Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
19-05-2024 21:49
Static task
static1
Behavioral task
behavioral1
Sample
5ba7cb0865b9dfb3d3a6c297b7c2ed90_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
5ba7cb0865b9dfb3d3a6c297b7c2ed90_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
5ba7cb0865b9dfb3d3a6c297b7c2ed90_JaffaCakes118.html
-
Size
460KB
-
MD5
5ba7cb0865b9dfb3d3a6c297b7c2ed90
-
SHA1
b5914e231f284bc8f544bfc0d1fbab05a09cb02f
-
SHA256
3fc26254846cbbe304b67c7f4dc03466865ee76404b7bb25b26e5a72499729b7
-
SHA512
4ac71ae84e095f27af18b06305e13ffbe49c67d83e3bb290ea9baae9521b59542049fd25d210f5bc0aefd53cd2c53d4e57f03b91a5b8751cdb44f26b870f6298
-
SSDEEP
6144:SMsMYod+X3oI+YrsMYod+X3oI+YzJsMYod+X3oI+YLsMYod+X3oI+YQ:35d+X3J5d+X3xV5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422317238" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ABC3AA61-1629-11EF-831B-46E11F8BECEB} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc2330000000002000000000010660000000100002000000039963e7bdbf5aeb2105a3733f428550b9a30b0198482b450799f619a0ab7a9c5000000000e80000000020000200000001b154c8fe548e9c97d441ae9a4d59290e02c9a9af30e13a970d5aa552ed694a720000000cec2cf164b0ded042d8c3c3c059b1eaed953aff0fd0072f5ff59ff9326e65d3b40000000adadcc7a600591d9ff88a9d335adb92e8ceb7c2a9305661778f63b0f1bf7dcd28c3fed2571803d273ae50bcc238da4f47e0f20e8a73655d6552c49ad5e8aaf6f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 005b4f8436aada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3036 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3036 iexplore.exe 3036 iexplore.exe 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3036 wrote to memory of 2884 3036 iexplore.exe 28 PID 3036 wrote to memory of 2884 3036 iexplore.exe 28 PID 3036 wrote to memory of 2884 3036 iexplore.exe 28 PID 3036 wrote to memory of 2884 3036 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5ba7cb0865b9dfb3d3a6c297b7c2ed90_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3036 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e442d2583a403270015412c71a4d869c
SHA14f1abd36f809e38466d7835bdca25c6c17b97aef
SHA2562d005c3a34f521a4d06ddb497b636a16f3a75645ba64bceb98fc10b17d67238f
SHA5121c4f159761abf9bfd5c0fc45eabe1db9bd8b22eec0dd908d14a927b0e0040b0d0db39808efe7ed9ed0df0fbbc06c0ddc76b5c7917df70f61e0f9b3832b9ea525
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5051f1846c35afdde17330daf1bfa6f81
SHA104d266ada83157928e4346ca733b5401bfa9af2e
SHA25656369e5bbd4db8f12714c90ac94f7e5429b2969fcf5b65d9d75f158e943005ac
SHA51200b53a300117bbeeec6e0fbf76a9373f6ea1adc03f8957a29683ef2ef350c1900ed726498af4f8c5e07d3d6ff35deabd6b49a8a9d0ac5e2e8b36c007ebace208
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528f5a17dba27b749ed92e6abe45431d4
SHA1fd0baafed9664b072045d53e103e18e2ad298538
SHA2566e5ae017297990b7649f6afd5f631bdfc173580248998dfc9f8b3b832c1c57ab
SHA5128ab53c36e74756c68ebbdba428b62839aff6a8f797a1c811ec8ddb4901f35e17c1f3b034f60b9eb255ee3fd6dd44e68a4841bb88cd7e8c4b9ce4f3f1e31e71e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a0410cf352293cec538d2e8d7d0c878
SHA1a06f00fb14355ea16f18f3787a3bb588b9ad828e
SHA2565353a3013cd6b63f1f20bc6d88108d83286d8bc3d0e5f8b69432d0fca7bd3cd3
SHA51273a280ee58c31217788acf6db2981ab768b702fa5b9f2f7c40269c7a85f7093fa954198cf8d4edafbc95d2cfa371e1029d256721e0797e7cec6db8065ab9ed56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518a90d035213ff4fa19165e4c16ebdc6
SHA1946e1b25927469ec8f1ca2e3544b68ca153c51f9
SHA256ed2fcd5a53d1466fbb34486bd350bb9d2c61a41b4526c6fc7a5c49cd086c0276
SHA512d80660003cda664c206b8931aba26e22f6fea2d8137252bf8d4892961f1cb7c79717dba1e7d2a01e492743579d348039f233ad7db72f75ce8fb1f5545a6058e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5660202fd0c613323ced6ebac6aa5cfc5
SHA1d176fb8a87051480f4d071bd218db487a0fdd5b4
SHA256086b329826ea12aec83e3d2e8d6aab9eeb716c854afba30686bbb5356692e6ff
SHA5122374890e675a38303a39631a3297033f33cabdcfcc45f06d5b268a53d3d4b099d00b3110e66f9b5d1d8197c45ee7ade8d7ebade1d2194652c1f568c5b315e9c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5958a0548dca102a48300d90cdc52cebe
SHA13b9a0ee467ff90fba68d383ddcaf49bb1ddae573
SHA2564985955f560fbaf846ad65faf46a3856e7184696f23d1cb949cacbb8497ca20a
SHA5127437341669b78a9c03fe3899f0c0bd876e885d2707e6200e3270859b6174e2d36e6fc75980af1de0a13fdb152770f0218247e7a0208628e8c0c9fad7430c86a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f1cc2794fe6a8ba4aa053ffa03d7267
SHA1ddfc0ef545b487f17118a692253261369c654072
SHA2566b9fb7b14dce8e8a5e5297b569e5809e1d27bef5833984ab128b2e0aba95f3fd
SHA512d09d456cfbc2e39b4b72ad2fbd134be353ee47ac3135a62fd88e0ecb44fe372ab5744f3eb0d19b47c24d90f5e0b3d44248431a0e06aadc256bf1fac6c5af60e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579dadf5b8d94d76a7cb62060ffd23cf7
SHA120b8a1c8a4cad74dc1b9e0f34927281d2b9dd910
SHA256d878f165bdcd9f94f5d5207c6cf069ced9929e92e0fc23e1b1fb8004f35d7572
SHA512f03726d81ab217904b3cf3dd5d3880c5982afe8b9c453ade635b201c7a87dcc96d861f425f694ce4615c0333c2e1c95d1b0818fd40894d799e2434466b41aa27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f3fc7e3a15fe1243abd2efadfb795aa
SHA1b382c03751b696aef94fe8c5850653d424d372a6
SHA2562757b54bd6588635e75aed67b629ea6278a63cbfb6920fa087eb7f83036ef2a5
SHA5120766a122f6d4044e9d790dd5708b2c5cd151d548e62b30bf2ac6b1bd911ae8e954d9f68427abf22ef3a479a76e5da87668996328dc949450d3e3f38e4d705105
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5265d22732c8d4518519635017d1a1230
SHA11e71fa17ac90c1e8dd85a57abba953388f79039a
SHA256945961e263800ad64c29ad01f06f31124e093d3d583532cf76e82c1a97f7dbe5
SHA5128ee5227291b3132b28ae887829097d56352845ba0a050cb4d4ae73d23c36b8077faa850a80b9c528b977046beba1fd2934616c29906c87cc13e53010eb0cf650
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598a1b2a7de24540d60cf4fe4ca8e4155
SHA119d6f0e362531f8e4f7c7618b420d8a2716da210
SHA256005ddebfc317f1104201fcc7c52fddcd8efa0dcaa688831abfc188e03175b225
SHA512bf178a041921c722ef16390b1f3f07b42a78778b92cb15d3040a7c472e7557b429f76c651ea7376b407e4af38c6da9f333125d61d603f185d66dd6004ef3e825
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df8ee7e69df7c0a12e14d42ddada273b
SHA1b0d3a398e4859184ce2a6f6688fc59404872bf51
SHA2563a5627fe7ffbb3129e62ee5822a93a6185fc3680685f8bb422f67e8f24894093
SHA51264dc30b7226574cd1bf7b4ed03d131515e442c7006ca4c24837a0009eb323cf8a25fba29f494b6a19bd2a3aab31ad6967d7885201220301c30ef3601940b6713
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e13c8989f14553e4f1aeb00a9350014
SHA172d209f7618767ddb0be4d51471e12015919eae4
SHA25654b5c8509a403376fca3079904dd5cb9aceb90e54f46c9e0cd4b1c0f1c681b63
SHA51243a17f20edec1ff55a838f5bca82afcd126c0747f39efa41e831289d2236bb846fc0ee36446ae38b995db23d252a95b62408267e9fcde442bc81995d9699cbca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5274a207ac7bb9ad3161eac8ad32be275
SHA16a78a93cc7cc75ec44db8b6a06a90fb3a7facfb6
SHA256dc2010f82735da8494786ae5cdd1b82a2bece0052b5f51d5c0e514b6f491a571
SHA512ebda80dc3623c4c60d4c2b854743b2020beea0a11df26148170aa24e0f95a204d94877d6df9ad8e6bdd1d414fff81beb945444bd4d60b21ec9f309d3c04c6b30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56bd20fd12775ae4271ed2353295eb807
SHA188f4be15214bb43638071c15f1083e303ef347be
SHA256d51b6e59a6be7650bc769a73d8e48d8e378d80673740c577776a3052e0f2fe86
SHA512ed650ffb90ecf4f5fb637f05cab8c28a25e0db3572fa484395dba923b2dc5691201ce4508dd273f165626396e31ecca2f1f6f9fe8b6824d3f86bed717a657eb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a3a67a9f5aeef5028b08eef897a2efd
SHA13584d95b79f5e222daf91244d5ac86d6fcce5f4f
SHA256374f2506455735f3df51176a404e3721a9c5575e9619c993f4ff9e9480ef2fd9
SHA5127825ce452cb662e22e28bdf5fcdb7db65332111023ca5153630972afa20b25b3ce5bf91b9ed01ba8304a1859d5b264c952b6454d7a8c581b9277a43b37ff0aa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a55fe2bd25c46412604451bd0a00943c
SHA177e4b7b48dc5967392b4b7bb5c3cc6cd1753a60b
SHA256649ab9119e6e44aa3c328f36ac14b19747b96e7eeebcc3b3d2f71ab3a5d22125
SHA5121d051d3b4e4d3e2a4925d26c315bc05b9801fe36f35fe8c3d11c70a958d741568a44d2aa01c76fa46351a1923ea941cf75806fc481d8ce3fdfd430361a685f27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5339783215dd372459eca1435cfcc868f
SHA1c395333127c59f82f76619531d2809e2fa12df53
SHA25619a2bc7ede1e94224f876a06bbefac7b24168fe64def55cc45965e98f026e2e7
SHA512dc5a81f4e240ca8a459b99f90904a3cea7acb0e5e81319674033381a2e18c9c95979a3b04935d3ed6b9a5c02fcab75615109b2f459d1df2bfc16a47ff9d62259
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a