Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 03:27
Static task
static1
Behavioral task
behavioral1
Sample
5cf2a08ff7f993be2b2bcec9d4a2b5dc_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5cf2a08ff7f993be2b2bcec9d4a2b5dc_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5cf2a08ff7f993be2b2bcec9d4a2b5dc_JaffaCakes118.html
-
Size
204B
-
MD5
5cf2a08ff7f993be2b2bcec9d4a2b5dc
-
SHA1
6e184b2837cfb851eb65157f6e18211d5f89b8bc
-
SHA256
8b8943c4fa10e4994e190bdf5bf73f26892188c28e2034be6b440e09042be033
-
SHA512
799e028be0bbe393eaa986f90858753d720839f9956f6149027f75068ff21c812ff86a0cdb3a377775ef10470addbeea11b02e85a4015c7bca949b10187958e0
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a96069000000000200000000001066000000010000200000004b54adab305d791f9e0d0647f65aed9ffcada7c0a49308f6588159f45d596ce4000000000e8000000002000020000000603e7da663c25412e99f5a1e500b4429cca6c56e072508f170627206d58c6cf7200000007acf8fc6560d98df3df985e9430f0c87aa1d33d3c687934163a6283e6b24c40f40000000d1397464764af8cb5102aa23a12af73a659980edeb36595d3bdfb69113856c5b91f313948e3ccc0c1749a2c517164756f9821407bbf906d091e6eb107fc307b9 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422337531" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 005edcbf65aada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EB5F1181-1658-11EF-92E0-EA483E0BCDAF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1740 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1740 iexplore.exe 1740 iexplore.exe 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1740 wrote to memory of 2768 1740 iexplore.exe 28 PID 1740 wrote to memory of 2768 1740 iexplore.exe 28 PID 1740 wrote to memory of 2768 1740 iexplore.exe 28 PID 1740 wrote to memory of 2768 1740 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5cf2a08ff7f993be2b2bcec9d4a2b5dc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1740 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6ea45bc33d86343c02e2d57b729eb37
SHA1cd6d1039d22fab74c9317866c8876890bd2ce96f
SHA25617b23a885e52901ecaad28671f700b7f63e2dcf6c57c9c02befce934f5abe972
SHA5125a27470f1ca96afe4d227a0b04961bcd8d9198d9e7da78a523105d14326bfc1b0665497c7707540163d2b3c6729d4323d08d25cda68be865bfc0bd2d93a7fa20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca4c46b15e257724e549bd146482a8dd
SHA1310fe3446178e10ab73110e6da872b2b0ba647be
SHA256eac22a9d8079eb10501315928ea74e4589df8df3b0467ff3cc475d422e1d3847
SHA5122939a97eb6485bbf05f67ddbfd59ddd11da390f44171ae7260a4c5c26754bbe5cce45ac42e127bca333f5944a53100bff09cc5cc80fc98a604d5be33dd47c32e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520802006df5d4076590797a9e655ad4c
SHA15ba4a6fee00d8ee4ebaeac0747265e8639067517
SHA2564579d71fdff07538421609ca25fba851dde2e4ef6289682c412bf58adc327d9d
SHA5129e8b2bfb1ab51a22f62f3c74627bb6cd0ba1fc61be8844de8e3086fe2e9a988aaa4223f1b2405e6998d99f67dc517fff232c1f54f9c12c666714ea1af5ddc6f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584bee490adbc229f42b4acda86a60c79
SHA145030908ede16d8e9993895cacd04e1c477093f3
SHA25630af4e4d71fb773cbb39a09da80e2897d286c59ea30a33b5cff17283ad4ec6e3
SHA512aa83990cd4f9e6191a80a20a8e5fa8a28f367b615bd5086771dc942ad04759dde196a9d526c404fcdbee4717b789109683d1a984210fe5dab7f9be64568b1b2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502938af2f81c1d12180652f8d4ad52a6
SHA1ee6757f602c0909ea531fc30dad72f288a1f35ac
SHA256129ea332cfac93d2b872f348b9b8df90801db6e5f9b98684f0d25dc73c4bebef
SHA5121b9ba929994844e2e1fe5ea5801cf6fd2f7f964d2c825ddd21170845f10d67045e57ba601beaf0392eb5e5e0c21b9a38c85287ac18b900f47eff21af5b9cee11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c9f623d563795614d75e1df7bcaa4fd
SHA151f7ed0f610b068f3e93f7c6f5e1d47453862a6a
SHA256088d9e8639498de1ada64ced0bc97b68a34862b8581dbfde3f6faa454afaaea4
SHA5120d74656e7105ec5c246263e5bad04e014a4d2cc55ef660f1cb22c0f0ddf5a42319dca103515c38dc93a32dc98947cacf69bf90c228384b43260d36edb8bc2bc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564a9cc3a461ff15cbda64a9850c6bc36
SHA1aee523e132021e130176a77e8b2792026b064469
SHA256459f0ffc4ed4077f0690ddb74a8fd15a4e8d60e3f1bbd5e2ccda7a6449b154b7
SHA51261e7a1c0757d7477e788d3ecae656a559ccb71519e6f3208dfb6e590782b92f190c361a4a49cb9d2e5c7be6c703099af63b6f1e350df39010b4ec8a7419772c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55fb941b2ddcecea9d131c61c2e837978
SHA1b331e443ea355e5ffa12a4faa85a7d6b44d17a77
SHA256b9351451a0e2be5d2bcc53ea74e7060ffd64ebb9d787e9ba22439e153ed18b2b
SHA51265a1a3453a0845aeb61b30931f8fa64cebbd6c00fd4f9eb952b8c2ceb67b3e2057c40702403ecae1b3b680a3f665671bcee182e26caaa2c51123d7b680f4ef97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6c091f9cec59e3ef5099d0ffcb0d6a3
SHA125a1ce231f7601a6f02f70d221108d167e70347d
SHA2565ca7601cf07b1f4a4cff1369bbf4d756b7f3308df12eab9ab079f272b842c9e6
SHA51298e4be423a97f51c015fdf4a88bcda82fd748d8fbdcdc79027f1a14897a7ca640779d5766e7aa35fe2dfce202ee184d120b1dad324ec46daf1f35f2178a23067
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526c78394c00e2a0d83935805714f7e91
SHA1393ec3c79c113185f8a28b0d203629269bb8a7b5
SHA256f5ce6c62727b65b21d3b04c8e6fe5dfa07d63a0a100b7888ca6b0111dd600077
SHA5120c249a68ba4be4f5d4d63c1eec167590285735fb2517ab90922a3a9879dc4a796ce578634b146b2ccc7aa5a14d8dc97736009fe1ee12f53d121f1c437c0592f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e32d7f3d34b6e3a4b772872b413e7a2
SHA1534813e7c84ab064c4a5341af31b03dd2a6f6933
SHA256746ad75452873a36a35e83a929d3f5404e945ba23fbadf38d01a3e77d87f6c59
SHA512aa874dfbca3185d7d25d6608b1049656ecc4e62d44050c4de9dae034c8f331697c5ae4f46cf6f0bcc29b09880363aba74b0db32b447ec7da9640d0664aa4f6bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52707916caf0d678647c74ae379ab97b5
SHA1107ab52c3e090598d120baf36ef1544b76c2c131
SHA25623913ed8eb68ded0758ebd425dcbd5592189fa03c8e55f55fe5163d0d765c152
SHA5122fddaaa012863bb895ae529c9aebd8017d646c2780c464d71d59edc8d91531dcca397e08c1fbd94a3a72da28431e2cf61932a67049ca178b7b86d96424d9432d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555010b857cfaeaea0731644898742a01
SHA15c81a1ff83cd7c53e12e34b879825f19df0cc191
SHA25611c71dc36aeec095106760bd98cfc71f3989274e3459349b743ddc4861233ee2
SHA51272084582594b56489ef3d7b2a9620d6b6717e52a736672e3e9856593a2d12010a3252cb5fc2096fb30fd479a8143987c81ee2cf9d4fa29759a81e7904dedf0c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d2d2598b3bc0546420d7d96cf35a681
SHA14fbb0902ed04a878b77cb697cc5b21ba5dd8aaab
SHA2560c11ec549ea5fff3f73b7a0427e4b8646fa7e9f33391cf1728c6b2e6853f6e74
SHA512753ba3d333146fec697f2adcb9356183a592ffe8a07fd72976a584807588e4deb5b5679f66069592276d144b3c5a3132196add31a2c4e182dab88b68b0626df6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab73c36254b855abae2050b450653bfb
SHA1d5d7eeea956370d6ea06786c20a043a064c3dc69
SHA25644cb57c43ee35820b5226e3b621c5b2b6b1866af81342ad192f473afe0e9a867
SHA512ce508f02c227c6dffbf5517146612888baf58e24dd4d692fa8f8e6ba14f43f3d8bbd03359411e43d194a16a5908944128622441bd4aeb7d5eb9ea82edc75b7a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5855cf134dca47100d4cda70c75532ebc
SHA1868782adb4af04cf043e8e342151d1d0db6f836a
SHA2563f29d0955a813ae2f00eb37716edb610a996a60a1b5b4d450ac38e2cb8ecaeb5
SHA51290d75dfe44126f9efc6997d25d34a499a34d4d33d4525012eecd070f477d71b5da6084a959bffa668981caffe39c1ec7455a13b158edfe2ead36d4d5c7cffdb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51caa04cee0e464a1cea8084fbb05aff8
SHA13a5a44fea8e93ef9ec9d2c1d092cfdc68469ea4c
SHA2566ffc336be5e7f15853ef9de2e349e9ff1cdffd3e2f8513b5343d7a22d812f8f8
SHA5120eb900a6ad85b2f044d4bb9f809fbbfc33497b695a05e00dd4d340e94aa8198e6f0bc46a41509fa19933162694b05206d390be731cf6b49db5934a4e5eb6cd59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b665478544d0a0357da8ea8a94e89d95
SHA184fc4fd8dbd8deb57aa6a1880158ae1b2c212b76
SHA256807baa79e5beed7f79abc1b83aa2cb4136737af2434e996b23ef5c9c65c5f56a
SHA512f62f56ab90aa26a28f093696eb0af0e4622bfe20ccf1de47437f2f352965339305b246fe52e39e379931189bb2ec5e65c68755c561a1bac6097bb462e855ba8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567990e91c7f4c7542885ca4df10f6164
SHA14ac60b238cacd586eff60de2818175dae9a43959
SHA2569298eb354f208e727877cfa344369b1ef496300463e50d6840ca041ae24e7af5
SHA512f8cd606f794e900c57000941c7cd1c598c5a503b6309a3f8dbf1d1fecfc48862521953de1b8dd1b98c4db87f18fbb13d04fc564154ef0b94577bdc974212a447
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a