Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
17/05/2024, 03:08
Static task
static1
Behavioral task
behavioral1
Sample
4e2ace4fd8ddfe3e5b55c38ddbf3ace6_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4e2ace4fd8ddfe3e5b55c38ddbf3ace6_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4e2ace4fd8ddfe3e5b55c38ddbf3ace6_JaffaCakes118.html
-
Size
4KB
-
MD5
4e2ace4fd8ddfe3e5b55c38ddbf3ace6
-
SHA1
b67e79f3f60cf680eafab8d12cfa667feb0de873
-
SHA256
10a456e20d76b00af4567889892debd7e58634c3da32d29fbd375fb2fe356227
-
SHA512
35d867d09af4a816046bd0e1d0844b50b32fc8da290c99d72e590a0de489760f5d7c3d366edd675ab3f7b948d82083b83714628477b860079dc4cfac94c68efe
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8owFd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDD
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0d3018f07a8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000406f589d174670d24f143c9532547b5b8d77d0e6ec0c799c45517e13746e1379000000000e80000000020000200000000b7a5f3983bc76a244fb27d41f171fe478dab15a663391de7474c3629e41f17020000000640648d6a4c0f8b8519a1e86a71a4cb0da7fe9824092375fd23df9bae3c4d1fe400000001e62107a90bdaf426e9057ab76b2b76a071291f01e0920682166f18218c5350d92e9a8f46795fa8d934a3ee981058779873807e50fe8b006f6487a9c11ba37cd iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BA835681-13FA-11EF-BF51-4E559C6B32B6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422077173" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2992 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2992 iexplore.exe 2992 iexplore.exe 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2992 wrote to memory of 2836 2992 iexplore.exe 28 PID 2992 wrote to memory of 2836 2992 iexplore.exe 28 PID 2992 wrote to memory of 2836 2992 iexplore.exe 28 PID 2992 wrote to memory of 2836 2992 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4e2ace4fd8ddfe3e5b55c38ddbf3ace6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2992 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e17f2d346265746fa1a2a58b373eaf0
SHA1157a8b51fc56d6607c3089e6755060e9014daf0d
SHA2568f20083db2c29c3c6868a0ed699ba3ebcc7bc90d68873035b18b1929b9520274
SHA512bb57c177bec1472f750daaea6df5995aaa629519cee3a166bc442d25e418704351f911075640799191af172de188e999003165d3fb92797e3b371220ed52c010
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d15b829719723f2c9ea86e8a4352adf9
SHA113be83896937f3b65e707cd3e062686105ad9f6f
SHA256d03f7a768f3e248264b477ecb47e4f3f7365ac9b3be37c4d86626c82c7df0f8f
SHA51202fb1d76193f717d5b7f81fb381637d998f47a2979d2911f0c0936945215e9a996657a40b2a1d2bc7f2a38d987d7e39294deb9348e439a027f173195a70d263c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59981a378825febb3ae43a0a6e925a82e
SHA1041c28107c07ab278d262be9b91d0ef237633449
SHA256d9eec4fb6f6fddae230f2eff6affe40bf0df09eb5ed4dfd0877cd3452a73924e
SHA51292c6c9b226e59a6a24c58d889a0856a21a507de6ae179a55dbffda9ffe7f781af31b69ad0b772e03e768f0f1bcedddde8488a354d12c5a9be435b835f4b0a195
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5803961038d54bc30abcaeed4ab69dcf4
SHA18f85fab1715265cb4bda142a89210190c1e3e0c9
SHA256efeda0eedce35eb16ef7e56c107aff2be0528b4c42f2cd3819c9777060b17c97
SHA512849da29aa3cba40a823bf6fd46c071769a8423799c880b71b6ffd48338c1bd7e2c728e162a1e003b0d4c6aca08b3a9d144a5566f1db4dbb9fd8a4997b1f571b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7c85795193a5f747f82d78428af8977
SHA14f216e8708655173eb12dd0965eeddaf634dee4c
SHA25617b59cdcc9b9fee5e2e22e6aade9a69370eabb9faa815642fab7d99c0e880295
SHA512455f1765725a089841f55abf4742bc7c207c7179d6cc89d4f2041b46164d9a5ed3df5a8774f50bc47ef15038518c0437c61da83bf651ea5224abbf958adef9d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583dedebae80fdacd0bbb15ca09f5f644
SHA1a4b939f67f1a4ea3da323f658b0ebe630f099dea
SHA2566712651f062618926e28a85015110fd5d49e788f024e30a12975fc032603ba8c
SHA512a7ad230fac65deccddaa4bb8aa8fc1149081bfcc328ce93ec64c608ccd1cf7c19d632ea99b3697f153590900074cc5efb6ef7bab3d39951cb9b2ff82c58d08d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd0f10d8a1525342dee7899864f6c9ba
SHA1d5b7a37fa9a0bccc2fb4fb1f1053a1abb93c4e55
SHA25622c3b87f21e2cc770a9a238abf9050c4905e5c6bf9b64bd4e4bd7976350a638c
SHA51257359bc7a5336a952c3984c297a9b3c01cf48bd61b3e6621b7d1d7231deefa187a42a25794800b13cc84c4fb0a63218daeca9e2431ff689025d88754234d7a81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3524ff23b362af7faac092025d6f473
SHA10ec223e0d1dff42fc6185240b0ee6ad47107d127
SHA2563e8cf845a97655ae9f11d35b89b0815c38790c338fb75acbc6f8bdf60f32aa69
SHA512e0803dacd655f699c0f531c1ed200dcd1b7767b0e0b3d73e79d219c68a1b17c719dafb5a1dfef5f415606050fddbf3b5c3eda2d80cc244c85ee170bd9dafe7fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e937332d464108f6adc1c190e3707a96
SHA1b8275ffacab1f6308430bcc81b0b81fcf0ce36ba
SHA2561f97c7456804ea0e28eaceaeb669e143c4374cc6af7476f0e3fdb666266e217c
SHA512aa784bbfb32702e9767ec907e3d6cf4fa40d84a5e93e222734ba902f2cc8bafe571107973c8bec77d122d44a467ab34eae964ed040298ed096a0d2ab3dbe473e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557a9134d865881cb565a4788f09dad27
SHA1706977fea34670e4690a67dd3c7a6db5e36c0e12
SHA25686b35bdca0617e2837df6e92fef72ead52931606a70aa6acd23e262a8e339b8c
SHA51235b0c29d80dfed7f50e5665cf441f77331f5a75a36d84bacb9648f9d89cfb8a71f0e67c038ef3ec79b7594db32e8c027f8717999fe9cb7e124ef733b8493144a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595109b48e3b9de9436a74857cb86e691
SHA1d509847e80f6e7d764d690f32f2bf34c93ec7fd0
SHA256b30aa32be177374a93139fde8c94f0be782372fa916099af519ef4e9c976458e
SHA5122e7a5f077b7f8aa1badfaa170f1631cf92b61a3104148c8d72b9f1a5ea176ddafabee30c2caf00010d7c3403555e61a88bf5a2bb19ad4777b40f5dfa2b1ad9f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e2c6f7e7598e8967de169ff77a6ccdc
SHA1c544363ab7bd0ab27743bf9be958fe5054a15642
SHA256ffa94cac825d8650a6b861ddf4b979963f2bd6fe0e5a508e06833a3761455782
SHA512ae7e2d89c2d91260aaac4bedc58636d919a0fec9cbc0293d6c08bcee31ba6dac1870d9a0fb8befd8ccabeb355359e9caa1229d2f1e0996d945571072bac2a935
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5563e76d1ace463a89faa543eaf363aeb
SHA158968a7e17ddf66454542f9f21486d3f32544394
SHA256980be278c33d0d8b47f0579883e541a3eafcb4d7e1a615365cc2aa63ef305431
SHA5125dbad33290dae138a52c73def0d9d09865a36b3ef860ebc3a93edf0158f6e7a26f6de6d2b382bedc8b110bca330b0edb39264d4c2403c7497de9cce601062cc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54897eb013f982ed98ce696f775e52075
SHA19f34d366556e6982380c457fc7daace7b736e3be
SHA25678e6133535e735b4dc96fe9e24443d45afdc2449d9339c0c983c30afd0dede9a
SHA51294cf1e404629e75f4ed9ce5a9e997ed9d597ace00be5eb5d5873163472f755dfb216779973de8721b8933b7eede3481bb5e29dc562ccbdd4a8187abb7e53831c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5824ab68741e9888ef25b8f613662c065
SHA1b4e6044a31b8442c6c16c58b7d1557c60b8a6ee9
SHA256a4d71df5953ab7ec4df67fa1b945bfe459d3f273cef3780937d377e85af3272d
SHA512e8022fbf1d1b2b45eadc36d1d154c87223c4dfe583a0360cc99bdc072e11453842bad022d7271d1d4adefe528e8bdbcbe312a7aa8b112bb5b0a9c018ecebc253
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517939dc03124d11a1d0d878725d17068
SHA136845dc5c426b4bad13376c9b5968fc2d08cdcbf
SHA2561a9519339b765e03fea14813e3a9752d1c7977fc4ac8f60c5c17aaf2215f37b5
SHA5122fae0c72036e054a4b7374dfac89260ac921a0ede87d14806d49bf54ceda0a11412b0932fc90332314a34b43996aa90e14f316082d016edbdd20616b4df65d81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aedf6f3ba90466df2d0ab744f50642e6
SHA1ba9f897326cacd5ab0e236aceb00d4d408df71be
SHA25644c3c920f7b5be246c48da9677a46652eb7a5b70b186323112aa13d2464dfb19
SHA512ccc54736a86137d335d96eebb6d8f0d62a93a3771718476a791a35a5643a224e341715d1400ecb08991daf0f43a773c6c6952f1b62b86d47ad7e1c3be58be133
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d167ce7325969b5b0123e86f835ea642
SHA16e9a10feab8b15f47e7a6a48dfe6222a72352207
SHA2562e8871e978471c488c7b8b1fdbf72a6ded9a3518962df3937a5c8853cc1fc4d4
SHA512ede5db0ff3a22eb6169615e5bb58850dd9d22cbacecc62b2f03349b7b583e03dcc5729cd07b8403a6dee164ce863876c11c0310cadcfbbb0d6cca023e42142e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aca9a7d213e47e7159b96df3e32fc7b3
SHA13db156f0c6d925eacd7282c26d191ea4daa57a20
SHA256b14cac7da65f2e1cbd087e1f5453e530336deaf2824b89439b510ec284127c36
SHA51211365efb4526a73e80c3261891e546b066c71dd4500c6a37ecf20caca70a17a0c03a6af49613f23d0af118fd43caad58a2e0c515918806c81320ae9253bb8c1c
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a