Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
19/05/2024, 23:42
Static task
static1
Behavioral task
behavioral1
Sample
5c18d0a0107faeff5887743e3d845800_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
5c18d0a0107faeff5887743e3d845800_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5c18d0a0107faeff5887743e3d845800_JaffaCakes118.html
-
Size
67KB
-
MD5
5c18d0a0107faeff5887743e3d845800
-
SHA1
9310cae0d0cc37358e01958bcbab921136b6ef6a
-
SHA256
b3872a00f110cf8230db97930df0f3145117243711838551e02d3a600a32c525
-
SHA512
f32502b0473442407b2acfe9bb4045b35556c9761b0ddb797e608474dddb3b20fe2313afa3597d45eea621a8f33beceb8768410427c8c9dc03d6152ba48bc598
-
SSDEEP
768:Ji8gcMsSZ8tN99OIsG3DleEoT2fQC2oTwMdtbBnfBgN8/oAOcRWQFVG8c//Ijks6:J4WZleZT6P2h0tbrgaYcOnz8Pa
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{73CEEAB1-1639-11EF-91AC-F2A35BA0AE8D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 802d834846aada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d10000000002000000000010660000000100002000000036fea644c2e84e38e7773445fff530eb0576191ece6ffeb8bf4e48aedf2cf95a000000000e800000000200002000000007036b315450b775ec83cc27b76be5a00baa9386c459ba4a68b98edb5328a57420000000675ece999edc9ef2b452685da7460a890489151f8941a3ed4d0782cd4a478b4e40000000c00cc04804ce5624125eeba1258036c0d50451dcc12c492b2ed5ac6f2b78a9c9906be9027fb34a2c33c6f08a14389a74c12831057bb46bab7500aa6e31105091 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422324016" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2844 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2844 iexplore.exe 2844 iexplore.exe 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2844 wrote to memory of 2600 2844 iexplore.exe 28 PID 2844 wrote to memory of 2600 2844 iexplore.exe 28 PID 2844 wrote to memory of 2600 2844 iexplore.exe 28 PID 2844 wrote to memory of 2600 2844 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5c18d0a0107faeff5887743e3d845800_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2844 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2600
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5157f52a3eefbe97e970832148a3eba03
SHA17b082846ebd2d328d5e481f4391cd25b0aab65f5
SHA2564dae536f26614d74c5f6073bce7f077e08958e2a69b75e9dae68bcbcc0423293
SHA512ebf721c46427751686915cea9749876ea06dd4c02cea7202f4f1daeef5395502b03673333e05f41d03536395e8727898074e02bb8d9e621a257e864167af8819
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e77a049fb852446d0c8da945218e79c8
SHA17b570d57468a16b12c7bc01c2fa8df3c457cfd6b
SHA256d10499221f77c703fe8dfcc13cde0186d34ca8edee6e31318bb3e2c707f054eb
SHA51287e7177da23888baa6a606b7f6d43ecaf765b9056039ff730b861d1647d3a14be0435852c0154a5f9e8363d0e12ac91ef62023eaf220a5642000f40ea06e9de7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e30ce408fa13a3b882576060f2c8ba5
SHA1a236db00fd09c00ce1764e6d767809b2d12451ef
SHA256975152898b23a9a032fe6edb4c93176f103e32e3733fb809069c1a3ff3fc4b3d
SHA512bfff07fa937794da9dfec7cc9884dd7edba8a295e5312ed2ab245862c2025bcab69e3401cad854f68db792e0e6f40aa705a42e2898a49987647b57cf4ae7612c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ab5e6eb59bb9f6e0d20985fd0c6c694
SHA135a676dba0bde5a6e47f99f9178d469b6b64c2ea
SHA2568d69d00fe91a21741c5654cc2e742737c9cd6a957c05863e54e787c3493fe2c0
SHA5125201ad22794e16bd37f52b3fa0a6f002bf632c135bfeca409922d679b95da685f1e9b597bb7efd49181e3601fb3091b0b193ff26ef3e58bcd34e7f85e24c12ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525ea7ac56fa68c72f83a7a7d9857f2a9
SHA16ad917199e0029e73b71e3cefbada3e48cce63bf
SHA256af00f5aa763c8613eb02082f65c8197d4b54e043a2c6236740484656fc48b83c
SHA51272427b67bcab6f50e7efe777d757b650d0c0b093dfb23cdaf58676f4b4f665068996b0529bb7fb2dc2ca8bd1267939a9e84a986768e686efee827d3899bcaca9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56dc8c9e3e1049dc554e29d85cc5cead0
SHA11f5da62f691d7950d88c275757c60f4832d4d956
SHA2562d35c303ec166a0fa91302915243b23ebe0d2fc5e4b09db9f83de29dc2c11e05
SHA5128184934ad04cb6052e943ae83a692866e6d62be75a5222a0dac9a6654bed046f22b69339fe2e939a0b885d26b29f16c2789d0419edce2ba5fd5f8e9cb4eb3be7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c6681516b6d26fa38d585c456de0889
SHA1630a646391400434444da2e20232eaada0d175df
SHA256c7df928daecc7bfb6bd77496eeeed439816545c57fcb7c7879f553d00cfd16c3
SHA512866e770ec88573a6142d01255d0b1d4148e32703c03b5d1be386e6ad385a92605e040d70ce26e8f926179c1a83de000f39c0e8efc635b1a28568d5d91b494db2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5acc0533dd9fee2048fb8d3ce4bd6e3d6
SHA1d264cdd66ae927fea4d8e2c4c7af6865047ae32c
SHA2566d5762c6939876c5eeb7bfe7327486770a825de158654b70b630f8747e72059c
SHA512fc68fc6667041942aee7e557a1c7e13897aeb7c0cdb8ce95cfc829d34ee7b39f330ac3bd07e9535fccd576fce9645374f2c80a1dc7acc3858e02ac0809e1c787
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc7d6589a2b027a64a5e4709ea65ba04
SHA134e7e7fd61c728ec63a5b2b726a3cbd2f416125d
SHA2561dd6462176c142c351e598ebeef022544ac294f2610a1b79bab73bfe7b69dd97
SHA51247e8cb5c27c96556bcea9476d08bd40979ed35ad75534aacd885af6de77e88ff606efc814bad714be6a00174ff4c53699bcfda9c452e241f8ae8c26b49c0f844
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55401152f2a244ace7d38b3a0e080a125
SHA1ce6d233db6c52899168670ee0967494e1ed182e1
SHA256e22214a51d08c94aec872a25e31ff42e4d7674bbe6a6e2f522771b4ce2b07c3d
SHA5129f0198f710f646c356b2e8738c10fc8793a7ac7b62133fd8d007fa34ce7239aa7cba096f97102b14baee1c7dd0518e24157e2187cb1729dee66fc3d8d678cf77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536e321b962f95eb4b9de53a9cab4ee7a
SHA14cc6abc3f9a99fee195b3c68212557735d93299f
SHA25623bcbfb5fe311daca84b92a6f4746540f0104c6d118e8d0d01d3c208b2411244
SHA5129cc049703b9ba18fd8928e36e86a161f351f8e044c490d335e4dc6bc0e686a6366e100e00ebe37842eb0bf46108c26d13cc5cb26b3429c47b21c2bb2ce062b19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d638f6b86dd437834283058982cd6a4
SHA199ff688243834810cc30f2b10daa5c7293636df0
SHA256cefe715eef9e897054f1ab8c60ff9d0b151751da37fc68234b0965dd3ea48d31
SHA5127d17cc056d6c94cdc3a020ebd612b8e7cd1c61fe16eb839baffc8aee55368f76715bc375f1dcecfff653171b7e29fbaa08223e585ca23851c1885dc002f731a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5752d42e7d6da483118b67e3396c82ae8
SHA1e21a3296ce70d40b6f80d9e6e631defa09a66c6d
SHA2563677045fa56403584b1371bcb235a4e534fb6109193409c1aff63dd46ff2cda2
SHA51263ce30f26531adf837c80455a29febf559482eee70264cfa554db29b50246d61ccf1efadc91920670fd87662e286a0d3315aa876d802013843084960adc38359
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a6268d5099f9e108035a514587a34d2
SHA1817c955220a70596c2078766525e94112e230619
SHA256be7e6bb9e3d34b9f4ffe22ef372a6e4e481dd7e9c652235d559743e1ec6355c7
SHA512cbd4bf24622aa2d0292b6c3b905518ad5c69a55598f7b3afc686b2aa7071e739413873ad5ab8bfeec27ef67e8a3b06eaaf6391858faaff9df3acbc1240feffda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52088d510226a1579889afd378a26ba10
SHA18dff7f11f8b479401c38c7e98f86b974ae944ad9
SHA256ac26727177051ff5b8a2c0a41a5d83a6de064f118a94bfd055f3127d3761341a
SHA5128391304eae00a91cbb8d9f5694b355926023d8e8a9d8d7d6af7d41b5cb35f8e46fc89311aab57af33fc10c09425e39eee9e1142b8fb354742ed1791ffd250716
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d10bc29a673c9aa2cc3039ec6ae7658
SHA19f9a5b01efef69910d959ad8e2e5364eacdacf47
SHA25603c22368aa7294715553ef5901246ef5f15c961111b825bd38d05896b3ae7d72
SHA5129326fc54cadf549bffc5e3ac8c682fdbfe3aaf25ab3521e136737a0f9c1bb79d230deda8ac1d15ef2815fac46bf8d1f6cdd150eb5cf83a91527616c46ae7c155
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b96e6ff93ee8212587da8a1029f55db1
SHA15ccd3c1ca0c11105be8e6b87c165b3da49486822
SHA256dc8e294b8e9c67e9db9a0489cd5a5adbdeb6fd7e0d526191d69604a6c2ff264a
SHA512bf5f2a161ea30543dd3ad88a96782a611a892b336657bff6fe887f659b45d0cdae8a2404a1e94bee770886f31246beb14d6924671f9ae4cddb4e010e1abc988f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3f9e57190b860080cce6174b0c6500a
SHA19e4ce473051ddb75d42a5dd26af0c251a0cff5f0
SHA25600ed5fc9dbae4654d7191ea6046b6db75bf9a0a37edc09d6df6aa6972a96b20f
SHA512a0d7d111314355979b409d7a6c6ae65cfd3fff8c831dd40696a97dc2bd88f83982c4281b0fec5a3acbbde0aafb2064858304b8fa5d85f4c2e672912c4697d459
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a