Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 18:21
Static task
static1
Behavioral task
behavioral1
Sample
4c6eb84e92dbd45ed28c57e6a2793954_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4c6eb84e92dbd45ed28c57e6a2793954_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4c6eb84e92dbd45ed28c57e6a2793954_JaffaCakes118.html
-
Size
20KB
-
MD5
4c6eb84e92dbd45ed28c57e6a2793954
-
SHA1
3b508497c3cfe47624d53aa51072f54a6a6ae252
-
SHA256
907dd12c88f6e958d66c130c06b4b86f37c5ce1d4107bfcd81fb5d0ff0e8ff17
-
SHA512
7d1aabb2c6c2145acdf5d6563e137fb9acbc16eead35d265f768a0511171367476abbb1a69a7f6ab2dea73b4f8a00d6667a0a5295b8b967094d3ada6ed26bdd5
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIy4AzUnjBhMm82qDB8:SIMd0I5nvHzsvMlxDB8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422045542" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b05dd016bea7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{14EFF501-13B1-11EF-91D8-D6B84878A518} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e93610000000002000000000010660000000100002000000094393a3a33e42af772a48ae06a298982d3e20c9e98a8edbc869f26f3d437ee73000000000e80000000020000200000000b1fbf56d9d38694dd30e6c53b72ef1aa30c769759509a0cded8b23c7840b7d720000000a27f8d8848c826718a1d7d847bf6cd1c1167e23b920354052173ed97a0f71c344000000087cec4c082ef05b3ae78e7f39bb7b0f71eb17a9c0499e8fdd0de04da52f9c8d8f4359d64c54c431b6938552eaf4637b6f48a945e7f6dbfccb020ec2cbe85fadd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2140 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2140 iexplore.exe 2140 iexplore.exe 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2140 wrote to memory of 2828 2140 iexplore.exe 28 PID 2140 wrote to memory of 2828 2140 iexplore.exe 28 PID 2140 wrote to memory of 2828 2140 iexplore.exe 28 PID 2140 wrote to memory of 2828 2140 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4c6eb84e92dbd45ed28c57e6a2793954_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2140 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5201897b5185e928789c9c0526eed4345
SHA16884953c0cb52848443ec3a3b00ef222569e11f8
SHA2567fae1c4a1950a1877404507a1b3e67900c9d5d637ffa2fac9b7da425b5ec7a76
SHA5124e5086c7b6747e39dc28c31942aeeb3018ad93d19c7117feb9a6e3f2f1f6d9781961d4f16b694c0c2078979adf3d890904fe2c3111325a4f6beb7f87494e9f0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58720dd9843090099a67a192733dbdd61
SHA1ab36a60d29d87a1d75dde847c8766262e774dd5a
SHA2561e89f6dc3fc89b513e2848939268e9aa31dacec279d35d93f5038e98ec4197e2
SHA512b4f95e5815aa78ea22268b32844897e485cd175a5589d9f21670a6864a1d172d9227e6188beb333ef7bfaf9c7952afcafa4bf5d3b0460c4da045c841c0514ab5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c235940a454d2ed51b158f82b830361e
SHA17ef885b547173d8b582e18e116bd89532c8b0ca8
SHA25699a5736bd855e1020682df424220c9c394471d944597f03eb70807ca24fa6550
SHA512c9b496501c1f1e8a9c6f477840f3d1cf870a74ef62ce2daeec86078a03392a2415b94be2729282af033c17fbf792a71f01223f23294e03464cdd1056117aa960
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515bbd53b30cc57afbd21283538925958
SHA1589cf386396300f36737723d837f6d99b5d27124
SHA256044c383ebec866806426d093e02575df83fa91a41c71166b6638631e64c69352
SHA5125128b635c51d7e07efbf8a99a25c216e766298bb2bb8d05385010cecffa903ee026ee944ca9933f6314504eba25b6a8d74096e752782e09f5fd904976f2df803
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580bb11b2b326986a53748e83a9cf0ec2
SHA13e206b957e1255d33805944a9f4a0672bc6aac81
SHA256a1c3353f45b0e3bfd3343e46038de34ec5f939fc406f925cae5fa4d4b1efa509
SHA512a2ba7c1218e60dd030a7ba168ac5237520405072c8399804e0046d511af272c80bd8d5447c42486df18a9bf15270efb30aa7f825f517aa9da6efe134d381c946
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4afaee5435472c4f0faad8f0a0c1bca
SHA1a557a3d3e4d40c01003de0104f14a0b39c8f2b4d
SHA256d8338cd7aaae5318925c10fdb5f2876e6d5facf5ac5ed2c43ba31bf891118d13
SHA512860e22ef604cae40e43086fa21295dca55a16dfc9ac3e428fd0e0def95a8c392f54203e3e5ee3a2a3776492f05167e762bffec921b4ef812d63f5664aeb554ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7a8bd5f83c83e46dbef80294a5011fe
SHA1e619aae8340a82697b585d0cec88df87a5268b56
SHA256eef83f77b7fc0490a32f9b668d02e2fb62b365837d64d557b9d5579c70426034
SHA5120e9fa23840b6b72822cf0e428eec6f929f1eb158a0490a9e8602158fff7c976b97281e7b11aeb61ac818413739a32e32cd81febaa407b71f80cdba7af3cfa25f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4bb845212c41eee12d9a8affaff3cb4
SHA18c2c2751e25fff0c26b21cdd8efe62c1ea33a513
SHA2568d9de8683a596333a5c63afe4857048591c1e4c8c65d733a29c236f551d1c413
SHA51246151c856823d477cdbc7b684972abd81b573543e24e2e4b40b06e77d98d67e3205ef3e5fdfce9e55fef5793fcd18a708e91b57b099e311143d26c89bd28e215
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aaaf46e90344dc6fa2e6fba22d3849f6
SHA11fb5fd88cf611752f23923dfad0895d040322512
SHA2560f1c6e8664977414ad92aae5df61202f64553ae384a6d5d8866561b3f5214132
SHA512d74fa30218b08bd2e1ae98f3cdfa017b28cbcf3f5ea358ee3ceae7e3876a2659bd2fc7652e6dde23ed2c027b6e88c029c8bfd11100ab4ec7abc8053b4c2e2e4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf7935505e3e61f83d0323ddfaa93136
SHA17189fe3455f69eeef36d0208337218b6174bdc67
SHA2562d0a4f604c4564cd1c0da1091653ac79fd1c7968e44b447be761ece9339fc617
SHA5123e1c4b4642f5dfb24ebdca19802941af19836317c24580d5407f2a054bc22c379244601cd302ea4e73451249c6c7ee9169183f6a3518bac7581c04d40d72a694
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e237f3ad9088dfb65fe75d82b4ac6cd
SHA156f0ac7aa0feb0ced65d51fd70f131a66da2c791
SHA2564660dace677c06bf5a190e9260b60e1e35b0779849730fb6887290d83fec4cb0
SHA512d9bb1e45d03b79d44bb8bb9211e6f264e3368673f62edde57b427457f6e9418bf99dc1bc44d191383647012c882a535de5135109ce6f1de163d6b541c85111b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e541729e2b26e9f7f4d91ee1e3dac39
SHA1436dfa3031bb7c63698fb95443d2ef1d3c45d890
SHA256d14f00b893814e18de7496db5807bc38d78ae1271524ae831cd0860c1e47d6b7
SHA512c6c59b04f515b09debc39fd35ddb21487dcfdb81cd66d5ccab2c408abf33c53a57107bf4c5bd6b1e70c001b8d8f081690b82cc624115ce95243699c6d2f0d857
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57457a7d4038712a414bb8fd76622dd4f
SHA13b96bf1e9909c1f2e4629aab38a71beca729895e
SHA256783b5193c2123413e6d7b3070aba2a10ec5462ee4383866745c1a5aa4e709338
SHA512ecb7a2d355bc78c3af56606be68361f3d042f0f9728d46112352133b07f2e56763ada5318225fa4e726ffc855a720f614900c9e732857df7c0a671f53155b15c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5824530d51fa191c76df94316ff3f28e5
SHA169e3a90149c8537664a43b6febee82d73c22acfb
SHA256eea5b95b002b4457ebe9e86b3daf7199aebdafc8fbbdf52b1c754912d13ef816
SHA5128094c5fdf222f888351490cc6924c1b0ff049eb5afa8f1dfd6a88f5757756dec9288642127fdbc9fb2950e8a37681bc8789288bc26aacc2eee327bc6e807f524
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5642f20575366d059d19d711488cf62c6
SHA18d29e74bcf0ea46fc45970634e92f8cd960aac35
SHA256faea9fe9088aeb76800bb217081224e3593fdd46277bbf70edd5c5d70f048aa6
SHA512b26b65b2d5785a951a2fcb146370589a7cb3d0b9c9c0e1501966470de5b10bb5e5685d8aa00b19ad6428a5991417e5c7c934079488154b49c992bf65eddcb806
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5725f64548bd6ffeb460f4637a2587dc4
SHA1da5e7aacaa682cc0034d38e6e157b7fa0efd4638
SHA25685fa528d948df21a06a654685cd031624b80b7edcf522c81ad484cf8fcc39698
SHA5123861763a27389996fea4bc0748c481c4efb34e50751b74c5caddbd8ff778fd4998c25b647b9fd25d393524fae143455997ec3a4657f0fa1037d0c8474822c2ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557ab56838f167cc8cb76f9582db8a5e7
SHA160a9fb6cc4813b5301cf1a8dfff1c8738fccdee6
SHA256a7ea36d827d8651bd36ba362fee8152a5462974385bb6bedd36e684a39ae4c02
SHA512c81d50e4f1129f3ef6fc3b806de0de030e2cda4da4a9f01bd81e4876e658c1329b8aa6ffbb5637b99e34dfb921079fb877d387739ebfb74a0b6b6af0de2d912c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503e6cbba862236bd3e893b3ada608842
SHA1d8b7e0d5299fa80f46b4a18a99192666cfccd3a6
SHA2569be93008f4ba42bcdde82e4a308466ce45b5589c035028c5bf8f03723f903b65
SHA5123424d7001f73898ba8c31803b1e23e4190973f000afdb84ab043557e6d1df64a0fc397881421a914e597dec381abf2c7c73fd345ec20bc6d2db843406e83b9dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a158deff4f99f61683a965e46b006bc
SHA19db39dd152c80275bcf9419913daf3d28afe39ee
SHA256b19d31c5566021f11ec3a019da8852a722bec3f94f4a68d243aa1102c5b3ca5a
SHA51274b41c0beda87f7b4d8f9e75306f3892a75ce3f34fffdb7079e632133656fbbebb416b5a42a7162a8f498745035c434224224ccd6246d2eb487f9893a7bc28c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b237e1dc22d77e2d6ee500bf1a715c4
SHA11f574ef5181a8febd5a1ee7defc163f07842430b
SHA25679571250c6c925d5a0c96106d41d9e4f857548522867684415616ddc5d0388ac
SHA5122953010ad2fdaa9523d80c1f5b5c90ae74dad6c65c31c3fbd789ac5a302cf105669b4cef7c655277e3c98c24f04df0e33001d47bd50fbd6eedbd78357cc7fbfb
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a