Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
17/05/2024, 08:47
Static task
static1
Behavioral task
behavioral1
Sample
4f37daf71317b603f136485bb8d8d453_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
4f37daf71317b603f136485bb8d8d453_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
4f37daf71317b603f136485bb8d8d453_JaffaCakes118.html
-
Size
4KB
-
MD5
4f37daf71317b603f136485bb8d8d453
-
SHA1
c0a7ca61beb1e939d57a0bc2becb0a9b7a360e58
-
SHA256
7f5219a1b6f252e2cbd69aeb6c601a21ccb3045fc44894b4e602bb4975e63665
-
SHA512
5cde758ecc3e2531f00597bdd38209d2d40eef0606f5e0fb1fca9fc6a399aebf31a09c6288d16e2c891ae865a2151708522d5df8342689ec2b6151b45dd24d87
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oOnMzd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDs
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{24FA9A81-142A-11EF-90CD-4A18CE615B84} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0b073f936a8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000004f2ae72ccaa593a3390729d91c6194048d8f33d4fe3602eea2890e9eb2001e3b000000000e80000000020000200000007cccb253f93227c6590fd61c50e9349b6914b2ea96e792928820a93a86d3c5e620000000aeb04a51d3ec4a52989fa71a6009ae3cf03f506ab69053afe8ea6760450d5f9d40000000056991b36ceee758a5108f995198f2da988e4c76ebc74cb5cde92f4eb900f515849448963b7ce50eee5d5013c818fc2fff8f586e66926c0789f24f055b28e857 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422097538" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2084 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2084 iexplore.exe 2084 iexplore.exe 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2592 2084 iexplore.exe 28 PID 2084 wrote to memory of 2592 2084 iexplore.exe 28 PID 2084 wrote to memory of 2592 2084 iexplore.exe 28 PID 2084 wrote to memory of 2592 2084 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4f37daf71317b603f136485bb8d8d453_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2084 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2592
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560e77b16207b3a344faa092220c8fbd8
SHA1696d2aeb5ca3f5e94fb74eb685a0b92136fa932c
SHA256b35077892e1c2b03573185ecc9bcf17ebdd64700c30720a0c96d171076519cb6
SHA512c96b87337544516b5f2706fbcf8231cdde29986a0e63e0e96a9af4589847f1fbdf772027ada0508ef93686ee12c04d7d64dceee37aa037d07b2a44e601e05431
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525f5fb182933cc8e9264437ad178f6ca
SHA1df85298303bdf7e1a315b593b4778fb823a9dd83
SHA256c638abd8e31c96931cf3d191d375c27405afc9feb9dfad29b7e0193734e57cfe
SHA5128d906c5abf5075f29c01476b8d36ed77a0b7738ee005c95ef8e6868a8ef12f5ad87aa8391d8d0127795b1c0d685ea907d8625c7e61e5181f4b36ddcffea12f2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f727e5c132e17117eec3c6be1cea5f84
SHA1c6775412f8da126afafb4f4ca163fa6ddeb8df35
SHA256334bcad33485b45139b273d3d6cc12f35e4b1a44690dc1dc418efddd5d894758
SHA512ecbf48c3c9bcbfb4f1cc223d963c5e94d3c6d5b7ce0be36c7e93cc7a06ed6935d2714e237a9861df62acd52200630c024816772c5e49bccecaf76a14cc51578c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c10cf24644f4c080353abdaf9b51b2fd
SHA1d9b18b2626e1835298b3d84329fb6a1e4b7e183d
SHA2565038802c6c04cd398af1a0585d74b33f6724b4b492f5a0cec455c0afa8095fdb
SHA5120af82abb52a71d2b4ca3b4516d3a4465dff1789390c3141bd8e93dd8100aa2b52fe5ca6dcfa6b24db0c629e1a5252e9967e6e7c5d4c54c37616d79c02ce7dc3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ddc6b0b047bfc06b2ee4756cda20806
SHA18c2b9eec6a84d0a0ef1b4d1086df8a232ef76a33
SHA256628dcf956e6b28408c4515c84b72592cab4d522fbcd00a571e2fbb68d94c6250
SHA5123f42f1d0fed6927ce6189830807f9571f908e7c2386757c2c41db3cc7d6c1af23ce28bdcf8081ff675627441a2f6ad8705b0729e4b27c254cc86b9ea1439064f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5398836f79adf129274ab7492567a9054
SHA18f4635f18ecd66d8b9b39ce54c4c2239b597ded0
SHA2565b6ca70a58ddbec1e068750f1038c610e163d75629a48397b6a5fc6a84468402
SHA5127470ce65e74799c1e2cf4173b62cadfa284bc2ada481ef054212970c4b7e84526dd93c7d40d92648159819defc8868c9cae222788339b2591d27c241f942879e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e88ee39102529ed98a1b7a09e729f666
SHA13dead4bc81e7de1db1667d27dcb59374c7728e26
SHA256fef726d64aac686c5505ac01846486334f80501d28aeaa27f73de951a5a804ce
SHA512333a7193a24672e861cefa81f1c969e2bdc923a2388dd7e735346e7db3692f915a668b4ea20f10edacfaecc5d3011423fb04c1b567601b815cb9a243dde90f20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a9e3bff3a653f70340c2a922f017159
SHA16d8c49a709017246df307fa38915e0651f8b1734
SHA2569305105168b0eb80f69ef7d3fe99929d83321e1076c803ce4f7789fe180d7ee2
SHA512df5e7d6a47d23ac2ba7d6709b71359cb082f73a63d92aa48cdf072d0536ba0b4958967931f377bf16b91581d3667230bd05da8ce15fb138b387229a7da5b0ece
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543a1c49a4686ceb436223a49e651930f
SHA1dfdbb99c418e91eb62b1c1252364841399653bab
SHA256b8ed1efd37554cc0b85b97a40309f03f1e63022656f9d4d58f4af695ce336e36
SHA5128898005bf27e251166c336ca7c9d6b7e52a0fcef46558531ea7907a147158374d836a396b9ccc3ee169ae6522d42ece5a4bccd38aae751a2bc65ee154ae65b6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac5e6955a540ebb0a1863e7cab198e5e
SHA18acd2dd807076b1f8c60c6910ebc629a17b476e5
SHA2564bd008c08cdb61040ae65b6c946ae3d66399d182427730a40fc12aee0935e29d
SHA512e323fbdc51eb65d9878953990155773056227766364577eee1e815c61c27469e3d814d53e5267082eb22431793356fe288246a52f0ff97d98df3124b81b5e4aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562a2c44eb7ffc26e4a5d2198767be4f3
SHA12804cf7b89517c858d84d3e90b0ec33b0252a737
SHA256bf455b81f2f7338e4154dd2cb839298d7071c36a4c7165253fa526edfb813b06
SHA51265834e00143acbea994819956431ef0897f78bba4444b9eab6663e4e8a651c38df081f0a9b1593ebd86d356ebeb2060d0594a6a5a37999ec39b23cf60f007928
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556a71c3b0257f25695237c282a0b9812
SHA1ea891947da91a7f5bbc7dbf46de22b0583429c59
SHA25669d5d900b32d3e7ba76de9834e3d94347118ef0a61cd93300da1022211e740b4
SHA5124413a17473cd2a2c0311a9f5c9d89bffb9c9ceec96b2a273b66c68120e577c43350e87cc11bad074d1cc8e6e899c55004209c552421b33103786199660447297
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fde003606bd541102b79dd60e0bbb958
SHA1e8dab04ac66836b77ea4539ca6d16dce11a2230b
SHA256546a608abc9ec9f7d752998bbfabecc39bd67e442d3bed1b89ded69ef49175c7
SHA512393ca712b209af797dc4bac8427f3a5c1349139a6d9f968dd8a62cebdb151336477447327839271e15f837cbdbf62d9ef92f392a3f12ce13a560ea1da12cb4e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52829e1b8a6ff9db0ac8785c401720057
SHA18851a591b5e62e68a147e272b48ca55f1a1f85ff
SHA25645b01499583979e1a533910f239808929ec4e5ab91b5e2c48242d7e01ae68497
SHA51294561ef6cccd41209f9bd426df6fce4144d38e3144785ff9b8b102ea171755defbac23f0278dd474cdbd6fd50572ec14d8ed5becc36a96f3144f2a0c0faad876
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d2e51accea72d12c81ece13efc7b364
SHA187db6fd66763e08c494a115de3901fae1c5793d6
SHA2564dacc8582e65ce7452403f6f3e85e3a802b00669723595ff715210458972f369
SHA512376dce15d57242158356127d4138089c1433da925d040598cefa7356f86dbfddb605ec88f6dce9d9519842ab605a7cd9283d881bdb8464eebfe6fe6eec069ea6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f1dff1b90c28d5ce9ba038a0be16dfe
SHA15ec3188003f86dcfe29b6b28fa4790091d930956
SHA256d0ee2b311d7097fe1e39ccf699da14a553448786136f825d49a25f76d6b84152
SHA5121f1c1f99d3f8887374a34e02e0c460d065dbbef66d5286f351cc45ce8dae84e8fdaef982e928b9a7ebbcdf297147772884c88de103793855cf22a4399e07fbd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540ed265adf93ffeff432b5a982aeb36a
SHA15eb55252f04999a15ed2c4302db949df54958ce7
SHA256153b7b02636e8cdaee6f048ea0e41e3f0120f3b2f172065976db334af8e18223
SHA512ca1922650b88dea2b4d726c5707f8d784effc1c78df53205c84a6e1e98b81135a87ae2f0f292ac6c26814073faa4277ae2eb227a17cb5e0cab0119fc09b0e384
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0e7526b787ce485f52e01208dce4ebb
SHA1ef95bdc94f3889ff0229330118584dcbb88ae479
SHA256b5e3d3c1f33c712a5fcb3afc83f04f94f1ad495793ecb131d932686d5ed6973b
SHA512dfbb500ee12cae8f0995599579a201f533b2045207a97fad2c386af09c8ed4255e45c8fb2f3540f9215f08a4c1052682575cf807bfaecd00f1d96e4b200462f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546591c7fd3d2cb726adb2d7a7d5f7384
SHA1c399c0e5013e63ff64fca70e2413b7fadba0f42b
SHA256fad94963c12949462c5f3d8a9a066dce628e019d35ab84c096a00f397916479d
SHA51218351164376e7bb98c102df6e87faef7be7f918a7d820bad5becd0dde306a4030512d43e8043443b83928fb0f448286b4d691655dfa5df000f8609a3eebed530
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5effc48f1a3436ee8cd64261a00a579d4
SHA1ab3c8e45453299574c4bea4ff51789ddf011089a
SHA256d98045284831fb2581bc68719ca94a54d76897fc7dc1a3f7636a2d4cde902d10
SHA512fae978fc496a1cdc0e8dba42ff44a58a1f451158bdb2b7ea815bb2fdb982158e0a9a89e7b6e1d74fc302363d2631fb9b4220ef86c36d7fd061de5c41e9528078
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a