Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-05-2024 08:55
Static task
static1
Behavioral task
behavioral1
Sample
4a4e3fdb24a3999d1da16875103f15cb_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4a4e3fdb24a3999d1da16875103f15cb_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4a4e3fdb24a3999d1da16875103f15cb_JaffaCakes118.html
-
Size
94KB
-
MD5
4a4e3fdb24a3999d1da16875103f15cb
-
SHA1
95e41adff7811aac9484d3e0c84a9bd18903b4e3
-
SHA256
262bb5829ffc1b50c7c4d9d040a7f7c68d2a33b41fc5a1d908d6357c14d98371
-
SHA512
7df34cd51dd4b3a4734d705bb0a9a148eb999bb61374fb2cc676e71b937c9814ea52ea9617e5b45bbd3ff06a851cd08eb56f33cb7431384a9864c1f7e9570f66
-
SSDEEP
1536:WMLiNcI7LVQGpwHYFLvf4niFrrCvyrawZVwy5G5BdkrY8mgHC+qpEyW:WAivO5BdkrY8mgHC+qpEyW
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000c2c9c48e23c9274e7cf6d95c54bc8e1507f7e1a6eacd67710e1c304fd9e3b355000000000e8000000002000020000000794b84176fc03d60076a31a0b9f30745d6b437216b3b9bd7a5832285de62fde520000000006f227c5ed2ec0da4ef6d26f75501be8e5241cfaf71236cbcb1d76ecdcc7fde400000009331c41cfd1c779e01da102fe6a680f408e67b9f0e5fd919af1ebc494ffd7ea2376e736c241d50544ba15b78ca0de22543a6f84f5d9b13b957d3cc208404be92 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0dbfe0f6fa7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422011619" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{18B0C741-1362-11EF-83FC-5267BFD3BAD1} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2696 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2696 iexplore.exe 2696 iexplore.exe 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2696 wrote to memory of 2224 2696 iexplore.exe 28 PID 2696 wrote to memory of 2224 2696 iexplore.exe 28 PID 2696 wrote to memory of 2224 2696 iexplore.exe 28 PID 2696 wrote to memory of 2224 2696 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4a4e3fdb24a3999d1da16875103f15cb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2696 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2224
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e28264500346ec0be5aa59cd7f623c4f
SHA1872d11046c7c74caf9c35c83a438326d0b005c93
SHA2561d60fda5cd1c6eaef26d37995adf5ffc61813f894208a34f6b74f0411aa9b3a2
SHA512c16ae41afe2a19ba77c953be3ac418157a6bf9c698836b4747ec7a746d1dd567e5bede5914a3ebe42dcd6fe6b870b78d6c435149ed8b97d78e76615ca8abe073
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab38aff2fed8d94830ce86fbaed39288
SHA19526cbf9bb5efdd99d57e733d718a793703eb0cf
SHA256fab7c7fe7a1cb11e5408f8fd7c5da8be8491cdfbb4bb089add201f2f26dbe75b
SHA51295b0dd57307d709fdf6d6b9606e718cf926b2e3480b88e02612bb289da3f0e685fb309eed70206688b115a45d42fd8abbf0dbea8f6d5581eac4ae36558910994
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bfc57d166541337cc6db07a3a9dbb9d1
SHA1f3fa28dda490e6a08035904138f5a73df84bd8e4
SHA256a00ff15cbeca6bf6685b430b1b33236abeb77b6fde2c81582074b9f6684d0839
SHA512d55e87ffca52a95a616fd0fad4a82a35048bac732ae3fb2038568e79593328d980ded18fa6044c120d8d3affdad8f88aa74d85e625b377c16cc88f2d5feecdb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa120a538c3c35e2f749a7f686971381
SHA1df31b8fd82684ba5367802f5d419e6f995eb1491
SHA2560ce51fa537c69782eaac7f6897eaa7fdd5c3d9ce2ea3181fc17bbda11e98b52f
SHA5124829a30f6665da27297aa46ba1a2039f316464587733f94e7649f1ce05f0752980d77ad36f0195676bb3a677d2c4bc9558406a01b6b9f9ded820c314546e67f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ac478ab750274a2c6ef07d83b2e00f0
SHA1046d23c1be2e5ec9a2b70ebdb965c1077bb3887d
SHA2565c351ae2c0b568a0ad2a58b9cc9a5898f66b027ab0b79ede4d0962d1ae17821e
SHA51279cc875ae5f6e9889d9da58713b2959c613aedb1beb5078ea9fc18017f86bc2ad7facdbd13fef4449d9b45012483d839cefa146de31223651b0823194eb8b377
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7c5c9dfd1f9f339de188105a9ece4b6
SHA1e1366fe2683efc0bb90c23278ad2e0211fb26f4b
SHA256ac58e8728fce7aa59db57411dd90a6c7fed7118609eb7ea7434b3492849cec94
SHA5124192b114f75c6d0f2ea33fc613e543d08694e10cb8acf702bb9be8bc2991fc5fbc2604ebd9854794813392ba2254fe9ccecf3cdddcde001d165ddf5824eac9b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f68dca9871d35bcefcfc6fdd237c01b
SHA1f60e7778dd8a2b3c78aa6f806e2b121845ebe6ee
SHA25644d5ea80d76924d563102616e9e6a1edce6f086115f8047c026cf8dcc385fcbf
SHA512a9539b9d7df59a7b697b487ecc0bcc44a9b12b3df4525f6ecbf3568aa08d3a325843687cbc9c73c36a0c67673abfffc7f9a86d4fe0872594fa7090158556eb79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597375a2a1d3a1c12585e1bdd3d2498cb
SHA11ed19311640cb48882f3562373606eb4b3fd92c6
SHA256589b762452c9ccba63db0caf70b2348780053a0a4814523a91bd9bf829d0e76a
SHA51295bdb6ea939a75bd0a17e90996d954c0e41933ff9ba9bbae5e765ae6c2bc7e011c84cae4476e8378ec4acb8449c1c71de41710d370d2cb8e8acd2fa8a091f254
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5caee5c7c5d38abcae58c99097c824611
SHA1d6d0b1cb7b375d287c0368bdd256c6c854682d0b
SHA2565afed7fe875f71f2f620cf9efd1b13cb60f024c352a5d369201789eff3f7c4fc
SHA512c2e6c3e5408866558bf48f94dff6279a072d99edfbc49bbe701be422e6b1728c5f057a6e7c3607276196b891f3c81e9e18374a3f197d8dbff9398932184c8e12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515d154b9fac6d48798601c6a12575489
SHA1535729414a6522ca0ca2ecb9babd1670a0a2a74a
SHA25666acae3d4bae919d30ab34490be0458de45ef9117159789b68c907ee347623c9
SHA512a0b06aed72a5233fe00fde249c1f5a9f3358e8f4230c5890b0290a0e7fe3ff67eb9980af9b1ef7ee63ba86194665ba5f0f1c4c2d193e163401a5807d3f104c72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55bb3d69de8bdae7735d8a5869937bfe1
SHA1694a601f5aae6f1e20a6b5941692fc8744b7af34
SHA2563ebb579d1bd8b4b64e3d524eef4632a33464e47bbcfdb47c8716f671e2338ca1
SHA512e4edd460ae05e3ca63a04fb339857a3c49686f88b47ea2c916139354450194a4328f1773ec4465ec2c9dcd7265a8bf9ec504012a1cf0b6c2539548785df98549
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7700abb58d22194b7f06fcab6de8859
SHA1e9b1bb58f203b83ef0fe16083fd02d66b1617eff
SHA25653ddb1e95cdfefba31cd2e9140590286fdeade82c95762ea95e2843f2d4d0027
SHA5124106446a2a1a06addfcb57a216554d5c0debd12357e1db63cca69e6cc7f63d775c558a72fbae40b5353fb10ad3345e14a7e2f108f7167ed6c289124733ddbd84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539a6cd6ede7df107604607127caf3f70
SHA10eb0eb94f125da94e8373e401ac826e9c6541882
SHA2567f5e2d99705579a527f2099ffcd7ac3b8e1f5eccdbfce492db14b5ccdab43951
SHA5127a4e8c3daee2c218fa16a41efcc790cb5a85e22e1f20c6bbc1da740217c8107f5aba7be5ead6e6023fe39c7719b253d1bd579dce8a637f1312bed0fd36f7e0b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8214e0d1f05618317d4bab44427a25a
SHA10aa32ac175e62df3598929f74f383e2d8bce24dc
SHA256129d9247a2f35bff6f9d1e4f780e28b52bb1f3e9abe4ea14ab9595a3b8526bed
SHA51252bf8a2b892394580fa05eb55c9fd5e2b0038ead7ac15fbad75572ba63686439fdaa667209fbca3584eeefd5e1e50dd687cbb247e2d2603305e91e798cf479c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503fa787fed2f9ed8e201604f675b96f8
SHA1640012fafb2e49efef35b5764657522b407fda75
SHA25691d7178b4100ab84b49233447fd5e176170c22a785b676e651b4b3d6e4977e36
SHA5122cacb75f6be6bfd6a0cc7658e03c4109eeba4d9d78e7a57241ef8e347e671080b99bf71e6b63dbf762bc24a213f2730638ab721fb2bedcd2b7d3583b54225757
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54dc635351087af691cc94e5e46cd78d5
SHA1ba7f90666943748fe6363f73884bd3dd00e584f5
SHA256285d5142b27f560577eaef1fa320db5d7f42bae0eb4b24a748f72a8e1a61308a
SHA512eeafd90a974f95e15448ca90d77c4a45cd5801e8d34958073a181c113a58e184cc157620d42280486e8c52a294f2816e3fe70f32faf8da756d15944fbfd5f672
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50340110cef467c2c6d2155c6f30ca7a1
SHA1e36d286bb3c5fbd33e0392b1c80c831150154fc2
SHA2563d92e0762afdf4c2ec419461b68b250f29c28544e19daeaf11ea1c9ec15031c7
SHA51232af79d303fa9e5393c231754576c2ab2bfd0792126a6fed1146e9b7636d61c5d6ea1113df0380c6f1fe1f8300c111f92d3214ac14452c005ea62f8261312520
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53de657f65011be22041ab9c900893026
SHA1ce2d9e21de941bd217b69f942d6d236d03d915b6
SHA256bafc45444c6b4b55eb06614d03af9dc0f90a9b608273488d87be3ccd842420ea
SHA51252948fc588a3d19c054a36db998048bc9bf46b96b7829afc90f7ec803675e01b3f6cab7b48342ed9cf27c6283bfd71a3872a0d8f8b4a071b047c270ae619b65c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MPR7YYBV\content-slider[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a