Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
17-05-2024 07:29
Static task
static1
Behavioral task
behavioral1
Sample
4efa4ee0799b3157f8bad1dea18c60f5_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4efa4ee0799b3157f8bad1dea18c60f5_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4efa4ee0799b3157f8bad1dea18c60f5_JaffaCakes118.html
-
Size
23KB
-
MD5
4efa4ee0799b3157f8bad1dea18c60f5
-
SHA1
e9f0193fa3ef7101ba142b10ef880db5eb311dcb
-
SHA256
d7b20374696bd9e274894c7343688a22b6ce9294ac7c873a041f037f6cdeba46
-
SHA512
d86b2c7ead5595e181d711d3920b500131da27f0329703ad30cd03231166cf9ce1b4ce6bd6defdcf93e67a1f61427400a856b989835b4d274bdb64d139609db9
-
SSDEEP
384:68TEdoFGw9M4puCgOSuCCgw0RRjOoP0iCsuWuaUFaQapgWa1weRDf4b06qCdv4of:68TEdoFGw9M4puCgOSuCCx0RRjOC0iCI
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 803cc1082ca8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000e08a8da614ddcf827e337be495ce3977d4cea8d5b9ed043f8f475907b4760694000000000e80000000020000200000004e9a21e3b69d9a628eb5f22e7c717b9e663449ade1b20ccf229d9254dc487d0120000000463fe071d7901c0180467ed9c0dde444a197c487b1cb7894eaacebbb38ef32b54000000016d9f1a008be1468e3170c5a63e65fa856701523d520900d4d0651a384fcdac360b38053bca8193804b6fbfcd049f7a2e3b03bd04777072ec0d440a3b524a3b7 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{283C1A81-141F-11EF-A48B-4635F953E0C8} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422092819" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1084 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1084 iexplore.exe 1084 iexplore.exe 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1084 wrote to memory of 3040 1084 iexplore.exe 28 PID 1084 wrote to memory of 3040 1084 iexplore.exe 28 PID 1084 wrote to memory of 3040 1084 iexplore.exe 28 PID 1084 wrote to memory of 3040 1084 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4efa4ee0799b3157f8bad1dea18c60f5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1084 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569c82361b3bd8534fbcbf5db9c6490d8
SHA1c1d5cda39141693231afc07e6ce879936e8d7a3a
SHA256b9b3a67b592caa099a26bde4983adeb97416481f124a3b23feb74d915e025526
SHA51228f06c488ba5cb2c8a55247ef2b7879bee80e8b9620efd4de834644e994f969be636cefe323d57b6549cfe7749a13d63e015c90ae47744aae613df8ca8bd21aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5619db09afa701bdf702f238c8cfadf8a
SHA1850f64c71edaa86b89c186fb01ae6cdf7b867927
SHA2564ec3dac2cf14fb5cb585df1e00340647b48dc9e01ae504ea471900341a1d31d5
SHA51237c732f2c3073f08360ac697272275635c7f8093eea14eab31ef8919394600cb1eb54afeadc9fc7f089357b1ae1d587713a29d9bf3a6783a567431e5b1f5a207
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5609239a42f3d2b69551849dca5f1a1be
SHA115819cdf4d5ab707863f04d37123c40243ab6d7b
SHA2561c22df4b3313e85fc02ed0a4e599fc07ebbf2fc39c08c458c498e56051a271c4
SHA5128923afbd078d8b1673bee8c367a6cd99716c573e0e67088ec39f8b69c362ad2e7c2f702336fe4cbd38316ef541b0e17833a068d0a3454da4485a60ed77479f4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d02af70842ce07925986c7f3fcd0d4e
SHA19cd9e813744d385dbdce1a12af2effd0b90d1b79
SHA2564f5b8540b044a4f7896ee802113abc3ed7af4c5dd90edb088a5a66002c2c2abf
SHA512e7169a700b72737f7c7bcece73b7f6f916e3d568e9454be100d438ba8a469cbb123711c6546527798413ef8910f443cfe8322f2bc88e6d9e6a2f2b41bf6ae751
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fd9757abce6ec25a0893f2f12044c6c
SHA1e120e3e29eb096addde41d33779a41beed8d0a6f
SHA25672a9cf67d4122f2252924436174252767a081629b82e9b547b844f1d35a4d063
SHA5129f44801498dd75c4f4d407e77d0e71dfbda4de9e6e2cb87c10498a8122de563abc6dff5e5ab424ee6167509006c2c6af9ea3d5369b1d0f9113953eb807327d0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef3fd49a45375637fbb8dce0e593a450
SHA16c7ae9d330dffed4f92f8a08c23e5e9421a65706
SHA256d02bc541c1fd12b36014d95788d2e1ca7a8996ad81159e77fc6264695ff098b4
SHA512876e4879b0c69c4d48061398afea19c7ef571270bdecddf790513af53730de548a87146d294ee263f861bc47adf6bd55ec119df4f8dc49a089ada1df02542620
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55afcb124059af4274d3edb5fc79f950f
SHA1353fcfb01e699cabf68362630838fde12fb359d9
SHA25621a7846748d66419138cf9eea29e2e3c0c3f0fdb5710928b97b1eec21713be80
SHA5120df05f6f6ae1876438b96a106f65f15b2c1513b0d454afcdd0bf74b0fc19b4fffbaf49c67d8b789c84397dd3ed3dc7a824173ef43bc09398b9012cd394164de8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f27c6368d266bffd934169b7a39224be
SHA1fee5541784542058836adc8dfda188a481f763b1
SHA256fc14392fc433e57981301ba524143a2115c63624b0c307e862b5e69de966f221
SHA51217b39c0ca0d1d3387e155f35efc93f1823df17d2f01fd69ab266cc1e0f39804b97b8fce8fb97de131e32fd7c0d85bebf7b075778b8ba5a704d2e085c7a6413ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af591366be54679f7cea5265bdd711f3
SHA12953e56a426c8bc7eded8f080371bed627b50ac3
SHA2564c4be245f3e11ab5c50940e2bff38fcae0de8e260bab2d801b0fc9d8679153a3
SHA512d7201bb7f5fce7162963e72df8cc0290b1101e9533558be32b343f27a3a9043eef2576b035cd84233c112b397706dced89ac0a33757a65e692980020bd6d3343
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c1c4738d6f41feb9a525c406c936ceb
SHA118660bdd2175fa0b6641ee5a914a4edf32c25fc9
SHA2565c676b140e5f9df7ae2165383d0791855bf6280f07c22e18e0458c3f64082200
SHA51255f34ab51e682a46d389092d12290c3fc3d1f57b3c2e023995aafd36a70f4a5ebac61229931c0a0b6d0883cc6815ffc2a00723af9c88a8d9ff11519e1b0c46a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5595fe4cb26416811878c48b700599d41
SHA1c26ff2379210b198f43317cba8dec5fd08b00b58
SHA256d63477278e7f320626a1af6a9c84c399458859d7bbb83529baed1d82a69a8959
SHA512956f1c12c814079ddb627b2d044d50fa0891bb5628e840de07fc3cdf21ecd73f29da3eefcd2014dee0d5718851d129af4c57500a8578e1d3d98556b75f698aaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593374243e3f32ca224b23d66b8807b23
SHA100c4f95a44ecad77a6bca488280342fa5c95197a
SHA256a25827738a029a951dedd1dba60f8a6c93b9bb8f043e71cf000b25db100f875f
SHA5125a9f3829898e60386111ad4e7cc8160cf6637f5f46684d33aa720afe4429266341aca62dad7d49acc7be8098cd729b68779397e4be2bbf7794ba720873d5be8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5033da1bafb75fc8dd76265acba2d42bc
SHA16a2bd34f2795a4309b01ec8a049c34119ed04adf
SHA256522b6e9389defee18ca211eba1cd3449080d967abb4f6ba8b391946a481514df
SHA5128f80f1848423f2f092d6595466cb6fbdafdb1905c2690e133b6d7907fcafb8dde7f8a94efe0fc0c39ab24ca26144b4f1807c705b252876e223cf86feb06ce6e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5226fe5133d56c7f0104456260103a1b0
SHA1523c0e6bbe245d52e98e0ea49e0ea3104f53d007
SHA256c375e027ccc7ffb261fa6c3e04db7e20a0a0fe8b79807c74f192f9bc8d4a097c
SHA512539faaa6d8d3388154a8b94c0ef450b4dc30e7f70141b56abe9cd7033a5726680c44a15cba43b33fc4de6fadc0d82b602964217bf6b80745715859e09606b146
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56bc8490825f26f18cf2488f06aa5df52
SHA1196a73fc25f27e68aae80c3e4e7ff6fa8947d21d
SHA256d316cd2ea4e16c688bb537f805a448b44e405019d1750761cf37cadaf6fbf949
SHA512f68fddc7b7d7f45f49eade5e14b71217df2b8389be8c7d48b465f73ecb03e8d2d959a0ce82aaef78ef5cf21b7cd9641d7838b651b9dae71df3884ba0f965f664
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b8fda08283872905989793597e2d947
SHA10b6be728366579e2f732496ba351976d30618460
SHA256c86dfcef127b8e463526b66f959cf7e2c30c286e858ded2dc02263ba781c989d
SHA51281f046ab687e4b6151452af466d2ae0c0c924b16381ab109857a0670c7dbe9d11f53b4510c08405741d8d5851281452a8d123b982de1dac929d6420b45e7b485
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5402311f57ba827c3ace6d38944819785
SHA1736ff0bdcf1f1bc80430d831d22e61a310fa448a
SHA2567f75a395436a822c2343f0904275d3b2ebd50c15970d5611db998e717e54b63b
SHA51295819dd7c3f7ccd5863045b8e40c6e968ea001dee5452aef9ded6709bdcb8e9b3b4bee31ad914b2ff1e6cdcb7a48a74b4da4f8189cc576924d734003415af856
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57782f9e3b9826c1d22bb94d480d6591b
SHA11ba40caf439c648b5fe91213275f7135b62bd761
SHA2568008f28e85f8415e84da4b00c24f77c46b731fa3b782efeec60d88144f13eebb
SHA512af441d5c204c50627110c7cbe8f816f38c3b319766e2f0c9a2ee0c419090f4c324260a5e5d4abc7db73ae6f9a10749a1b8c2b59c4c1602074a407284d0f7ceba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d53f97f6cea18d8480401013fce5dd55
SHA1d668f87dd144f9ef0bc9339ef11e327ef15927cd
SHA256dbfc2e51af6dcd6a1702a6bf0602bf667943ee3bae4d419b38c6b449a291399e
SHA512e7323762270173a5fdf39c45919a97b7cd62e900def9ff2691df3973b624ccb8cd3e0d732cf056bae49b8a6e175c3ceced333fa3526a8e007f2b799d2a8f7786
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b6744d4d89e8bc489bfef3969b29940
SHA1f98a2744305541d7d5cec0f26ece7dbe1924c427
SHA256cc0a8a7a847c1d18e731d27edd36f6f6dc194b10dc8bd1da9b7a0b41ad8da691
SHA51207f95cd5b465cf25c1c3e823cb569ec39e7c32ab9ca02414d54b2981e70d62d0051dd9039f9b9df01c38b77966865df8491f645936c6530633a155596041ee42
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a