Analysis
-
max time kernel
140s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
17-05-2024 11:21
Static task
static1
Behavioral task
behavioral1
Sample
4fb7c90e9fea2da3ea3c2878e4e78479_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4fb7c90e9fea2da3ea3c2878e4e78479_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4fb7c90e9fea2da3ea3c2878e4e78479_JaffaCakes118.html
-
Size
32KB
-
MD5
4fb7c90e9fea2da3ea3c2878e4e78479
-
SHA1
c4bbbaa0d6600a0ea00d1043e0f0c2a003e688d8
-
SHA256
b3826ce0e1b3cd750d4c0d3190334f3dee951853f7cff4a036e0abea6aa7b29b
-
SHA512
d0bfc30e324e5d8140847942d635d6633f3c39cf9d910af8794ce34768430fc38ea30374491517731ad29244e2ee12bbb103b1a8e499ef6f4f9e105e111976a2
-
SSDEEP
768:0Pn6ekQrMrLCj0U7G7X7w7u7h7C7l7x7r7N7H7JU/rHcNdU7G7X7w7u7h7eiC:0PxMlU7G7X7w7u7h7C7l7x7r7N7H7rdA
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422106750" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 309bcf844ca8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9731A111-143F-11EF-A538-5630532AF2EE} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e93610000000002000000000010660000000100002000000066d7904bb4b538b25af3eed73cb06c51b9cbf9ba92e303c60e80e7169ec55055000000000e8000000002000020000000fa663d113387a1333257905c2959e27ea127de4fb52d3c496fb49ccd8bf218f1200000004efd0cb222c3aab3f18641aa6b305fbc4528cfad99c1a0294b47293af7f3165c40000000f7f40270dccf92fec0b1ffde10baf65775f1fbcb737e4a8980867470d59b113a3c1f86808946402b1aa80a084c7b9d2767c87f4ae326fb66decb5d661e8dd40d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2348 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2348 iexplore.exe 2348 iexplore.exe 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2712 2348 iexplore.exe 28 PID 2348 wrote to memory of 2712 2348 iexplore.exe 28 PID 2348 wrote to memory of 2712 2348 iexplore.exe 28 PID 2348 wrote to memory of 2712 2348 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4fb7c90e9fea2da3ea3c2878e4e78479_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2348 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5439b99e89acc9925be1238c5832613bb
SHA1c776a8c399042c4479576e149c059fcab5e2c416
SHA2563e2b6f29bb3baa556715f80a7e0b46e9b173ee7e5c83768172138c7fe0ece02f
SHA51207fce155735ca15dcd95ea488bc347170225c65f027ffff486369ac85521fa1910232a0fff5bb6fb5adbdf780e86424f27510881c4d8f39059ea0d9808bd0015
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd420a414527d517189b5bb3ea944f83
SHA1af4cfdfb263d9a947479720231cc245a4490b8c7
SHA256f564a7f74d3b89e465f05f4f97a7ab4f963b17862c3a71e781865493a25888f6
SHA5126dd4036014ec6fe91ca03d1a8d3140239180d82a7c8f341d557daa450d873dd1b1d4647ebc0edf3a1c6c295de1b2c4e12712bcbe189274d1f6c2d002c20f3474
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518f26d7bc133baa2dc30db91fb44f941
SHA112bad0dd9d610d6432865f21be8df79e2baf60fc
SHA256dbe6530483f4b7a03235506f9d7a03e5c43c5623f6fa321999b5e55a2be74bc1
SHA512bde7ac5c24c6feac16f444b657a5fa1af4b2c37a8915a79a5bcc361fc484f72b816669667d778a09ffdadcb72cafed8229e79c3a455094780f5f6270d565705d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d5645d51a1a1a6520df01b5e3a4cb30
SHA10cc5bd4c0339bb0a217068ded5271dd5b88ed88c
SHA256ba6aab957ee4580f92da8b1dfb3600e1a4f2e8fcdb0811a578fc6c39a53da719
SHA512508112dd79b6dfcd6fbdb9e2a59aa9a3b8a9e597d3b47aff8e4c2d1d45e6b6d3a98c960053aaca3149f36801193c30e79e6c2a5bd1c17763055717e411995e39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518673314841198ddd3786e02c130bc1d
SHA167d212f29332267afdc55a7168091af2a7ba7a3f
SHA2569a33c501b77fde408bd0f683a869c75bfe6041f701dfb8bb730dd07f44d8aaa2
SHA51288890a24587aa1a8cf9aae9dee32ea90e0a0321ba628c09eb8fd423d8a58eff3c9b2deed03deac0953847b20998f2dc2c63bf843797659ac6e46e0d102d15e78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a30904b1450ce308467561c1e2cdbd7
SHA1d2cc14b7aa8249fa991c7b7054641cb5345f4163
SHA256055af8a91b0fa9bca2611e55496a3cd8ff5da145e6017bcc157ae611f57f3105
SHA512c47d4fbc7ed88847ea1ef57992de74939f9ae83753279eed764b7ef5ec7e3c10f23cb06ae156e5bc9485e1cd165c8ef0bec6ee0078dc41447fe2b137dd29248b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518b2d041ba9be606393773706f1321f1
SHA1ec8cbc0635ba554770715547faabe974eb7e8673
SHA256d238a8d5d0d31df83f3868e2fd2efdcc0e2714059218423443cfe8180e3b508f
SHA512e8653e98cbb7c2ae1f140178e6571adbed5fa629b5b9a87b6be9c10819496de22c1e0b6171849e353c72845aeedf1556ead3c3b9c6385bf4e0c411e4a9a471ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1a6fd9090f8492f907a6b4f33395cb3
SHA1141f27edbf2864d5d67fae7440bebbc19d90d60c
SHA256eed024ab83937e3129fdeaf7081d6981d602b94b1a329e0bf830165297a5413e
SHA512a26513bd89ad042179efb798025ce8dcaf91860efe92fb0216cfcbc18de65d91f54cab26075061ca23626f1d60e22615aa82b94ed1f25bce3516503837cdd646
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529ae843897bf96f50a22ccfade432ba3
SHA1d1a41d553b95a2b8bcd580fadb6206f77ab16c6b
SHA2569458320668c88dbbffc4f2a023aaf4067db465639239721fa69b8dc9103dfe37
SHA5125363ffb19dadf81705be8a6a4499c01433370454753ecefe7406901ab8daf5f25a09e80840b75ea302c5b828570fdf894450407b7be911a87c75533737bc3323
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fee3ff2adcb7336d0f5ba2b8e84c51c
SHA154187d6a41910f7fd8af4b721a042c69497dc561
SHA2562b7326cf48f52e8262a32cad49ffd73eea00c42075a46909f5944b7a51d36703
SHA5127d182d7abba4258ba5186a49b75702e4c0c8121f7adb52296bdbae1cceb2552fdb652a309fb170cef94552d6155c4a8c6a4ce91035a64fa08aa77417f85cb1e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547abc03071b422b912bdc95e0e058e71
SHA1e34b1eb3b39b89724947d496341167ecf2b7fc39
SHA2565e1ca7aa17a4aaecdef2d64f107287506eeeff886eb2dbe8ec146798e404ada3
SHA5121b3119065b17b644b27605146d9e72ad7e3d995761686f2b9963f1bef3591ec876deb709cd37ee51ea39b84878aaf48eb56626213f0f4f3a5e6939feb427cd34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53628488ba23fe5bb75f2ffdbcaeb68a5
SHA1181b23f0db15339acfa070bef4a038a495f8bdbc
SHA256fb3a260a725953686f870c8d37e7a66b5ba9a329c28d5f1d2549acc3ae28a748
SHA512bab9dbfdde9989a8dbd060d28ad7a2cba45f4728b011c96959ac87c6ae95e5ddfd2622bfe03c726fcf225036e16938a0327f54be1fa6471930138a8db73b8354
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58979272c9c7756e6ef5cdf5d5b1a2b7b
SHA1f13195d48d0423334065ab0e2d88d0c9db8b6f10
SHA256398221f682a46933194044f2fa36eec3f36debe8743f4a496f2e51814b680d18
SHA5124381f3aaf2fe88f4e77c792307bff46cc75703fc32345be20df443b0f3b1ba2f5d72a127bef594ad1f27edf664148a7c3f5b18480d501fca139b1e04e2741e7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6623841647e09b639bbd82a1c5e39cd
SHA1095c34d047598ae90e4f76e52e58d3e25da3a54a
SHA256b99cfae9295198656d57753caf21fb381b69530ebb5c42abc970069a3a54af6e
SHA512d92873686187b0a9d7ec814c92a51d5646f9b29ed20e840c6081b9ebead93f1116d5a93cb3830570f354d5d1bb1e66b644fb060c2ec7f6a437c1332ff8cd34b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519428b75e53b14212cb5d21d763d3baa
SHA15a7484d7ea8629b12ada0b21533cd1342581b7bd
SHA2565287f9c046314055f5a86270500721573e7005dd8e651bda93c13f63a19ddca1
SHA5129e0c77371c2556431a5255ba10c8219d5f92a7f0210ddf3198fab024af48733a4b16f8a8da2ca2dbd6f921fc51f6d7a1ad6bcff402fda7298eb4a835fab5bcea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bc3cce0b1f4a8f5dee855fb3182df1d
SHA1b68eac9f213bf4188ce297b2e8cea32671d67075
SHA2568a398edd4e8ed866770b4dc1342d22ffd136128356c82d1ac79e6d3f2729aa6f
SHA5124e2a45bb6e3e63f13413ba54a0e32617b106b06df281b20e544393c15369a0093c90c4c92207f10b7a9a6220157b1142af17bdd465ea49a5b5e20f83972c2488
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596f810a3b31f71e183a7fc46cf10a1f4
SHA125e21f7e5e39b5dd4b3a40862730e0b42e5f6e5e
SHA2567ec6c6845d5aef5d50e7d9aa404380f408aa9c363401fcac498fab2dd972a529
SHA5121a1cfccb9456742768c0cb9ed57751f161c8c65a65e66a0f72b6a244a5de880104c5d9f7a118bb7e93ea6249dcdbe8446aee8857f9948dd6841b8f140e693c36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a889352af33ef5c79553d72cc5d01b13
SHA1cbd143e477d76bf7fd7f1c2f2fa8072a8008c315
SHA256a3d61958403a5a9e63f8a4e3d151cc8b357ab23d6a487571edd892224039e73c
SHA512515017e61fc894d2874e8bf11b23bc4e090f26591f2d5218ab7dfd5e1c3cf711770f5d27ec9f4f356bf21ee5171b219e7065fd88b9faeffe24276c9ec9764ff4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f292ee3cde337e1dba0ec933de41cf0
SHA1e8a22dce9af6f2947954ff904dde2129a87adc3d
SHA256d41b00c69b2dabe7b057ed37c19cf229a03b10f4b0c28b20acc7b9679fa6b34e
SHA512972319947394b3ea9cbdac96ac877e7ccb747eae099ce66c1287a2332e9bc206e742652135e39820127231063874244975c475060e1788ae1338bf2ce9e6bf8d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a