Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/05/2024, 19:37
Static task
static1
Behavioral task
behavioral1
Sample
5b199520b5183a32f61f01d0576e140b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5b199520b5183a32f61f01d0576e140b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5b199520b5183a32f61f01d0576e140b_JaffaCakes118.html
-
Size
31KB
-
MD5
5b199520b5183a32f61f01d0576e140b
-
SHA1
7768f2f4d1ca31a978c023baa32b7b8cf991ca8b
-
SHA256
458b9c50e6aecd1851727b7af737ff84fd9d7bd4ea52a30ee1db5560386aa1d2
-
SHA512
e8371d69447131372566d4e08eb0a24322a1a110b9579be06d6f6b10c850f0d5c0e70e068d0c6da3f1cd20c95c6af9a856fc3d55532523545b5f14cd6098df18
-
SSDEEP
192:uw/7b5nUHGnQjxn5Q/0nQiefNn+nQOkEnt0CnQTbnZnQmI5xL/lp2Q1Zp/A8YXJM:oHQ/5YxRdt/AxSKF8
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a700000000002000000000010660000000100002000000066b05fad0e44ad79446f3ba72be0eceb0ecb7a5b91760b71ec59611e8053017d000000000e8000000002000020000000a5f6218c209907cee6924e4ef2d6342af773b04a9e0bdec82db8d3efb9d23c2b2000000046d3dcdb9cbc92c9c6b1a2a3c46f43e67d86892c2f005780250c22e7602707f340000000f9303e8d95b729b720b0e65809da00a841f99982e67e64799a256072fc752f9fb2705611940d0b3aef3b4c8bb58dcd61650b44b07e00880f6edfdf75a963ddfa iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422309310" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c054350b24aada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{365DE9F1-1617-11EF-A635-D2EFD46A7D0E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2024 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2024 iexplore.exe 2024 iexplore.exe 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2024 wrote to memory of 2480 2024 iexplore.exe 28 PID 2024 wrote to memory of 2480 2024 iexplore.exe 28 PID 2024 wrote to memory of 2480 2024 iexplore.exe 28 PID 2024 wrote to memory of 2480 2024 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5b199520b5183a32f61f01d0576e140b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2024 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2480
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54acd6d911969231b6ea549d490cb47db
SHA11648051d2cae18e97b7e1097564f3a2bfed8ea95
SHA25633a5dca6fc4965f4a26ea205152b224e286df7bae010ec620cdda2bedb751cfe
SHA512b05fa31f048df090eea4d8a9e92a878097c030a277f98fb223ccb429a066ee0a26bfee892a06016c7e6938e4cbf03aee734f4017c22930e4e9969161c67ad7dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5736b88ddd08d1c38dfbee8ee1fe9c7c9
SHA1be30f050c1f6e87b98761d77406e6a080cb53003
SHA2568de5fae71dd6559186b442dadff9c80670fedf1abe8c271fe22e7d714ab12918
SHA512e1054da99d9232e7e03d57e9aa1295b4aa1cd668d23c958e0ed1689ef7234e4f31a3ad17c660ebc8fbb7f496bb097ab27134496234ce651b3fb6fcd54417e016
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50738a36ba2ad2827b51d4243c0eb7c9c
SHA178c067cb04d6dce9200c60aa575ff62cf1ae324d
SHA2562e80fc3fa872a8e055a346ca54a01dca8622c7c9783c32d34cc117f176ab7a84
SHA512cd8f9b61425b382bec6249bafc906bab2110f9eb77430d750f9dde4df18a4b79806317583bd580e0b00f68a86686214055d2e133f34801224d1441ca0a604f7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593c4b8f90d275727a5715c1e1d1b10a2
SHA16627403dfb348dc58aa19e009513ed404d6d11d5
SHA25655c189570efaeecbee9a294d735dca83d5e7989e4467dbae60158e2d69ac6d6b
SHA512a02fef62c5c65e6f60eb4653857c5660e512ffab1b0818f8c0ca3558ce358d5ce586d8509a464eedae364b4acdf7f93724a865bc60fd4ca66444f0825c77e7d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a549b4f7f38e2d3c2a176dc9dd55ce3
SHA1ba8fe09f6738fb7af0be393e7a29c5a35073f6e9
SHA256b6dd886a50962224764932e563ad5793ab9ddeb3a117c6128133f7493a618bb5
SHA5129541a99e7d966b54cdfb8eaa56a0f9963fc6d6215e5374b130644b278f8b39d47b2f6ba85dfaf5149d0b1e8fca95ffe55f81ece9d37017a9c8bfd7ffec29b124
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dbcdbf51eb3e79db452e1e635ad1bac7
SHA143c574c169075934df902432c8d7a9cce7a64ce1
SHA2560281b7d8f8d35f102dd51387394af424e48557f769fe228897b568093c228ca7
SHA512a67aa33cb833dfb49e9d1a16b29700d85c4a64ea3c459bde6615e70ade305f202f27e6c653e1878717e832b70a8ac4918f031d176a4a6c678b261a2e9e9d1bb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af64ae1a20b53e32181da6457b81c05b
SHA1f2eef943fad30dc890005d2da0d87e9bc7cd13a1
SHA2564b33476bd149cee95c61e9a96ec678386dafdf09dc1d570eb03a31642574a604
SHA51206f710f6432281a66ed82b5031433275b0891ad561a62f83360ac810488615b26fe3c6fe76a3b457803de1eacfcc1ad63f95e47ab2a742e1b84ec3513e73af79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf576931b4cfbd3a1fad5d8a5fed0f8f
SHA1e7b2d8d6ac6c72dd75ae0825ef187ad9939005d5
SHA2567ac8a181364dc077eb1dab14fe592c1dfe1bc6bca323b1c873c53450f7fd148f
SHA512c3ab5dbf02c05f8b759d004d59170e7ecfe461fbbe2abf3c3d209cb514063a77368ad3d0c2dd2a4edc07ee9f4838f0648e22c1ecb483e7f0c118b151aba25dbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533d242fb1f3aa136049b923b6b47d501
SHA1845db3a4c3ad8fafabb42f4a58da261096e88104
SHA25619caa4383d214398ee6fd3c478fc77c3cc33e97816a6de093c5571a511129f88
SHA512330b3ab038b5e753db8fede7a47e2732f65c96193820025b9a776c2752f077b59f43ae2b1d7bd2f69dc1ad537e580ee4b94a694f43fb0a7c531d081b6ab08577
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5054040c12ea62d730c25bd06afda5b06
SHA1e52e471a7da9379da3433ebac546de7ebacfa052
SHA2563498d051da5dc4a9786db416c3fce2e3f4699f7a0b0c8364465c0500c46563c3
SHA51287448596d62ba35fc74353f7fbf3bf92e07c9118c54e23b3e3950e108f6e42790e3de4de555ea4dda6b5ac3b190604391333294002d9a129dac08353dde2616e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e16c228c11ab80d35fd208b06ff9ee79
SHA1d84e51b503c12ee260a3d3c227da4594d8157400
SHA256ec0b6ce7fdc31dbfb2183d91b69fd00cdd3d84be16a65158a2d0cac1d1a7f8eb
SHA5126ca1eda3931ae37a4283715eea4ba4139e9d81f2bb86bac18eb582cf1b99f0c71fad51748af842a3cc04e44856fa9d1251f37492998da099fcf99f95a669857e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550597c949884945d7851e842b1df1a4b
SHA1d65eaa1ee7450f9bb07acdccfac731ca8d9d02ae
SHA2564e79fb385cc579e76cd3ea4270a98a80f1676f10f231c898ac8ffddf16ee30d0
SHA512b22ab7d3de14f2b51beeabd8902ecba75d813702945d457656ee4d9f4048aa66baf7345350f7772a5152aa216483e59efd1ae5f146052fba160655903316cb99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e457d341559a54e3caf894361fc2162f
SHA15bb1a7492e96e4ed79c8dd3a00cbd03d3b56a447
SHA2563cad9f4ded3fa2b8c705e2c34e8c88335cc48fff5bca26e995d3ece82bc46f11
SHA5124eac071c5f32ddf53e22aae95ec68aee3c7e28890850c82a7dfb09be608b03383d75f0959592915030f55e70c92fa4ccb596b19a78ce5353638223bede2d12da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f5f7d799bc801ded038ef908d8d7070
SHA1a87b2d999e36e43a68627b4e893e26e512919f4c
SHA25669f8b6b4c0aa0a9db77f3854989565b8537dbbfcdec897e18a5dde367108c059
SHA512adb65e1db05d1f377d7e1efcbdbd4c2829cf71243b7634aaa279204d2de76162878b97ed0eac3991cec04b4e2bdf9e3f13f35963418fc5c66d108d3d0974fc8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a299636ff52efc1d1796ee750fac1dd
SHA1fafb8cef22716dd843836daf45eab5032c8c295a
SHA256cb5470ef5813ba4585a0b1c187d0842727ea73bab96403884b958c841e66960c
SHA512373ccdddbad60ca2d8be7de206420f6b8a2c9a0de418481edc23f444f12c81067ba28ef99ea33b4d3c25f9dc2389938aba23a202577bd44f65ec5aecb1431239
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f571381b8e0224e4a534fc1b395e3043
SHA1e236fe3cb2308ff387e3da1444e68d278e3ac58d
SHA256dca2a36f419bd6730b99220d5f796e48aa8d1b20422954b3cf8170a3d18ac237
SHA512d99e3f2911eebd5eb715a1876e7aec2687f17246b740e9f62c6d6eb00bc258f3170894dde1b6ac3b5c8f9e43b388dca0b0df9e77c30fbc137afec6cba36de7f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53913b080249e92175c1309a0ef57c100
SHA1bc1f107ec30f87244b763df3fdab68872f28e23e
SHA25639bfe9e5c5cd226017a023fe3f28170f0886167f7212226298c6f9c4bf24f47c
SHA51292c792159098189a84a1e904e73416333e94647f3dddc45c65cdc0baa870d1eb37eade5344b9600be76d11138256b4c6a4576565063e7e79817d57a3232c5258
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c4b3644ef14b5092eadefb86b50a87c
SHA19052a1a71989d31ed018995d7d8503e40ec3f8f8
SHA256879c8935271389ca222afdf6d3a3889825f02e455e81b15985b0cec708b6e9e9
SHA5120ce507332e1676af29afdfdb45211f9167392b77795dd18a84a055d03840040bd3906637eb8a66564f5096fd950f1f5bb582bfe13f959b1ba5c26b843ad28a8b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a