Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
17/05/2024, 06:57
Static task
static1
Behavioral task
behavioral1
Sample
4ee4260c78fb8eef24d1ff31e6941dbc_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4ee4260c78fb8eef24d1ff31e6941dbc_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4ee4260c78fb8eef24d1ff31e6941dbc_JaffaCakes118.html
-
Size
461KB
-
MD5
4ee4260c78fb8eef24d1ff31e6941dbc
-
SHA1
1aeed99a9c8733279c3481a5233eb0ad268d3ce8
-
SHA256
9838f08c21a804b043df634524f7b681d9aea52577a6631125c9a9dc5a53c09f
-
SHA512
bbec2c439ca68f6b88e59d2e631a1cadd5bac4e112c63ae490f8d8d4b5956c87581638ce8e283b7d93689a465ca2eaa9cca144e8fd4e9fdc2fe7460d5fdd6e11
-
SSDEEP
6144:S5sMYod+X3oI+YRsMYod+X3oI+Y6JsMYod+X3oI+YLsMYod+X3oI+YQ:Y5d+X3f5d+X3s5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000005077237ebd73d67aa1df81d64cbe02dd2b826867eafae41ba92279ff55308f11000000000e80000000020000200000005c3ba23595f7b032146ecfe01c5924d4349e94f479086650b556e04d8c1de9fc2000000064e5d264c72e19bcdec44a02adebe77f47755dc5f6e6b0f3bd8479a26da5e78940000000c1d8052e63e59a5d91b8b41ee981a14f8154152c1c398d3135f0acf850ded5bc9c3d9d99a5c068bbbe3a2bd680bcb6edffdcde25e17bbd83694ba5d1d89283a5 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9054c28427a8da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422090893" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AC37DC71-141A-11EF-ACD5-4635F953E0C8} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1764 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1764 iexplore.exe 1764 iexplore.exe 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1764 wrote to memory of 2924 1764 iexplore.exe 29 PID 1764 wrote to memory of 2924 1764 iexplore.exe 29 PID 1764 wrote to memory of 2924 1764 iexplore.exe 29 PID 1764 wrote to memory of 2924 1764 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4ee4260c78fb8eef24d1ff31e6941dbc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1764 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c89c1204faa91c9713c7f72e510e21d3
SHA1804a0208bcffe75734de05509ea574f6f90e6b33
SHA256286812efad689bc9038ef7112fcbbe46835c798a36ababe44f0838e0c1bf54c4
SHA512a4fadee7a0189fb922620f8aeaebffec75c9f3fae47775384636d3d93ef0b87ae10a519b5f3361d344fc3392da786efadd535ca9aee57b1b04e4aafa93173b14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c23d86f92918cae8750b8e3cef5c9cf
SHA144b351aafa93236f364e431dccdb4a243f8048c8
SHA25685aeec3433527c3ccd1382264b3de89869142e4315ecb6b01af8d2a2ea8bd033
SHA512152af78fed4654a757ee916f4abe1fd5d0a3676efc1c981060882f939f8a04efafcec70aac0c976e24944afaca3f7ef07a77acff69c1453e45fdd1f220119c68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f042a4c54958aaf41b27f26f9ddb5fb1
SHA174067e817edef10ade72fa8e3ae51adbb1dbdf2c
SHA2566e9f2cb6cb999d5fa855dae853416a155874e7f1b35cd50c4e3c340bb76c1f05
SHA51221eab97c842bd38b75e9144f5d8c0045d4bf73d81389d80bfd8fe5b100ebf5946881e9cb8a85b33124820df67cc4e24b66701ebf3a13af85899c7e492e4fb0e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562a754e2c2d1447002a02063846a79a0
SHA165c3c9b82ddb51df3f73fe1a0821a7211ac28436
SHA2565575b2f2d47b25626a17d8969e206c5a436dd7c87f7410c08cf1eaae15d33e76
SHA5126f73a8a9614b1b06652e2d0ca29be97b43139ae0c2614025026f0f849dbcc0a5a29f8fbfffbe41a48afc2fc1f1368e548467e045201a6be67480655b292b9f44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b445742f8dbd6313430f6fd5a9b3d00
SHA15ea1d606dd0091552ab2c5118de75b15ed1e2c45
SHA2564f91c6b56ec34bdfe0a0ab26cde47726b1aba63fd948073b37a7bee021cda73a
SHA5123d786c06134253616caf1b4f395d195bb66cb93b5fcb9236a149c8c6fc0918ce0a77431d02ea25f70e6eb45661bf9c9e3942c800802414df1c1ebb9d55c7e3e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55094c7f2244c8738bd552c50765fccd1
SHA129506ac8a07019aa8ac66dc40ba40a7aa6594493
SHA256ec504054eb9d27e4b6cdea631f560aa74e4f424487c80032284c59418e71cdfd
SHA512287bc7699ba57b883751de2f59cbc334a0e61ea333144f5c45bcfc7f16b1ac6acacbcf0a48eb29acfda9ab479b1f00292e0662ab490834abedbaf41b4c41b8c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf4fb3010285b941d73b5a40466f3b81
SHA1f2e8a7a6742182f06380a14845ee5a5ec4aad982
SHA25635f72a711b34eb42c325e9c1691006362b3e04d11d6c857aa8545a2d39fbfaac
SHA51264bf3503095e867b380537f1c3593dc61df1bb5b09b1a96abcb43289a6d1683f71b5e3c1ed41daacc64065c18bbee466530c9a4cb2dd561501db6b57039d75d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d8b55fa21d9ca870d2d1dd1149c0660
SHA18fd31fdc43373678e611a026b29bb80b0f5a219c
SHA256f4deb66dc6d0fb7b30f041f1ffa3786d82b082361b11c5e0b49d4cb7e43e52c8
SHA512a84a3a998398e0c200eb6178e78bfb906ebfea87b815c02943eded2fe6c5f5937af02599f6a01b4094b9b1c93c561c5996529889a9c83cf5cc090956ba8670f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c64c06f00ed57d283b75ecccc8ec3e4e
SHA109ff596023d4287ac0e2bf17e9d7910d0181284a
SHA2561b77f954a3d0a88a3c8f496d864943f1d9167234ae3fbd8b3bc586f49552a815
SHA5125b236b78eb7f7e73d1037c0c3f583b2f732408b5d1fee516ded9cb9bac27d7eaee6ffabb3578b6b13f41b403d0e74e57727ca3ef0c88b42e30d964e621a42ce4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db95d0352037963af5b485d4fa6bb8d2
SHA1e5b7b0e7af9f29f03cde60a0ad4f5157965d2e51
SHA256914f45f72bd7938690771c444126ea51c5e2d971db01d0edc471c9e77324b37f
SHA51206c2265e0f8033b096014b2faf3f2bbb3baf2e076506e4db9658f8b8fa4d5329224b183ce2416a9cc60e54df47ebfc5ac5e6c363b72f4e310b9135fc44768daa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529b9c80b3fdc87b61e434cac7f50166d
SHA1bc65a725609f1ff201a55e33ff874ca5b9300ed0
SHA256e4ff42387d59e2c2d030c15b558ee7ff7ae9ccb9b00e7cc6b668e5b1855f7a98
SHA512c0d4d5ed4be5fb2d71fa1d6e868c22fcf96ee919cf2e4c294e2c2e7d605c336224b4e8532e3c436b481d4b1a80eaf1808c017d1d0788031b7c43fd86f057903c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51efec48579b7750d3df7fa5d7188b51e
SHA1137af4e1ff169ecf12173008743a0f21ca380b6e
SHA25606a0580b74b51c17afc7239fae557ce03231675be0ea62963fdfe8c8bda919c5
SHA5125b44b3fcf93a58312e8275d9c445816a1353441ace0532a1c38bd4a20df04fd61c3b7a2a0cf4982456398746c497bff5ee5ab3d7ab74e53b576d05b5bd3bb440
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528dcc879d6d0592204e3b7f34e0706ca
SHA1c05f03b5bf3874dd3821c234245e770260ffa534
SHA25691362f35e9481113cd0ba97f50688fb5bcfcde167864f6bcb2ce84d1a194aaed
SHA5124721ee7776d693f32dbd148ee713333560898ebff9e6e62de47f47b748349eca072521cb0b8df4a1579a778ca0471b7eaa7c9b23b80d1973b2f3398a0bdb8b85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54549c56c8767ecfee7992eb5eab29bdf
SHA1c2c0637053877d5e7deb0e3488523ef9592353fb
SHA256c672fb42c871d85c8c171ee721ea15c18ce5615e8acb2faad7f5c8ede088349c
SHA5127a6a9b921479e002a41252315d84f9091362fd0deb7ba114863803cecc2d0a0e58b1478ebc685fd6516d424decedb97e835bca2b50a1923ce20503956beef87a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5316d6939d91ba4382b7350d9cf04ea7e
SHA1ad4ef29f5ca90cfb0c1b5ef14222ec2e353eeeea
SHA256813fec0903cd2aa6f3332d56c5b5be17b5272a836e7e29212239430eb0571b7f
SHA512b6c141ef29661cf074e5f0439cff783d58b66dfa36b36c7856b258240a90e26f2b2b7f0ac550cc01b90db6b3ed80f0da55b4795e51107cb601fdd2ed11d61c10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae9f1887b1b43a1afb77d96b2263254c
SHA10aeb624dabe5e67ffb436767d298e4010f7ce957
SHA2565d30acc798a943420bd6d88a5a392d4cccadc34d02039c6617a3bb7f7891d67a
SHA51286a0b48eadd10fda637a219b5e1f116dcd45c363637b3f51f946ab0f38edffd3878153ec1536519d4c5dda5db502e66b8f6d1e2b7c97d5fd34d2d484d9717442
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9549e5641408cf1f6ecf562985b5d6a
SHA122e522fa694e2a848f45a35b079c82f83b266277
SHA25605790d89316e6bd00096d7106804b7c7952e6c4f8ea9e1135e5e903f90870ba9
SHA5128cf9b3d1886d997e91214b4156cb72d91ac17a2fe143fe0aea6926c2ddc26951dd765b3be8755fff81cc018a2093deb2db5dab6255b44b81a2c67dd506039b1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a519f95164614a3c00eed0fee3abbeb
SHA178146ce305ce84c44adaa118f9233c47dcf882a6
SHA25657b545ee739ed016cd9d16628467fe299060b090e56542451e8cd4b3c22d22f8
SHA512d87144f19f90f6f5d14ab08ff3ef9df370113007c872c98d128626d9e9ad1bfa30aa77f5315074b4f1b3862b6395b7eb7d30431b9732b0bc5d0bc3913f357d2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a82ef8c2cc5ee9a06924821b1a4ac52b
SHA12fa619b7bb81bf37c25a3489763b8c61c19279e9
SHA256750597f8107e4674ca69c670f8a992344016d59a426c2ffc0f45a6d50ff2faba
SHA512ede43430f266c8f2100624bafcdc97cd93d7b6b040754a2791a76bb58c23bc813a08c5876e93a6a728ef14eb35a674b322abb0b52cc389aededb73774fe8ac8f
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a