Analysis
-
max time kernel
120s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 01:29
Static task
static1
Behavioral task
behavioral1
Sample
5c7d49967ee89796d6af2223357129e5_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
5c7d49967ee89796d6af2223357129e5_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5c7d49967ee89796d6af2223357129e5_JaffaCakes118.html
-
Size
8KB
-
MD5
5c7d49967ee89796d6af2223357129e5
-
SHA1
155d86e86cbc2b63a0dd5fa42b071bb2155d9114
-
SHA256
a3cf299a95f20e4abafdbd68ebf2d8913ad1224cf9b70869c472a246d4c9bf7d
-
SHA512
b6edd346a2d52885aa5c3ce75956591ead066f15fb3c6b37c0d3fc44a701c5fd334c569767925237fa0aeda605ca6697f13224a58f81861e9cfa8e17f170e572
-
SSDEEP
192:SI0rIkazyQvvHVVeqX+6VqlpoAj/9zmCI:SI0Ek9Fm+6VqlpL1KCI
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000588beffe0aa694ea66f5d97958551216fdc029810d98416b2f4e2a141c7573b9000000000e8000000002000020000000c37bcaf37ad00af200c8b99a0eff6e0b2e8c52881ba184084749c245929df04b20000000ea47ede41198242ab626b917fdf6ce7cff206673d1cd659a9899eb55c64f46664000000062f795f78a6b7605b05dd364cc5371866189700e33961887b57bb532b2f42ad03336d844224f632feddbda79dab4a8ac7ac4d97acb30d76767ac55742b9f0e37 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{74B94511-1648-11EF-B5B3-EE05037B2B23} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40675b4955aada01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422330460" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2128 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2128 iexplore.exe 2128 iexplore.exe 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2720 2128 iexplore.exe 28 PID 2128 wrote to memory of 2720 2128 iexplore.exe 28 PID 2128 wrote to memory of 2720 2128 iexplore.exe 28 PID 2128 wrote to memory of 2720 2128 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5c7d49967ee89796d6af2223357129e5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2128 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa986f93033c3d517afce7600b009e14
SHA1224215eddd22ea2dfb44a78a1cd67b3da987b7d8
SHA256e375e82871f4a4dbaf0bc25349649c7bcc3a1115e422195462a21061659f2019
SHA512cf4b0f5e7c226e4645f319c21aaaa9f1c758761d2fa32a1950f53430eb548e8f48bf5f995e68ae597e885dfb4b89862b20c19c388081154fb7f907243f9a2c01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596be093175bef2635a223aca3ddaefcf
SHA19e3f4e18184df03d2287878e4dd3449aabc61d15
SHA256b5f857f8d4c01b3c46c77114e0d057278dd62986f04d8b49769d19cdc72231b1
SHA5121ba096a12f39b8eb2753b1d862f9af88927097bbcb3a7ca3cefbb47a4a8c4ff3417e797f9452eb13f6fff811156de53cc15dc90e6c16f145281c44c7e704dc85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b417825744e6e596987a5f569b675d90
SHA16881dd12fdbc70682102287ce35ee11432ba102e
SHA256bd23b69a52c541b127878c7dfa3ae72ff73986869458e489b4f2468183397348
SHA5129d6aa24c382e630f2bd25dcc239009021e24040c575c960089b01ea0371db5ebe54cad5fcc4904a487313b5469ab89fd3ebdf7b3ba398dd87d77af593706df66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5859827758191ad41bca98ea0281220cf
SHA165a17031ef2591595f167d1b6d1a2274f5aa3dba
SHA2569bb8a9d4612b21636b87831829c52bba5e8cbd1ec59f6759a2be248858c34bbb
SHA51296e25cf42b22e0ab2d7e8ce336e3f9ad56b649eefa42ec2afd603af77e049f65ed859636753773b6f3bf3517c412de2cd375fec8f8f1b7f1a911716f2053ebff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56bbb625f3fd354a4cc5ac8c2f21a7e91
SHA1aab3ac977f45e95d1a5451bb53a53bb39b22dd81
SHA2562b2b91e91e11fb93229c7e9d36347f0e076e8b9bea06045a5fda517aa4de23a6
SHA5129a48a68464a72699386f9ed9b03f20f1fc14dbd947a52887f7942d2d80691fe0ce3702808d411947682d1996120961a266b8fdab00e6c3632296f465f83de7a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c43a859cb3a4d85093d2daadbe77e6c3
SHA18043bb515b86e54d4453773abec0459b45f0aa42
SHA256a0f8751b5f6fdd462383c7658c9b3bf2c4a0134ff77f79c5284ca7089b65dfc5
SHA512e6827ea166e5290f67d04a72a1b20d6d879fa8bf12bfb2e748d3b6a33cf22573746b9e743646abed06f4fdd81419e384a6a910f93a78b3b0cc2ce84e80cc0e95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f2f588e52ea6fd34348a7a2ac6d8246
SHA16741774c766960b81cad4c2322d20f7ec5def614
SHA2568843f449e9e3505364a5a8a3e09884f6a2539a24e3d09bf51241c11f70862aae
SHA51226eeaa3fbdfb3ca11fb522bfabdc431f7705e18f3678aebc461cec90332596ccfb445cceb092bf794341b9a55110bb2a39440791d082bde4ffbce041421ea2af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5547a819cbe2004a2040b83d2b2f4e419
SHA11576465a38987f574937a1019719379a56a7894a
SHA256ba94ed59532ec632100b859d4f82a5c9ec81693a648a56d4074fa51bc6a16255
SHA51292c4da91e26fa361f89d874cab1ec87cb5b0bec194d9570f59fe4841fafa7a1c5f01dbaf311d801330fc6b88491d87ff9cdaebf966d38d16caa56b7bb8219937
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec522c905e86aeb0e0c6b81d4464c365
SHA15e2301983c44fb18a6400fac862c4d7829828d6f
SHA256ce63fbd47d37ed01d2123baeb3654a3dfa5ce93f50f76012bd914ac4723cb010
SHA5120321fabf6503f2178440b63cf0b90c708cc236da8502a8891f775199e6546453b4d34771f016800a295ec1e095db21f2f21b1935b58ab2555aeabd6b9222180a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e02248c53fdd4a2a8d8f21955824183
SHA1c926f5f1f1a718090c18c2b07a34256af78505d2
SHA256274dd1bcfff7075a57c7e7b1f3010d78c29ac256f2270630bb19d14b967a9966
SHA512072d36156415a352b52c376d842386fa7bc2daecb4fffa031c6cf7990e81cc72b144ff2bef932d4f4ffbb5a8db68832eb6a43142696f10c3adc71bf37517d3fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532bb8c0dc496afd4ab3f6fc54636e765
SHA18fbe77e70b212cbc2d9c8ae73c8e281069059174
SHA256d28b0e6284ee19ce78f9b27daa8393ea8bbcfe2c2b4b5c0760d9eb588fd66d09
SHA51242f86c7f3c883805823709f7267690f5e9e5a955bc3dce03bba10a214c99bebc012040ea3ea1caf4f59d3f9166cf09c804d951ca05aedc6a5be1badea8968518
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58cf0a81ebb934eafceb2df21afdf1728
SHA1a61a0ba5a8eced68b4ca2d10be72acc98822ba02
SHA256d1573b17dcb5917ceb6e69b61cdd4da2fb4472850c97397df9efe785ef2f9f08
SHA512d136fdafa8680cfd78c95fb625b5fa190eaa74c1448f46896e7ba2a6807595e763e5bf781446cffd93c13d9139b457860a77030a3af2b73aa8f21e10b89a51ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e8d584cc9f8aba4b1d2b0ed11e8c9f6
SHA18d51e58f30b7b8afd3e72c6b18ccdefe1bf87486
SHA2562966873793f5112cc0c2693892ab12c4335d1d494938ba1db01001dcc5db93fb
SHA512b8c20a1c95878d359aa23428281a2df47aaeeea8092cebc7dccd28582e193c23b496cbdb8ea0306e31e48627b6a471f80da47b31dda39c44b6824af516d034a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555822e01e256e8817ae1711310343478
SHA1470f051720684b8d2966ec9df5dd4298e33e5c0a
SHA25680e73875be73b42f04a90ccc3b0150fb33fb77c67a0552bec68517d36c40bea4
SHA5124b5ce78fa8b42f2df5f730ca389fc7e56110caf23917192c46e4d83a655218d7d20ac24a73c59fc4743a8a6ec05f916d1ef81ed53a7189e84f22a0fcdea5dd50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e878d7cb02053cfb51943317fa3b29cf
SHA1823c81266b2f323aabaf98233b43d0105c12b3fc
SHA2567e9dd9914b1e5b9afa9e5316203278db1a868bb85d4fbffa0ca7e7b6bc148b24
SHA512cca90683b62a72d554a24ad72eef04ea12ae55826a0b1a5337ed1301dc01253ae151248d37faa60e5ed8cc0b33d9ef9426feec548b38ee6fbfa92cd08d67ce88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f13e7b21f98ba5dc0a4650f72abd76d1
SHA16c18f4032bfa21a2f679a94b9283bde0eb27fd07
SHA256427a0f5c2338d3196fd969ad8a33757fc1a79e507eda7088c8524b625859161a
SHA512d1d6aead00346319e50a549bf9d3ec90271393b6fd8f96b1ff4023c1cbeb5b7b04549c2175c87ee1cf3e90a692818736a933acad641f870e58c5a0897a025f33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584889d561345348bc2f5dfcbab2bff4a
SHA12fedde9b2e18c017c347670fc5c8ec9eb480d9c0
SHA256fb6ac1d731c5baa86425737a2f90437600cda5c0a2fe6c50de7cdfbe56ec839a
SHA51250c03aca6e6a93ea8f2706d09c4dceb27478fc43f05d25942db04a6cba8bee39ad7d0428f0d124aa096e3434e91020d03c6a3481941d87a6fdf44f6c2a159f7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569a404a54d46deb711d93e65d32294df
SHA139049be3d40aabc0c8dd61b42c47a03c7ec2787b
SHA256d2cec9f05a1effc5dc342c8aa8225c9ca128a9d1e59cd6ab342414a05acf7daf
SHA512482a5608df5f26483d931ce189d6f7e6169078b9aae1fe03191a8de8735498775efdf998bd8232f3ad15393b2975dbcd7cf5ba6e71e580bfcf0a2708189661b3
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a