Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
17-05-2024 16:20
Static task
static1
Behavioral task
behavioral1
Sample
5061026482a8e43de37da7645f4de9cc_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5061026482a8e43de37da7645f4de9cc_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5061026482a8e43de37da7645f4de9cc_JaffaCakes118.html
-
Size
72KB
-
MD5
5061026482a8e43de37da7645f4de9cc
-
SHA1
e5296c76f9d9180ef536fe776aff30f681be5982
-
SHA256
b56919391795d626c43e84378012ff5223b0e8399e247aa1e72f728bbe72f219
-
SHA512
7cc3e1111dbd9b1b9342b6df1d6d299aa37943ca72c8a50455d7473e08689ec0f70d87ec4a027d9986bdb9ac85ac03c01c2ce3623d02a97a28c17ef4d21c04b9
-
SSDEEP
384:SVL+fO5laRCRnRzRgReE9CaRXiwDE9gE9KE9SE9eE9LE9Mh8bh/rmrh6ieB0deJy:SVoUR9UMaUKarh6ieBYQwcQnDM+X
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422124701" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000b95fd7c9f1fe39b838dced0988c58ec817a50129ac75ddd87326a50c2c3d8bc3000000000e8000000002000020000000d5d9072c65af9b2e0ed4266b0a1e8e0e81dfd56ad66b343d301be2163c0c419b20000000e8e28ce9e433dae9718586400cb5ff7e95cdc8b5d593f87c26c1196f380c0a214000000082f5dceb973bfab586bc9e104d66243d869b5c87adf329fd6b54d417663f56c3dd185335fb2947f094d27beb9609c50fd9445bdb330dbb8d3db081d1228eb823 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0786a4a76a8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{636064F1-1469-11EF-A585-5A451966104F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2296 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2296 iexplore.exe 2296 iexplore.exe 2608 IEXPLORE.EXE 2608 IEXPLORE.EXE 2608 IEXPLORE.EXE 2608 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2608 2296 iexplore.exe 28 PID 2296 wrote to memory of 2608 2296 iexplore.exe 28 PID 2296 wrote to memory of 2608 2296 iexplore.exe 28 PID 2296 wrote to memory of 2608 2296 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5061026482a8e43de37da7645f4de9cc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2296 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eac9a057cab4628b746cc873834327a6
SHA1703cd0c85afb6aa1c10a9c0f8c13f8958858c658
SHA256282751df9b7da15147c9e4627dc0acef56e97b7a93a25d44d319628db6f00d91
SHA512b8f8dc8d870789e3eb5fd5b2767d0c2b7cc118772eb94f2725901ebaca62a8d767cec4d9813951e3c6e703051e82ab2637fc16da4f7ff4b96d36c7fe15b09562
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5170146a8737b6265887e65a78d9a1071
SHA10c69c1099b396f905efc8a6c729d383aab81fa72
SHA2561e4a080dfd9d6ae5c911ce0bef97b70b214d3c2f5016a0ff09b51cee054f0b98
SHA51235a52ac752125876c10bcd2529c1550a54511f4dadf51ecadd87f3933785b8c30ff429b4c93dc5ce3615fa646592f02a37dccfe913659468a7003bb930acb84b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5231fec9b37936955bf727647cb6aaf44
SHA18fa9bc20b1de55a745335cb236c6ad07c6c6d7ce
SHA2560651e190d2d7b771aab43e0042d04d7709c94c6c0ec100be73bcd7c77c88175d
SHA512cb2be8bff4f93a6f73c2243baa152f87a112b212f0f1afc30850c312c4394785f0d03a210bce979dbcd71badd4c190014e4d38a1f70dc939247b080258e64e28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a918a13f268e01169f26706d5f8195b
SHA12bea1ad7e88fc9683e38f96b6fb98f85830707d7
SHA256646c1f81c70973bd0f0e44664af27dfa3ef42ea2e96b49ec022eee843623b824
SHA512b3a6a8e2f7e5c1a60369f634523e2ad001ff8d7768017fc21e2e3659f4d4554e7adc3d5528faed68982bd6995f52c46d54ea69e810999161685e1f982f312f5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b16d8e25571e01c3ba707a63747f99af
SHA1f1a4312c610c49f9ce90451e558bd6609c9c3b67
SHA256d7b9ecc599c964d9ead9206d0ebf7b1447d9bc54c103c91a7f8c4b8454d29550
SHA51205a2a34425d0c5bb6a457c3cec640c7311b8770687157028095f4c2ddfa3fa2bf7922f39168d88d5ac5a82511b70369ff3c04046e59302a67f222a4ad2e32c66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5380f40733c6dfaaf16695d6f9fdeae6b
SHA1057c382571d95a14bd280b4b1d2f6d18fb322f94
SHA2564ae841c90f127b1d830dbc4c084e5c9120d3a929b2e96c77f75c8b26f27fda59
SHA51246ae58c45215b8b4ee7d92f5bd4c828c5bff9ea0924d3e1e0328f24d9cef388607315626de23ff029e92f3c637ef9897813e7d98f5b36e6418a065c8f2595ebc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586fabd936034ee2ca2cf84afa5f3c3c2
SHA1ad146b10d27b23e6d14f568851e49070f656c0b6
SHA2561f4b1a249910c21c5ae88ca31154bdd01fff85984741cbc4d3a77eda78e5266c
SHA51210dd70d4759943edcfc2898d1f40a2880b9839739b287b5c988eb7d04d3cc8113ddf3115393a8e4beb543fe4a77eb06a5e2b12b2da250df145800931903b36d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd1e21a851d6a152bcd52a0a0d6239dd
SHA170a8ae35a723fe441b3e5ee3f1759689e25fea7f
SHA2565558fbfc885ca05deccf64a68270818cf19fe8500de940e342b015d09eb6e57a
SHA512bf08da9bd7fa8468f0e6e8021ece0c30dc2125f75c882071e2de582eaa25a196c853bcf1ca0f43a61d36f17fd6dc00d6c8272517147214e66aa0f617ce5b05ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53662c5453abcf8a52b2704e14747ad78
SHA1a74f0e03b1fe8ed8532a8e43f8e609cc834bda6e
SHA256b2f0171bbfd911c51bc85caf6f3b8b7290e6792d967c0ef338b96ee26ff5ec58
SHA5125806034131be9f6b34957c10615c0213b3b273dce548cc2cc2ce408a606468ecbe3ebedc765610f9926dd02ce1e25861250ac1d41cd28092bd33f7d400aa5a01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f02f6c13c32b78f4488da1034f04a5d2
SHA19afda55814f3513c1025ec301a5932895ef1abf4
SHA256eb32fb45c76aee6f08ddd21254f2112243e3ec8d54c2b097b72e5734c2445475
SHA51296e18cd2bab25dfdfe4241cf12b0a58eb16fe66552f353ce70ab5697321d0414de86c545c5c2a990cb042552cf305f3badcdabdf2a57a0dd7cd0c1425cd40a62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50daf4bd46ecceb59180aa55da06fb545
SHA18aeb811e6b72922da40ee566d0df04a904df1de5
SHA2566ee6985fc058b5fd6c2c54b8bf4c4d5d2e2351dbfde6567ad42507c437485929
SHA5122ef196260cae25d76d600d42da03656598315cfaec73e0aa67e5a5fc9ccec0a21131bd52516197f82550d274d68201ec5af5bf3148a343d4b823b521a5000621
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559cea814bd883f17203b2b41aafd5cf4
SHA1cdb5aa25c75d7d1390110410226246b5d96ca8ea
SHA256c9b0dcacb50d3be97335fd6120daf21e50690e0863f4a7c7405bca7bc8682068
SHA512b93ff8963c6dbcab61616a707057de45e5507d6b1bbabb81da332c44a0365bea71ebf03529f58badafb0da4bc2f8c0683876aae2c381c8b52b0673e0977581b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4a90cd0097c280446253cce6464b107
SHA1d25c8644947c714f4361a9b41ecb1853db28af7d
SHA256e67819c9153421fa5c55f27e37b99fa4d8319d373618babe8fe33cdbb4689d47
SHA512307a8e07d18561c3aa980ec51eecd954f839bb8c0f3fb3580fe06e032906da8cbf1665bee28f19fcee6b14949022ad7acc996caa2c96d25f4d6c9fb670c906af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c252f36352c4ebecf5a7cb305b6c9ff0
SHA1fa5be61a7848c53d17b86c0718c90b645aeb407d
SHA2560132b2a4003c90791c4eb1fd28146c3fdf32df222b08df9e982a2a7db43775b7
SHA51250ed25478954641606094f81b30fa1c065c86ead7086c9ef3e1430f2072aff4edfbdc9ed0339193f39bdac190eacea8ffec91052cb3c6e0e5d3052e63b2c0c77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d9760d276af10f4f3342087ab9854d2
SHA164601b8c1f5b61433a22b49053891424ad1b6f9a
SHA2566038c0eb993e42d28c1f89e1afbd8aed3bf0bd6ac89d80361e8efffa17b6a970
SHA5127d0c260aa6fe84b8410519f96bae0252332118eb98e0e653b0ebca97563254586921f34834f19ac1725421dbe2ff4eaf172365c1cf6453c6b1391ed67a7e4533
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efb16bc2f46c859e72eadc470d298db9
SHA19ebb939c6eeba416bcf136db5c0a33256c11c73d
SHA2566175ee337b2914d8c11efa8c2385b7ca88850cf1a4dfb85fce28bf9c09dfe6f7
SHA5123b11d00049af52796d3d3b14b047b985e5c4f4e76c966c85d7a4735126dcc0e94cc32e212653bd37a824346630f415de30e7eb126594ada4d07cfb06f02bfb82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552d98ee2a744a11486aea746cd7bd657
SHA1e8309478e76f3971cecb6bd6780895d70d7deed9
SHA256e3b0f0225390c085bd814e271209e0b0b8c0e0d3149fea67c0fb4f0076f02954
SHA512480e6f9585d5a3e7fbe5994d94b9cc6a40d7a9ee00a17db4d648189bbe7d1f622f44122533265333f96f0b1fb5519a575647d31cee50b41e6750f36b3494c6b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c3d1dc101f9f626724541f895c7f69a
SHA136bed6156dfbd0eb2acaf087df7fe925df43a4d4
SHA25644fc9e6e00711bc4221b7a7dc7bcff3e674e7fdd150ae9596519dcb3d500182f
SHA51242a2af44d44ae43d7d3317a483c88a2b653d2a5ac26af365d82f5d4364448e12d0f7743450fd8038055982cc324fed8e09ef4b0d617c30e05f555c2b4902b054
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1bad95633091c064afa54357e8f223d
SHA19c5674f0ad788296cb6a490dce173d531ee84514
SHA256b8df0aded5ae8efe58dc8a517d4559df630faba634ad90bdcb30f238251f0887
SHA512b6f483f80475b16687c596d200e59e0447592bdc4a639af6f9233d65504163cca5ea85fcb4a81b615eb26fd4fde20fa6953dbbeb3053276cb8452b192d81d5b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc277c26bd7e1214544346c5bffd4d0e
SHA1e4e09d4bc972e2d416baed01fefab31a65969efd
SHA256d10dbf83e80dafde11be5c1d3d3f501e1ed486e791bfe3f6b545c266ba36b158
SHA51282186cae6f6890236d41a956e835943c4fb1fbc7ee4f0ef17a0014561f643c18645b1bfeecd0254f82853777e5785476f5fe91ff1344841153fc9fac6bf8d36a
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a