Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/05/2024, 20:30
Static task
static1
Behavioral task
behavioral1
Sample
5b50c488284e7bce45465c53fb2b139e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5b50c488284e7bce45465c53fb2b139e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5b50c488284e7bce45465c53fb2b139e_JaffaCakes118.html
-
Size
5KB
-
MD5
5b50c488284e7bce45465c53fb2b139e
-
SHA1
d5f4369fe59c93f428d58f5f762602ef366913ed
-
SHA256
fbc88343fbf4019277d5dcddba7e518a90a2cc401904cf6efc852d19aae0f6c7
-
SHA512
e876b8892f9a1dc95c94776b34721e1b91955750f68bc04e102763c8fb238d2785655f232b29aec8f179b1f6587194931ceacfce7042b703309d26e68870fa77
-
SSDEEP
96:1tM18SU6laiJE1IcSsqxlg/Pbtu8PAHdLVKrwtGRDFf9HoUqEPkRI/I2Ix:m8XOaLEcXBbPwdLVKrwtYBoZd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 703216772baada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000e2cbb2318cacdb88ce5255931492aba2a9ad79d7fd8f9066a1f7a84f53c381d5000000000e800000000200002000000009cc23da4a7d7fca58c748014da72c10bf85c8564197972101809b9e34673c7b20000000ef98de58a314c3cccc265bd8ba033c368b541f9711a5a67daca05778d0acb72640000000738b69469e592876c8545b90dc81c28fdea9b0c20a29f9e7cffd06522e12666274cd102234892f9fb198f586d43d1ac46cece92a5de2bd43cc4f96777e68a25d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A283FE61-161E-11EF-82E1-DE62917EBCA6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422312498" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2168 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2168 iexplore.exe 2168 iexplore.exe 1612 IEXPLORE.EXE 1612 IEXPLORE.EXE 1612 IEXPLORE.EXE 1612 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2168 wrote to memory of 1612 2168 iexplore.exe 28 PID 2168 wrote to memory of 1612 2168 iexplore.exe 28 PID 2168 wrote to memory of 1612 2168 iexplore.exe 28 PID 2168 wrote to memory of 1612 2168 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5b50c488284e7bce45465c53fb2b139e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2168 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52818b494d08cee5ebf8891ffe9a9f159
SHA1be919b67af15e6000376d049b5cbb7014f47a438
SHA256130209e4322dc41ed651f589946ec4a477e22a09f71aab498058c483f5a9361d
SHA51253197f32e6f202c12fff873c21eb4f87a0ed7ed25150c386dc94135fedec6bf2e4300f01b54db517530ec2ee3c3b563153869fabc1b9aa511d5f5e5bcd52a83a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5c88756b7f34816dfc1f154d25ac646
SHA1c60ac095e7ef7cfd73b65faeeca03048b3d16b83
SHA256e371cdd0cad34a65412b5c4606d992fe614cb042b71028f289e0ad13f36c3ade
SHA512898fe95458312df6ecafa05c60417f064e5043ebbe6123ce22f4f041b501766ee2f220215fc0e5821e388cbe36bc02f21ef620085e57a2c6f7773387b848303a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51254cf853086f4c7ab641f0384b81e29
SHA12686742cd1b0f084c744f459bcb0b2fd69e1add1
SHA2561b50bae9ed072e534bf72bb90728f16ac1b2b007b9cc79ac64cb06cdedf9a87a
SHA5120c9835950441a51a36417aca955fae6503aaa5a08c0299cf8c9322b4da3f53c28245c0bacd557932d57355c1523f95db409694904b3fc4d76992a58b9b7b6702
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53be02e826d4bf14bbf28e2379125fa96
SHA195257eafb797992e71c92becb6938aff4a5f3cc1
SHA2565e4fcb3e09bd75c7f2b158fbdeb685abd5795a6f3ff6b608859cb73403876de1
SHA512cd42480f716415db4c18b055a16d10475f4a05280d086e1b643a46fb010c0ff2dbd654a7fc6381e4a2df142a740ae31527386161c96ad3bbc20b0f11633a232a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5069cdf5a89b78aecb7e304cc87a9908a
SHA17f47efc8b57f4320e17887d3cbc87a5a0d92120b
SHA2565802c3767dc6c893ead5420b9a5d7305b4f7602ffe6cd0357d9ececd28935502
SHA512d7f369088dce2b225be7bddc60789a7b4ace8e2014e9d1c07deac4bc5affa7bd1d635723bb11186b1d4db1d43d00fff10affb32677dd9cd2cea5dc0c5ce4d2c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573bba68f4471aff608c4a062c8817d23
SHA108ea23dbb3f7910a889b38f99a55297ed75deee6
SHA256ab7f3ca23877752d0b3e2db7137cdcd7d3120eee0ae354c7b21a0ed78907543a
SHA512b88ea74d9231cdf07b96d41d5c31f59e1a162537a4d27ce4a5035c7751641c6d5ff4fc5696bcefc803480422471bd8d1be008669645c114fddb2f029994d0818
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c59acf4693b5e611c6908816557bb96
SHA140806f6a7e02182626de26b85892c083a409d63c
SHA25681660d1db61396639ea14395814dd573c7800bae09d34b21966ce5f6a8202b86
SHA5122515f782997fb4a19e61843b713af1ebaef1af03c534b3c5152e269efb19055c062d25c10a46f9c60227d4df0dcc11ccef5028d3ca07e5c00bd11001f986329c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e62faac1b6264af0e15e0b40ace093e6
SHA10835b598c277cc4269576cd15742bbe3e1f105cd
SHA25641f387008cd2fec95077fdc690bc36439700562a4c9dfe36d495ec4e1bc8005b
SHA51250adca662d1c7494cf7c3b96e646f1502f1e0fc07349eb4e3aa0adf6676ac3ed38db4fd93130dbd2240fb19c782a7b9cc2663eafe00db0a5e37c50cd23237519
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9cffc2bfa108eb7de8075b8afa1963f
SHA13ddbda3c176979dc5099304455b460a24551b1e7
SHA256ca21855ddd2d3de4995cfab3ae1afa84b165fb9918840d41e4983e2ecddf8738
SHA512043d415a81c6f95783110e88a6c209abeaa936a854dfb79341cbf70b6ab7a06e50f336c340b3790163f7081d0997632ffd1fbc7fb55671179fb435f8c5701182
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d1c73c6306a3db34530f3e3af108233
SHA1935cc5c158b44db1ff2e9529d93534ba7dbaf56a
SHA2562e0c9dd9e31405586e8a0f9c07c160147340ea1e779a01549a1388f8007721f7
SHA51221c42d9b6e1d12ce42b1a768ce8dd293c12c4ad81c45810df1299d3511ce63c7dcf0c10f18f878feafcee9e70a3c776d93d66b18155609be24c7d2cfcdd09199
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54eef221c751728d054f3cd308a113b64
SHA18b6f3e4d37527735174b74b52188372e40d1d210
SHA2562595819e2f8ba022993f06a0c8168f36f00b7180d4eea4d0842588e4d8e41ef1
SHA512cd97701af3b7a9e835238006f710171d4a9d0f3fe32ae466ce1b0c9281ee4b61a09fe22968f60e211ad7e80c709c4aec01e0f986c110c848f49c22c8c2f3f6cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e36cc11609b1fa82fe196c021e36124e
SHA1e6145b249213aea6c7893cf3bcfd22ed9b4a1c6a
SHA2562e5716ded1c1ec45e237eacac61f4de692cb1fd75886a056c3de057193d994da
SHA512c15f6e367bed9d8a6ef3af424f6d5f886f558c7dae079f301c0e3dc7f1049494813387275f0ffe38841486312aa42df3036f48567574e0bdce3a29a0ea701d8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f5dbe3e6c703032cdc30436c789e7fa
SHA1ff9bbe1b9e96183585bb7443d8cc597e3163ec04
SHA256d0d83e213b4672cbee10b84f3a9ef7baddb21e03f489ff66f0750074802977e2
SHA512a5a548c6444be706c7847bf40fdd6a0dedb99943622d8fa1258697f9ad4d1894396142de993efcf81769ccd7eb3b4e08dc9689731e23ee90fb2b53a7fec135c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4f61b2ace80d938179d124c67d148a5
SHA13a9f607f4178c23627ad54608d14c9662a03f535
SHA256531e31bd61a0456cef92fa53842498d119dca8a9936008e371d7fddd0bbb8e4a
SHA512c672c54c0b46e15e98c827ce2cff41a974517dba77fc1fe32a98e756e478dba810d1c6135d86a2dcbccf44618d9131ff34d6e9bbd19d5a324458547cecd8012a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5714fd1318531078747622c59aa6f74eb
SHA1937093e87c73f1f3eee5047971f70001149223fc
SHA2560fc4a4262443d8804c8510d9679698fc87a33273ef136675b99a9b091add458f
SHA5128af052071044cff7ca1157c76b6fcbcc8fe409881222a5b9ff8d6e12eeb2704f73b87c5d975d2f993cb9639ef688357311ae0675766a3fe14f808b57fbfafd65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a016fd38fa619876746f2f9133920684
SHA13c2208a06f43bca38971a6cda813bf0b57536607
SHA2561a2f8edeb03a39e066789a4af09980927abe39f19ffdd07be6e1f048105286c3
SHA5128590dd1563a0ed266bac5106077e4ebee3fa45bfd8cf7d5b05120edbe00be7b14bac73d3ba55d988a32d19bd4bfd682d2b45bdcf143355a43aac9a444a5a9be7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57514d9191aadcd1fdfda508a7300fc5f
SHA1e4bd15e161882972a95f9311586e7be829c7ad52
SHA2561e68f52f45da5bf8d80ac9f567cedbd93d6d46558d70286d11dd2495e79f0bfd
SHA51294cf21488f21a9ad345c9500fad26d06b37230ba7ac7f2d19d5557bbe6afef346e34345a8b00830e1482490ed31bc20d1dff6ed8461deffa745d40c195ad1a14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521e9cf4ed89eb94b2ee137cd1db89167
SHA14e03eecbfe4396287f73f10106f0f76a70ebd2cc
SHA2561ca83d8ab4cb7cbea5a993d9bbfa8015a0ffb3b732a3fe990edf22fbb8b69d15
SHA5121d894a8eacff1a628a8c8abb9b8b5c7cedf449e36f29db443e6a60f9dda85e3a5a2709451ea36e29d1328de2748e75d7015aab4b725b62ce2dbe800c8e2c0b48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549346a9f2b96373b085d1cec4e364948
SHA14225c8eef70fd7d11b8e45b3193738e5ee790373
SHA2569d7843ff0e86cb7ce0b2c347d7829e0b91feac4636d6bbdf2fef1985d4e28ba6
SHA512f504728067be6fe990e8e3b81c285f99b086ab7bcc47c52a47304a006d3cc4e4b435eda3dca5e8d22ef4b427929cc3cb59e41e54adabe3f088402e76e6857d2e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a