Analysis
-
max time kernel
138s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17-05-2024 04:53
Static task
static1
Behavioral task
behavioral1
Sample
4e7e5c8440f53b2d6be1b52ba15a1c3c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4e7e5c8440f53b2d6be1b52ba15a1c3c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4e7e5c8440f53b2d6be1b52ba15a1c3c_JaffaCakes118.html
-
Size
79KB
-
MD5
4e7e5c8440f53b2d6be1b52ba15a1c3c
-
SHA1
5190ffb42f4b92fb01fb9ce2ff8fca646861a436
-
SHA256
2827e057aeeb6b778d1fd5ea83dc0d3634ec4ecc561d8e521fd3d05dc2c6074d
-
SHA512
302afbf3cc1e92eb78db2564a54d53ce117047e57c6bc5557c5beffc0790c314865f9133404509e4d1235d982c50ed424157cb6c73ce7282a074497d70c13624
-
SSDEEP
768:Ji7gcMiR3sI2PDDnX0g6sF6LozIeAk1bqYAbsWsoTyS1wCZkoTyMdtbBnfBgN8/C:J3ONuKsATzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{78AB05F1-1409-11EF-8AAC-6EAD7206CC74} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000346c5755db7c84cf1d7959c948a6021f7e06669f6cdeda68338de789904b307b000000000e8000000002000020000000fcc8d997e4f75908d1e9d22b805794099e5870e3848cbf528c7ae24b0a8e4fea20000000f26cff6f13b4d150a884328fa5bf3a8cd8e0c771bba91d5711d069cb61b5c4d4400000004568177cb49087f55cfe9e91e1d2307aceca45c61f9872cb361a6352e160a13614ff688a7463fb32dafe012a939fcf7c4bd90c86ab1d7c52cc5eb5bc03b56629 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5025614d16a8da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422083505" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2340 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2340 iexplore.exe 2340 iexplore.exe 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2340 wrote to memory of 2532 2340 iexplore.exe 28 PID 2340 wrote to memory of 2532 2340 iexplore.exe 28 PID 2340 wrote to memory of 2532 2340 iexplore.exe 28 PID 2340 wrote to memory of 2532 2340 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4e7e5c8440f53b2d6be1b52ba15a1c3c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2340 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567f70e326b6e21a406b35be2e32d2301
SHA11d28c0f50cf096f673808c912d2f1d14a2198b1d
SHA256bb3ea79a202239d7ea6b66c355f69d304eac4852fdf83a195127ec0b51c82ff1
SHA512ca0fea5963b423f8d556b669678cf687cdb79e29ccbf7057adf6708a79f4a823158fbf424e00d30ec71e34cbf0eb2d0b32138e93712ba95b23762331957ac7ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58059c05d16ca383aedfa3451180523c5
SHA15f8b49eb4f19d9d733060893b338c07d6afd3179
SHA256b953221643da3519bc739d2ec6f1e10166754b17ad8605e3821913fd75c8035a
SHA5129c0c124898fad5565d34d5c63473c8c51105281c7a39b8ad6232b25426c58c4b2a4b3ea3f4ce9b02e1c36edbfb1f4e1debc11b6a653dac9c9a1feeab868de60f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ba95d775a7831951398d313018ce784
SHA139c39f53737cbefc2fbb75dea1975f85a45a51f6
SHA256ed143bf0de21583461c1d401a473fe274ae1c910df0b1379bddf8bc69a5205f5
SHA512df69c89fc9a451fbce5da4af12291cac7d1251546d5c54e562dd78a1f1214780cb0b6491c78ac406549e2ee66270284d79c1486a82f6b9ed0542de11650633dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585fc3d487e6a5b11532c3f74f2d95335
SHA1c19de2f3e6f3fa467b9940f42bc75d62c33170f2
SHA256328e6503a580f54d74b6a500248e30445bcf54e8737cb583dbfb3e09a21f68e4
SHA5120f1505146940a6392670012b587e3362c04955f7ae0ebb8bf636590f38f4f6086d0f4a0034bf66fd84e57cdf5ec46770dc730541f8cf3132c8ad4936f81fe35d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e9eb0aefe301fc19181b85401ff0718
SHA1182064977ee58e640df28bba52126fdc2290e926
SHA256d85ef59a87fdfc7281ad9b64c3b880542f5048a4ccdd3f1a2ce64edd7dc71f3b
SHA512c9b003133083c2751d8953464f05223b460bb8e550c6dd3677a0111b9ec08c4e432c0bef928042039de010e47b952b819b8b35ea1fab10f66339bb5286ae6a8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c54f347beee71df03a333a888cf6d5e
SHA1907d9aa5cc6fbd2a54344b6d1bac016b4293aec7
SHA256cb9013388d0b9e8796ea0d89d5aedc35de386e88291f6da9431298a8ab9e76aa
SHA5126ec574f040d6e9118b4007809693191c0e4b134e7a84b1218217ccd8929332ff7c0f47a9ad4db4ee00144dc8ab8d43b739b517f2e3c5a44c8a7852fd551c9877
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549582a151d9b5753b304f8ed2a74bd18
SHA17d3273d24bdd0f65099d0bf028b20a3fdd1d43a1
SHA25651d479ac933c7a4843ef0ff95ad49fdc565ac769a5f41a0ab64ba75762e1fa5e
SHA5125756b5bb016a055c2c1e6aed60c1b794ef171b0ff34c8ef76052ffc6ad1fe557f874ab24539fce29a0d45f1db9530cbf593c58baee59fbc86c86c9d2c25da972
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d797b5341215d60fdadda4c25c2a07f
SHA16140121f1be87fa4309907ea1cd31c6206639952
SHA25671bbbc863f25258aa89ee18f3cb1b985941dea93bc98426ff9f40dac21b7034a
SHA512fb99dbbd782fabaf154707fc4a37da28efc920db962c6756e65132a4a9d762e4cceb7b944f89bb9ad8819104b4dd5d00c010da507d374608ed84bab699f4b0f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502e6d35453a3d7f7ac732ba638356ed9
SHA1e5ee569f2ca222ab04bea231073a704177d20a4c
SHA256e74ee6335891a9eaa9612c54a8d8bcc0184f534c0ce30ac84d614923365d31a7
SHA5120307ce9e8f158fc8cd4dda432d5562dbed29002eeabd803303bd08ee5261e87b7f70297b88b57232a618d89e83a93aa0ab77c3c3bf76831d7d855ec9f8b6e7aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b4296738efbc36127db5c655ecf4491
SHA11a8e1affc3d4d27a7f35d7d6a1d64bea36ff1ad5
SHA25660a37c27c8578773bfcc46675cf19fde7bcc4bf0c45c2862aa2fdc5fa2f556b5
SHA51212f418fa24f69ac90041a63503eacf32485ff266b0c6f384f546a843cf71e8be58f83794c3deead15b42999ee61522bb22e5890067d92419d871e5ea364da623
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595e92330a1ef81df60d259025059f524
SHA138a795645f772d6a952db3c327bd6d66f8d2b022
SHA256d99e64481f1d3797116dc061c50288b9e8f5669153522a9b23d5629a79c2d3e3
SHA51214ad217db6dcc969751fdad99ffa06e4d224c61f064469860c5d00dd433b57336f8193598537731e955fd7da1c906afea55d094af0ea2028badcf351d1eabea6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580c281920ab93cd14f3b24957f8e0291
SHA175876fa291e0eb40e06e2d2cd78bf2a7c7b782c2
SHA256c47db316662a8350074aefac926d1840b3443626bc5f1d55da5ccdec8791a055
SHA512d054d5fa66e51d1aada9951f8078f9cd99048604640b01fb419b3b12edde1520ce077a240d3ce88154a858865328da5235f6a66a72876a08027ec1a7532cacd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5160184109196cf9587d7f716d288c108
SHA1180582b1597ce6e4ae1aa294c83c900afacb0f06
SHA2564a707e20a0b87b2f813c80bdf1c73fb1acc78c4a6b71f41d841c47d8517920f2
SHA5126afe5ed286593c790d89854c7aaf7db393d3794af4dba4c6bf66b5afac4440a8ac60e9e4e4e5672e28c038a495be63e29dd1365360267cfdc46f1389a1b2b1d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53284e9bb7c5981ed01847dc143b7d843
SHA16bf6af4beb1045bcca2d33e59d4b2c1028c9c59e
SHA256f237b85d8b0573b1cc26a45d95edc2f28e837abf5dd7719a3558bf2a5d3ba60a
SHA512dbaae668d5d196c470c2a53096baed2a3004db78363bf70a8f81fc48af0769d332a03727656a3634ff7fb033529555a60890b8e78ab33c49969f9dcfb925a294
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5479eb4ffb5c4a6282bbc9c60ff2abfc1
SHA109d96ce0dfaba44f53c9ed917ee028df971f2bdf
SHA2565eb90de27459e6e16b46bdb7fe0a90677170f23a7c85bae8fa70dd1eb11d171d
SHA5121a3619da7f6ac1163c54dedc2bf20794fb608904b5939daab318b01bfcd860ead72887c6487f2a33a903d189b64f6f016461fba0e96b3f0d286221090313607e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5199a23d0144afe9b6dbea188b55b5a59
SHA180316668e500b08d79e249bc3f0178016f901c38
SHA2564da1674377cfb285d99fc54ef9009722960feab0f4210cbfafe51a1671a6fdf9
SHA5128d095460ce78fad0a28263517d45288d5ad11a75b8c84553c779559fc7d5bbafbbd403828c4c16b9f56dd4bfa77239979997aa6455dcde74d7ac83325ea5c22c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a783111ed52c962b214964a85b3db4b2
SHA103a34a8e14d46bb0d4f353f88aadf5e70ab5e399
SHA256635f13f62913c26150c1a02e9ceed59d2a7b780f34f344c47ad9fc6e6eeaa5e9
SHA512af50f1df631aa080a173d24306ad8cb1d7a536a1909c51c0ddb48138e194d826f68a95b2e52ee5386b2288de5a59d479deeb1f9f8032549a304520811038bedd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56dba2083853d83a0bea9accce8dc7090
SHA1ad3edd9f174c8e3c28f930c583bba8a796eb47b1
SHA256622752aa9c46b3e128e87dfc13a27344a0db384c0d26aaebadac56c41b7ae404
SHA51285b64811951ef6cdf97d74c2fdec3491abfd64ceda0ebd7df1557931d88569802c7066d70de68d7f38e2740095279ec0bffa5342da987422d1fe54b63d0817d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5534f71370df62c8767ae3a9c5e62e15b
SHA1e4d96d69fa226eb13f033f68e6683053e4592abb
SHA256e3dc0b0ae3209c2a68d8ce2fbbbc91d15c45fb35605588002007dab24906fbcc
SHA512560748cd7cf30da2f8f23978c7e0f9e1d7e2dd01dbd8f830c219735cee769800bde8c46740e06291607d18a84ee569062548a74b56da6c582ec09752778b1eb9
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a