Analysis
-
max time kernel
119s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
17/05/2024, 12:55
Static task
static1
Behavioral task
behavioral1
Sample
4fda311977657d31451c45d6c056fc1a_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4fda311977657d31451c45d6c056fc1a_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
4fda311977657d31451c45d6c056fc1a_JaffaCakes118.html
-
Size
462KB
-
MD5
4fda311977657d31451c45d6c056fc1a
-
SHA1
105e66369df39f96d5909ab12cd9486960e2a754
-
SHA256
eba33f62923457e57a32cb26bba10ea6862b8e2fc58f103ed7e067707527c6a6
-
SHA512
58c61e773fb5690c5d7c6782637aa3a7e61f64314bc489543b011c4731194972f81d151f365d804afbf9f8b3284b43e6e641550259d287bd0e8103cefa3aff4b
-
SSDEEP
6144:SgsMYod+X3oI+Yh7sMYod+X3oI+YysMYod+X3oI+YLsMYod+X3oI+YQ:f5d+X3jP5d+X3u5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000f1b1abb7a354069156f89fb1ff1912b679a5f1e822dc8edc8f29e228ae8c326b000000000e80000000020000200000005609f5b36a98cc1c10e5ee31b92d7ed87cefd37c1c533c9855c45b32247d30a720000000b6580b02f7b85fa533fec465fcc3a8cd6b9aa8cb47a8abcecc8d6f54c8d692b340000000f53d5d38d7f33aa8713c881e4ce703b9fe4fb60d67ab6bb596f72ce2e25df3f88863097868656e6b36efd5a15835ac9bb4c5c7ae8653b76b83fc89c2214077d3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C096EFD1-144C-11EF-8B04-EAF6CDD7B231} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80741b9959a8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422112402" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2104 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2104 iexplore.exe 2104 iexplore.exe 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2560 2104 iexplore.exe 28 PID 2104 wrote to memory of 2560 2104 iexplore.exe 28 PID 2104 wrote to memory of 2560 2104 iexplore.exe 28 PID 2104 wrote to memory of 2560 2104 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4fda311977657d31451c45d6c056fc1a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2104 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5906d619ff7c1a264d2c2370a7512ab5a
SHA18725a7f63dcde65c3c1ed15aceb014475e9a659b
SHA25607c338bc53f233cab38e64d17474b2580c26f811dbe7ef23dc321a3cd76fe44b
SHA512531250e87181aa47ea57bed102adab38cb45b4872ef4ff0a53297ad64ff7c29d7853b5f9fa14b2733c13aabbee719e6750830e1fc7c1e22c9343388912d523af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea5f2701f85dcd8560a420bdea3913b9
SHA1869a3b178fd639df5ca3de688b0f9102b5d68d69
SHA256580fe6828bccf81b7f8919284b7ce9f9239f456e0b91f466e738b9e71c32f82a
SHA512bab5bda693ec79e4c0ef4c48e343ef3f50834f57fe6f2fb47ee12566e72c447f7b1aff1896fa7dd5b1269ed8efbff1692b0687aa225c463f5de936ebad4130e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b802758173e37b291a820c2ef66214e
SHA1963536fe0e711b525e40c45efbadeef1434cfd0e
SHA25631f44afe12ab653c1de24e5d4dee3c8df34017fd14e497d98b934073813abe65
SHA51259eacc9e4cdb4e747d81196bdd3285394ceb951a48ab518e1084c867007accb16575c7be8ac67fec5c5ec68b3c99314370115c3fd89f5952a27356c2b80ba13b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c3b375ef55450d41b36769554f0ebb3
SHA1008723989cce2f7b99f9b776a2a9280dc2225df9
SHA2560e0e9d5280dacd746f288e7986a7e46c2b1ab502f19e683633ef9448fc44e428
SHA5122f96dc1807a82c0112685225b788c9d04573d2e25ae085e29914144a18db152c3a1b60306e61b184b9f17f1279d3550b3b194194fc20732debe0f9f81c3d3a8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59548c6b3a03c00bcf445383b7e629558
SHA1ec77d615a0ee0cb1f53f6c584eb6f7ad17d3f224
SHA256747b36aa78a7ad8cda995b36ffffc48e4875da0ffca7b788cc5b9a49b28c027f
SHA512a3cb2dd3f30c573015d4bf0018b319a4f554f190133366345864f9b86685d4a83168e7f47c68d5eae8fc500569078fb20946cb77ee79d4870729f90b7c8db7d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592682e0f2d9002ed223baf2c997a9e58
SHA1b5c234dd01d1e404b0e950f927afec365f8f61f1
SHA256790dd32083e2ca3f75b8327243ff8c9695c44d525db3ef3488c45587f5c9b091
SHA51297e115fa0d627dbe36ccdbb5a4c8322a6c7dcf27b08c45a356245e06d0ca8e509d42fb799f7e223180d832bbee8c8e40c377fb39d98ec1b5ec9f56a47ad1b310
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5f171ef68cfa3d182ececdbfc80b8ae
SHA11c219f171e40dbb221d9ba7c2fa073e47bb9e54e
SHA25688ac3210272d14c42fa941ec4cdffb9bf07b50f3ec7d48cbca865a426c87a1da
SHA512afc59eea7eb500ade325ac283c3bf1c4ec9b866b33a62c26edf9e4dda58b6976955cb4aed9a733d61822d67e13df6bd6c03cbbf220a7ecdfb06cb37d6c17f0e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542b7b8d9e0a7381eae893d2956c7bef3
SHA1459f7d789da8a23d60b867f5d3072d3ece6f205d
SHA256b51c068b1862bd61589567b8404edcd6492ebe5233aa6f864d623f63a233d385
SHA512788648e7820be0d716cfd6463dd5c0522a90759a8dd3fd58edb608909b7e679ded03293ddcb41be13d170bd35084cdaf434eac8fcbd271754b27e2bee3dd1f9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534ea709df338ce5db97fbe7c2449a20f
SHA16bf636c868c379beac40f721cc539d0f04d76a2b
SHA256eaa1e9e40c064ab9192184c67dec51f00095a9510e4b88871b25def88f10664d
SHA512455561e8be71cdef1914618c22cd1a940c5799d97c6db0ebd40c500eac1e034bbaeaa0eafaa299dc50dc070fb2c24e6607aa79af9967da518ef11d738fdc8887
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f31fde306f76caf451e5b013bba42cdb
SHA1040a45719ecf5c757c429a01dbb07a2a6f0a7ff2
SHA256a10e6077ff2f4ff4ccfeacd9710b512dd12c62a1cec35157adb44957df64e3e4
SHA512caadc5f92328d52c5d250d59ace3578a108390c87a7cd8a9c21633dc7c11c4115f9753137bb18730e6348d09b64f8bb34ef05a00d1b8fa509a42c556d5775d2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b45be582966c048a8850ddeeb9adb44d
SHA11d06026c2c599ce895b1bd6feca053b014bb4f04
SHA2561e4b76e9ff1e28b94506024695e7ba65cba42a590a7f0ef534cfbb344dee3d58
SHA5129ed2716507b58a49ec1bfa0465f6f3a059ae465d9a63940b74ee2d4b7f63553ac56a81b5b6e25e978742f25d3b53d1f192393a6565f5aff435dd0633455223e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a193a671f5650a144e469037f4b68c9b
SHA18b4444bc893bd194688db3bfb08dc7f2703334f7
SHA256d6fc5a5786b1e894f5edb131319cc25883308992e89bb2aa8b3b578805d1debe
SHA512ff5c35b50b4e8e2b00e84e8dd73e03bb5671e70b4ceb9ed1d42544e651e1298a5a0badcde1231ab433493ad04d140d0b4fcf08e4de160e3f3fc7e3d83a2277c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e081790b53b193d70be6bed4ca5b8989
SHA15e8ab394195db6ba2b76717eeaede626fd294ebb
SHA256dd31405d2fff767ec079368165b551cf67d25d3b153141744c6842c83a16d192
SHA5121bd107e12043f60ba83bbdcb3fd8fa9dcf4770225c26154927a89146beaa3ef03aa6a4962d9df8aaee6a4fc03cd990eee015e0c5a3b34295e2bd569c0d94254b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517d7ba899cecdbe3ca8c32efa6ce1795
SHA1d4df00aa1459921a1a0dd61295fed2cbdc1d30ed
SHA2563588d12f1302c3af8e31b39d6c6f3229dc6ab617c327dd58bcbbf98ad568e5c2
SHA512f5ea17f402ac18be7a4d35054062ebfc553df038c7fc1fa872b431e252616c944839dfb57cbc6c1fd2b73e73c1e6aed9e0bbd4a4031e79deb77b563538387993
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c25629e4684c2561773070883ba7e4f6
SHA1301044feba8cc722d771e9ef501f5543a6f8ecde
SHA2560a31ed46cdd3f6adb80a58bd4bddac6b83f5c2725a05727d95efac93f53f9cf7
SHA512e37d9199cca43dca3a91fb2ec0fa2e730a3292dba5b02836214708ced863f428bef24fe1bd270d206ca7287ce0d1c20c41f962334bc560baa8a1a2890168da99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572d2f297c375365f3471d2017b4ef128
SHA1dcd2305b2d598f5c9f26b7152d2c8bfd7504d10b
SHA2561f9cad1224163e887552742e61df22253d08240629228ff920bfaf3fc54b0a70
SHA512f438661017ee74e93d5d8c89c87dc9aeb085a90d946cb30f6aea14c981b5306fd17000f02b50057577d73e29daeec19cc70a387daf941c6192bcd0f716af933f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558eb98bee9dfb93b3046cc0fb91f5037
SHA1ab92efef46fa5e2a6e1e3ceaa049e6e01fea6d6b
SHA256a458b5e3ea569fba35a2246e6fdd8da7a232c27f42ffa9e21d2ecd3ac210d698
SHA51262d175047b1a65eac8b0c2dc74087eb4dfd31c8975909ab6dae5ed7d13c64ac4c4cff1239e25f579e099d0881de7fba8fc36bc24f49d5d1387f4571d562b281b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e898bff62c845a31f8705d5e37c4ac8
SHA18d6d09003044aa968d3f22fb94301deccb5c1dcd
SHA256fb803fd93c7a41f9917aca31fd5f7aa95f7bd2ac8974360ccb118d9f790a1908
SHA51272075658c8080f0effed698a38c60d199fb232119e6e0c61f60a9c02cb3823a86852ccb2103ff8e6b903d9f5b3ee1fffeb82748bc137b5aae10ae360be062b30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e50db8d0c7e2a97a0549b624682f03d3
SHA114e7e9c92ddeb22e1cbcbd0400688390f254becf
SHA25635b0c10e36299cb904a299bf6fbcb8fb03e97f86ebafe795bf683914ad234860
SHA512b0d520a6710749a7bf082fd0a863c3635196b3c3eb22c4985cf5de8ad26ae2ebd6c8df612ffa2af8ef38b3e35ac53f308220f6b533ef983846d1ed21b479b435
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58aee2a26ee1f6fcf83fb387483691c36
SHA1f1516c6b704f68824480522e406ec4d66919d533
SHA256bb5c9f2dec7aeedd202f2f62a17a4e067e8263d3c610615bd50db022aa41edd6
SHA512a17c390f2e1eca8346c810382dcecd9ec7caa9a7df6d6b269735643ad0b04d7d310afb8af8d9195b9863005e5dd756953eecd516df4d8b13836d1ba5df75dba1
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a