Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
17-05-2024 16:47
Static task
static1
Behavioral task
behavioral1
Sample
507aeec35a858a6e48d3801e9cd80b14_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
507aeec35a858a6e48d3801e9cd80b14_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
507aeec35a858a6e48d3801e9cd80b14_JaffaCakes118.html
-
Size
460KB
-
MD5
507aeec35a858a6e48d3801e9cd80b14
-
SHA1
c28ae7c96f89f0150ba86640707c2d3a4a907ac3
-
SHA256
25e5b6b0f37405fe3e77b9c36e39263348e78d1078a100304e9158a960d078ca
-
SHA512
62db2ed8f91e8b640e5aa6011b8a906c6c5f7bd41d0e63953bacdfd501dbc7e37164c09576255d1eca6e39fabbd73a3507fb1f79b0b83031a4ee29a369b43f4f
-
SSDEEP
6144:SXsMYod+X3oI+YNKsMYod+X3oI+YasMYod+X3oI+YLsMYod+X3oI+YQ:k5d+X3A5d+X365d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{21D5DF71-146D-11EF-BAE0-E64BF8A7A69F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422126310" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000007fb113caa751c32b299f3880a1724ca83f7bf3e2d815d058a4d987030fcd921b000000000e8000000002000020000000d2b7aad4c470356a677fe1ad8f3aadd0f1111d6c117c650baac3dd7dc6ac333020000000e1307a7ae951172eae609df7f5483743494957d37b9d5645cf0aa7734982e5f9400000000590e2c495e938abfea7f8b3cec8872b8aa6f41ad457ca75750f6ff78d795abfce2da2d8b6d2c1d0ece60ec9f44597fbc4995820949cd78a1ae49c2dde98bc49 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e09761fa79a8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1612 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1612 iexplore.exe 1612 iexplore.exe 2996 IEXPLORE.EXE 2996 IEXPLORE.EXE 2996 IEXPLORE.EXE 2996 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1612 wrote to memory of 2996 1612 iexplore.exe 28 PID 1612 wrote to memory of 2996 1612 iexplore.exe 28 PID 1612 wrote to memory of 2996 1612 iexplore.exe 28 PID 1612 wrote to memory of 2996 1612 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\507aeec35a858a6e48d3801e9cd80b14_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1612 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc829a6052f7c6f4562265f43dbfb01a
SHA142a522c8af6b2039f9070a008f5eb679d5f38d62
SHA2567c54f1f0700d84dfb4fad815312e1b92b1eff30e237988d2a37bb8a772e0fde6
SHA512176caaad79b5dcbb625c43da57ca1a2ba5fa792090e9bed2d42d8478fe44a9152ec593430fb7be442beac6f00daaf9f8754a7aef044ffd57b6a87a82bd631508
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c3ef3ee4eb5ebc15e012a7c717d9134
SHA1dd278f2eed72ad393face4f721f76e676aa9f2a2
SHA256527643fcda65b111b36af9939d0550ef3a5a0473aabfb975c68ef2945ce72bbf
SHA51207a49a8ea62f7abbb7a962113bb1c4bd44f83625223c45104ddf31f0721f7498c525cb2842079cdc5fb296a3ec7028d9b75980b9c002fd0bb18ac6d992b4d354
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c6b5925cfb533ee8fa4a8fce27efed8
SHA15c4198958cbbe9f150854e6bf4eef1869544dff6
SHA256b0417fb5d5110710f97534e8822d2aae506621d6c9ef7280df5e00418c6c13b1
SHA51235e64b0422a6d7fe1cb0900d57508c012d7f9c01f226245cdfca86855dca96161b7a4ad69d91e0b0202467ce1cb0a376d654db45e98e762993d9ad6ffb43692c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd5a4a3996cd9c157aa592e633bf2ae8
SHA1dce3e9232c5e1a107581c23ab4f5b411025ca3eb
SHA25698eec6fb5cef80d7ddcbc6b6f3e03dd3931beaf1de7e3883669e39d2dd5f4f68
SHA512a1c3e688129d448e11756a115220e4eab435c697740d8ab6da5230464323e97230bb353721779ae075d3f0973de16bb7b1ecba53dbc311847c7f038b855af7dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8abd2651fd92e1842c63740b00b9bd5
SHA1f6aeae073c148ff91dc17608287ac07f60777afa
SHA256e3d2a1fc6e2b2d4f1670b8aa51be4d38b2ab6c8698027d8f1e5c2365e2a6f5aa
SHA512abcce90df408b6bbf3ec00c100522bc441030b9e1532a01c99133eec5f859ecbc71e07c53a038e46d711242c58bbe13bfbb7674dceca67b3c357f18a2f5b168f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542d663dab46d4605b27c6732c18a91d9
SHA10a8bb90c6df0fd9cdd495c8f63c09afe352ab70c
SHA256f83af3b265cd595cc8716541c52679e3bf594cf1b821ae4f76d1cf8c982f6fda
SHA51255f4d9f7c5b891afd0c142ddda191af9acbb31d2c4dcd41376486ea06c233bf98a654e0b16b34a444a7eea069049ffe6d6da13a078eccf1f0c13fda6dd89632f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da65c3c2e2be0c49f5b1be8e8848522f
SHA1ce516558e9647b461c1a6e12576462940ee71ff9
SHA2569bbd2befa86345d1a5e52adf4a1000917a82a6276039c43f4d0f10fae4e7178e
SHA5120f326a6a721ec83f8af45c09469000b16138f64abb3e464a1e66d9cc71aa4b53dc02c63d2d1da57476d0c2f8873080d3b7861546b2b9582f78293c51f2214f94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59dc91d05e7960c277d318a6f1becbd6c
SHA1963a0a6799aca6176d3f14200b0372b272e44125
SHA256d548170db7dcd0367296fee1180eb4d05ce0174b8eae9978b0d3a73d7734671f
SHA5129807be8d49f3feaea09250be44a2b606448d5955f0eca18fe0dd1ab5c913e9f90a9b8e18b9d69bcb63a8023792b4880af1e7803768e9fe03238f0ccc7771580d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad9cdfda50ec2452eb0ffa7efca07cb3
SHA19f57ccef2f964550fdb4286bf01679a2d1b02b52
SHA2563c67b8da615877b53756b5ba1001ae5576957ad148a47fecd60633fc2b1aa50f
SHA512f536a5fb52947aef6a8eeda70659360e1d1c1f7a7cdf86f314085503279206477df3ec56a5b579115c108cf3a2fb7427e8b8d5edd81f1541e0d0621ea015a084
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502d38024c3ca331669739ec37fc6161a
SHA1568aeb8f9dcec51a81d4b1496c6e472470fae783
SHA256958e06d52632159d479ff3660140a6c55daeebd1282d210e4c04742f0b138721
SHA51294d40af450b9e7251939cad6525341cee752ebdf50e31b85f411ed38a5add5283a92aa20874b7792cd5a4d760df8d165d66185f610b7dfe9dfa557d15cbcdf07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4626dcc7a32ef06f7c0c2330bbc90c7
SHA1c47219cfe71da1c5bbf52370983e62223f5f469a
SHA25666a2c2cc3c342c527d32aad86ce5ad27e357eee0f899405e703e5fc71f887789
SHA512f747faa902b747581f71b7e677be886a106649b12a88f46b39392fd6182fd671917baf6b00a108cbe2573739a03ee9136d54727d9331893ce0dcd22783ec671f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8f995c85380d7dfdbe33561d56291de
SHA198195c6d47a04973efa4de790b83c13a1132732d
SHA2569e85119e2369f6b072c24ed371ee0058b57f11ef463566ed8a98340b9d07e5bf
SHA5124bffcd6c03dcafa957343f62c34c1e91b858221d6e2407b1d258d794449db91aeded772ae00e9bdf0f613e7d129352a2fea9027dcddd6b8a63b373e61723af7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520365b96f738d6545efaab55106f4613
SHA12f1f4148468fc6949c077aab8450666630c9f726
SHA256bf831adfd21e999e106a8beecea130f454698b99b9cf6d13aad57bca0bdcd528
SHA5128b2e9dd02d8d580602e1fbd16683d95e501af9391b88336197c7250a6dbdbc993a61ff5943d6c9a00d7597962e77419fa1bf424b11e63fd3c6ef513de9266cee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5484a87c1267daea6344d184dd931f7ef
SHA1f9afac39771a7e03f7c70cb41473573e5afcf3f9
SHA256a57d2d878d58697c3de29a5c9099e4ce6510f61e51115419290242e77e62727c
SHA51297fc0f4e8cf63092303231d36a1c7c566f0dfea446bc2f293b10dd5dda3288e85285074abdd211392b1f566c7d1f2df33b0c2dd1ddc1d5764a0a717a1d3aad05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2a99db975a5d2d64d72db444d2dc5e1
SHA165dfdf53fbda2747f725ab8a75e3aad8f98cc6ec
SHA25606255816688720e83dbd77f0be60da3346a66462f90b90033a291dfae6e81a80
SHA512462387b8f631d8e7495a834fd5288e4bb00e2ad36e9984e6a1df500c6eb1d95aa2132ebaff5f8f9c26e581c8a08d5d7bbe1b97a5fd80cb814a2c0f33352ed15b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5182f4ca117175f6ac877f1a88b5bca56
SHA1850f1e1fcbcc5c3bb0b7ccf7ee801ced70527015
SHA25662d0bc0e83d7d0a0222220563fc8d44742ea79e746b708873a092af7c7561825
SHA512938ec7f18828d1d9df01f1a53c5f1a750890e297814f8c23b48b9f0193b1a63caf58d9f8b2f951cdf925588e1d090a61606b4517953488fa0e1a7b8736fc7488
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f59fb77386755e6646de4600e062239d
SHA1b3fee9d38a0179824d0616c97025f6e43b9036d3
SHA2567a85c767c77ed6651626ef8a8111249d0a3bd6a97b7ceb44f5313990c1971f11
SHA512e6f90951e4aceba624762c899db9342ddfd70ad1e3e11675b2292bec1811bbebecd585b17b698a56b4f36598d9a786a0659b1e23c6a152b6c8d9c6d8ac4a795f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57813572292e5780095b76ecc262f7cb4
SHA1f34d7bb8c91627438ce252fbddc2a172cc531a44
SHA256204c8c0d10639cb7978e87f778c5133e0875874d6e86cdb3b109e889def52621
SHA5121b20b7581d33c9e21fe4767d688e04fad7ac59b0b1518b28ed42f5896126d27cefbae4bafc668545c4c2f24b3c9cfab62617ddc954f1c17f4e77d64ffe4e644d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500234903705100d3d142f686ce388df1
SHA108d103698166114648a041025b355e06a2baade3
SHA25610f579eb7bdc20683d06a16cc7144342f7c4dec7dad3505a25d1a411d045fa51
SHA5128fb47dfe3d4954a9078937d7744ab97c17efe21bf67aadb61861f7932a3f68da970ab63febc80587a589ce9c54f05a2ff59cd084feaef7ca6b4f15a0c21a9b12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52741a30b5d118c232c5737ba55a08ce0
SHA123ddf95b05243a0be768ae75f57c7b65e2707c9d
SHA2566ce4f13624536c103792c0882763762a3efbfd8f348babc26acae0478d21b7c7
SHA51299f25a58e10023567e0d9a43a57585576113c5e25f8e2b5a9931e3e2cc9f24883d962147b31dc5f01b1b3ccaad6315bfcd9b3deba7649bf49176bdac0a1025f6
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a