Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
16-05-2024 19:51
Static task
static1
Behavioral task
behavioral1
Sample
4cc60db191b50d95fde26b3dae601acb_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
4cc60db191b50d95fde26b3dae601acb_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
4cc60db191b50d95fde26b3dae601acb_JaffaCakes118.html
-
Size
463KB
-
MD5
4cc60db191b50d95fde26b3dae601acb
-
SHA1
318d86c9d093e5f8117dfcdd4ed4be77c023d12e
-
SHA256
bd85ad35e15ed0ba9d519b4f0e7ad072a8d70bb8ba6f1825d3d00f890b97771d
-
SHA512
7c298c98ea1dad96fa1bff69d25a0f387402c99fe36f43463dfba4f6654e863a20a49b444cd0807c711bb4d77dec116b1cec09be3150da9d8178f7fd6bda21d9
-
SSDEEP
6144:S5sMYod+X3oI+Y5QrsMYod+X3oI+YySsMYod+X3oI+YLsMYod+X3oI+YQ:k5d+X3s5d+X355d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A52E4B61-13BD-11EF-9ED8-52FE85537310} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc2330000000002000000000010660000000100002000000034767ac5d0d9edb8b3659d3509c7108240ef15ed27ac3512befc4caff9ff2198000000000e800000000200002000000069ba5d7470481549a64dd5281e78efadf90852c6d76bd7666f297d3a03a9542420000000183330b05c17568919e648b2c48d13994bb1dee2e61d33b94329459dba69c42c400000000416de3fca8212d5677dcfeb761973bd91f48711959fe8ca45613a59152594c9503bf565797c007062b7cc47152316aabc506a5f9d24a6d7a75b44e4497e3068 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0042557ecaa7da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422050939" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3028 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3028 iexplore.exe 3028 iexplore.exe 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2508 3028 iexplore.exe 28 PID 3028 wrote to memory of 2508 3028 iexplore.exe 28 PID 3028 wrote to memory of 2508 3028 iexplore.exe 28 PID 3028 wrote to memory of 2508 3028 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4cc60db191b50d95fde26b3dae601acb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5138cf1f770f9b8fa47b3c9e266677c30
SHA13dcb53fb9a01e9d21ec431362ce7b131fb8f1756
SHA256187f29e0a82d9114d72118900a93c2a7b0fe18a4f55f154585aea6c35cd4ca89
SHA512f2556555ad23d07dbc8ee2ef918062dd86b4cb433bb2e484b48ac451ecac4e4060103ed7190b103c7cadc23d76023017082ee789d328eca938ed64ed14ca0267
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5582ec9e1f281afb7b66435851a6aa21d
SHA1c30f3370b063fc2ad644e8e5fecbe9323dc80d92
SHA256f538225d3b2f22b609bf2652e258a5d286e4a844257fce5c4d69e85accca1c75
SHA5120d7ae99b1c680e6470d980142094f8cc83dcb03d38adbb74d81119d474a2fb6d63df267713252682226dbdcbcb1acd583bc1c27027bd23c0982a48f9476851f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56624674bcb8dce274e95d2a8270cb98f
SHA173aa682dfbb679c31774b55bc5e0b187937fc893
SHA25687735d6ba1a6be34f820df4c2846eaa493be0b16a0fddba2a22de121bdab28d4
SHA5127351035a534111e71591ab5591c8502e104453f57f04efbe0fd65a9b7c149d80ed877e524ed78bc114e3d67504320a570e30c6d865a6a00eaef664f74243aad4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b262a0a7fd5d98cac10bbc4865b4e52b
SHA1a668fa537ecc100fec539b17195d621094e9e7e1
SHA2569badec23b9a934119cb509bff35f7219a5f4dc64f41c36236f117cd1cdbe7a5e
SHA512481309796999be9b32e441dbfb7f581f89d0a33a94c96f85f883938a24e6df54e67dc9b5af98eabb2378ecde587ddcb0cd37cb6a4a326b0ae2b8a62f1f17419f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571678bdc6ff649e24d12dd51ea3e6187
SHA17c85c277e6cfbf33b0e864ddf6b4eed5bc78b76a
SHA256e59f72f4cca06e93e3fa3321b2c68a8fc5199efa423091b8bb13cfdfd0bf7037
SHA512c1ee55d93e55136837604a255d0e1819a3edf92c91408ca369b11c71d788cd99aecd7c2bdef7a5d029ea8473a473bd97d8d514345187868161a462fcdb41c273
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58671713746ce2081e9ad8bed39656086
SHA185da03f5addb24a9ac212c0e42319f98295d9bcc
SHA25610db18ffb29b2eae4b5a0085410d2ab577560fb3e05c1538859b4cabfb8dd6d2
SHA5127f924c8abd3a164c13ba489d5a266f2d4319e8a9c3e1793a09e77a1ed7e856f694426e82bff577bb69b5f2bd9160cc8540c1bc342f0836330a235ada8c016d79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5344f89056e0b2b34f3da64fd5ff9e020
SHA10b473446856a9067e8de002fd2652bd433385add
SHA25669ab4c69f68c2a6acd4eec0dc9e8c6a21c4514b87eb3c5a061e95bf58ab794f7
SHA512c5d3473a84635b2517e51ab7af2438ad80c27f6821a84d2a61badcf3a13b50626fd76ef682df7131a1e4afb93b93ebd15b72e9c464e47fb1fa313d0c40e2f54a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58132a7341321d79ecd80e64661697e17
SHA1ed15444eca09abbeb7c105e572dfb97937da093a
SHA256d4c7df8254687cd5487126b1709709635bef78e2b3e7acb9ae65a32fde34cc2e
SHA51281cbc35a9a8778aaf33edce2af92c9f2b542c4a16dab787cb6d99094254497be63a69c25675a7210fb474808d1cdad7f3fa111f2ebc6f63ae9778421b126c69c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d78dc6c99fc609398c2422d17eb63bd8
SHA1e5be5dfd029556722053bae09f75d735d13e9512
SHA256201f74854703acdaca2a6b79652381cb23f7804f9378c1d621ec23fdb6b2ff08
SHA512aadccef8155148a51feef71f9bdc6d967af578b71f905dd3c99f1a8ddd6037bbae3598e9715ad2469cfa8d388ce0552fe6efc726853b9e4e43357ee2d6c29cc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594dc3da858a9271ce3b84502e7639ddd
SHA1d4417ecc0f487b1e922fb2a28b88838ace850eb9
SHA25620a8ce87b82b185a5ebf257ba677f898db9444072dab87d4a88274673f68e722
SHA51253d1262d22890523e30dc6ee3568bd71d2993ced6a2431c6c1c8f3f26973aa565df414312be330a9d3c996da42d0cf363439f10c46530f636ed15400821b7e0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d868fb8699c5fdf29492f90e92a53864
SHA1356f561da69d5cb45538c7827b3a0c1243d566ab
SHA256a6a4f181e0388d7011a67860e6a30426e776437b89f0d73b3703bd783adf19c0
SHA5125cfcdc0129a3e5a33c6b41f11ecbed32a611131fd91f2a624586ba5bc04a4d3e480268ddd4b59f82110b0932305cf24c9d8932086ffd8eb193538520bf2d7f8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d288408633fc7956d23291a272b306d4
SHA13cb1f643ae9a92e49d572e973c9bbb443264dba6
SHA2567fde946ef2a295f76f12eece7637970981d9610174898a76b3bee9fa9b2c2fa2
SHA5124c66c11be243f70b0f569ccb1c4750642676cfc056c155fddc536c90d8799949decb0b63479cbed5fdff2ab5f30f56ae49376746b60b83651b1ef749898f1a07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a3c2e2ed06d5d1203e1d3075fda8fcc
SHA1a2b4189b1d602b17e0b785640a88b1f63c95744a
SHA2567bb9b0b36c5d57a459dc9624a694d7f571c945d213b017810899f3a51515beb9
SHA512b596d27d60c2b4d2922fa1949bd1d755ba6b7f3e5fefd47cae18aa3f64403c45bd21b212092d839646e1bde5cc2627e2bda9e66fa7f3cad9c26f4619821ea40f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5555bab2bf1470a2c90b925471e499b6b
SHA1ef0a37200b9a1a6b37d558afebf0ea21d58e7ca0
SHA25628d7be580d504cb5ac237017a635b05f168b0a5069f5a07d1ecafcde5fa0c53b
SHA512739b503ff6501eed42c408bdb28a11c9e7e5ef9d59257fbfbf365fbd687df23b931a854c3e71fb3463c6c0d1f2af2018e5ffcb1b40f2247d09054956b197a60d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eefe27625453c109415ed7d74d68a850
SHA10ac40df9c27b2356e050f049bc372dfd6433d210
SHA25695e0882b75b4626659c1fc520c003ae0086c885717f97749db81c6a4dec5ed45
SHA5122ce1f24c8ccbdaf52c80d8db70b12698f00313e2fbfa2bf3eff29adc11ada6f77d625c82aed31593ac69448945bd480bf71a4b3a8d95074ebf36523837ef797d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db21011d3cc99c4f21552fc52eae1ecb
SHA1970e4e2eec50a89291dbb982d65ad40c5ea11ccb
SHA256b55dde4d2f28d0acb4b12905064271b4fec2e91c5f5ff784cf1cd6efbab31bd0
SHA512693333ca823869c42c6aadf0662b7e7053b5aaf56f2e26a92e9c2332366a151d4f635edbe5ffb16bfda855b6038644e0d4ee44207c9a65840466e6acc80b0331
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d4dc54be3f4d7efe5d98cf128f60212
SHA10674efc711144c3617f901f6b45bc933aa14861b
SHA256919ca6d2cd79545a4ae0e41216002e410d61b25e14bf0ebdf3ed966efe138038
SHA5125bdf001ed98a474cff233845854f92cf4f645b3e2765192b105d062444092784a2833a23c3c9d2840d9cb6702cd4510729961c9c54c2dc1d0b8154ca9ebda07c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf26d9e9a83ebe684b5848f95e24c80e
SHA159a30ff70c79175da8f7be580b056c1f4c4c3e2e
SHA256bcf6c508d494de2acf3e9ff8222a43b1c2c3093c948f7d92f6d5b01f71f8322d
SHA512202562126dca94e9c9f0fa0412b5359f4e2ed2778fb7f77d056a3895a4a43bbde280b343a64b5e235eba84843fc5579d217a2124a7e1ad2c57b7d0c746265bd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d790d47bfc98db596f03ee4236c71a24
SHA1377cc4e38e59cd43f58b0b17f20919de45414c79
SHA256a5183c5cc2d5f15943d75292b8960f93f4b3ac0534e4ef3dafb542dd07a76b9f
SHA512bdffb5c6c5c2ca1c9a99968cd00661d876a3a0cad274c3c7e7d2a3ab8a032115771e232fe1920e55ac9819d04fee3b1893cc932380bb795819c6fe892cdc8d06
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a