Analysis
-
max time kernel
138s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/05/2024, 18:56
Static task
static1
Behavioral task
behavioral1
Sample
5aee8911d42a7bd8f8cf1c5db7bea6fb_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5aee8911d42a7bd8f8cf1c5db7bea6fb_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
5aee8911d42a7bd8f8cf1c5db7bea6fb_JaffaCakes118.html
-
Size
33KB
-
MD5
5aee8911d42a7bd8f8cf1c5db7bea6fb
-
SHA1
d0b3ad86e53a5cdb3d8866bcf8bda0bc890b0542
-
SHA256
c3a71eab0bdf5b3de98804fba675dcbb240603546036ddcc2f0fe7b8c804c330
-
SHA512
d19f5dc644cbff461710d85ef09bfb1cccd389dcf87f35624dee81da2c7a86bf153ef6f1d9d1b6f8a3d32a6a686b6881f8995803d7f992050d04a819db4d44a4
-
SSDEEP
768:YkwFFFFFFFFFFFFFFFFFFcNNTJHrN6PFPPQSUha0NkY6cEUynsoW:YkwFFFFFFFFFFFFFFFFFFcNNTJLcPPmx
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000c506e13da8cd77cb0c7436d769b3d0941fc27ee4e8210bd5e85d392f87fe928a000000000e8000000002000020000000d30ad28e1f75a2e861fc8625a942fda467be1e64aabd132223f5e8b0fe63ad2820000000e9ac297dc6aacdeccfd861445619a13da8db1b74634a93892b5e9c13df9144ec400000002b7c478d94d62e5437d2c3af98ad70bd1c7c355e305e31376af2d8969bdc847649ad59cff7fdbd57f263b132137adf3ec1cb09e29de243c1e91b18292e628d5d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422306857" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8036C981-1611-11EF-86DB-FA8378BF1C4A} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10415a551eaada01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1724 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1724 iexplore.exe 1724 iexplore.exe 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2592 1724 iexplore.exe 28 PID 1724 wrote to memory of 2592 1724 iexplore.exe 28 PID 1724 wrote to memory of 2592 1724 iexplore.exe 28 PID 1724 wrote to memory of 2592 1724 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5aee8911d42a7bd8f8cf1c5db7bea6fb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1724 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2592
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5078598df9806b6c4b1563827dbd9881f
SHA1d2e96aa840400c1da9dffce71afa24252258009f
SHA256f697c8aa7dbd55e363fc93bc15f1e8796bcde91ffaf14a9002fd6cee2331c0cd
SHA512fcf9ea4f19a3394aa5c6260c78708e061d55e3680ddbfed9fd7065a8d183f0d439a148354717ee1386b1227f2c742b1c755182d20d3997a9217e9296a9147ca4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54dbe69aaff4e1fad4b8ac17699672d9b
SHA11bd3a4c0ce792d9b3a793ae0c4e53b1434eb3794
SHA256f2847bb1d2a26f99403b4459ae654e5cf8ac1bf0ae67f59375cbee378777a396
SHA5121177857b700808705cecd5d39b5d921b99b3006094007ead6bb3a0f7715d4fcad7c44a9ae0989c20948ea10153659163ec421143f30f7c1b34333acf0a0c8613
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d099a30a13791994938c66acb13577e
SHA1478142847762deb404c739999b8444811476b68a
SHA256cea298250537fd37b97671ecb9542c92221dc7b5a3c740504e14e451e8aa61f0
SHA51204ee4a031b58542fe2bbcb6e41a217bf65e33c35842b0885ac3514f4c888d27bd380daf1e38022aab71512fbd2eb6e4662cc2bc5f50e0f1989f4fb3386398088
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e688c6fd97b5ee1618f4cbf9bc56cfd
SHA12720032f01ca189ac7a96b74375f567de60a6de4
SHA256ee226576245a75c9f8f4c5fd3ce7ac131a02997bacf507281e8ff8db7f3c22e9
SHA5122f01a184dbe26d9d7011308b40d01d31b8b5dcf5c79aa0b07d0797bb618af79ced189dcc287478ff87cd4a5363d7241b7818cd42d66e02c543d0fb37d19b05ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c5e5bc7153831908bb0da34f740b220
SHA17ea2dda6f0b6b319a35de518582645be7f177bfb
SHA256aaff6b1ad6d86f899344f0aadc2b636f344e0a71bf55d58096f7ab0167fd5def
SHA512232ebeb5d15cd6a73805496777d77425f04df429fdcf5154359819f36d45472c64b263b428072f96e3d5c4321df06187fd73ae8bacda1129cde824e25813e8f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c93d3d66d8e02c7af9329410398b27c9
SHA181e9da100872cd3b0a4aaf091e07d3e4ae5ea9f6
SHA256a28e089bf0d9d2682334f4ba4ff6441d62c1e5294c0a1e9c9f0a19144478387d
SHA512a2e45887767318c6c43b8907715281af849cc8cd90b769ebc95ad210fb8aa047f07c114d01b7056b3c92801d1f4ef1e021f0e774cd60b8313d070ca42a73513f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4c4122035e8ebeb7e1aadeb2dbf9fc9
SHA11db27fcb444f45c5912e48568f6950b9649a5b4b
SHA256c03fd050b5d6abdb83a450d59dacbf96703aaa86a82e23f7ec2b43c2a291d46c
SHA512ddb47d2083553d209e7d188ff208b38080733ab72af06f71fc9066de8a2e6e1917a4a0b81498f10254f06f55122a29c5af9bd4e8c3c351646e0da29ed4750710
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ea4804b14544df3b67355113b162fbd
SHA1e5da846189b557e54d8ffab2636a3a56bcf84ac7
SHA25608f6abba2c3d8b4286e519da077f7e8adefbf32a4db38e8c9c0ad37c8021a209
SHA51296b3ebcf241d2d792904dcf499f2ed87b8a148228563208e719d06811fc11a8580e8f2cae4a96e22a3cf8342575e37a0cd38bf4532b44befa42a5d9429f84e96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cccbd7a179a44fb3fc2a206c7fe6406d
SHA1dc734ef9143b50e5664e35675fa2e3472f8c1876
SHA256ca74d30b0f37279f71dc59f67089b9547d9d51ddcf073ec0ffbc2600d229c244
SHA512c6bf759b1b25bfd86298b15ba888125c42103367fba4ab48a384e32a8097763b40e97c108be5c3830e09a4cec0c6f306060b787bb8a25920ad70759ba514032a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d038ef68e80dbf1fb6cca87dbdeaa70
SHA15eabce9ba2f2e3e436cf8fba2ad8c26eff49df42
SHA2569222c90bea07b3849f5d6249fac0fd7551044480f6dc3eaf4fd78542a9cfc9d6
SHA512189d423be00c92ac65dcd3cc92ef886097c6912e4d89205891f4fb21bfc43139e1f8a7ec1aa553e6a35827fbb27f3ed3a666b6e1c5350439e033c604ec3c96b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d29ec6d4820fadbb719cfbf3831209b
SHA1f8318398b02c5773376314ccd723ca1fce1acb0a
SHA2563237b7c327c058ee26297764bc65e223f259878c3c50a0e6132cd15fbd8e69a6
SHA5128f1b76f507ae4defa7ddfe568f8f2915269d60487ad4016e90e948ea899ac1e2c03576f27ab34c121a44b4c34fe7d6b3c8f2de0e45904266b0a5b35ae2e52c03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be31cf37018a92d34f260de7ecfaf407
SHA1738d30c39186098521799dd756c8e85f55c93778
SHA2567119063bb30308dc3f5c9bbed40a749f72fce5189f9402f6e27ed704b821fa1f
SHA5124c56766d80c9141beef003a420d4e6b1136952613ac029e818f8b0566f048349de79a6fc74d2e3471a34ef111eec691eeefde36726740aff2e3c672afc79f7b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4eced52e525d35f2928dd6abe9a778c
SHA1ddc20d864e7081878b8c61b1570f9a3fa517cf41
SHA256871896f5ecbd9ad7d1fe58099a5216c95b5f1fa70032e2d05c6c88deaddd1cc3
SHA512037e6d53f4209af2e25fa687479ab1acca45f708becc3dfad696dd036f909448d6a6dbdd4d7194af06f55706f9270054c9b02de76b7678a83d151c032a01e4c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d3b3b8387d8092d642ad73488b3450c
SHA159bbada276b3f877080045f63e4e4806d10df56a
SHA256dc0f73848c961e2c4e07562a7e4550ce17a28f2fe91fcb6d4868f2539dc80d73
SHA51212e1d6390dcbd451800f25887e7701468a4bccf451cf17b38ede44c16dc73892b2546a33b43a1492c6784848ada74c7889080b493388927bd98b5840df740bdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5995dd0aa3cac66b86f4a67763a3325f2
SHA1ed228137667b83b9b381a491162a9e9bbab8c97c
SHA25631cc12477821d4524e17f2cf23bb9b961157c44bad0895d5a9a5a9c6cdcf9ba7
SHA5122d846f0b21d66f5aa967fef5b2661c4d1dc176737da5ba6f39aca35b5d7e1d20d549eef9c41da41095ba2fe633be3f9286515256be47eab427c052cedc9d23ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd9a1d85f6d617f657e41669a08f0bca
SHA1579b62b228d31098f2b945eb03de7774d2cc9e93
SHA256309f5a2940384c2ee7bcfb8eff337f085a9e3dbf71d263ce79d882b83a96b5f1
SHA51293e9e1f2a534727ad85488968ecda8b2b25976adea2f6ccdb4d238c7aeef69d06d3b987f96900f48f967b1d4c3112fe3764fe8fd3d8ba2460f2db2ffa47fb02a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517f55b0f1f54a23b2be4aa9abcb99126
SHA1a6590bf245a78ad140b09f74a642e987f5f314f2
SHA2562d0f42c1de5feaf49fd5a1058d6c4a93b74e06696063563fb8d33109ef9fe6de
SHA5120d4eb84457fbb23804de099093af86a1d73040b3c4c6ca7f0b8e8d1d550a097a191af2e5ca319d764895b05cfff11e3212ea87aecd1fb223cf0db7c26817e460
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a