Analysis
-
max time kernel
135s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
19-05-2024 22:15
Static task
static1
Behavioral task
behavioral1
Sample
5bc22fb285c78a096a182127a8833a8b_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5bc22fb285c78a096a182127a8833a8b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5bc22fb285c78a096a182127a8833a8b_JaffaCakes118.html
-
Size
33KB
-
MD5
5bc22fb285c78a096a182127a8833a8b
-
SHA1
02ce577692cb92ea1b738b7278a992466bcd6aa4
-
SHA256
a4fc88341cd5149a9a6479165a3978b01d8d3627ccbc9425b79020496ad6d9dd
-
SHA512
78b836ad4d007de1c34b61ea47b74ec60b1cb14121e1506f45845a5cc852ccc57fc165ce39ccafa129db46dba68c6758ece08cd4367431fbc6216289f136afa8
-
SSDEEP
768:Za6jIjltIk7AiIXiKioEwE2vKM5UdE2QmAhp840b3zuGz75:Za6jIp7AiIXiKiozvKM5UiB840b3zuGp
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4F62F741-162D-11EF-B587-FED6C5E8D4AB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422318800" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e93610000000002000000000010660000000100002000000073472511c1557684d8b3b6f1a642c079ce52d7ba3e5f1bd8a9f858e1215d5148000000000e80000000020000200000004b48fe43b5c55b7d81e351114250e23f289eed368cf997d0213a7d0a3a179c27200000009af97a894e1a7e7c384085a3b6b4a41445feb0cd39dd9f32622f22a48172ac464000000044c620196ff01b57322a6a8afe746af42772f7196c1f490bd14e3cf255c7c6b4b16493ca48725e739fbc8268f4fd7aa9c7b9a3b4ed96d3d82aa1e196c6637bc2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 709000253aaada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2484 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2024 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2024 iexplore.exe 2024 iexplore.exe 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2024 wrote to memory of 2484 2024 iexplore.exe 28 PID 2024 wrote to memory of 2484 2024 iexplore.exe 28 PID 2024 wrote to memory of 2484 2024 iexplore.exe 28 PID 2024 wrote to memory of 2484 2024 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5bc22fb285c78a096a182127a8833a8b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2024 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2484
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5484f2c046017df408ae5eae48406faee
SHA1793e73429fcce2ae581c8ef8e9db0396490d7686
SHA25624dcb9eec13ce295ba5628feece847639abeebf54c058a095cc94b22d8141884
SHA5125a339578f9914ced5a82abe7d27a15c0c4be10ea97e9c07a1943417be7150ac7166576139359655840a2dccebc3e74430ec62a95e54b7e3e93bfd05ca180a483
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56cd294eff2d86fb03681587c2932094f
SHA1d787a5ac4008c550de9a75fea736c95ffa53fd4d
SHA25684a45ec8ce6ac60ce081a6f0be3b51f55545709d065094c9ffb96ff52c34ffa2
SHA512ff4dee5287abf7faaccb7cc1980535dca680412ed0fd0f6a04a6370ce617663bd6e6700c68b97233bb84b8c3f1c2460de1668eef1b0027c1e2f3efdd39c904fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5010f36382de230224637bff83c933db8
SHA1410c86e980b262885b14ce7a2cfe36cd124c915e
SHA2563bab83678de3a7886c0cace0ca327ddf19520e8adc6b5eb29ec58b0c14851a5f
SHA512a703b4e0c8ce9fcb5e94382c2b2d2ca4871476beab189aa78c594d21663358b00c5a97aa59ac498d0c2f1e0dab2aa32ef539c09529f556b11e626865440de077
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b985cdebda8cf25b8d8358f3de7920d6
SHA183249ef3a6bae4f7ccb0ccd3b14d3f6b4483d261
SHA256b58168ee0a4236e999ada614572142c007746ea72e2ac51feecd22c01250c81c
SHA5128318244edb6dcd94bf11969c7612879e753be061373f9d9bdc1c691523d883cba04a50b2d8e53d91fba9534087277cd320b9ea24794e774404d9bdc88fbc641c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5290234c001ba02fcbb184782a8796f05
SHA1dd06e928559c3df249b4b205888ffbd4afb67c0f
SHA25695e32369cb6e65447a565b9bb83cf1dbacc2bbce5b051bafcffc1fe0bb8cfd88
SHA512cbaf46e843ed8754695d70bfb4a1dc77cc6bcdb0db08aac97091aa3e21d5668e94cec3a3c3299b182ed69db85a45f4d1c24ebcb65e296b2bdd5fdb8c3466f675
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ace1499e7d794960c4508b21cc1aa354
SHA10ccb7a8291ef27f43ececca64d1b9027caf88280
SHA2566451a87e8ae01563a856ffa6cd52a522590cbd1c620116ee1740e800522c8845
SHA51279224c63812100fc057ad96d23aba32d5dade52eaab228196833f23723534669644596c583dbfcd2c756030ae23151ea80ddc79bc4dd357beab9f4e78197a988
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8ec916040653449b0402ae477b08029
SHA178d5e622433a9a3b597e30a1bae0249288751d14
SHA2560d6871233664a02ee1a7ca78b94c0afafd4301433d6437c01cf27d5a9b92c6f5
SHA51247e63371e97fb2998f88baae553eadc1249d9db1b140df382ae8a5d5fb6504a1a08da606ba929e90a035596dc121e14541054ab41505231bad644e7552da37ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da87b0c99b0fa0472950b6f137466f36
SHA1268fabbd3e0af95c5217b5f37a146cefca5c059d
SHA256682742d294a32a5b91191364f84a6b055505716ba399fb1e3cecca0fc73b6c83
SHA512507da4f904d33df0728f35c9130cf2201fb63de98bb3b6a4988465c8014878ea680131279d0dd892bbfa602bb9d6340ab9fb1abd2b6d6431873ea716101c33db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541a3210b6ace8b443b9a1cc225cf29bc
SHA1c614ae49e45dec61888e7cbafd8d8437199157fa
SHA25691f1af8955dda036c7ad354e60964146ddc89dacdd82f39090d60246fb49bc6c
SHA5126dacf1da1c5498adb3b4bb8daf920feb7f9e5d3d014062e853374300fce05afeb2073aec8bd6adb70bf86fe5260e7875c08f56ca0a82d0b496140b68dd57b326
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5117b2318bde8244e037f11564f936084
SHA11cda69c866bdd7302d3b50e9971e11e741573a24
SHA256fa6515232fccb904931ae688d01955c7a0f3268d28feb5e633e5e46b9947e831
SHA51206876eeb66773cd911ac9d9eecb9995d0e4c221746aab6871b9ffe85300e41ec2b7abeaab5e991d480796fc18ebd99592111a44252d3b89005da13af53ce17e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f43f25d3d61cfc20dcf98511f5e39f04
SHA1c566def26afebfd7e55ff12949c2b9f8b1b145b5
SHA256a809d657d1353e61d7844dc438238187890f4b9f3f083b8efec9d361b337f90c
SHA5122a5e26d08c354158a5522bf42940cbd59a3decf353bad3d782ef8b60f534354e73e9c3fad32b1db4778bc87578da4242973a5981a46471e23ef55116280d306d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f4ac1bccc67728a8059484f3a0eb1cf
SHA1fe114ed73e98ece85a9202fe035a7c873986796b
SHA25627fabf476fb4c3e7ab713c5ee4a7079897e63912682b41e1eca63e0b242d1836
SHA5124ceace99e65c120b9be6d78c5f349e2c0d6b5f8569abd5b441103b099fad1431c3d7d87cbd8ce2c77aab8e8eb75d2f11f33161a6041adc6178191ad270eae071
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0440dee8889547c20834af4dfb7e76d
SHA124971e808d73f6fdf5f21620c222296a63ec15d5
SHA256a57ae73c7b63d489f7f6634c74c2aa6d6dd9fc0fe096937543762761b859f1c3
SHA51248f7fa5958ef2ccfe24a2ff95fd0c044173de54ed271d3f7b644018e27f090c70e3b1d0d20d8d7fdb2b7c3d7526cdc2de1c7177f671227d90b2e80e33b7f3d59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5228098d485107e380ffa6e7dbde9751f
SHA184f1ea20c2eecf0b78bc1594e976f6ac12ee2a50
SHA256b8b26da871229172e6c62cdd92b713f2181b5d8a8a46e2b0c97bfd9ef731ac8d
SHA512e51afe6faf83e41cef4e6ffacab2ef6c26f935d3ab3f655ea221aca5352ad675a07ad2b0d798e6899c1fab7ed14b9394ea68d8bfe8416e684b4384209e2391b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b42d72be546f6a6a20cda333d643e11c
SHA14d592f4b6e549095d4536c819babbcfdfc97766d
SHA25609bca20af7dd91e52843b7d3702666e7554eeb61a817cee0ee97fc604a6f9b38
SHA5128335ce102ca8d8d23eb567bb983194ba1ddf262b8c831696dbec8945d196f8e37ca93b6116d6fda3da18601b2291668e0402ba91cfdb650c32b8bac04b224434
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541fae2c3d473cd3f33d8a3842f4a6d06
SHA198f04cf993e7f5061b9604a1cf86e5cfac91dc61
SHA256cdf457e4b7e3308d6defff9f694e96e55244e1fd5d93414dbb7eaad724632cd5
SHA5125b97f181398a4591afeee32759743c89974129fab9c264a69dc8928b4f7c8e66ceef2613c99f9527c022e89a2023135a46d62d454b47cc6cde61b2dfd0c0d536
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2badb9f70c9ff53b29cb87454c2250c
SHA10a977b578a92af4acaa3051b695dbf9d2fa8bd10
SHA256a0247c4306cdd3b1b382bc03feb71e011a15b920c09028cfcc865e116fcd5219
SHA5125f7a82cecc911b897e52a087a3bd6860213ef071b73e28489050cd605e345d3b407273e7fdbbed2e96704606e5ffe67fcf0ac5defe185066cddeb4b60fcc595d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff7259b210cee4fcddd278b7c2e6e25c
SHA1dc1272e83c4c4653a89a4092ee61c6000e740b84
SHA256f1b043affdb352a308d99c9351413966674861cc4ac088d17304271ff9d70b48
SHA512ec20a0e059739c4bfa49ea2eff996f07a4a91fe21632f5fbea43355b0f95274f3886ddb85322961dda27491668141a52a3c8b784f0df284346297e584f7f77eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbcfdb2f520188c06b1467c278b01205
SHA14069b07da83d6f47dc270f869c22e54b83fe1cfa
SHA25624ff52098476732435d931d024165429e04700c7352bf03728ca5c2ab033e296
SHA512fc2e1d635895a9995cf3328f4df32d2310b2bd9b563632243f844ff5800239a5752bdde37fad04e4a0bc98bfd12431baa7f920f3f16efb98d9ff70f80ca3b99d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f9093cf0ac76bd8f9aaa7b445094bca
SHA1fb6f58c66514b0a7b5009196485235034ed7409c
SHA256e7f29551cc36a24195e53f72416584d47547fd62a9a55b986ba64ad67f2a85fb
SHA512fc3b57d572372edea7d58c4d3444ef6d42f971ccfe82d98fcc6c2a3a753a164d0fcaf5a599beeebbad24410012f20d66fc00e2b3d081f6336619814a9150c613
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a