Analysis
-
max time kernel
137s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
17/05/2024, 16:22
Static task
static1
Behavioral task
behavioral1
Sample
50638d6f41cfd34bcf661468adcb88b9_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
50638d6f41cfd34bcf661468adcb88b9_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
50638d6f41cfd34bcf661468adcb88b9_JaffaCakes118.html
-
Size
160KB
-
MD5
50638d6f41cfd34bcf661468adcb88b9
-
SHA1
1c851514cfe0cd0fe363ddb0363727a469cb068d
-
SHA256
20b9b34eb454c53643d298c9f6f57b43d721766a1535a3a9e032b4cf038f5498
-
SHA512
97b7fee467a52e59d69bd5ab8916511187353139ed1c211216f15bc78ac8af0c7ffaec55ba962a3d8f0b275ddfe8e309b55f934a90fc4293ac19068b33070103
-
SSDEEP
3072:SsDRjM973VyfkMY+BES09JXAnyrZalI+YQ:Ss9jsTAsMYod+X3oI+YQ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 803fe8ac76a8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422124792" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{99081CB1-1469-11EF-A4DC-6EC9990C2B7A} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000afbf519bdd2bc74288b5815e90969d8c00000000020000000000106600000001000020000000ada8217f3ffc042793c618f9da86fb6e2916d0ff75bad593e58a4dc25c0cf091000000000e80000000020000200000000df48f3f186ebcf27a60d72727f6f7b1bf838f972f570a93a429d695246ae69a2000000036df830e57e629c0e06e11b09d62347502bd81f1403b8ea5d72a101b099841a5400000006871a1b33507754d6a8b6c3b11079bf6731fc141038e489db9c71f0549c8903b0a476817f97f4e3dfef0c1774b3db6eb5ae4affb8731df11c9d2d1c7459be5f2 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1888 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1888 iexplore.exe 1888 iexplore.exe 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1888 wrote to memory of 3048 1888 iexplore.exe 28 PID 1888 wrote to memory of 3048 1888 iexplore.exe 28 PID 1888 wrote to memory of 3048 1888 iexplore.exe 28 PID 1888 wrote to memory of 3048 1888 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\50638d6f41cfd34bcf661468adcb88b9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1888 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3048
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554e4329c93ab719b68fc2b30408e84eb
SHA1b99bad205fb1a8d3a8a377265a76b0b194c2546a
SHA2569815d0ce10282f9e4981bae073bba13f214006724cfac5432c6db0d600255c76
SHA51276416b51cc7f48713bd53a2cf694be028ec3c8868eadfa11ebe8628e8e6b3f6c2d5795d2d73965ddf8c47397d483fd659e57853ca9b7240ba1cbcb3a19a64dca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1a93af2701d5366543b08d1232e44ea
SHA1c0401301c54ff70e8cd5552a238e8086e7a02507
SHA256261a58e740c6ca019911bfc239c3708d39e99042bae75940ca6117f0966de8fa
SHA5121fca2ae2767b678e616b6dc881d8a780436649cb5c14170dcaa1077593185fb337c74c7a912b4e166fa74aa17055f921b9538ab0abc9bbd4d45ade324be34a46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522a04720ea413857a5f403d0a4f4c9a2
SHA11d533560ce1bfd5da1fa6f14994e6b3b7ea9a549
SHA256545631f7447e60449902afd3477cc313913da1f84017c640374f5e44ce082ce5
SHA5122b6d78af047b9c2682ebc60b2734f21c5f19173f662a4ad14903be5643212bf9937d0e019082d94db12c14c2437b062d41324388176b3ce206482f5d7f7e143a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c151133b36f03aefb35ef9c5c5c9988c
SHA1e9075a056f6af4dac8e7f3c19f7862aafe010705
SHA256193536cd4c1105fab62a10892cb348244d32688d727882747f070590d4a21d87
SHA51253c3475ccd9629234d114afc5d48ae71dc420d4e10e3629af00ec5238c41246f22e7fe85b0fd9775762bc9072ae4993d66fafd514b36d89cde31b7609379ca97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7a0e62ead158bb244c4c5064724721f
SHA1230db9bacec1247fd4d255f72cccbcdcfe24d6ef
SHA256b35212d8c5a55b2c876d94d8ea4949741d5bf4eafeba98b8caf90259048f840d
SHA512db4f02a9cc6b304f3c751cb5a32f9f2908d1b41a16c9b0e572f9a7e3ba026cb8c3ca26d2b26469913a40b0f47291501a17c3ed05846b21b9895004ff699a070e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5b00e3e631ee6f1f37bbf1c3cea57f1
SHA136abc53aae5b441d67aff20a8a67d077b7c74df6
SHA25678a985e49fe0b2a95338a210277dec205b94fdc43124a1c1fac81f8371f92d75
SHA512c5295db60db25867c8be7ecc8e48224f717127254966f7ed22fd2d74382fcbf1d8f48465734ded8cd2d5817eca02f60b3dcc8d3fd664c7a3eed378071a882389
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7ca356d6c7b4989d592d2d3cc4dfa24
SHA15c62f0397c1839ef91289fbd7ea35319ef4d9734
SHA256e1ba446204bb8b554950f77c7f1b3041d6072af7c266f14051b8ee7deacf0508
SHA512b10241560ad713429ff0a4a52fd246a1ae95e895736140c982408fa995a65f366665b0cfaa7d7c1ebf542fb6572abaed5f9b7bb4d739b20fb4bef19949e25de0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b7b1198e17bcd45ede7a5ba60bb49a7
SHA19633edbf4fc4be5ab205b3b54ca6e6be3e633f92
SHA25672c9f3e7056efdec06f7168a0d17078d6ed618af4062bbf53fb811d026573794
SHA5124ef060ce7d11109c86a0d5d8b7cc3eb57e35873f7c61a9ab8015dc94828459dcee2713ad59d7b9049e35bf9a5fefb7a39eaa71399d1779ce6fe90b61eb4f81d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b18195ba44182d49c7d4642e59e15b07
SHA1d0aec2c7b0207c81c5e8097e26ff8532104e62fb
SHA2567aca56d45a7ed6dbde9754cf2b2c1494fc9555c657fb3e898ca26990c8357d4e
SHA5124808c0de5ffa1a3da2850924c87abdc8ebd6ebb1eb3efbf4537d01c6862c5215a484df1e9386cdf1df6a234311b3da7b355844637dda68fad1e936d891a13e54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dbd1ed4fcd9e2621a2b384e8028e26ae
SHA1857dcf327da10d55365585f456cd645b8a7728b6
SHA256343793ecff5ede161f20a61649c9f1cc1ff146ef1438772c38ec8d602815a1e3
SHA512892d22c15d3f4d234fde9f6f7d8da26c89a6484051979a50a36dc4c4a017877ceb2b6c5ec99ba3396486daaaa7d9865569db7255f11baf84d0f54941a6ebf485
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5749b56ba4d937cd38365d83c5c01323b
SHA1f62427ea006acfd51c9a1bad7d165ba7f49f18e5
SHA256d2a2fea9d7b42b33557ba56ef45efcf79b2ecc7957032834d634b99712bd6c3e
SHA51275e4308367dde5eeb09e6f80541e66e588879bd53207bcb300fc79c63badbcb7477467e5a8b38d569118f69951c4bba003835f8a8183e05f84eaea39c9f44676
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5707f0faa8a75b03d3b57a07153c25f
SHA1eca0bfe3e70dc027223afcca7ad12be024ef944c
SHA2562a11f83a9e928366d74a47d076d4c199eae1845d54577c49f08546a9150b564a
SHA5122162bd7b9657fc321972cb562bf42564071bbd219d862d5646f40334c4c53bff334bc72ee93c6e23baf699617e5a9e09083c845564ff4684da678c47587d06ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c26950728885e99e4b0ceeb386cf166
SHA1b537d679055661395a422d4a18a779834a41965c
SHA256dbdb062da85c6b133a09cee6e44a194ef3b064c256eafc1c0d9f95234e181ebd
SHA5127ac456d6d0736ae18f0e016e05704f26c66a2bebc9579f1ffa997ce87a903ade9ab876b3bfdbdf95c7e7a66c3147f90f000c200acf7eb5b94d014dfdaee265cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a330523ae0e6d949ca7d6ac6b0775d7
SHA1ef3c9317cbf8013a10a1b76e3f44c8380d9f3b74
SHA256445042915d69002329530b21e308b48dff51d7ceb042c54ca191f9db08fdb8a3
SHA512e4999af11805e041d37c23ab9ab2915e25a82bf49547060ccf176e86608aac72504dd5b7ae7bc920a5498ea1737d5e3f0d8a5b90472826eafdf9a6c16434d011
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0ee04853090f5cfb27d314369752aa4
SHA116355eeef3af81b6c5177ec941ed92fdc9b71a50
SHA256ea02b804e37bd4e0c7ef8367d5113721f9c8f7c397282e198b16aab476b4f52e
SHA512d265584647d85de9cd3c06dcf76a0745ccf36d9b8cf6806b5d3cf273dd75dffc1bbc7fdd0b05631901f4b2e715024bdcf5f01ba593741e56689df1f4344ae49e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf9713c632af22b361f329cee9a0158d
SHA196e396c18fd64863380a38f5494944a30f7f30bd
SHA25631ba575416064110bec3311f3377b02c654a96a08b82b024b0df35a1a74020fb
SHA512e5baa2dedac096c673fa752893c12599f73034a8a04b26b8b69f17102c5944a5ea655352bb538a5ebb0e6140c8a713cea87aee077134d241fb2c23ccd25ed102
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4d2d5c0e21b79a1685170b1f2817acb
SHA10fc16c1f851e0f5ad847761eeedc86d88ea0e664
SHA25656fab3891d26cb1d309680e50103784bdb81f6a24950425f5d32001428d84e11
SHA5122403888a199891c2638e9bea0d72a4e737e1130445802ca626c23d5a1697c707250b852220aed00b00f6207da3ad8dc6a8a04a0146af2a2975670f963c210d33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd6e5a478f2b8403e627ed0dcff1214f
SHA1f4afd753687466622e0aa79d66d4aed2b0fd7d37
SHA256f7662646ba879d2cf96ccb915d8e2264bc65e4dde05e8cc0dde7218298c0503b
SHA5129768676319d4e66876b2c78418a5cca6563dc696178504f63e2896adc94f6383e1823165fa4a846000d226b656e81b94fad4333b0f1d446ae74f98f7ec4b09db
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a