Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
19-05-2024 21:44
Static task
static1
Behavioral task
behavioral1
Sample
5ba341f7f5d32406c82f578632343a9b_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
5ba341f7f5d32406c82f578632343a9b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5ba341f7f5d32406c82f578632343a9b_JaffaCakes118.html
-
Size
21KB
-
MD5
5ba341f7f5d32406c82f578632343a9b
-
SHA1
057abea3e2cca61cb307a8b6e563c3ab192164e2
-
SHA256
3af7fe37bc5c7afb78c9f758f22b2911319a9f0fd48e3bb175cbc65107a0c6fc
-
SHA512
b0318f1e52093e16526f67238fd79afe1a02759b45e5a6b8347745c4ecd6b2f026ea59383014dfc482451c139d8076e81a70c3ba0c98bb892f15e4bd3f4ec849
-
SSDEEP
192:4NarN8f8efCaO+yEpIW4K8TmV8IpWv9MW9NM89M8BM8UM8I+s1Swm9dwxzowLKpK:ua+adrFRsI
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{09AE0B31-1629-11EF-9BF3-52E878ACFAD8} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d10000000002000000000010660000000100002000000061e2ddeec8efdf60c16945b36fc3cae12f971c57c5640840555cd07aad4385ae000000000e8000000002000020000000a13998a2ad4e381757db326bd3a98e1d17522a4eb65b409f64548ffcf10b7dc520000000d2e860946528a9ac896145fac659e09f4e6289ea429e399367e1394dbdb1c91c400000002720a0a6536fdd0b370295a56025795ca1a1c89ac7762bdedbd10a60d5a46c042058feb99510533fc2240e475670b41a72b1e8b6071f4cd01e3aa1372c483ad0 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00cc4dde35aada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422316966" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1044 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1044 iexplore.exe 1044 iexplore.exe 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1044 wrote to memory of 2728 1044 iexplore.exe 28 PID 1044 wrote to memory of 2728 1044 iexplore.exe 28 PID 1044 wrote to memory of 2728 1044 iexplore.exe 28 PID 1044 wrote to memory of 2728 1044 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5ba341f7f5d32406c82f578632343a9b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1044 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5784e5937b5c1a4f1bb2ddc89fd943572
SHA13ec9f71332668e3fa4c3778ba10fb77d526ad17c
SHA25619957a5d0ef9d45052336e74c9da3aba3cd87dde7ca04bca7e40f91db0f1ec53
SHA5129ead6b4801ddf1ff1ab94e8341d138b634805b36c212a505a364022aacfce793d8ffbfb7f0439a5baf5726ac6998f83fcc669eaf2448192f34a5f8c2fc97c256
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5745174876cbaba3a862660c6e6e7f6
SHA105603e8f16142b97da098e73cac3fc7d488c2cf3
SHA256d370ca965977ccda6dae22aa2d104026f0abbb665fb8295eaf75f4a9b4ad706c
SHA512cc23977fd30a7bbde199aedc06a80769a31132bc9188e3c8bcb121986604d7bf88dcf9345b0ca190a1453ffc40fe02e794ce7ab10dfd55d79eb5d0e920b1d0cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb174ea02f5306f1e5c702c3fd6a707f
SHA116846ff9c1bab5f34599334f3dc13fad8ab0938a
SHA256997e794eb2c5cfff32c90e511ba5ca1856a92c0100b3a55b4f8193a9d0d60b72
SHA51222a4bb269233be9f47de63d7bef9d8ab893da3afee0e8e7f6616801dd9a40ff2e83bc275ab5c7afd58cc40dc9cd1f0050a70e9c778d294a1207eb042440f6fb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5850288507fea96125b5da0fac915c9d3
SHA1c183685e1a46967f97ec1a359a0c502e6347b08d
SHA2564edc67762691edd1b91b4deb5c163422e48e64b24f60485a91b4bd004a1a1969
SHA5121855799bbc228a199226a202ba4b4f0abe5fe8f32626c012e48d09c2b67910f2402394951fa01d187578828cb1888f41e1bc365cfa3ce6f3bb5d790daac8ab81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3f8edf069aab36f97ef53bf038a0968
SHA1aa0249be6e3ee534f30c531478f30e1d6f7d182b
SHA256b205c576f5f7177d6cc6588a228a67a136a785104d247b5b5d223220282d5b92
SHA5127b2e537b0f13ae6d18f844a02a0f3db4bbab50b1f604eaa1fdbecc159a44a3a5589f039fc22c1b7b9d8350497e4a8c4c168de63f32069c72d38cd5d839f25f53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523a5ae6f32cbf599030b627d05febbfb
SHA13a881b759785b0c9971dbf6aa829a0f0b4b63c08
SHA25648d4da14e70bb085cc9f8e92a52161f91bae080c9beb6c9a6945172eb2ef6c72
SHA512faecc6d7b1bbeffb357da3d9fccbe98f4a2dc9094f8d3253849817abe288573d76b20d8b655dc60483b6f257b855a7ef9e27093425a3c0565e02469c69167dc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c947ff5629feac665c9531f25ac0e800
SHA1044e2e93471c10e7ccb9f042cb841a2f4be5b113
SHA2567a2f7084fa4688d57ec1cca7ab586529e1c1af275ec249b4aa7d9126bb651d8a
SHA512e3b3de92c069e464a5413f4535aa60b5abb9381e7665a1d5d05cb6c0a7f4a7d62107dc38606584f15488eb3c221a3f186118522a26b62567de125f8f6f30e1fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52585123e3b47cec65d2cdd6efcbe7745
SHA1547525bb6be420392de9c8acffdb37a0b4f9333e
SHA2562402d45c8f2248a15cc5e5379c5a2d1c050138bff8b73add03b4591018a7acf6
SHA5129a1e21c08e8d0e1c91e82116b2cdfffd4148899b35f56b9d874f9276a0c2fcc8c1c65395367e245bed509eb940d93a5d2fb8fb03a55794ea0e9f71a6d25a2298
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58227fccb4cf4a9368e83493b889f9134
SHA12dc69f95c49e3b71b5358ee1d3bbe80f6bbaef11
SHA256da1a64a5e341804988eb1d2c893e783b9c7268e35f2ceed17cf13c28cb8216c9
SHA512712e19440503825fcee7685a06c8b3f4c4a91417bef4a1e8972218e37b9981cf5dcc9deb57bb9d30077e0199dff424560be5db70dfa0252c4323e7f3cc18e398
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50094b8d0246117b5d39d8d24f222a0fc
SHA115df5bab1c6f8419cbcfb9592b03346b0b246d26
SHA2564bfb387821754f0646539601b222228e8acc6f05450258e35a131ebbb57f24f2
SHA51209d7a3a1e43a48aec15ea146f0808360ef3602b64cf284c8c1c0faccdaacc9d923406298ec4dc4ebc37b33d6726a99f73a9f34926c4094bfc43fe0b802ffc192
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f52447f84e3070d7b39e51afaa14bc42
SHA10b2c8e3150670ddb83402f6bf2a7782cd0231986
SHA256fe805af117630b0a704024818f021db19a6229cf418a7c3011375082319323fc
SHA512ade8d3b1221fa32c786c078b84b52af8d5ab3b53e177e7de136bae2989c92b94f9ef079e6b9e5e5638b450f6a800d2020540dad13dad5001344ecf0217185fa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52efa096a97c67e6259d4ef54a311a7c4
SHA195da0a6ede0430823ccd899f22346af2b0883d0f
SHA2562fc490f8d05954b36454fd44192e2b47b4857549110784088255de9894aee46b
SHA512125c5840c85e5f8e653c1f354b654b1ed910e4cc099b9bda9aeeea1425da75618795b7fe6c07d729afd072d8a1d87c25f06cbaf0a9876830fd0bbc1479fa6153
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591d1966b3a9e04a0fae6f1963158a9c9
SHA1d084453ff875439a5d2db0bde17cc96bf68fb943
SHA2569cab1acc8178791edab32eeba4ecc07b08bf09ab1d90cda557c7b239b2c3a807
SHA5126c27e4510c5d7ec567520f5fd97b443933a880310c66e1715b274617e0325c8333a5ac2f4c927f6aa8254ee5c01f0adf69d8d9223ec12a228777baa34504e552
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed5508225cafb8228c5074c760af80d3
SHA1cf36661e3a80107692a5d32606266eb8edf9ed2b
SHA2560210a2c9bf1d0213d67369ab50b68844af8d0dc4db1e6da9dce2107456964869
SHA512814417a14746fed61ddfa7f46ff7136535a5b973a7b5c15810912ea4dde62ab7a355998d9cabc842ffa193ce76ab9525c01d6f627a1b00867b734fa8058bdc10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55cf6d3feaeef2178312cf93dd6616b3a
SHA1298be059e0df9d0eb4fc0867e263767cb0c1e6ab
SHA25625076a82f33fafd8bb6fef689e97db4195be7e6f05c0d5d2ad55b92b0c48073e
SHA512a5b5a5c560ae2a5bce53d4b1e702754c1b2a80117ea11448b3343d198f4636364efc1db0b15d6ed168aefe52cad3cba248354e57b4ba25046b676c67b72b8795
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503d2345948f9ab0d27611835cdb458e9
SHA12a2a525239dfbd842f68ed04a838854fa4cf1625
SHA256608e880c430287467ec3bd1a92b6a8b85a91a7c348ab2748c4ed3cfceae73192
SHA5122ed64449265e5cdc69775dec4e407ead2cfecd328597c437c3e219db5bc3b00956f7a687ecccd68f5cc43a0bd4ff1b4dfd16546024575a929f26c4a46734fdd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5959a069044fe077e719a32207e777e6e
SHA1dd8f7bfae73d241fbba31d13d4986c501d240b12
SHA25658f4c2f632ab51e098818ba5dd0c9a06055f773fd185146502bf032f8bf16e1b
SHA5121f3e73714fcd234e6ac475a75536dd60d239b6dbb536eb433f6f7423bc1546b4a436ce44e48b26771a8c758af72dc7d4fee040dd3d048d072d35a6e30d6bd358
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5940d175c3dc59291ef67a11e91d75556
SHA19c9b0cca541699e92a8d979826871ca521409454
SHA256b2e8a1bf1a6f40d6ed6d3a2f8ce8eedac0b9d18e5103355d8da5b1eb8e2ed76c
SHA5125531ad8ca42312d83c76720127cf53b0f6c3820e7157c4aa1254933578939ae25249041b861ed2859a9c50f8066befdbc398be04ff0ed0430bcc2dd8e46206bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed28e40611e9facf11a5731dd9b46764
SHA154a2a8d065540858cbba2c9013b2efce8330d547
SHA256b49547f51bc2c83c84a71a3bf74ecc384a9605dcf9c07a506b6ff044d282f91f
SHA51238485f81538dae55036aa72c44af0f8007ecc6a51c2db2acae331a9e78898f8691c0ef6432a76934e8d38cb370036875c6be165bc67ba3f9cedc766342060651
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5cab6bd799c84a479b591b493c12770
SHA1bdb3e28be95c8b311f844cf7ad69daf21f0f35a6
SHA256a7daf72698354f8383350df960c36bd65df56d2cdb355c83f9799b8c04cf8b90
SHA5129f86c792f3df1724d837055ce6d9d1728f298e4ae9ab7a4deeebe7c6df97b933418b4527c2b883e275bc908ddd9f58eb96ba6aed15d8850e55cd7f382e6082ce
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a