Analysis
-
max time kernel
137s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 15:16
Static task
static1
Behavioral task
behavioral1
Sample
4bb8e6ea39c370adc213bddfc033581d_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4bb8e6ea39c370adc213bddfc033581d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4bb8e6ea39c370adc213bddfc033581d_JaffaCakes118.html
-
Size
56KB
-
MD5
4bb8e6ea39c370adc213bddfc033581d
-
SHA1
9613d20102461df355fe4162d343046d2affd665
-
SHA256
d44cf2dda0ca05748257420e4924c9f2b7ff7297cebb070368a6c107049e2419
-
SHA512
593f0f81a29026e9cbd15ec27bc7d85d27141f9beb386c15dea3c47a53289302f119049f88cc579bd328d6988951abd994c000fab20b9c7549ce4be38a1af5e1
-
SSDEEP
768:SU5OhnVng9ccY/E3YGQ/TYGGpaI2sbo4OY:SssndEY/E3YGwkGGpaI2ss4z
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b09eaf51a4a7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a230000000002000000000010660000000100002000000087b1c8b30a1b3bb66c926d4cc6843645529b6fe90ffb81c0a1742026728f51dc000000000e80000000020000200000000679126e7d207dfddcd21f80de281a2ba5d29abad13ca1a9ddd168c55dcd5ae020000000f334e46e8e03b662b9f850de2c0759141b44446eb6e2f611d25df6c2715c904b40000000624b6f413bd013ceb07af07d660832e14ad827f7ceacf8e0294eefb3b41817c3a212666cac1ca15cb55d2fe6d5f103d517f44b32f0ab90ed495151bb31310c19 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3D6E6851-1397-11EF-8C93-DEECE6B0C1A4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422034443" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2980 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2980 iexplore.exe 2980 iexplore.exe 1200 IEXPLORE.EXE 1200 IEXPLORE.EXE 1200 IEXPLORE.EXE 1200 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2980 wrote to memory of 1200 2980 iexplore.exe 28 PID 2980 wrote to memory of 1200 2980 iexplore.exe 28 PID 2980 wrote to memory of 1200 2980 iexplore.exe 28 PID 2980 wrote to memory of 1200 2980 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4bb8e6ea39c370adc213bddfc033581d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2980 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1200
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe08e75681ce0f014f4d4c3cb0c72b5c
SHA16f4128ea91b0bfe49d360915573c2fd140d61cbe
SHA25640d49f93d9220dfd51b10c22f7134c03278bad2984fe20c1354213b0b430a0e5
SHA51225c6cc49450505469790c0f2573aadbc848f8f3661788b3d42665b869303cbc007fe7ca8e180c4d03101ac42ce716bd5266031e7120c8ed3614aad00844d8970
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d152732c9283331c9480ef8c3a62b5e
SHA1b3acfc83c21f733d0064aada0d16248ff1f3fac8
SHA256db66d746062fc194288c5c707dd998139952db50b541aac64ea8f831fbb7307a
SHA51277c81afb65c046b45c16d3ada98feba33b7f97753120c858cd9a18611430b1ee4c2da8b3bce973c6e5e5f8455104107c83e37aa87a144426c528cd3dde90bee5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5339ef33b7bfd0633e928322cddf6d2ba
SHA1e43583e0226f228e25c06ea3ea714f78654a6b15
SHA2568043c68612c2a22fb9506ee3854422a5a81b07e731b52a30e57d653e96a1affe
SHA51254a10bc9d6f332834f74eb84ddbc10848d3427346b150603f1be38f52be6e36ccf7fcf3d28c8e9870e97241a8ca55585b1883f292b1bebe384a4f764c5c9d456
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce1b464a8e20ec6672e43d26bc31e929
SHA11dad2c636ababdbd3067018f64a7a4c827f84b90
SHA256667c9b6cd67901512daa5b21d097b05634b26904011ac90553e3e1650dfb42df
SHA512be1be958eeeb75b9969f205d79f3403c12b5614b8f4dd5d7a005b03e373a40bb7b44a3039ac00cfe9aec9bcfc4c50e413978049e24a7266e33066d5a2b01bf1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522386ec3e07a5f19f8cb339bb2806911
SHA105964a32bd0ae6f1e5771409f0c4b25801c552c2
SHA25652fb9064f14a67379f3b1380e410623ca803877d09db05d59853dc37e0abfced
SHA5129a438a33e881cd80d52905431ff6e9db59e6ea0219c0f77018975e719a72b22311aa3fdd42385bca4c97cfc64151a0955ba7e4ec548938d5f816faf897de374d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592ff2b4e824470deae85960bf2276b93
SHA1ff4d7c8c63c563bae43986f74745c860652d15b2
SHA25694e02133fffe6f31510776d209b5477540fbd7fc795f76d5c89a8cdb5ec43366
SHA512fca451f9df9298f70f01e7341eaf2db44e33b5bd4680510042b808013a0d3a9d26eaf408e2482c5afedab48f762a915c5a96e88a495e695b8f06fac9d83d9656
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b10c3b1f2bdeb4143dc41dafebf1d6c
SHA19968846ffb64d17d9b4f8533d6f9ba0e325bdb27
SHA256a5c3b2e4f51f4d66f1691a8da4f90c0f9910de4b8b99f4cd12bc344f23c5f327
SHA512cf8e8516e59687ae074128af562c6a3446ec67d8ff2bc9c7c8375f909581f6b3f9d6811e324d067157ba5b6c88c99e977fe0ec3f6c42672e6946bfd2a713acf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588f6963bdaf86ab6a4a38d5ff255364c
SHA166e5f54fafc8960e8b6d6d9ff0981ef4b581ca17
SHA25634301b8bef27dcdcd57daa96a1a1a3bfd4eda3a2c62a8f7309c504eb3f3f98bd
SHA512b6b6d64106aab756bb10b0a68d754937f188f69056c440e738d8600f6df10837b0ff1f14237e72fe3d8533d83ad799a90b6dfa272654efb405b0213696ef4e45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516033bbec13059a750a50094cc91ac8a
SHA1122e598c0871a443c002dd9b3bfdde3a853d4526
SHA2562180530f360a8da487e328ea18ff6548734b77a05bb4b844b12e16e8dbfecfc2
SHA512387ac14635c0230526b887247d74dc753c0c4c48bd344406709d976f4a90a74375e8bfeeac2aff3b5a1214dfee566bdce838bd1b8e98c275f041447e47cf318a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ac2ff64e82602bcdb2e03896d8d5cdb
SHA1bf493e7067a1f8f52fb73812a35a7b690214af03
SHA256caf0deb6d933325d218632bf6bc817e605143eb98da4b0d898c04021e907fb11
SHA512c97af4d29f8000fd48fbce7e88013c7499cfa73b824e4e46a77e6365019fe70cd927b2277ca6685f35e2f0a9d6a6f274eba8203329a6798ecff47e15ce4eecbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e98279a3b1861391bb1db0ce129fb319
SHA1fa4712dd9a27db683edf8aed1c701dbffd065588
SHA256645f411174e7724840411c092c61e737398f972947672e5929699fe60401cc6b
SHA512ef6d1bf0f3444074ab50ff08d4fcf46d2defdfd29715ac049f68f4cffb39b8a622b20ff0b1918ada8872df1fc7e7a558082bea82ca776487597f592e2091c4ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5557308bc747edbfb0a262976ac4a262b
SHA1eec537796fc9b55f0029603084c0c07136f56d41
SHA2567de8e66a14c065864ca825a1e205d12304dc292259adf72ccf86bf58e75e476b
SHA5121a3fa83b9a53ee723488a11c54e778829e35d7c6a19678a714c3dfb6a9c7c1427130d14cad98dad0570c943e719a29c549b6e1e3d3a81bb2fe41865e6eb676d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b9e0e5b9052133b6ed4583b3944f851
SHA19e90c7748ea89f6ee0a2081f58a54cbdfd86bea7
SHA256a449826fd87198f98c42ae6a4894ee9da71ad98cc686b5f6a50b9295bdcef8ab
SHA5127e862d2645c6cb90eb47e6fce8c75546f4f12c575a0ae4db487de3c8e723f247395c09c5726099eb862508f63ca073464c164133e1c59ae16a9aeea0f36303e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e692c9d368e36284f4ff0ea157f61cf
SHA1d5cca75ae12f46b01733140b8cc77b9582f1953f
SHA2564f3a35228830ad48c2212450d321b0a3f24c586c065290ba326d1904e22a6fdc
SHA5127de755931e1faee58955a7f142d66af7ff4ee5b630d1fb468f38e86cf6098d31d5a8fb44e10fb419dbbafdc092a3e5f71ea5d479288c009e562373b49a79c1ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e0e5946606a27bff8ced56aed16dd03
SHA115347586bd9c4238635c6e39ed0f35e3c38219b0
SHA2563568c55695ade2b01eeb5b595119753c8c0ded884a1142b1b18ebfdda58d818f
SHA51251810b319ba7dfe5535560ab920a25715ed085e1574f7e99ef4d7a13378f10c5981fcf5fcfbe950403bb9501f66f9a324f44d4a146c6290686e46c125e368d8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a718028d2ffc07ffdaca4c3b7b79bf2f
SHA19c12f0443138ffd6df647772c86f87d2abd035a8
SHA25685341268fcb36df6a8a2e40a5005f2dba0ece193fd2ae0100119afca5a1e4e42
SHA512c97701d1f84c9b7aabe8310af5685d366b86ba08215164ff70f78c8fb2271ed6cd5073a07e1996f53928423937c0071f777030a8e66d924a31de119f4ad29995
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58db772355f3554703dbb0ca78fc334e1
SHA11aa08ca089e495052569b11880c52747f6116e42
SHA2569a1afe54bdae27ce4372e3b390e78c2349af4d375b08ae655d04c9a53f918feb
SHA5127eb177b225ed5f34c66a4580ab0a6d6f6a00fe969d88dad68e85cf4945e8517eda0c2e571f6bc0e4bd5b957114cf3185fff833db1d9bc26e951213f6f30bb73a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5064c0e913c17f731bb3b5f7a9dbe7bb5
SHA1c52a6c940ce69128dd9359d47302c592ce3e1bca
SHA256dbe8db748cd007c0cf48f1133f6c252c8beb2af658e482db096a83c15b9b6bcd
SHA512109a29f83e9969c08d279360b165fdd2e92f70ca32a954be222e966b13d2ccc967161f8aa031bb9eb24f0dd977e2d27bf2a55d05f753c465ef9850fe9f313abb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de87d8aa29c5fa3e7b9994cf79e77d96
SHA174040059d788d3433887da1d095b4d5db55e860a
SHA25688458e9175904bcb0a0bc0107ec437a30902323b153e9c4f5487d95bb541ee8a
SHA512401a355f9d057e96055f53b224e4aa293cc7cd70157c1c67b3146dd97d34878fc8cc5b54b25c1ff9ff33412ea335fe93d231f39a3a3f76e5a375255bd801cdc7
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a