Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 20:11
Static task
static1
Behavioral task
behavioral1
Sample
4cd683f137bb3d1d24998263653e274e_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
4cd683f137bb3d1d24998263653e274e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4cd683f137bb3d1d24998263653e274e_JaffaCakes118.html
-
Size
7KB
-
MD5
4cd683f137bb3d1d24998263653e274e
-
SHA1
cf1738ba9ac94d13cd3d5beda987d3aa4e892c05
-
SHA256
3db2026e313b8c9f2a6d22c3a6e6edf4ff0c580614585caff4268212c9dc11a6
-
SHA512
9e65b5c7fd912a3a888c0596c2388623df941bdedf081116ae40dc25158e2bd2ae2323be4d23929e9146bd53c83b74e46875977fb8d2a7116ca32ddeebaf7f06
-
SSDEEP
192:3oLUJuatTbbwx7QUZubdk/Hzm/zTM9FA6QAZzSs:3eUnTbbwJQRbCvzcniq61Ss
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422052188" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30802664cda7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000921c0a35b176c958823074331a32719e7ff3a7741de6899543cb32d93ce66c36000000000e8000000002000020000000179ea2d1e5feafdc24fe7bfa12513ec80d19a1897341ff77a6b65cff2027135120000000f01e4588f018b6293099a994fcfb0efd9790fd1d1343dff37f1d6a830dfd549040000000ffeb23bc8e7774bd8506b7de8b20715271837929a20fd373dabe2089980ecc99d3c48ad036b46df07fb9d54f917c61a397b1045a0458dc2ee146e5cacdcd6591 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8E458501-13C0-11EF-A0CE-F6A29408B575} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1320 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1320 iexplore.exe 1320 iexplore.exe 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1320 wrote to memory of 2824 1320 iexplore.exe 28 PID 1320 wrote to memory of 2824 1320 iexplore.exe 28 PID 1320 wrote to memory of 2824 1320 iexplore.exe 28 PID 1320 wrote to memory of 2824 1320 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4cd683f137bb3d1d24998263653e274e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1320 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb9ad60edd562dae765add23aa0fb0a6
SHA18f0f961c5f6acf5ff3f10026999aece844c1d199
SHA256db187c7a66439264cc340fba54f363c6e20fdbd79f3a53a41167a4821ff62e3c
SHA512d6100abc1520a355f2d91f4723d5b8970583e05cce29af0e79b475b41867b1b07afdbdac692e859c098649054f120e7b5ee648f7318ea3dffbec764d436c74ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569a328ad25ae0eba8d05cee12d06f4c5
SHA1c49f2ca36e167c01ea04cd42dfae5be3dda60c2c
SHA2566d73439ce996dd5b4d281124e04db7a5f96e7880f2ff9047b04d2c5712763679
SHA51237e7d3d1323ad22a1ba41c71a7521e243c0d84b33cfe568dbfbbd50271270071866cf6b29d0d548a2206110bd57b602148252ec799682495d403fd4de2df256d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561284125a0dbf92d852242c73f557177
SHA178f4fd6d8374144067eef87e95a38de2c226641e
SHA25693a06cae8235f9ad5f0199edabe61fd8a3af062fa407318c254bcf90882b25c1
SHA512554784e7992a1d0fd496243b5436abdfba305bb8d92146cc4c56e64331dc640762049f6e1c6ba3be8e4f9170a9e6a5f37f271f9930df9e54432e81460263d9b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a7cf212198409e6897079b08947513e
SHA16006222cdad96371e55760d8f58e2cec22cc0745
SHA25639fa4b34aba52a6566d3c93c56cde710f75be72646b351ecff4a1de63c91df5d
SHA512878e218d05025cde395ac8dd11ff5f04defb525847d09669413863d4ae673353fee92a63a9dbd236c7ca317dcc844a05b3ae51eab2394672bf0196338a040a21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595ade12cb654fc55f9e07a765e021ce3
SHA19c434f0b9cb72f7b96233794bd200311d93def7b
SHA256d225189bb3ad90f90cc8fb659c5245e617bde218acb98f1d475448ddf1ff8e4a
SHA5123898fe585680dcc1199afab406324c9d72614ad86abb70ffb1a3cdb75c638faf9f90dc9065e17a244053a2b1c8819fd614a47dc829287be819bb27bc64276470
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a37f81b7e1da4425a042119d50055311
SHA14cc885124b66e56f33eb2aeed3ec461be5c45500
SHA25653acf82e66d27d988d633bfb50ea79c77162b05bfa3a2357a278c1e1c18f0411
SHA5120e314565aa32bcf156b3d04202761c1b22d1d2eddf1cef9d09306ef64dd281caee01501d40bfb6fc95e0e8253fbbdbd12a659848612b4b39a3e5f0c0a65c3955
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2092e6b707a1184fb95606eb73c84b2
SHA16ba91da90c89b102207cdc7c18baa1b90705d0ff
SHA2566bb767a52a7bdcf23bc042a05fbd0d032bf7977b44a36ee8b932a8472d6bd65e
SHA512bec5ff7a71ac93bbf387df984667a6943469fe2df2ea1377fa5a09b5e4f6c9a1c75cf54fa65228d5484f4fd9da3b367cf4d18bf5a51b9d22f0cb5de54f48ea87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555cf006cc2413da6ad1769ceb2af377f
SHA1d8ab376e939c2d03f1ba08e82eadd08f36e86b11
SHA2563817dcc87aa7c90a08a91f3b7890a52724c483fe7d435f90da785085da1c11bb
SHA51207a77897a084ca8238f91cbd46f75edf96fa40fec69aee4adef7c46c33f9aacb97725e14c8a5935f2ff1373c65bfef15c14cfcaf0fe67cdbc1e8459567050e86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507a5c09e910719985b5260d791fa8255
SHA10c1a4fc46ea27f0bb01ef19ba497fef03ea2d44f
SHA256adc3153027c03b7f2c022eb9cc815834e55a856a219904bde36000743406e6af
SHA512ebd74778372fe8a970996e9e0c43041abebf7ef822d4f58ee5453bdf614e6d472f5fc620731550d7ebd4efefd46d48c6c68d207e5ef091b724177d5463c999ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6ce7d8523ac925765ed4a0499486112
SHA1c27dfd1f42abb7db72ee5c1bf7e1cefd22414233
SHA256593b11239de04447646dfa0420fcb9b4f881db64ef71180ac9ddce1998de911f
SHA5123f9086f1785495a845497488f95e5ea466eb98d243879ad87879779110f0e1ab5a24ce2a1ef5931511bfd2f63caeeb0ed2c63c287e222a32dfa5c24ba12da504
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ff9427f8fed815e7b62f8fc6726aca2
SHA1f596b88ab3b1f8d4dc706faf5b35b4895cf4ad94
SHA256b4f37408a11dce8a5abe935ef56ad7b0ffc892f915c7c9aafd70ec4e5f92e06c
SHA51204050d6c0f5ea95659cbdce1811beafdcaebdf290fe152e9b253b579a621b6126007059c8f1124b3c2b0f2f22038137eb970c4bfedcc22ef414cedbf80420bed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538b19199a6f8fc9e516a24b360df4836
SHA18b9650d7278a050c11e9cf50c9cd21f8c892dcd7
SHA2568d3a4b70d3fcbe47e13b4afd31671a586d762e7b7e853a75ea586b7f19c3942f
SHA5128e9d41e96664006e6e5c193ceb10da8c834c22cd82340f4d9fa2eb91d404c895f1327ee9e694e29530f0181dca2131c2471ef9b643f69ceb83d004281710b350
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c86bbc5ddde4f1036e2f64a30967a629
SHA13fdd5d3064b983c1a9d983a2d57cff51b6d7e1db
SHA2569b43bd359783060257964d0665e3a999ee6d942e1e310f3ad136d12826e14d81
SHA51276c184b2274faf1ef18038f9c813e8cf359a1d66b8c0724d91a712e15034e7b1bd6780c02eb544aadc8ccf04392cee3584a5094345ea97ed79ad75d68ab8bac6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ef2c3f158361b03de2c025980440f80
SHA1cd8b4c4c4ae518128a9c80fde019f5a27a40cc02
SHA256b44a7c4d0f069f951bf9d480aca268ae034ca5616804404ac909865165469998
SHA5129d8f86a44fc89c13981fdffb463ff7644a15e0bbfe8afb6e64f36381e2d4d851575889a0711e53525e9d748c9b80103e8c2b7ac7682aad42908e8fd0be5cda8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e34c93d50c519af43442d4065b0b82ae
SHA10c560bdea0263033a4cf08402d07453b9c4641cd
SHA25692af9edab5ac0dee1b4497fc868c2ac3ad226499807a61da5a8c98c7f844f880
SHA51262e5a77e9a1746dd78d390f24b637f248aeca02cf98bad706a4ca6f92e7c2df1874b833aca3675b3c26676c50a3fe026b9c2881c37535fcd78f8563afc8f8f6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554ea1f434b74ce715c846d2d3b8bb542
SHA1663a7dfd79fc0b6a144f028c3713502b616f272e
SHA25633e3ef4c23c014af365eae5deae3ec68f44959aede9eb0f1bcfb738e48f40b01
SHA512652d28fbeda7c078a572d4e2db400bbda1075ac8ce53e25b666759ad18c210d389cd615a775a53f98d629fe8c4a1507b6a24c310132c1dfc52cc3cabb03f8de4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a75fb0e2d6ae4c9beb84e351ea4e1eb0
SHA169b7658ea290ecddc0a3253dcb2f3cd2c2bba7bc
SHA25671291d86879275dfac70ab7016bbaa1eb6fe53e7d1ae211a7dceed0af74c9ed9
SHA5129a5fab3a04f140e2bf1b0ce9a66ffedd914e23467203081c093123c25a43f44e707983b854527706489ac4d7fb62680c2e13b64511511686b529734db5d0b41b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa5824e09ea3db7b4a65362636b01b15
SHA1c87303658293c0724440090d9411981ff8593ff5
SHA25608e69d778408d4b5bac7e637126aa006ab8227ae93f37c405e966389dce722b0
SHA512f866f221701639ff2020568c510195171521cb4a09ae99c5bfa9443b2d98db9fc1f6fb92ac8c95e65db34379038cb42b5ef15680116f56e33ce74ab41e538f77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5037a383c22b0127101f225938f2bd3ad
SHA19c1d37c3772c9a47e25a7423f8ca88a5e3afdbd2
SHA256353b34b30e8c909846728134ac6ba820918285c09206136b906fe75e0c9a50f9
SHA5120a9341c5fbd74431ced373718a5e7d370a8f9015215af237ec002cb3de804781267e55a0c3723d3026736318fafb326691ffbef0be56bd4494ba65f5ccf87495
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5595589e240cc75b6254657342ff46cbb
SHA1dfb175307299d90dd2f1c3ecf914a52407e883ae
SHA256c83ad56d5b74647c35b98b89de1dc3f2d05219981444d572c05156fc93505ebd
SHA512d3cb527bdaf4bffb4d7c2c27d8adba52a7ae7057616a09a0c42189e09920f65187871664d6c6a54d92560c43ff7e75ff1cc9176dd1afb1e3814930da5a5108e1
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a