Analysis
-
max time kernel
139s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 00:34
Static task
static1
Behavioral task
behavioral1
Sample
5c49ad0eb81bcb6de8555dc16d771356_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5c49ad0eb81bcb6de8555dc16d771356_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5c49ad0eb81bcb6de8555dc16d771356_JaffaCakes118.html
-
Size
18KB
-
MD5
5c49ad0eb81bcb6de8555dc16d771356
-
SHA1
cd587afa376ce4c8fbef5f297597a137563b82f8
-
SHA256
67dd057aec51c9cd1ecc022877816d3140df596b888ee7554158882ad1f37c05
-
SHA512
c4bf7fbadd25e68269f8272bbe77babdc974e0a3d3d73c69e3b82953b9e28890cde7a40121b6221249f5cdcb32602bc6d080fbcd7026d2fc97f7191c50c20480
-
SSDEEP
384:SC+4kEiqe5pFx+hREykTOQ21PXSv0wCw4hW77fmW1271Fjp:SCvkFpFx+hRELTOQP8wp4aiTjp
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422327124" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e02133c44daada01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B0EBF351-1640-11EF-B023-6200E4292AD7} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000d7877694fe9cdca84a3ffdfa062df4923658d0bd660359e9ad0aaadce85b37ce000000000e8000000002000020000000ffa47e5c753d5819ffad94e68e345fe29dfc8cde22f2cd03a39380d1b785d6d6200000000ec4ca16f65b76de4be9e7e0903f340a5f1e8d43289f4eb3df8caa03f4268e0440000000be0ed1205372e2316926fb3dc941133bd3e078ec478132e9b7beb1d27d2cd99cdbfbeb6a41ff60c93d34fd5d8885f804137e3116e58dbc5595a172b9f9f94dd8 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2252 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2252 iexplore.exe 2252 iexplore.exe 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2848 2252 iexplore.exe 28 PID 2252 wrote to memory of 2848 2252 iexplore.exe 28 PID 2252 wrote to memory of 2848 2252 iexplore.exe 28 PID 2252 wrote to memory of 2848 2252 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5c49ad0eb81bcb6de8555dc16d771356_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2252 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59233afe22b7a860e4ab7d526b9ecd128
SHA1edf373d3e4f797c90ddee2eb045e560b7d71e250
SHA2568a5bba112419bcfa84111f75b9301b36f8998691af51aa58110a4c1792e65937
SHA5121af1fda1c2555b7241a51d7b3e9011a16820a5f4fea1969860ac074d773dd65eefe4c8fcbb71971234103f4584e879e3746ca36de796ed397554171dc2c32da7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9e2a91440d10a821211760a5834ee60
SHA174d6aca02ff06b6dec5e286923e8ff284665f958
SHA256255a42cdb54a4dbbc2050aa094d35a12d9049518bbe689a3a7293ff16e25e332
SHA51225ed9b010c7f0e243334c7b69bf8bf7f7d66f43d6b03ccdbdb2bdc51469cc36e70a0981f746b013342ffe505ceda4c21bc4bd606d85241ca0f95c1fba79f6ce4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf813a9828dbd9b9bdb7d3fd597b78e3
SHA11a77d821f6fd50bcfde0b2ad9260dabc20be4d6b
SHA256488f15de8d8ce8abfae182299ff6dda4cd99949b853f98a99e8b9bbe26535d0d
SHA512ea1b0a64e0b6516988301df006a4c1911493195e561aa1da7e84163a023fe71397c5c54b4952c066fd1134773d5aca3733f4746cd29485fed6d070cd5c356728
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a72d0d60d1fbb80cba47c487e4ad6603
SHA1c5dd5d82b0bc2cdac87e7228277d3f714d948795
SHA25601875162d0b45f3d87115e4a627ec8cc1dce8aa08c498752eec4b71815301f7a
SHA5129d4a5dfde685e08b9a74852176a9e6350b41e7f53a3a69b273c90496c2b90062fcd99fd12787b4e292bddc5c0dbda032995b8cd681f7b0d495ace2923c368a13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d20be76785773ef497ba10e4cfd6aac8
SHA1a2e5223f04997f2ea66c2ba1435ced27072c5165
SHA2567b3be0d6b90e4e6ee8256e5aec96397b33efe81b206457e627165b70fd526aa0
SHA5128248b4c269647094baa9d4e6d914c6f9896612b4f19defa7ce38dd5f90b49f363c5bd68ae9808a215d1fc112548c10c9e4af1b4ef95cb45f01cf39983452bc2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f759cbc6e8b42ab5208294d61a44c184
SHA1f1c016ace929eced3c470b6592a28ada84e1ff84
SHA256dc2e57a711b781c5decde08a9d439ef80718cd57b74f5f181ddd97de2346788d
SHA5122fc17b95bd2857faf48771ab7962e39faed10d090396768d18519074c389ccb55d592ad9a7c3428f55bf1f0d1ef9cbce8d170fa2ddd89949a111dc139f88f063
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518ec3caaffed6fe261f321acc76c9ef2
SHA15e83d1105a1ecfb57133b71ffce7d58e77d7e556
SHA256b97b6b600540326ff615a8f90151980e7e332a4976a605b151b66145e3817792
SHA512a45a73870f983647ceb80c53d63afbb6233af74fdd694e319b94cd5cc3f1f9e151afac49d6338c683995d4d9e81cbf2d10a05668ef3addc7f9699082b116c41a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52169def730fa3fb1de48892d8f0ffdff
SHA1995c5870d7cc4910f58fe69d499508c3f9dd93c1
SHA25655af06e0254caa5a3d10ab7e2ad54aea805e03c2b7c29a65d59685dcafad3867
SHA512d848f3d19db232d66c9e48c04d565794ed8016f26dfc961ef1160f763d31108861f7f995df1b3e144646ad1413177acc8fb7b4ee4465cdaedfde67edab26b1cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb45df4cdefdee5c347bc1f649a2c7db
SHA12350d53488e59935083e559e58ae6414248bce39
SHA256a3079b76b5eacdb61f9b5a841a6e64d8c932adf6595b99d398b6a3f7603c905a
SHA512467a4acfe373766e4c1d9ada35e7bec8d3d720dba64010929650b685c061148c933904949a1e70e717f7d57adf5dd570fc098d9777b7dc381c47fe604a83885b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ce0c7a6bd4b046b9c2ac143acfc151c
SHA187d1296572cb6ed36f411e92918b59e2b70185ee
SHA2567d372ff5b0fe608edfc16052785e382a80bd098e45612bdcb613fb6291b05f5c
SHA512948973bc7a92df78093b07242933b6acbef48d1418d0c78befe7e39cf11eb0192cc75a1aeaae01b32fdac44928c8b5d3b440cb7ca0fd513d924bd7cd5e60e8e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8860ce67d4c319af93db781f0e2958b
SHA1bf663a3af9c9efb0c24adce6f8979e766dde4f5a
SHA256724207886b0b688680fc98e05625e7242f0e78645c6cf3e1b9947355d8ffee79
SHA512c46e7a0cb58672bf27b30b4a303174c7fdf5388f1ed7dc5ab04892d126ebe54776a3711e4fc5b223642ea67e882867c1a90e61b7ef0866eaed99b3f50a36b762
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ef1c3e1d61afa18fa24539bd37af38a
SHA12e12c4ccae5c523c53d25c59d0797967fc72ea06
SHA256d4f2bcc96c976af08c54218af82c23d00830de2f36b65d874347ba20094d2aa2
SHA512289dad373383a026f0b1ad4eb08d7020c74de099a3499b0f68c98bb0184be06fe8d3cad4822679e83bd4838a26a68afafaf042226815a0fabe489cbd0ad2e2f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572762106806476d1c12cb66dd585f987
SHA1566482f643c6d66ef2b0f36af4ebbb819c15c27f
SHA2560929a47dd3883bd23467a7b23e9baeff3a8d30924f1c85b7d823530e07018ce5
SHA512e0a8b28445c0476809258c3d74a97b29827190849ff72f36dd221ce6717961a835e92456224ff1836a6ab63302ce4dab71f9c7186f239e45fa4bcf7b1dc84283
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7588f80afe6e2d762a63fc5d0825ea8
SHA1c30f8428ea3984f4cb89609117d3e33d6cb29800
SHA25610f720b682a62968ed1d1dbab04a935497cdd71cd17c6405c5cf1e9e1e191108
SHA512ecad8b4f0f8416aa3773c20e2bccbf697309b59521980d0f570d68833bda5069994317580f164f1f1d868d6ebe5d42e8af5a79c55bba7c88e8730d75b69f1b93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dfd7ac276b3abbbd7ba463d8b815b4bd
SHA1b29267e242991c2e5009117946dde79e0a9e22f5
SHA2567a1833326d39ecb47c9c28874ddc088264a6bfe8fe84323fcbd91353965459d4
SHA512e0a9d53a98ab2f3536f14ad6665535efa6bc94c2bfab7d45a2035ce5992eb0c6c1b9a43448242b59655a2aedcd235f944a728272bab4c25c64c294028ae376cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ff9c38443e537c7d756a514ba79fac4
SHA12a2d9032b24b3ca9a61cb69af0cf66f35306da64
SHA25655e2813a0e6913fb5a4a03a0d410f5e939c3db215795ab3999de417a16fbbc7f
SHA5123549b38071112436a00c528dc37cf440f62705e2e8ef0dcc3d50fb1d64d45d1c596c3c7796a0393af07f8ca9f8a45412f63dc5db47cbf97aca34c80ea4e23743
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541bbe4b8cdc8ec0fa56270e8b83dd5fd
SHA1a8e5034f516918d4665bfe41a74e8e866b7a96e8
SHA256d4fe539e4f34c829e7a17c3fef542e1be1e1dc6ad3320372494569335c92e63e
SHA512539d5812e049ddabb3dcd499f0e18a2c36ccbf1b5cf1312a77e2f8a1d27d1821e80e52cf6f5fd97bb66f9f7ed357099fe9ee5a567e65b627ed4d3a146dddce90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561d6a95514554bfdecad9a3268fd12f5
SHA104b19e4374d9189a2cd9599588de68aed83c1b76
SHA25651a826bf2aeba91124ce2c848d97d45b0a1c875cb1a766b5fb8a7a40e63e4bf4
SHA512f5b08ae04035e491f01a8ad5bb6253c168d30e99e64e7795a2e910d5cc3a57bbecf3d53617a6dbf4129a3f6f886c1e541f58416f7385e56d04e9bd80c900881c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53538abaa998a70d6d96a93d987894b11
SHA198fcd54d64cdad30b962ac4725eb28e877f38446
SHA256fb7b064e48509530ba42d1381df750829b78e4fc5979c921237491cf1df6b48e
SHA512d0a60f97bc20cac2eaaf69decda681e26bc8e15aa1826a2ab57fabba36775ebdfea28feeb860aa11053abfa7e114c32833e180a5fe5d5932669c198f5b049fe8
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a