Analysis
-
max time kernel
136s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
17-05-2024 04:04
Static task
static1
Behavioral task
behavioral1
Sample
4e5baf4beca86af0b2cd6de6d43855f6_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4e5baf4beca86af0b2cd6de6d43855f6_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
4e5baf4beca86af0b2cd6de6d43855f6_JaffaCakes118.html
-
Size
5KB
-
MD5
4e5baf4beca86af0b2cd6de6d43855f6
-
SHA1
67265291b81287bfbc6d10c744ccdd405327f3be
-
SHA256
7fab4ed4b8989aed48f7b18c777b5e2c9198fe8c3a2b760c359069127eed94b5
-
SHA512
833d018f08d6e99fa2c137526cd006951033e13a0226f81c616242508b58cb3694be49934e5411fa2df97b7eabc2ef6fa73292ce8418c51c2af29ad02093dc5e
-
SSDEEP
96:ckucoIX3afenbUHdhB8Y3jMHk1LQkOkykWcEeBldXiy5GpAP:c/IX3cQb+x8YTT1Jf/sy5GpAP
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000c7bd7a35b6ee84fb23a4db68953ebac19b90df80a5555db05f59333e9b7e5bd7000000000e80000000020000200000002099c754e76bf2e78d83af832d5608daad8a2fc299256b10a61c22f011df8c7a200000006392a3cd0285396d51f035869b8f977f653a642ee6df51e97c5e706702276c4940000000f4238ca6923584f606c519d996dab16e3ccce955094e9e7cee1c2ad95fff180079a75c4e29e160523a73f3dc5227c813d9069443dd06ac75f02ce8505c8d3470 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422080514" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90c97c950fa8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{81E39301-1402-11EF-B8F6-D6B84878A518} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2988 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2988 iexplore.exe 2988 iexplore.exe 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2988 wrote to memory of 2712 2988 iexplore.exe 28 PID 2988 wrote to memory of 2712 2988 iexplore.exe 28 PID 2988 wrote to memory of 2712 2988 iexplore.exe 28 PID 2988 wrote to memory of 2712 2988 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4e5baf4beca86af0b2cd6de6d43855f6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2988 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53bfaeda30fc239a70fb06c7231017ef6
SHA1744669fbbfb3ec845fccdebaf1331a79ae093b17
SHA256c357d4a5928ca58405ce8dc7444ba8e9925de8f043df7068e39a1aa2aeb263da
SHA512df3ab0dbabd4ec5f5b86cbcc64084d3eefb24c463505a702adc8e7308a4cf3bfe1b265cb22107ce1cc6cbae8d2441d7b1987b6334ec9937d69a7f70a9386bad1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb954f775e4cf6c85ca4106b41ce2c0a
SHA1fb689a8787514da73e6fce9474be658fa17c542d
SHA256409a1a80410eb89edf14bed17b8ff402d4d0c6280ce382ebeabd11577a2941b2
SHA51208458e386085866ac8d4adf85221b42270dfcfd2b437dc4003c25c0a21e0e8ed32a57e33f00548a9e0f137466a7fe543352dd79f5a149291969b67979023b9cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568c38dfc8ae49ce2df34f90a3add5280
SHA19a1a602a6301bb231ca443ce82b5e0ff196273ac
SHA256fbc2b951e651fae4a62d6e2d454c7df5c2dc2034fa7c8cbadbb97fc966fddcb4
SHA5122e503342e8013c0dd201fa811b3bb02858ab7beddeb79e9eaf0ecf60f7c269147eae412a652bfb9b46034c45f9175965a5789555e15b435b1229c33849e3f4cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51863a36844206901b7fecd4d724abd9d
SHA1e01be69cc8660d8f3d9ac05c1a8cb65d6e30d874
SHA2563191b539572053447e6f1f5067b55fb305462f6c5d99866e4e01bee0c3d4836d
SHA512e8ec1b336541d6df5981e644bfc73d9dc518c2b5b873237930852f2edd5e6131bb199b38592352510f5418de5185e7e7cbe30eb6f5a482168800751881b0dd5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e693d4a6774e941a24e588290285f6e
SHA18ff931eed5a92728ab23817170c17d16ac7420b3
SHA2565a358e71de64ed21c0d594276ed67b8a50e0a3c2e359d9426e5e55369f38c388
SHA512638dab763efdc6cdba976fbe9978cbde9ad03dbfe6a1828df09a40ad4afee70b00e0b31a292514180dd54a2059f2e2a39dff5dd4e43a3f4bcee080c46b92710e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ef6d0acb12462295fcb0dd10a599d4b
SHA17ebf79dd03418cfe17d9b34a9c1e811b6e24408f
SHA256f406f595c9ed5dbff75c82a2313c0e78cccd22411eae803d7a782c7de0dc6d87
SHA51217207fb956f232903e99fa235777e08d09dcaa91fff53d370b7563228f10defab32abf255ad33f5b486174fa7c7eb8d023861495b1c5f40928dd6b5999d60d86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572e9f8d235c816ff3ebd2734311b650e
SHA1d3614d39c54e5c3da066f41623ee8c68e86d3ad4
SHA256423914d710b48c00f75a3cf13eecf54ae44cf93c8a499fb679891065a469d775
SHA512f4846c5a42bd8d85f8bd5e8c9a7d5453fb8e4a1d515f6e6cf532959d7cdce4ff54e863991f5574aa69b5016aa3c2dc7285587f3616cca3d3955d303e6b06b0a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a333fb9ef70cfc4bc3a4830666919e38
SHA108274ab86fd764b3bc15eaf3a6ff849c1c230445
SHA256fc24116fadaf2b9ec93861d29321917b61c0a949c7bafa16e5a847299c57d809
SHA5123d137314ab6cc599afd15bc63bc7c6960cb561a1c84665044c313f4313a10d37a128731d78e0d5ca60393b2a21728a855e043c81b171d2f31a8308b1bfa5182f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a896dc806335a0ba3568b1426bcd732
SHA19fc856a930433f9d17bd31e95d1b48ea23aafeab
SHA256577d5956c0f6e84a22c2432d29d3622e9513c76e3d1312e48ea226d4c1bb83fe
SHA5128e8195b5054af1e96c202cd75943dcedf85dcb28b582801dc3d63a0efd3a55f25bdca1cc67368aa79afaebf0b9ace1c1c5ae84056eb0bb6d9c1453b41da0c672
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fac53aa4d6064e67f4721a27c7bf35aa
SHA12ce9c853c0cd735733e97943e4c5e71b72cec238
SHA256277a75ba19bf618d106bf03f7cd1228194174e9a228410177b40ddb757ccd818
SHA51214fa76dba32b8bc48606434d0d56a386cdcb5ab968596b5c1c43fd5b888798b1b4a698b4b9088811f5a5130b1957d82d70f378c442c7ff1a2fef4335f541ab31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54bed6064c983ae65362644a7e8b5c651
SHA1529e530a9dc2f39cd271b69586888840651a44a0
SHA256f78924650ef54ccf7b8c84b849366c4364a0acd21016482b646129ca544b6362
SHA5128f43913d4077788d83819edc620782a2d58e3c4cf42106c15297e41093d7515280c9ded1de0ef0348568cf9f6559f2b54e93d00c19cecec479f097c32239f5bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5346bf6e8a8598aee7f08312e06af7e0a
SHA17703586d07876a9530a8255e5e38142d9ab360d1
SHA2560755d2ffd78920d39975daac619c636ad64a1fba5db6cb59816b83a4607f7f2b
SHA512a0ba07d97a4af18c2101418483e8815ce866968f73271909819cfb0e0d64b93b662782f29aab12816bd581ac5a8c665c3c95cba56daa4ab56456d81c76e2967c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab50f57f58ae823af6bbd80f635e5938
SHA17f65e855500ad09742aec9fac669cf4be4aedded
SHA25613600ff47728367cf42fb314a82df0233076007dd9cab36acd65d0136c83e344
SHA51218e1ab5d0eded9d722ac71d578ef0d434849bb2f22929dba02db2c01fcd00ee60e0b61eea10d5aff6dbdf28ba4da3208444e20dbb8f991a7131a07e3f9f63204
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563ef09871ac1b47e3f4655b72d2d7819
SHA1151231d0de634b6f8056eacb17a711271b3d001d
SHA25633b367c0b84bb1894c38af7198e1730a4f3265022efd180427543bd101d12217
SHA51228dfc601cdd7934f2a7be4fd18b106c56580b36b4cf33d6bd64d2862fb83dd2706fedf1a4b4048a224a4ac0aaff8d7f27b94d0b71fa92401b7f6560f610ccbf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0ad789f93a72cefb2e291d071db1e38
SHA127aef937112b4a096a4e8390331532a4eeeb3b45
SHA256759e2c8e4158eee4437d57e055bc7f45c169c3d5731705bcb062e0cb56045bdb
SHA51283e5b246ff608d736949be368e9441a68bb36f268db97e60cd4e8f745e80c8a6b404c75b9bf1a3bfb1d9bb4a33b460b920b2d8026ba5a8094604eda44d2db58c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573db2ed9c7ceb4944b8e9a36ce76e7a6
SHA1f54629ffdeef0d931acb7653ab769fea9973205f
SHA25617da15ee6ef2dda5ed38fc18db67559ddc9b90aed076781d1cc6525120ae1f8a
SHA51250d44a6719e47924ed98a1acffc96ba6925d01ce67961dd6a62a6d9ee6acdf81c4bf3bce72f4be7f604e9b399f824f3e7f49e2ccc0fcb3221d1ee7d82d4ce2c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd12c82bf382e50d27335463fdd0560c
SHA1f90dd9c55d0ef9e70b382b98213e36d638613e90
SHA256d56b1ac57d84dee537700d89d287f6197b70eeedcb040e129e05102273edde02
SHA5126f136398518d4d0c0fbfc072f5985ed687363035f4976bbf3a6631ae5a29028a7bbee7a1b6a172941b74e1ca2d5f2a0b284bb4b04946d5ec25a2f1556f3d82fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ddaae6c55fe96d8ab0eb215bd6281566
SHA10a2a7f7cad6bd3e5ea81606c7f1b89a38cdad2b8
SHA2564ceba91afdd0b145b6e744f383e8a7ce5680f82addec4c6bbca8036b79df5dfb
SHA5127d20d455da6f60700c6a8496b55649b457ca67e71d0e9fd7e231b7682866c06407fd9476aa3e7aa61541601724749714fbc4ece88a362d20e4dd025599ab22c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0c2732b87e19b78572eb191b12e29c4
SHA196efc7f831db91b4598a8cbaff493cb4a85324fb
SHA2561bb24f87b00086335f71915c9622f32be2aa01bb07973d7221634b31a6579dc2
SHA512796dc4d6ca1e45a059b67a44b1dba2e8d517ea31a9b002440e211da44156134ac5389af4f1d94f1f72dceaa1343dec991bf82ea07597f57178e5945fd5aa30f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bffe468489475e7dec230e2ea235c21a
SHA1d7c1f2d44794d84fa48b0ccbb6ab43077a290c49
SHA256bdc9744db2a098f2324432ab342cd52850aa902afb941370fb4e68ab184c5afb
SHA512aafd3c8909d008f6778edaceba7a67b7282e8d476fd6af9f287183f9b0e58bee6d03daeedfd70f0fcf24108032554c330113fd87c232fbeb2a1f1227055479de
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a