Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 01:02
Static task
static1
Behavioral task
behavioral1
Sample
5c61d1d9d5ca093d0e0dd0821c353f01_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5c61d1d9d5ca093d0e0dd0821c353f01_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5c61d1d9d5ca093d0e0dd0821c353f01_JaffaCakes118.html
-
Size
855B
-
MD5
5c61d1d9d5ca093d0e0dd0821c353f01
-
SHA1
95f759d9b15c6b37d30d18749650e33f1ae25b7d
-
SHA256
def2baaae00c39a0938adc7107b1ec888099fde5eecc9b0f81550691735d0e8b
-
SHA512
c0285216a4ddf164aa394bab248a66847196648185bf91e011eef833260579bb7e2ab1c4f3828d84ab790da7c8c4b4b7589f3140027301361287df6f22abf996
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000005cf7679016b57fa56e480f16a4ec7c46c793c9061fae12ad6d9210e69960c74b000000000e80000000020000200000002a4b5e57808cbd3dfe32a557a7e28cac6b42328fd00f8912b1e96b17e1bb5de820000000d7cb21d795d9dcd3f4ef332b68b6d1227f5d0ea304146f62bd9e0fa5e41c1769400000000295b71faa130add080740b779f486a2028d1b8d878eeac368b99b9f13266b59f5aaf5d1ec616ea13e8f483a2c56e3eb5ecd9302234c3e417b2567abc225c7a0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A7F59EF1-1644-11EF-99F9-4E559C6B32B6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50256f6b51aada01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000d0cbd4e90d8b50f44d48054045149d9db0619b0db4f2c80202ad013adac86a38000000000e8000000002000020000000ac374606984a9ca434e3e37c9cd8734f23a37ddaf8155a638b188af4276671ac9000000087d8e41a30ea4a1bd90f0b5243e4868e759dbdfa742b42a2d35954e6741a39408ab21ce0c0715c212972166fa23a4d70d7cba3d7c42c7db34ac87ebb9c06df55363b6e05b6671e79d349bc4d4b4a9d3b004cc62446615a38ce9564f58723510f957858ab14efa6a4524572a42c35b41d5e07823f5282733e59581972ad73a673ff8e60989c6117d53bcb130eb281cae540000000c207abffeed4aca3bca8cd7e4f229bc347ab810fc1a30cae1cd0c22debb68a45991c8753a4f9db64f85aa3ef9aa8af22ef828d2ff77e3b20dcea1092f32f5412 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422328827" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2420 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2420 iexplore.exe 2420 iexplore.exe 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2376 2420 iexplore.exe 28 PID 2420 wrote to memory of 2376 2420 iexplore.exe 28 PID 2420 wrote to memory of 2376 2420 iexplore.exe 28 PID 2420 wrote to memory of 2376 2420 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5c61d1d9d5ca093d0e0dd0821c353f01_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ecc53c7752e5a2e64991ae7b18e3c64b
SHA137a086f223ce38ac2c1c58cb6f94ca507e03edae
SHA256055ef84ecff5b7a2439ffe02c4108f8a189f9faf9b6ce9c65f74fe991b014bb3
SHA512f1a55929ae0a23fd9a84132b8a27c96cfca031bc76cc412a979cdaf60fea3bc65e537bbd13cc3d3c3af8c57e99d8b56edb0af75f66e0c500fffd297a957a365b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fdf08dfeeea4caf209314540c836e8ae
SHA1d74031d2fcc2b1efcdb1cdd67ce77869f167ca9c
SHA25677e9319cd98778c0e1710b05d6e137339506cf71b2088f865946c56747bd2e58
SHA5128e04b4a285879c13a707b1fc549914c53c074a69d33741faa5841fa2aa014510232726a75b759722c106e775d9c9564546a6f5c7f2e0a1f51ca349b0ff4556b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e089992c96fb616e8cca1b0790da42b1
SHA1a8a9bc7e8709c0685c480f9621264a8de11cb689
SHA256334c589ad87d6e9fef1477aa67d5a3563ef9b8ce1fc7f55cfacbe59832952333
SHA512ffcb3d3d41029945b29c21235a79ef8ab5ce67d22feb76b315f729fdae6f5d4765876e5b0a12a6777fe46f7cbc442d58d6ea254289f7e658eb3484bcab12dae2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a70a631565fce424afc3ca1d7953ddae
SHA10814e0b8c2a084fdec7ddb7379192bc60aa52804
SHA256f0059a2b540e7b708817cc215f6f13b18a8f1b1e7f3789b1072b12cd15806f12
SHA51212707e43a22d523826d6d89b21e0580d50c1a73070f1bb1d3a9f49ac72dacb4c481fd84c38aabe03f35a79b01677fdf7720f4085b3191b382b0989215d821cfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536f451f616a0c5eea0cd94b936aac381
SHA1246842bb71c3188a603daaa970d4f94617bec6cd
SHA25602fba628e4e20a9c34a49d437d10938ab22e3a85251c9eafe1b183467090130a
SHA5121886f875136b8463f7190b2acb9c444ab0ebddfde2daec444a309dd82be1425df3cd59fed1af8283a219d53af4500e801ad38836452515d707c356ae0853d0f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5410a00b3beaddfe65284302e0f855ae6
SHA137211e761f4662e801846445353ce644cb254bdf
SHA256352e1be2603ae1b2460a884bbe36b6c6995ca35eae6af5ec9feb059482f50f61
SHA512c61e00561a81442aaf9199d41e64985908d1938191003afec849c8e28ebbc394cf410ba4eea294d229a63acccab7d8a278ca60de6e4054ebc10f5283742a58d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e34f53decd743caf77e5e099ad5a637
SHA1e0223ce31654363d1cc9e1f5615ea13acce234c6
SHA25678c82232dd077f28538d603f6c70a544c5f9bf6beca93324771984a6f2fa250b
SHA512737638bc4f9aef81afe090f1b9df313a98ac8b03ea35c3538cc1e97d6a9e9011960009e51db28ecdbdd615725a5530b6c21bd939e9c202fd7987a02bef729bc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b93c7cba5fabbc5a152661fb686d005
SHA1606db44f80261d21dbd9f0dcb1d4819c18ac150c
SHA25665671e5c3c93f3d397fa416e3a405ccfc2d3320ce9b2bb9e9039232cfcb23d84
SHA512ec4e8f98d196da5163e39b7029b4c47ce7e2288aaa6b46fbf703a6fc733135321f7ef632fbd0b2a48bd3ddbf252ba1f5b39bb2968e1ed2953da9bb711e1aef7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55425aa96838fcc76c7bdadcad167715f
SHA1b9ec0aef4a2952c90905b9de060106a40548c565
SHA25603c887c73b9e8ce8c8c4c98e25b900622c641ae7e8fae76d48c07f3a8d3e1ec9
SHA512b8aefef44d0dac1573fd68b1b5d6fa403c0f47eca8177950dde347a036c086a6c773a879f5cf2c1a0f4e64cdebfc09bcc72f2c6c87a2a2fcf5bcef1bb11b114d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1ba257a8da13926db24b6f3f84b80d1
SHA1366085afd348b52563eac1fb4a3df495d211c884
SHA256f7fd0c17a3c9a366d2b2c67881968f6b5131a91603d4884dcb088011de7a5c4b
SHA512fc3ad097aa2a4a2d70cbb9c69bc78c8180f538f725378c83c29b68b5d085cf5fe1448d3c143d9958947b293cc8a148cbc665f8b92a3b513166258220c6307945
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac2bffdd18157d302649d3ffd90f8511
SHA1615200337f253a25d3ca6dcb3e7afa2a0a8451e0
SHA256ed6cc2988d2c911ffbdce2c68d3e8ed7736aa295cb5990f7d88fe027b8f236b5
SHA5127f1cde947567af2571cfc60cb532cd343460e4e8a0a7f1fe98222bfe8573f990b3e0902f0659b7d661f13d5b56f346630d11e75d7b97d4eb408b9b6eb81d15df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad0c6f971baf03f38aaeb241a2377d7e
SHA12338448266843425dd4d96a4f2417a1e4246d633
SHA2564bf15496e0cf3844035ba484009c5375c0e53350c74830ad77185f6f1ce10313
SHA5126da81836473ea13ec8ae3c7bc4f68cf93df01f986df7d2e593ae33325efffbffaf27acf6aa259ecce56c51bdf3b5a0177e53704e77426fd7f1b689086ae95a67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef1394e56d8d319db353e6f984733536
SHA1f7615cc0384239213b9f21d72e84ae3f95cbd34b
SHA256b2b4da0c95bf64c492bdb46f8b614e8c99efc4f6c56dbf2b9f51e2286ed698d8
SHA51222908d49d1029b3de644277093190eabf9fc087a3fbf633e1db4ae1ac58c9643f2adcb2f56f85f07a47ff4b238f442e9d225d7aecd429dfdff0e6c0f5f33eecc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0cdfe4642531ac4d94d8ea670be3a6f
SHA18710ad9a6101c08919cacbdc5cbfc53a4b24cade
SHA2562c98ca4f0943fcd9d5608be7853c36cc78ae27e1a8e157549d83e12164e98866
SHA51288d950d79f0339617ee2df6b9e63bd3c40e2d6704f5119b59cecd9b3072c7b6673b864324f769696a5867b9966d0e97f8d45e17db0603965c03857f3f83cfc0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5018bcb3de97c48212769e83a780062b3
SHA1d33efd864a7295167f31be99c345e814746a236c
SHA256d54af3a54fe0a7274397999a70b9377070a8e761874816d1af3bc22bb017ab57
SHA51242bb00e854d545c18086ea5b9f0ca342420f71142bce74989108c861b52fba728bd0d239ef95af5be7c4f69ea758496161a3b11051a21bffb785daa33e896b2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a08fe3ff7b8191ff20f026a95f399736
SHA102f19c7e07caf391c2c5d0c45bc0413c1557f087
SHA256b5357abb4b200a34498fd4590d4b1607ed9b3d4a6c4008a7c01dbec30e6db69d
SHA512f5f8696b547a9910b2e762b5723c11cde4499e5051423d5b5a3fc8d66ead5a1b5041827ae85d40951ec069a6cf44a859bf2b0bf4b2d55ae02f3a54ee02e030f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd640b5347a34f1146f4f4f01cc78186
SHA136e4340f82e379f5eedbceb41db199401e3ea472
SHA256f18222317d9d2894394b9d6803ef8898a5710b1c38eccd9d636357358333cb95
SHA5126e3ec576eca8e90e7c49b52fb90163156b267735314b39956480e9a1a24ec0cce183bfa46f80447b533321d06f1150ed490146a5921d84aa82b0ad60d32d3bd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd6aaec236301f8193a32cdbd83d37f1
SHA134f3bc20b826e904941c2770f712b1fd9b0140d9
SHA2561fa000256d8df94eb30fcc09183abfe49791efc3c84e9b9afdd8a5d8e44cc13b
SHA512ca1cc19c2a40a16baebd23e026290dfd5d806b9867c152e5158cb669571eb03bb6ef49a3e1a8250c2a7b765cf5650edd8f301c2d0fcc7d2b87077fcaee25503e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51383794d8a97dda95aabc95c55add7d1
SHA133879749e75ac73d90e9ed51531a3a1f2335f890
SHA2563d66d92bcd4c260caeb37236256812b6af8d359e0d993eb491533c2e78c860d5
SHA5123e3c3f90537a4d44a9515d6639d700b09f4c10473b820c82313f59ada8c6a063d46414084073565980a781ab73b89aef40e44314a34ce8be9579b61d6f67c428
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a