Analysis
-
max time kernel
121s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
19/05/2024, 22:02
Static task
static1
Behavioral task
behavioral1
Sample
5bb524defd15f8d36a3897f316da444f_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5bb524defd15f8d36a3897f316da444f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
5bb524defd15f8d36a3897f316da444f_JaffaCakes118.html
-
Size
12KB
-
MD5
5bb524defd15f8d36a3897f316da444f
-
SHA1
26d19efeddb2cc797e964185f0ce1e857e89518d
-
SHA256
2bbfcd4ee4df811de95f3e035c5a3e2a5798507638d1f09f9821fcf228d372fe
-
SHA512
d99ff1a3731c8d3a88dba54b2f70e46e4361d6d78ed3c1824d6ce8c1a3a4d7c4625e9fd6d6c067fff6537ff36f6dd360c1c652939cf7cf5d7c0b7224c55679ca
-
SSDEEP
192:/2BBU6OFwi/H960tg0/eq0cpCnuOVtNoUN6pAig3xC5FndX+kD:uPU6jiu0/ezcUnuOrNovARUndX++
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{74F48F21-162B-11EF-AA6D-D62CE60191A1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0b05c4a38aada01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422318005" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000af9fb6c4202fadd6e4c5dc663b580b0fa0809864e734c9fe6d0effbaba4c84e7000000000e800000000200002000000050a499eef8441f44f7ce70297ae50114b3100c895c4cdcc0385d17278ddee33220000000d4a6d3bc12780a342f309a2f99d50c6bdb11784a667a175eac29e321561b2d90400000001015ac318824415f6d4bf7ff1984c63bee5dc333d663aa942de4136523d0e5e52f1f7ae05b4ba37fb052396bc8eb040fcee2c02c1faf5df7054b8d38152ba002 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3016 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3016 iexplore.exe 3016 iexplore.exe 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2700 3016 iexplore.exe 28 PID 3016 wrote to memory of 2700 3016 iexplore.exe 28 PID 3016 wrote to memory of 2700 3016 iexplore.exe 28 PID 3016 wrote to memory of 2700 3016 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5bb524defd15f8d36a3897f316da444f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3016 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54793a924a37bc50fbcbda0b97dc78657
SHA168c0bef4f580e526ec07a846c6e3cd1529a6b0f2
SHA25638f7238c19b2c1e82e642faa79820007daaa5b0b8f3c78cdac2e88051a34496e
SHA5129a262d65b7563bc0e0e787d921974f2f806bd7ff4e07778bb7d47f6df275463aa9f8e3eb6e9f747796d6905d46fb660bce6d54dd54ccd88fa801de23e4ad405c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524f0fb2249e217da2b41a45098480964
SHA1b49c144693ed82d479dd599bb775c71a3299e9fc
SHA256d3256f0aafc75f9c2f9b4819132aab74ba45772de2d0129938fd1d60a1f46288
SHA512b33cfce6365fe60c7818d284ecce4f6dbfa18b2a966c72defb80d1ef8604b966e0830086304be1bf9828143d7d622b297ee68a25fe57b74ba041438f4a159e5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb43fb68e4dcf8d0f894c95b109d56c0
SHA10c74dcef9e21d51c4923b4f31170bbad7713e160
SHA25610950144374882c193189c7c4af536ebe3eec7a3611b4d8af9ab5e19019437e1
SHA5124b95da6733f6d6361d8260b50a79693bdba9f6b4d7fe6a15c1ec4ccfc2993eb98d52b8179d0e8286a288f39f6613c9622d3523f9b51281ea2d76a27a0a9e6cca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f0129c9107de6f886b1b97b72f02e9e
SHA13889fa8e99356892a00f09e9400ab1812f979a39
SHA256298aaebe7b64789d1c22ba79594b46b2236c1a4c12a1d0871d600dc7c25f0983
SHA5122046658e68717c82698a4c66a16ed93d1398142c057a8944d3c8c2cf185f506c024ffa4cc77743d1875a5bb9dc74dd8d941e2935ecedef055d736ee03519dec1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520022a1820933b6d106da5979538f664
SHA1045934752c99b94b01d611cd22ed68551b764cbd
SHA25685063fb3cd3f7a9f7798d7c8032c9890ff60cde63147544f6a7644b55e648aca
SHA512e31489b53cba2d182f2862eeec40d2f2f7b2c1403c8bc42ef8fdf88e032f105a0497acd55f576c23536f432b825d17cb5faf0ebc1af11711bae159f1c894346a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d43d935ee7e98244e9cff3016cfd30d
SHA1880e1b2e3a7d9d34655cf85d2c5937fd432af05c
SHA2564b817edcf302a18aa907d3bcdb06a59ec073152dd549e7988d6869c3dbcb1d39
SHA5124cd5af169f1b9147a8d01013d6d1ea319ec81ade0dddc403b939005af794cb1e4a6818b20edd510b7a37b9fa38a95fdfb1c5b4b7c88dac25f2a94f02dde1cae3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db260b2dcaa7a28eb5c4a1d0d09f7e29
SHA1b9459538911102e9e7399fb382c372a1716dc683
SHA25682241649417a0094926446effc136f6cfa5a7ca67c95b97e894ecbf2ffccae59
SHA5123df140690614cba172165378036fba6f8f52c26c6fd144a09f5ad5f1c1d79238a9e5b430b40f5331ccdcaf57d9637fa0cd458ae501d2d4a5eb5190c55665b68b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520eab3b2692b744ae92b6d85a2f325c9
SHA101124e201cf026ff5a32276a0f664a5788f9b495
SHA256ec77dc9a81f951a266a0bc70946ec3b7b01259ce3569f48701930c3ca53ec041
SHA5123e4394cf7061a20fdd18048d600fed5dc140f521dfeec3a77375f9951bf075880404d27ad02517b104e38630eab7edf444992c6c1c95b9fb40042186fa480085
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b47e47750424a4b776e6be8548fd5f05
SHA15f8a5ac15948227359b484911f5cef3aa2b7c2b9
SHA2563c832d541b481c7cf9131787c8fd449f99833b46476ee5b17562b38ac7057a78
SHA512cef400021dece84dce8e2615ce992039cf667963796fc82b8888e06d85953bb15210cb2f522015e1a55ab1780c4d76be5e06406ca718e3502aab087983e2a5a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e7cf9d45e6f3cc69bb768e59ce8d64f
SHA1564126473c2bc4bb033410d6800282e567598067
SHA256f49fc31106df053590935a2ff76aac9f54e85577e764ed31439391874f448472
SHA51290478e274ee28ae24fd82cdda3da25f737ca3fe4a97f97783b6f67bbbf1f8ef5999552c7b9fdf28ab178788dd7ad8db8bf5f8001e329ad46d2f830653cc2a58e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9aee212952704d2203164d4575a9d10
SHA1e6872b83d9a9d458aa8bf8f4b5fc424abbc55f33
SHA256ae5b0e6bc081626c72e048e342cbf21db6d19b2adaecdbe2a9d7542ff09ac3d3
SHA512c93e82d98354b8c0e006df4c03255dd9bdc95ada4acb39b193e22aad68fe5682387d5b5a592f4dd74534e8cfe69abb6bc3947335d9dc3f5db71d582dbedd763f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9e83e09e6a9f96d0db1b8ac7899e043
SHA1c1deae8b3e7e4ab84d2f1b3919c1baebebc6fca5
SHA2564e7d5f4b51e1122c6ed714cf868b4cbf43b9498b2762c3ed5296dd1fdccae897
SHA512c6424e15ba0745952ae733253c3d069e57223941d296381c277bf076278d9bc6b5cfce93f713a6226d9a61243ef31e4df0dbdebe2dcced164a00dbaa5b43e648
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547792dae60b60e8d907488174790b581
SHA17121bf3685736c5e164c9aa003d41f97b708d583
SHA25669fac07dac7f1e85827a86eb744d9fdd13f61633f66564e2611c6536ecb58594
SHA512a6d00d0e0fe2b164b01d8384f17f639434af8b2cce0615d6ab8a979a04ee508db636ca9023ab2ad287d75b8c7a8a35f11a4062b81277bdf725ea760f6bd204db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ed22246a8e960052b714809c03457bf
SHA1aff8bcf94147b21aa7b531376173ad1f6afc0159
SHA256e3bfe4f2a63eb1dd57e9412049ecc7b8ce68689e203c01a4f8b929c88c6bf889
SHA512f24490237962e67adc191ca4aa71311ef8ec2542d76e4bfc97839912d5aa10e34048ababd806680d47f9285ea54a77bc88729e8ccacab869b035c63f73629903
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4bb44c14840df26eb71b3596f27e6a1
SHA1e41aec2034e1f7183403eaae8ce857b4ee922620
SHA256696e7be1021d049befb014a9a7c49361367312e867bafa00a8894e2233010138
SHA512dc4de79cfd2fb13c6f9539e65bd35b7ec18bb9230fcf5382cd90fe8168eedd1a843288c58a0a18336db5c293bd2c0e7bc6ca210e2e0d996cc678658f0d1eb0f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5600450a4298e4475bd3d067ccb7aa9b0
SHA11cf2ef4060432aa4bfeee5b9056caa7f94abb550
SHA25631ede025d50b7ba5f10246e6aa60b5e231f1ca0434ba7affccdca44748645988
SHA512d71cd6a11d2f182124d759e0d9aa2f87900ee27beabb430d353edfdf393e9066a76f51f124d490d40b7c72009787bd2c38ec87ca4ca139ea5a4293475fb82b18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d41e0e6c58797d29588ac9909b8eb01
SHA10548051fc00fd19deeaefe9f60ee279458e50be8
SHA256aea2a6c1e1453801dbae46a0dedd615f5d734a1db9860fc3f2bc01f985f1668a
SHA512c3009d8f0cce9f9c0ef26e205a1ff4b0185a36fb938de5f94121ca7542b03435665f63a781a66890395208b967df1dc2555b99a2e806eb563fa9f4a13c5c7819
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507ccdf15c393e77b8d4d6a20707c79f9
SHA15f7a6d8f080d056ef1649abd27d7c01f9f5baa90
SHA256596c21fa2fa7dc9719348195830ab39f4f3b91537862ed16368cabf3ec289469
SHA512cd6173b6cbbf107c62ca3cd3955b9fba63b6ea59aa9aafb55a4e49f8af4f81aa8f03dcef94a7ced954ab2e80787dbb43deac24454b25ff2b93c86eb2524c83f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535508dfa4059436b151e7fe4dba04f89
SHA17862deb17e81e5bb3dbb02f67277c72ac615caab
SHA256bea3e076340c4e6424a94b6a2bb39cc973b7b3b1fcebc1ca3d6eb682bd01a4f7
SHA5127acdba0cfaf65dbb991c27b0d69c8b458a92c494687eddef2f27c5249e8ee21bb26623eb13eb2efff562dc9bf711f005b9360509de16b0cea28302c2154cc259
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a