Analysis
-
max time kernel
142s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 15:58
Static task
static1
Behavioral task
behavioral1
Sample
4be3ff4c3c7ac8c6c5804ef96ba7839c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4be3ff4c3c7ac8c6c5804ef96ba7839c_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4be3ff4c3c7ac8c6c5804ef96ba7839c_JaffaCakes118.html
-
Size
54KB
-
MD5
4be3ff4c3c7ac8c6c5804ef96ba7839c
-
SHA1
384c1817f3ab00aadc70537c273fc1ce6797b192
-
SHA256
4ddb1982e93fe13626df4a646f5f9f10ee4873088738e6bd06783403396a9e55
-
SHA512
d21d02da670b35c625a39622db5008a7077273895cc3085a0c20d65ada8400d826b242bc86c28feaf30a02250c76fea2b92da23988ed54be0b142911b6fe3918
-
SSDEEP
384:K9OxCAS9igovNrgFNL/n5DWuabEY0q06yHHJ8ftapnQ6prpsQUFU0QWuHF5pDuYl:prgLRabEI8BMJU
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e0000000002000000000010660000000100002000000061736624257c35cfb6653f60734bb9105871854e7b6bf05aace59edd187d55cc000000000e8000000002000020000000b17273f31fcb37a0ba3e74fecd4e23a78ff77b0161c3502f5975b109c8f9485d20000000f937a084ce9de881705b334debf66df501185d591cacc90f1703f8f9f18acb1a40000000acd9e0be2f500992f175b79821e3feac87b0e8af0c2c76565833a0b6d3645680f6c7899731da5ca6b3656b97d13162181564513e296fb18855e91808bb214475 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60dd8603aaa7da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{158F8071-139D-11EF-B1D1-D2EFD46A7D0E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422036954" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3048 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3048 iexplore.exe 3048 iexplore.exe 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2860 3048 iexplore.exe 28 PID 3048 wrote to memory of 2860 3048 iexplore.exe 28 PID 3048 wrote to memory of 2860 3048 iexplore.exe 28 PID 3048 wrote to memory of 2860 3048 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4be3ff4c3c7ac8c6c5804ef96ba7839c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3048 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD515ff7f030e571d105ed923f6a383b0ac
SHA18c7fee5e18fd13681d082b4028fa6c6562936aa4
SHA25655c63879165e0c67bb1a8e24dc8198cce064562fa7c1be7b8f0b305b38eae511
SHA51266c2893c1a2bb1f4ffbd7698693c9b4bdad663edad66afa23389978087df1c2593e550f34fdc8701b486279934d8ac0d211e8de3358931fbf91375d63219bb9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512331fb5c80d2946ca6a87b69705e743
SHA1a130c8a12e342535c49a7c60d086766fb63ca413
SHA256c8b16168633533633f9bc532f091b357ce2911d3b0550d14743beb7a71ab7550
SHA51245c53247c0b879662fab60b64bb8e8749e02924d2e4de3d6f78a19496d2ba0e9994d17bc34b09d49d1c9120af088640a585b6d8dd39c837cb75436c41e8e7ce3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5433f679af9b19035760d1f7fe20b9b81
SHA1bd80a0aa07b7459670817147ee8c12ca053e551c
SHA25640eefeb5c75869d1dc0f081a89349d58ae1562f70b6d23bf942582f3bb9aab8e
SHA5127ee2779fabdb1e0a4448108433a0d6cc4a4449387d32fa9727fab41b1207441035aae9fe54c3070331e640edade2ffdc1fb9b74e16e4992f64dd7a5bb261d00d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c28c273a85d2240f5edc38793885a97e
SHA17c267b87dd5c7b1436ffc0e9f7903e4044e86a38
SHA2564e653863e575650fd0cd9bfac5d143176fc56d9cc57d26e640832cb5db7d4e11
SHA5120df28e6019946aa8e0b1d20966f7dbb628d1f469ad16350ed350cb2b9463f13416aeefa946e866cbbbfb64bd001fdae93cf9f26980a93968345c548500799388
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3de85c165cb8f75bf8d77dd425f5c54
SHA17d9376ee5b2e6fae340350464255069a4d179caf
SHA2563991972e01874d9f6762929761e3d733004efa4a6357da4026823dbdcbfc7ebc
SHA512469a566b23484ebc954f73fbfacd58861a259f6ee5e4c700437031cb254475c4806e93f8cd40287d247e17da1394391669e69c3308d5ba5741ed92fa04245c06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd8864ddd54592868a8c5accb769458c
SHA12e57c22b3475e1937220c48a60c6314c7af922a7
SHA25621511bbdc653dd93c4d196907108d663527e86696ccb2b04b59cebc544701b7f
SHA512cdda986ed30d499063c49a699d863f620aad9bae11671aa5e7295562c2f628a2d60b54a405c8f5b16ce7ff43340313e9f2473e25fb0a9a27e4f565e7f9b242de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e1f3d405b2f9da36f8f1fdff76e97cc
SHA1e09f1ef399b68e19c047a6e783da98fb3bd65c73
SHA25616b9fb967f319415df2b0bc1cf617f86aff9596c182ee4fc81a77e438663f9dd
SHA5129ef3c817c6a2dfad39b70a1207e4d378d13d59c94df4fb36b0b0695d7011a9da2365c758968244537e88d31c1fa2c524d6c54f883e9c14950918a9b580afb1bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f647f7b009935668e1e583a43af2bdcc
SHA19835d04c37124ad0a7c0d5a0f842e18ec21b731d
SHA2563fc193134c846a7a74504af2fc26bc01dd9bd5cd35915b9f9db131fa17973991
SHA51293b65ce3c20638b88c0d5e35111ada447398b3660ded0cd1ccc67f8521e8470b59bdb9648d98e9e297598045e2ffe1aebda0d97997a639b9fa27e8a84bdf8060
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd4393b4c928f723bff94234952cbb7f
SHA1344ba4e399800b678a3d3c616f4b07c555a5bece
SHA2566657ee73e27d4e16f25749421bdd569af65470d80128507feb6cc2c64fcbbf4a
SHA5122add0153393ed8f6fa81cc6a036403875b79cff4e01db6c2005e3d84598d8ec132e9369b149497069c732a911fd708ea80c72ffc79bdd1ba7a2d5c59f99c278b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569ef8e790c2e8f77ca13105ecb717999
SHA10f898ce480cdfbdc8150aa20e9829f37f105341f
SHA2560c6be848d1113d1ce68e3acf07649da87d8629e0cdc26bb3d103dd1a4981b40b
SHA5128b1128f0ca3fd1089e89b876f25012fd64720d6b064db2e673cd7c64034678295064ef985faa33af5df4b5e36e17a6561dc750b52bbc4bc47e04608d26d16787
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555c08d63c95186dd66d6d2ab3b5c4ff8
SHA18dd5622ae8e76e37d23ae027476dd6cdecb44004
SHA2560b0d6f4d84656b7af389875b2ff6eb8f8465d5c9766826a94e31c7ae4e087455
SHA512527fe65ea822368c507dc0a209a54304229fc3888c727a1d3ae7ed6458451457ac7ebb270276b624e4164071f071063ef3a1ae2e405a8506b06baf463356a598
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e4375812f24ed4625b79ecbeac02dcb
SHA105c0b3f6acbef4c8238fb9a29d5b2197a4f29c07
SHA25669431bb8e247f6d397e94066f3a68397f855dc274307b615fff92c4cc747ace5
SHA512a640514b9e244468cf85db29f7e17cd9fe6339d77656c77956490162d873f9b5f054b53905152856b696870c27052fe89590ac618360f7a19593eb4922df78c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fdb04becadce96c5235dbfb76a7e0312
SHA15e6de32a9eeb56fe5ffea807e4c6fc90aed48c44
SHA2560cf00973b8db01bf79ffaf94bbe4aa6fc072dff0cf046340a22266da6afa8c22
SHA512815a15ad5057e6b9bec5fd24b3529bbbc6e060bc7ff2b777fa7829d2add8b649906174de637f02ccc95c054386e0f7e02ecda78233766d4d2c35a1b9386ae46e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae877efd43ffb7485519755e4cf5691d
SHA183c7446dd34ca7a9bbe1621b414e908460d0adf1
SHA25622564b508be2549d798735d5e29fdb75fbd8fbd05f05447860d0a6eef8970cef
SHA5126e07a253a3ce9875c34a1ec8571a01ed7260dbb7c411f0b8d447e236dd729573b2c9ba2a63e55a5b3e185d820066b21d773cc9a471e00dc43f5febb72ac13d78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c4bd7eb6572ea48f73c7933589ecafe
SHA1a5e26791d435a41169476985b9e0ea20532705d8
SHA256f9266eff243f4d05f893fd91f559d64977e4dceab81de291ca56618dd92dd65e
SHA5123d531f445cbf84c60856b028c2b41902484c12915b348d1a35942144c984cc6093ac57e43de203b481b46332ed1d9d42bbacf1eef40331d0d37628161d2c15a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501ee6930dfa24f4c1b64ec39245d1b08
SHA1ba9897c600b9cb6c975aeaa7567f323902fc833e
SHA256910dd8995076fc8c7287148a6acaa7f712f17e43dac60400e41416e7d13667e7
SHA5126aa22b36c0d6d82f4003dfe4d7bfcd1f24d411ce23d5d1723d8582b73653df410639f25a479f2f0b178ac6318c23d3d25255c84843ffd1ee642cdc54e87028eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5a5c2f8250f791513b5e6d25c3b5eca0d
SHA125504da48818b729899066f31116d0d0b05873c8
SHA25637a538748e0df459bc849cbd449be1c2560ebeed035ef86248ac96b972d6604d
SHA5129532f445aa7e54ab365ad1e9017cf067b71fa2fcd1be8a30031c21d80e7ea99c133eb233b381ae0eafb9496f04478433032a41c3d1f9d2d2ea6b952ed33bbcc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD50a60cfc20f0c8caa87c947d5387d1076
SHA17dd231684180c435eb5ba47a0378c73e416a3fb4
SHA2563b391837cfd30a226effa156bc8835a8ca36e077e95f574d4d34d46ee6cd64e2
SHA512e2059d8d1f937349b78d04320c1cbb48087a5354d8219a806802319fc53a807d32995c67d84af04529948661298e400e0fca7717a3de36e792e7f76c8bbaeea7
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a