060f158e89ae6362b7539f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db41a684b26138908ef90d6394f52568
SHA11d422a6ca7cfb0d257bd3fce95e350bc174f9151
SHA256b89dd0a91b80003cc4df6279866400f0d9b464e5f081db9742591d6a4bb381c3
SHA5124e1c5ec04d5471ce850812c10ead03f47c10a1f8417ea011c2bd727da21b7fe1ae6c36a7f163afd47c1f2226134cca3b59393d7ed48f35dcdb989c53134e9291
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f061dd09b977d38756bc8a6270ef16e7
SHA1e0bb8ff9ee582bbf7ce1466e3cecf8669ac740fa
SHA256cbf18185e3cd4eaa912aa80f1f974a271e23b1af476123992ceadb1db841e475
SHA512ae7614f3f3acc0c8a549464ae27beb6836e72af1ccf83dee79e5644e135514b89f3baa644590f18e1395029775fd077d91ca7274be7e499aa1b0ac87d667c4a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505410ce64f8495e139750f86e5eeb642
SHA100954877c878ca727d9208c589b00d635aa88afc
SHA25620a0c00084dde2cfce2a3bbc8391f6d0b6b9a4766cf5488f9a30f499f32d666c
SHA512c879064b2f540d367264ac9591ea8fe13993c5e034bbd83c58fc89f19a6ead826a653027f574a28c11bbf86812208dfbe2d92642244506f51cc7956726329df2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea320ebce7a413c54363d396a4328b92
SHA13d99e637b517d54f54bd635355d1d3456d2a4a4c
SHA25691119d3a84382c3e02a435b296d41ef0a13d8555cc2d91c79cd10ae9e485617b
SHA5128a093370be91025e551f8dce2e01f805c31b46e3066d7184899c091375e1d52f8e96cda7e93ab1ec305883e46e09aff12ddfd5e12214eac74f5e842ddbf4d954
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dcff3edf5b2fde9d02703ed0502220e5
SHA10b7134b3fea3cb7d3470f6cc2021374c07e8b721
SHA256b930a6c71d78e97ea1977dec378fc8ac0ded73834842d1a1213b84c16d9e2b69
SHA512af25581273e9048ab7e2d5a28a462864516f558e14986e4b054fd0e60dd3cce20cceae2647e8fbbd1c17fd3a7068244dc1a268df827d4bf9c29ac9df6ad85fbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582f1036006b0b373ee763d03783a6cdd
SHA1f946692969f39f055c10b83c013a6f00795a7345
SHA2568a78ae004d20ee13b95570dc0b03c21811df49b8f98af74ad4108f29df0df8ae
SHA512e4a497f03e7338c762a88004876e28b39bd59eec1e362796718a98b2bad85c15b42415c1071981d214b5328c6b01461f4f20b14ad299a682d84c1bc1d8de1061
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f0bea634986ad6e753203869c89b4de
SHA19296e9c12773bdaa307e227f5d2d7e55820e14d3
SHA2565629dcda3d5700388903565870584a0b29d0b931f171bc0532fe34ef1bd4b459
SHA512b8e2e015ec5c8113c6a26390fbaa5cc182e9edf4d9d97bc9b27c32122c9572a659540e84a25625c4aa8bee76180cea757763e42d6b43d272cc9b73d369a83324
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a