Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 19:24
Static task
static1
Behavioral task
behavioral1
Sample
4cb047422332f8a922105ae6ff732604_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
4cb047422332f8a922105ae6ff732604_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4cb047422332f8a922105ae6ff732604_JaffaCakes118.html
-
Size
162KB
-
MD5
4cb047422332f8a922105ae6ff732604
-
SHA1
263a02cb705b173770e2ea14cefa1c4e6f078c97
-
SHA256
a3c2aaec11fb8b7a47adec44f7886dcb9061b09dd9f0fbd95e343f82f6594b5c
-
SHA512
0981c03f32711e4d52f57ab4d0a38047eaefd24fc555f9d40ddd1939d6692e2b577b1e91f9ca771edbc0e083296ff4de563921e5d969a16638e3f12c2ea0094e
-
SSDEEP
3072:Sj/drtl5m1zXpU61MMWYilXrs88W4Um3QfwyUAOSA90Qq6NZtxtRtCpHRLJfxrZO:SjFrtl5m1zXpU61MMWYilXrs88W4Um3x
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422049350" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F2174701-13B9-11EF-8004-DAAF2542C58D} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 604f07f9c6a7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000342313914bea710237e9f7fcff02435f6595aea85432886860a4d2b8948c1bcc000000000e8000000002000020000000598e7ef3625bc0d92191b0dbf67a74f5747c1f0cb157e68efe087eeacef2bd28200000004029a57d3b708e70899bae9f1e2c6a9627b78665814d2d52ef767b216cb6c0fe4000000052dee187bb5d74c122dbe63f9eb1a811cfdcbe81f2a11b376baf1e059bb084c7c1c9ce2ae1209c5d0a3642b25c1b199c9c3fc342063d49d525e04fc35492d4c1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2288 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2288 iexplore.exe 2288 iexplore.exe 2260 IEXPLORE.EXE 2260 IEXPLORE.EXE 2260 IEXPLORE.EXE 2260 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2288 wrote to memory of 2260 2288 iexplore.exe 28 PID 2288 wrote to memory of 2260 2288 iexplore.exe 28 PID 2288 wrote to memory of 2260 2288 iexplore.exe 28 PID 2288 wrote to memory of 2260 2288 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4cb047422332f8a922105ae6ff732604_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2288 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2260
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ecf13911e9094e1f3010d1f9160c695
SHA1b854bf71eceee8a95d85f1f4326683fc06dabf41
SHA25607d095bd9babc3ca238ec0f74c82dd2b3f78ed99be7561ae0d5b61f030495cca
SHA512da4e90d38f53493578689d33cf28cead3925889ab75fec5a1ae48453d9a0a3eefafac3ff704e95e3ad3166474e785d311f553086e55ea2d3d85b0d799350ae46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525f2ca21f0f00fec124a9eba5a7edd49
SHA114fe18019db8bddec69c656f68be7680505c44ad
SHA2567a611ab322ad3c1168f9f45a33b85135880592b332f41599681af70aab8a1cda
SHA51258f9ccc2969236b8e8d25e44dbbaa361ea83d220c217e73880a8baeac9ec089838bb9d3950e9258a75983615c6988c5c8b0e329e2ffb6cc6d6b930013454a6dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d94d454d71d6b29123cb78c9e07facb6
SHA130cb061b94f1925357f63f0f8b2dc3326e06abe0
SHA256ff5d3d1eb19877da78b0e4a4031d0f00375a431ddd8245a5f0a6131ce6038ab1
SHA5120e1161abc5e7db24b53425d3f1f7f9ef36827fbe2d07f306c1a7163f0837f857998ba923ab66e721e4cffe47985355490d7586abb09cff2abeef79c43352da6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54cf0f7dc567ee85f18dacf5800460bd2
SHA1cef365dc4a3b3421196ec201c80b4c94044a39aa
SHA2568a7c3f115a91a37a0ecba630f69bb1cec757b5d6877f4806e519fe3163733e70
SHA5126240e76d5f4fd89d330bfece9283a3ce4f6be09242c2036bb7eab7c9aa65c543a06bbcc2f66c5af72dc223f5b91ca1967db7aba5dd10cfdae2116b7e304048b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b6097e3381a204d435fbf7f9b1a0248
SHA1abcf83672f63d3df062e26fd0a8bf2aef281717d
SHA2567a0ce41edfdb6a964f8e839e474c33ded8a3041578fc143429738bb0d98657be
SHA512c4b4c85a23a8c7f7122155383f86ceef8ad4df869130b207b858fd3eb8cbf1905c22403605cba3ec96b869189fb71b486785a581e24282ac6fef8584f57d0929
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5806667b151260295292f3dbdece690
SHA1f2cdd49cfe68bf96a001275d7a92b27b12ab2d94
SHA256360ed2bb1573410e180d0f45bb592ae4fef4d9bc062bfcc882b718b9ad9c4cd1
SHA5123bd87cef56711c059a82479d5f68eb924193bbe4c674bc60fcb5551a60a48cb17cf26ed9b26e06e995b2cd019dc3a7f892c9840ab52183bfae08ce8aa6d2dfbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0399a5c493338d1a2fc110e989f9ee8
SHA1534ffb1e7a79e9fe4a61f712b68644145024f348
SHA256257fd13d9244264ffd6243e8719e35cf0de8b35363cfef9c7437926e18738042
SHA512c99e57a7ebfc32e72c43be53b238fa6ea6c26de4806a46a2d41b422b25881f13f825ad3e9c49e98270be28bb2acd7c35fa3d68d00a425c2c0317035159691b9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5875b7aaad8acb47539933fce21a28edc
SHA158148f27393da145d428ece2fcdbbc50aed00374
SHA256a776fe544059d108e8b3807331f0fbd18fdbb4078cf2cad48a387ca012c96b00
SHA51218788b0e1ba6af99c0197861dce644cd457b0bc64b8d6f5ddf8d168e636e8c73e909d00b2a19b6097ccc113f40346a1bc2f8dae508ce0fb488dc87260695c932
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4a1b162d3c4962c32c44adea4e9dc84
SHA1117deb6d09bfbc5c0c9114c328dc0e157d30d361
SHA256e40cb4e6497a73438bc3664a92a53a748516644c77d8d1db6d16febee70702f8
SHA512b09affa86e92faa8154cf0ef104a97cd9c5844c8a38a9d735a4aa304d50d34fdf4c25d8e5da78dcd26395c16392615afc8b22a6f93384eb825f8eb6d45494edd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592f1bda76564939ba7d8e92d9147d78c
SHA1620a19a94dd2aebe5f21afa9b185f3e095b0e351
SHA256486c7a0ee8601f10235b9c9a656776a54db1ed4cbb16a25c8caf1f658ec16c7e
SHA512ba6c596b4446d3227d21fe1136b0d0f45e0573ac8ce5a01623c5f720a90f1c95be32d913318aed4042df9cc872fe58dccce2cdf8a54da2af444e800d9452d428
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd0ad66f9797d6d59be172b614ea4ea4
SHA100adb84d3c2f0e5a3ed7882c79f2c4bb9329097c
SHA256437c8f7b7dac2452aa60d7d23c377c3d73c32a1d554fb7bce30f73c2527d0341
SHA5123c89695dbf9be5c1ca4187d30441bdab29504a3adca54e5e6969507cc4c6c38c8fbba5141359d899c9a93a31c63b372e789219ab1f31739ed704a9e1d712443b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526fc356b5279e02e1a1408b5fcb360c4
SHA196a24a8b6db3e7c7291e9a425282a1d1d0aedb6b
SHA256d010094ca994aa98f19796501018b27591d3a17b45f90c20c2fe8ff15ec7506f
SHA512f534ac01d28e8ed8cda2d0dd7ace05e43d8d95d97d02f6a509419aa2e9468a43090ab0c70f2f07ac0caa5e11c5bfd4708dec623d386f5a06d75f2d60109404b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd77ed0022e1c2e9419049541275e9ad
SHA1ad70080b826f5dc8e7181913e316ce3d3a03dcd3
SHA256fb4979d871677e4abcac0ec1a29fa9f212858f2a0fb50eee7a9bed7e1481fcd5
SHA512a2c7ba63c15f5c2da3b9ee0b3d7df7c83a78bc5b5ab1aee71576fc3746a75a9b32b3dfa2795e521fb86455199fe0e939509a498fbbc867c71c04460628ddc29e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553b903c155b9c208c2a87d9822a5c87c
SHA179527ed5c5a5ea1ecb3d80b00f4d97639c49c6a9
SHA256ad474d245011e46424b038140b696179b88c041977e1b0ea1a14b0ef23b556c9
SHA512fb3c8bbe0dd7e6923fe78951986501a85ba71c57789723b18b567ad6ed510937a58049b02e19e41fcadf3faf8813bfcb4deaa6babfeaa4f09226783808b50a91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3547b363fa5f02bda724fb8e77c3034
SHA162165d89fe68a3727787caf3a007dcb9994a51f3
SHA2565d9fb7f35cff0ea398f6726fe45feeba8a1ad3fd5bac6a8f308f32e2070fd822
SHA5127c97c0a26fe5fb614e980f209ee52226b868bff93f3e72f53513354efe14802f3b03f546afdcc759318b3a5f01c3729991b58cda739e8fa45deab09c621fb66c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a0bc6ce13e224f9828f3c64c7875761
SHA121d89474142e8074ac1d7e6ab3fba993dd8fb6a3
SHA25633326cdc8673fbf6aaacdc1a4e9da2e78f0b301457f1fb41e5599f7b74f13d3c
SHA5124f977726f51c1f49acb575c1e67657869cb8d7ee7da08905d1b5a49f4442eb1085a8e79c13713259537934e89123966ae7e155cca978068ae3acc7c65f99c98a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa2012f8eae76da9dcf62a61a961ab0e
SHA11e624138f0e5ea964a172e3783f2e9e812fb98df
SHA256f73131291f01a285487af5bb5d2454244ce0307ab4bf14304a356f85551fb660
SHA512fd81804de3a3b2b957bb5dd25ef88b58a29308c3374e36cc7c7e4e390d49a03fb7e764ac2e97bfa5746f5ca9db00ed0c75ee96898217d480235f8ac2627157c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a347e562d04925b981b854136f8418de
SHA1e542f75ea28db198c2df8b836cdff6abc24559a3
SHA256218281a7e2112799134ad40bba8cef39bac50fa1a0c4ab16685f448ae79aae54
SHA5128a8089cc4d0de4a61d46485ff701a49764ab048d1f2b6ef220341e0d939d0a9b1d33df14fd952382d4c471b3b3d4be4ea56de747a1797122d85c7a184b8156e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4cd944fda1a770eee0301e3de38f64e
SHA12d4bf84df05b20c9da91e1229cfe5cee6c69fa52
SHA256774e135d0cd81eccb08ec63f4c489722e8143367566e429078b2083aa70c1a66
SHA512eb3e717124d0448ab7d1fb1f91da629f3afa5416026c8434bd030deefe36826dc728fe5bba2fa5287c0ccc129ddcd1c629cd0aba180eeed8ce23e49ab85474e3
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a