Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 16:36
Static task
static1
Behavioral task
behavioral1
Sample
4c08ec5e4efb5849b5ee4dba252f1f5b_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
4c08ec5e4efb5849b5ee4dba252f1f5b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4c08ec5e4efb5849b5ee4dba252f1f5b_JaffaCakes118.html
-
Size
4KB
-
MD5
4c08ec5e4efb5849b5ee4dba252f1f5b
-
SHA1
1cd08541f1895fe7af331cbd75df91f6e9c4a4e4
-
SHA256
e90397c32a62670ad55b519e78f82ddf8e753bffea2fd99728aa46e7874b869c
-
SHA512
54812ad4eb33f8a5a3a03d89dba97b8566acbad729cc5ac7452a88369e02aa4fd74da6666502fdca0740dcac3a24ab278db413ae833ef3ad1ddb2e4369074f0b
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oY6URLnR:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDl
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7C4B2D51-13A2-11EF-BE0C-E2E647A5CFB6} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000f62071100bc1d8982f4e4c180c26e048517d6eb8d823df7a3b42b1d7a5cf605d000000000e8000000002000020000000f7b50915f2bf099daecc4347172cda76c435561478f0d7651bd570fd8bd970cf20000000a0e591de6a92b3108709869422bfd2edf16fcb8290a92599fb7014fe831fbc6140000000f282f9bd102260a5bbfd8b3677df5ef0910314ab0128cdf852e8c71d104ca27e37ad241330f70a4850acb95f4bff758120a95333fb1e8748b3aadff542d6b5b1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6002d850afa7da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422039274" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2932 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2932 iexplore.exe 2932 iexplore.exe 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2932 wrote to memory of 2564 2932 iexplore.exe 28 PID 2932 wrote to memory of 2564 2932 iexplore.exe 28 PID 2932 wrote to memory of 2564 2932 iexplore.exe 28 PID 2932 wrote to memory of 2564 2932 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4c08ec5e4efb5849b5ee4dba252f1f5b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2932 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d39d372ed4bef58a14679a66c55d245
SHA14e470cc8d0eaadb3f5887383701eb1ebf3d56070
SHA256abc6c6ad80ecf2622631d27062e2ce298aa34386b51763701fee67217976aa3b
SHA512faf452675aebef215f4414be8d91151306ea439f488bb021ad7e992b0c1bd86144ee965a78cd30c2a49a6a958ad1d416454e6a49c61748346a4564d035eaa406
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aaf582516fe6fe0b57f1f9aaf65755f4
SHA1a35b2de0e3fdf0c1d12e373a91606dff9f8e1c55
SHA256f0134e215420d8905b0182b5a96cf2ee1f603c1c5825415a49926b65852f247c
SHA512fbcae43a9c03dcdeff6e48d1d9185e6841fef6fcabdd892e34c07a9b402daa0fad4a37a76745273d31e5dda3d914edd485fe340ae864c27cc809fc378d59f988
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506fa1f3195c782a7aaf5036fa19f67e6
SHA167de1ade4bd028a4606e8b315e8a50fd937486e2
SHA25654ae04b881f3c345cb1e1656e2dd80bec710523118f456b818ea5fd45cf852c2
SHA512c2b22e338eeeaa11800615fc43a1c4fe8ee3808b5e3dbd1e171c1c58973473268bde2d4ba2ce140d0747cdbcbac1309c1aa634645ed33ef50bc84445ca49d591
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2df97e22c0603c980ad5c95cf306797
SHA1a8f2d44a45de445e3cf9e5a053a82b89805a8ac2
SHA256e005a04855947cdaf467b121647bdd96c1be5e19c8a1d3da2dd8305568ade1d3
SHA512a6a2024d011a9972107699be54be2bcdcf2702029d463dc98d3a9f9cb0f1c1af8dbe96c65db9416618fd0dd7abe9d728ab90f46472f6cacb6cdcb84aae9e74ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5097c64819884e3210713edf4596bb33f
SHA1a65104eb8bec691ca29a0a048c7b757ef890ce51
SHA256f0466954477437bab48f9d36e984d44326d3a29922b7a2c4f6a0a1b6cbeb7982
SHA51284730d7586067cdf39ffe108441a691a51ae0462a13005e49be36e5790b72513508ea507828181e945d2dc479872ad3a890797b6ab98dd4324be3f83f26094fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c30ed917cf460ea2f54a4769178285bc
SHA175e4e771599ef118f2d4c3541356ed46ffa3634f
SHA256a2e4eb9f2b76f9523fb129f37e7c5b76eb9022cd8a6f6696737b9332ea1d1625
SHA512e862388e9b0984a3c413c7532126020ab9265b34ccac114ec37242444cf666d98a49bd3a57e1b4299726d036313a2c1091f44eb558d5304d7601997e6d13b92e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518237e08e6a0307332640836efe44aa2
SHA14263f6e23bd7b491a4e97b0c9cc0997ab7e5e738
SHA256682d1575a344d48e28c25e87ea500beb550405a43d814671390734af13dd8b9f
SHA512459bef61e5e78802ea801d7c18f8ccefb75937a9073b883f1de9e77e9583aaf6222d090ce56fea72f00eac1fb2fdaecfaea0e1bbf84f3630ca7a4fb48b7af3d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581638662fd5c63704fefab32aaab5ef6
SHA1f97c775afc4ec7ffe29eda13477bbce7389cf752
SHA25630c12169c19e3aa977bb5710011d0dced4a04bcf89a5fd294b4bed23a2edc9e1
SHA51231d0407c10a1812847e853d67a8185d896fbcee299d4093e09bbaa806750746e060d6aa16dd8c2b15729dc34559640e53fed63121ccaf5206f4500ebccaed341
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f942d38f91a4c727d4ca67a6d1eae23
SHA12dbe27d1adff3d0ec138c9a59c8edc59066d59dc
SHA256e46d556afc10ac84809b0a42109c1ff9468da476cc514e8166d5a14e57a96c01
SHA512d2d14cdeb68cdbce2db6ace53f808c452dabf4c34f1f174ff8158a09b038799aa777a74ddec5a207a4a07539096506865efdd36cb6a1a325d349a22d072d390c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c11806cd19124957120f98f055fd3e2
SHA1df48e081931bece145c87f842d062f8db3011766
SHA256f0b7f2f9c2db01b4b53cae32e10e2963cf134e02f613846ee121d8a6d2ab6066
SHA512f946de6245cbf8d46ed35b436cab43d27c04e54d97c442bc34136475310e2eb12c4e5f22ec6888420af0e076526fb79fd88247499ca10b7878505983bce2bdf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b65bf690a575f28680b6c94436bd8166
SHA1ff5a4c4621c57740d92dfaeef75210037e61e9fa
SHA2566eaebb4759b6e37fcde26ea0deaeee28f96338ce48173c335cb37e890becc96c
SHA512fc74577e423eacf9937e6b971bdaec529cb39c173d651cd5bc3d7d5e093290b45be3ff20776e986d013792c4c59ea73cf64d51b932d9391c6d03f4392647840c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a9708c81dab96bef6708db1986a67ed
SHA1be7fd6d616432a8c1c2af0c7ca207c548c5e6259
SHA256ebd2fe6dd49213795479d89b69b286e3a930ac1dc73f6f3fc1b824ebad1be076
SHA5120d61666b6e967c357f288c084588bcde5cdebb919d95c57e9f39b3609fa14346922e42e661e4d7fe87db082f4297c25f72c45fa824a6fa5dbe62f96059aba667
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553372df1e7120731c73402d39b9d2328
SHA195592aba57b054742743020c1a7f4756405f360b
SHA256dc78b9e017785ac348859e86bd64a867b37e5a1a10b399b0344222eb0c552fa2
SHA512d4184c3919c43125c763398a8deda63368ac6be75a18cef1eb50a60761fb77139ee364fa9cce58212d69eca68d4bf9984bf58e1d471903fff33b198261995d1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7461fdbdc1f82fd019bd4fd96d4ca2d
SHA196c13ebc15ee1f66a7a048705d9e65ea4e43779b
SHA256f861ec784fa60e9d51f3d0249f37bedd5351970a3696617bfe24a2977869e1bb
SHA512dd5237bd3832b32ee4cac202504be665e1458cb027acccc0c8baa7290e16d825806f83374c559180fe2e27f11c82796858196725de55ab882d0aeeb8b0048b6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568fa53ba45fd613422d5330d299ac138
SHA16ac32bc48ea581e89d7dfabdef41b35364798d0c
SHA2565833dcc91fcef84494127f4d877457fe0e2302f1bcc7eedfc33c2c4626bc7edd
SHA5120bc377c6b050c019fd6284be44713a4a2b7c320819d2e0cd7a31f6fa2a6f3a57cd8138aa29127d2807cfcc0b5b5db42a3474cbbb0456f36c33fa55251150b4b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579bb96385028bdb3b02310fc4242deec
SHA1631d3c3cff21d331e8a7681cfbdd7fedd951c1b2
SHA256fbb727c6a134f62191e29a4608cea63fba73f5bf790eed67630002471ff55791
SHA51258020f689188b24a9a348348652c0d12ce23e0a8541e8fd92985aed8c8fd23d3ba0c9d9d725a9b0c0af104b1e0fde08a9deb7b986a5dbc019030a2db2c4cee58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58cb5348709b571955e86aca9b2097a84
SHA1c50416cb62f6af4f1c0def7380859bddb4f913cd
SHA2567e2194a609a6c699227b65bcf255512962e31bec3ffdbb0863ea3a0fb065b68d
SHA5121d6a5463ee97f871bceff6fe5405cd742671adddd5e837241cbec11e32b892ad4546fa6754d893ee1f444b86ad103e3fd76cd23f18a4db45cf9a5389731e9a68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58480a796bb638dac6bc7d38ec80afdce
SHA1ebd19ab07b49f99b4efeb28793a25a06281f9667
SHA256bbebce8c3afd2aed82fa16e12e6a25e4755a7f3c826b90557c0a62601003824c
SHA51286ec5245ee8c79d3b5910074633e22ef55dea9ca8f9949eaa1afad92700829a2488143f6ebf9cb432b45865b79357ccea541561593364fb1109eaebb9b93b024
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ec3aac1e1a33c8ba9093f6aef71c638
SHA1ea276a9f25c28433f5fbfb831f8286c2063e6dc9
SHA256d66a173ff5917c1d43d90c620e195f103c928b73149eae7fd56ced85e9b7b205
SHA5129399e81b085d84c89dfc281cc965966f3febeedf4c22404f953cf574d1ab352901bbeed1777b73be7ef774bfeb0e8c56cd288ef3ccc73d9dff4e782f36b6aab5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a