Analysis
-
max time kernel
141s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
16-05-2024 14:24
Static task
static1
Behavioral task
behavioral1
Sample
4b879adbfb4e99610382f3e1714e5dc5_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
4b879adbfb4e99610382f3e1714e5dc5_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4b879adbfb4e99610382f3e1714e5dc5_JaffaCakes118.html
-
Size
16KB
-
MD5
4b879adbfb4e99610382f3e1714e5dc5
-
SHA1
8ea3e7c2e8595d88893d37aac1054ec995fb42ad
-
SHA256
c0ae92442553e415ff90f9ec679283b237dbc3e4600313d9741d8c263b2c118e
-
SHA512
599da8b6b259d959342e7b3dc6d20509d6ffade4df5d2afc728df0505853ec496d3764ef1dc358dce1619c5504863e9b46106494ca75f1e535ad1d8f6954ba15
-
SSDEEP
192:tl7vFZ7vc4TfdyEC8rQJSRtuSBmvot+gCp3sEhSZagARu6FMKZvqWHK+b5J+Fh92:rf00lhvvCp3i0MKZiEv5ch5w3I0BB
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422031331" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FDF42E01-138F-11EF-AE27-76C100907C10} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3094ded29ca7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000824be76acb876c3bbd2aad61c445a25f37648c066ba7c566cd2e977726251fdc000000000e800000000200002000000069c99587f58d15d40f3cf8eae3d9757e40786065fb81767b2344c3cf39c081702000000047bd03ad612be9a76bcd2e6bcefd39a68517e4fe159e80e35172436cc19096d14000000019b82ee64d35a8c6a8ca8342a477dd3b30dfe44fd64a6fb01d7c32cae4c77494694f810d09eefcda3a06ef3e19eb3b266aa4414f6bb2b516c1e83b31096bfb39 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2460 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2460 iexplore.exe 2460 iexplore.exe 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2460 wrote to memory of 2480 2460 iexplore.exe 28 PID 2460 wrote to memory of 2480 2460 iexplore.exe 28 PID 2460 wrote to memory of 2480 2460 iexplore.exe 28 PID 2460 wrote to memory of 2480 2460 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4b879adbfb4e99610382f3e1714e5dc5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2460 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2480
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570bbb76c4aada9836a1752b8877f6cff
SHA14e94921100b0d9f2d4d683745a85fcd8be8e624d
SHA25604f1d2e44e3044af4456819ae228c0ad0e58e979b25e5bb032098c51816bdf92
SHA5125937bfd8017d24e1a92678a07fe1926edf4917bae65472a8242f197ea7ff5059de6c9d67ae556e0dbba4e13cf2841792616ea1e5d1e3b9e24f99be2f878bed84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e605fa713f86c97d4466ff259e0ba44e
SHA1166afe9aa528f64d96cb331bc82b244b141f521a
SHA2567fbe6f8d3c10137162ebc42a0e7611c034c3b14c76398b5fb016bf78d7e95d75
SHA512f3584756b4ab82fa8c3bf8e9d7d7804fa07ea210aa79ed1df3839ec2ef5c987cedea2a47c73ade9e906ca6c7680182f340d5f0595683f779547a70928dc62f51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0a59054b4634275cc914bdbc556d476
SHA17bc940c1ce428ded750225ba659b030ce4c86791
SHA256948658ea76c2ae830df51378ca09eaa7d5aa9239f6d1ec3fed990570652ae443
SHA512eb743daf31f6ddc8cacc6811ccfa00b174bf53c82c71a3ae8250fd14ec728ab8f084c33465ed254705c7bd82ef2865ac6e1ab4247c30b94569df11f557c9009a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1e3ed590eba8583a96f53afd077f108
SHA1d83643f542cccf8c3076e72ac307ebcbe001cf63
SHA256986c8d6a4874023fb391706a76a5ea6dedfe5708e3b98c207fe593ced80428a1
SHA5121f5ed47cb8b3ecdb5de64f37e352940377be9e168bcbb39eb02f42dcec145dc06c69e3310585310c386346b54256f98c0651746a9e018444d687d57f53326774
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a274031693e793ef890566c710ddc434
SHA1bc4d9c8276a5fc46ad17908fc4fd0faa08656cca
SHA2565534cda3bc4d35a40066645991427d6de2afa874c4a96ef97883c2baf34ca4b4
SHA512eedf1367051d3ced1cbc96d5f270648311876686666e406afee224970ac40adfab48a8a326b4a019de3573c9860ac057be7dedca3370442f30fde6c29750e695
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b47ab3d6a451d15395a28579c9c86f7
SHA1ce6ea307e5687e1faa69abb5a9cf5cbb1bd69d9f
SHA2560d8c368f7b8d6f2a8be1142983d110c0cea13ad411b87c24f6ce2166c5be3b01
SHA51278200ff23d435c8d1e604288ea7e1c543999d1b8cef062fb0a487d6409889ee033fae6fcb5e14bff1db5e7d65bdc3efca42d0c023f45d249b91290524e626645
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507c145f3ac72a0757fe716981414c4c3
SHA199143653efc8be3f60530947c22500547b3c0120
SHA2567b2dde8e369c4d5318a8c0cc7f24b4450e6017065b9fdf71dc2ced165dd7748c
SHA512c7c15e9cc4e3d468792b227a2e7b4b8678537481a8714b5ee349c6b348b3a0c43f7b814d8dfd7f0b3bea50529a80f9af3f94fd92e693ed09d4450fa6049ebf48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578e3cdcc618d760790d259af6c86a32c
SHA1704bbcbb0e710bf3b6127e5f088691d1f8f86602
SHA2562006e6abfe5a157cdcdbaad89aab17e87aae5fd23b56fc03f0bc1e350353ccf0
SHA512a9c53e65c273645a1d39474befe7a75cad9c6937b50a06355a0fbde48cca43da8ffc3604d3ee3c8f9065776c98b3d4699957d7719b12547a22b6bc99bb1b083f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5256911c7445e60901c6d18e068969195
SHA1a34c3ceeb65d1c11d90231359ce7b9aa5f3254c0
SHA256b814f23e71afc912c6b82577d7ab78a6d556ce871927a1d60c9a94066aeb5873
SHA51201a7b87ede39c0dd4b368ed19845ac799c471368a8becfc54ae81634fb3fff1ba966376cc4aff69df8cf983cf6b222e501cfb4374f31593f0dca4ab08b07b61a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554baf6ec2a48bd214e1f49d6bb68f82a
SHA197048aff7b4119524924b72e0ecfe37859177806
SHA256782b9260469d7f189fc2b05d19ab959a386c3675aaafc8a4e4c705a4c6e4b931
SHA512aa281741265e828ebf443a8d61244f029b1fdec25c0e67335c45d6e8f73abf5f4beaf3f3867542641a814f2f4335ef6d714d1ec6b1524dd0d7d994775c1d5f1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cff756c9dc6c88a709fc3d99bc59ae10
SHA1e968428b9f73d65991d50fe8b59c0897c6f0875a
SHA256c779abca6a09de469456b2e13a733c09cfec47ed2f1f9715464c204d3948caea
SHA512214a2a0244e200568dd59f063bf722cdd478c8b69d8ae6af7912c78cd68ce3f87b14900bf377e72bfc9d83ffb10caa18adb934464a33c3407e36b6eee4182480
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e30479dc7b12646237a1f41d9921ef95
SHA136ded36bd3227f3476d428e9be5e9fc8033bf9de
SHA256c1c5cdd1be5cc81f34c2404d50b5340516194515e09d098b3016f59f78732f83
SHA512fd49d4cc8666d50390d0b06bf8922966751957390dd7ab7539df06c3989eb1b1f99ca403396eee08d1caabc5df2c8e9e59d37bf0ea63b55d94730149bfdb01ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591fcb4e4450c72a9c977494746ed9690
SHA1208a2cc951e1444f80c92263cd7317d277227bbe
SHA2565eaf2093453f668fcfded463646733f610eb6e22ff0fdf9b3f655f0852b78b5d
SHA512f468e516416e4fd5cb5f19a99a915fd524d71a8c29e5bad7c38bea13de0990262c3259bc4b59a64da58945a97e05726dde847d20b10229ffa9a472f66a452c2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530d338575065c40a66795f8ec56c169e
SHA15cf02017fd64d56aa7688f8516dc42ce6c139601
SHA256ae46f5663a50633ce8ac950c3e12e103b66e60f7c5d1ca637043f4751e6be209
SHA5121d9aab9a175130c24f9345107e4f3efac191ed26388d1d168d4791cc115d7a960e8de647efed89cf8d6a771ae0cd72c0625942123d314806ba7cb373bd9a87e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb60265c637c3120ea4d303099226072
SHA101ccf57d2958619f237fbb293786ea0e51c625cc
SHA256e19c212156b6b1de76a5f7caa1592fe2882e5dd2b40835b7b6acee625139a9bf
SHA512403fdbe525efb3e61a9352261e1110c846b637cd4cf212398c858bfdeca8ae672c750c15acf7681c241b2ab48d58a9f89ee821b3cf766a891f9ca73e6a2d9da7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc4c933221b9b357a4ef70bb1e6a3524
SHA1a7d1b50ef6e3d4b620056d79e006918694121f01
SHA25679b92fd2db82ead8f04e2d92af55218d84197253ff53d8d5138726abc29ab775
SHA5122ff2029a653fcdcb1548fed36a7ea7ab70c8ba18c8c847a4d2ec2be2ed4b93068a13c3b96739b4b740722c7c3b08ed68e94b37574e846ac94d47071fa12e6fd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3ecec4674f8265f8fa4347a3fde9b9d
SHA141ae99d3d9a5a87690095141d929a80210b3dfe5
SHA256c4b60522377e851a8e7018fff0f26bbb8a8675b8b1d837d4180669e6c80bf043
SHA512544e3d11132fa0f95136e33a8b092a2ec78f8c3cc3dcfc42c4103c7d31664f1fa127d8ba917dc3e41474d50f402226b9dc7f4b4c7fbaa8af45061c5aafd5ca8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5739ea4e9f0b56822d1d9f6ef293b5e34
SHA1fb860d2c1f6200e6e02e5716bdd24e28e123f1a9
SHA2562d4c4e76520fd46abe17cc19fb4a47b30e761472801004731a68314895d55525
SHA512d73b3158369a579df0293d571d44f77ed4af8eee3a6ca7de4f6d1c92d187e5217f93a87099ec75ce0d9c8bf204f5942de0cb4c12117d73a2948d1a41a3ff8104
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ba975b14ac396da40f5d8d28466ce7e
SHA128a577afbc8ee82446c15937d487a8b0155439d2
SHA2566aef80fc03aeba07ab9df7b1020ee1797e55eb8c9b98031dc1881011e75e2878
SHA512c245f3b3bee6230885bc8ec0901cb94c62afdfabae3a667a437ad655fbb3c84b8860c0105626b44c05ae208de771e8ade8b3ee09e70cf8f59e37d92f30ea935f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a4a9932935eb8494a678634337c11ec
SHA178ae536be4b5cd0064556cdcc5ba77f68e2ab686
SHA2569c0cc55d5aa6badf3df266a8c9a182ec313bbfe0f6ec6940b47027cdeef1f9cd
SHA5123b305203416cde54905748fca820e75d8f10c4906df7de8b9114785f1c57e2bf7d97f90601f0e9530f2c75369762fe7edd8c5ba48ea76fc9c0208d03d6801fa2
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a