Analysis
-
max time kernel
142s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 03:22
Static task
static1
Behavioral task
behavioral1
Sample
5cee4806e2100dc46464bc8170611d45_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5cee4806e2100dc46464bc8170611d45_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
5cee4806e2100dc46464bc8170611d45_JaffaCakes118.html
-
Size
58KB
-
MD5
5cee4806e2100dc46464bc8170611d45
-
SHA1
f0489c35e58119f5f79695a4e36a44f2473a1680
-
SHA256
5b53b3e8d91e871f30362985f12183c613c50306cbd31683d594108013ac0a99
-
SHA512
d6de7ff0d3d5e60fbb5a579ab8011f164f876a090438820e7481627f59eb418ab70928be0959092ae5dd76133b4ab9a0280b1913e13bbb5cda7cc99a999d7502
-
SSDEEP
1536:8n8NXLvYc87oPQjfjuU03aoNEHV9xnrYx2sfFSR5+0M:82FPQjKUf+L
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00d99e0065aada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{290EFD21-1658-11EF-B3A2-4205ACB4EED4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b0000000002000000000010660000000100002000000010e6f7f5720807550666b110909ccd1aa9c0c1a792865215ec5278ac0004496b000000000e800000000200002000000014e2bf99e0a1ef385632d91f21ce43c9314e6a55d4caa0a6c744b751ea9911a420000000b3e2e0c15be0b610dd7110e3b1445cff16c4996acefb381faea9eeed0a418a5c400000000e8612da1aa5ec93111f794c69bc01176f7bc62f1e5afb0e43001ecccd4294c135dbca3253fcdfd5ad365706793645e0574da528636bc3fb4ee6e0dd36984b67 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422337204" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1656 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1656 iexplore.exe 1656 iexplore.exe 1668 IEXPLORE.EXE 1668 IEXPLORE.EXE 1668 IEXPLORE.EXE 1668 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1656 wrote to memory of 1668 1656 iexplore.exe 28 PID 1656 wrote to memory of 1668 1656 iexplore.exe 28 PID 1656 wrote to memory of 1668 1656 iexplore.exe 28 PID 1656 wrote to memory of 1668 1656 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5cee4806e2100dc46464bc8170611d45_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1656 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5494d324149be997a15dfc8ea92a2cd54
SHA11544b123ddbfeb801f5575bb15fb198a43e0b080
SHA2562bbf5547b66568ae2a15e9c881bb0eaf6db15f325236fce3de1eea42e88a804a
SHA51235d3cff29fd2f65901b48c9f383382e2b06d4a5983a07d8fa01a140dd4091f21882400e71367a84a4d89c8242af59ea1cbd86d6fe3f78a696434e9c994b017b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d51f39d8d2e586968e5b853fd940d815
SHA167907518bc34fa6ff300b6ce3b826a37f7ed5369
SHA25607ab9be099458016b400cd233bde45e06cd8c8181b9ef56f030ee25ef95f6c27
SHA512d86951f5b0cf6139ac4a74e9db4bef7c375104e0e62cfa14654129569b4183a566f99d6ba8c68b59dbfe0ea7af5aebace64d93c83bd435d210c130ab48c82b88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ba5e4d5897e163a955de55a0ba6b32c
SHA1b9c41f49e01f875a6f7ade82db1b5a45f9f6e0d6
SHA256bb5dd64a9a4eb2c0143dac2528c935e10be2006e61a95d268cbcfc0a7a4ef768
SHA51281006efad208ae62886becf91c9f3ddf09da65bd834b3a2cbb97814e5490889d135c028c00b087050d3ed9e69b2290547564fe1bce9658bec33be8c091a64cdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501fd0d2408e5b668c06025a1d7a7bb36
SHA175b8d0e0d7a1d9c45e3a973275b5d9badffcd3f0
SHA256c0e04feb9987ca7065bf5473838b1447bc861ab2436250e7e7d7e59c47eacb60
SHA5122a14d8270bbc36c096f01cf8d28dd9ee77d54458fd5b329a17a3d7b03372b8a07aa44531eb16c127e434eecb0ec7c162c47dfe3e5c97b067d45859798d8429cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a7fcec08c79eac2d83b1aed629d0fba
SHA1f0fe89646d30a6cd7366fa36d77daae37bfac62f
SHA256c785c8fd4ea618e951b6e4d9d37960fcc9c0ddf52da4a0970b9c19a3f52e9b02
SHA51256fe034cb627d384e785468e72754173d1f36eb82f03e36088f628118b9afba5add25ba04016a42955b32ac978112c007b31fd94d41126d19db7b3cb18b0d1bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf274c07de604c8ed70eae2ee330674d
SHA13572e8dc66a0fdf0b5058ae247244decfbea7cad
SHA2565b9dd71bbf9cfb980b3d70107d60d823f278e901c4871f236170ea86acdf72f0
SHA512bbf938bd7abad6049779114e97138e6c8bde031675a76944ddf8e54fc86893f06f2ce4a61bad5daba1bf8f29b2e7ec5209121f8daaae2591577e448fdb0f7770
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55541f02b7dafffe32ff03971f1945913
SHA12cdb062cd4439cfb9ced7b0419ab8f995f492d80
SHA2567827d758d05784b189c2408cbc5c3f3b7de908be46a8390823db0644623cc045
SHA51271a33f45993af4ab7a0d5f407f4c53077d489973e1ad5ad15d6b600cda11b0a2734bdeec549e758084ced5fa41d9a639448ca4df37baa8ccbca4727198212ebf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6be3f3a1abc41ff7455b7678e358be7
SHA112978e1a3df659c835f51670675d30dd7a04bb18
SHA256e8ca9c458017bb0676abf8124b60dff7d99f68e18059550b5c7ccdf600663f11
SHA512f57dbb669c6912f19342e33e5ed7065c1f4719fbbc1480a5fae5ae8edb49548ae96dc8f1abb51198810dbe1884946f3f748819360da68a54f2ba1cc298ac18f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d758b41ed0bc906cdb6d9f4b5b2adc0
SHA1fcde9ee832b56b335eea3e839d43985f9ab40103
SHA256a4f273143a8dc011e148ff3170e7b73dcfc942af7d6cb98328d24a45ff9de919
SHA51207d2fac8f9c3d0c4ca2d91b24b52920262b2b167995991e4e1c284a78a18607716a2d81a87fd1f74989b6023066d48175a42ccaee05e8a59499100e632f9eeef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a23b6c9dc5edb4cf0dedc73c602d4bd
SHA17ec7f1c2e662679ad9d95dee51c8fccd5f36809a
SHA2569a114c1e742518a6f4a69a083c17a813c1750d217f20a3977f3e90d1aa98f69f
SHA512e887fc97ea34ae93e0d74fc64d18073fd481ecf3e2f5d7127d6458147b990cdad4fc9f1ec44864a29b3824b2735bab16850a8cb900b59694bf6444c359716faf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531b0497d578eecdd0ae3033f12c16789
SHA17413543670afa2abf798169fd539d4d5163c5353
SHA2565dca01bef552e5671c8de29782e6315ecb192f284206804dc059ea80e4082b4e
SHA51224d30bc4ab6f063c32190df4fc38f9882bf25cd7a1487d58857f0b51981034e236205611a06acf8e8ba38851ddaf93eabaf759c47d75d957541ea1ff30d57469
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e2eff4cbcca28e15e91c0da335cceca
SHA17a7746df69a8c17602824d5f237a8f99ef73fe8c
SHA256e2d4dca499f79ac5505134aa1734413f5e664a5919675ac631b19a8fe922edb1
SHA512fb5a676b3a12f44e3e78debb8efd86880d65c31fb1028e5f16029cc7372986effa3b953018aae6c043ee80cd69389a2243e9ad61a9f8f2bcb7565b719cbd1b70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511669b298f87b8bbc2f7538fb3d3d893
SHA1c6809289077515fd98fb78ca668153e18640f3f2
SHA256f07c7c59edb4770b8d94f43f18f6f1df3e1210ef61f575a19dc46d653433915f
SHA512061a7152f13698c8f1f63642a6e2126a17eed1a0aaa0e92dff4b39d544a58617955032635d4bfb5fa84f539c9aad122727c9acad195d645cd945753436ebbbd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e11b1ee8296845bc3d14b84a68fb7395
SHA1072e964eed4b02c5cb7d9bb5e39d4bdd03db9cfb
SHA25651924c0f49f15fc582b475a8b1036b35ec4f1f69439f820311421d4bfa177a3d
SHA512fbcfa737fdfc8f4e58cb7a0c7ff97e23d636f874ed86b28050b9570c3255a588eb74858e861ff920aaf5d48733e17fc673f52f637dd3826781b7a38794d2802f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d42805a76b5258f3a963e70b4e4411b
SHA1aabe907e6a355cde939d4fb32581512b4f3e17ff
SHA256e5c1c004072ad740c2afba1560af2b417e47abf722417d2ab701092c84e0e67c
SHA512db1f296bba0127f5031093fe75941bbec117dc1cd091b31c92c2eaca11bbf2f6b5a8b8e77677c1a558e4aab88106d32278e93c813368404ab29746b564ba3a93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4923e9f3575b8fbd318fc9ed51f4415
SHA19f96c1abcacd2d642af52c9335fdc42ae1b53cdc
SHA25651ffef1f52ef89c77609e16b43b3cb42a368064f216fdba37f3d09fc81dfa64a
SHA512f7df8fb1197c58b43da6afcc9524c80623eb3b863bf93657f414eac7d9dc12a8b67b0c54f9a98cf2d1d193a4ee1609058e3bd70558b69e81f237b36b64415ce3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f93d27d7531663a2926a122648f034d2
SHA12cfd58940dee3fb46636ab2311242cbf8b0ff9c5
SHA2567e428c1650f1a5029db473b42911ec8c1b3aaed522f8b2383b72d718b9342e8c
SHA5126a1d9507fac14f2b0a50302807cbd6d454503ddc2e8fdacd5892510a1dd2529becc3754cb8007a0484a4e2e6d00f1c60f3e1f3817970e7baf1b59124376c9bc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546536690d31d37bf071b7f42b84f21d8
SHA15dd38ade0a11e35dcf8e491eca1995929b26e8fe
SHA2562e3788ebe41a489c425642395bf6c97b66231222b579a9978c75b3fb6831bc2c
SHA5121bfa2c59165e96ac88dcef3f813aec4ac5a4705df2a3c07ee778f39a929e1e3eab2e4d591277fae1bbf73a34423e6b3284900faeebc2a90ccc60816d461d02a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573bc873c02c9b8d50ce16dfe0368aae1
SHA1a3df825302f50382462128c922f385c167a5ab64
SHA256ca3a1640e85ae8391bea44c168a7a5d98ab17bf3bc885f785ccb4b0289ce8d83
SHA512e1c537a63e8517d1475032b0dfd08b1a43318fdb865a0074aad9825136e54b55bbcc2b8373a49ddebccbab1ec6be6276f9c529b3eedc0bff65d04dc3adbbba53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552e277e5b5ec992d47160355556f09e5
SHA1305d5d276f6c263e9484346ae06f3c0b526c1a0e
SHA2569811a35917da50c78fd0d27d3046aa622a561ecf5f00765a6ef278be7b88d122
SHA5124dd9f51d09581a1a81e10950b5a8b053cf39a4e8f5c0720ad250c2c50fa5d7c06a47c62da911c3ee663b1eb9aaebae7fa265ec1ac2175c0f55fcc0c26ff5bb11
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a