Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 05:22
Static task
static1
Behavioral task
behavioral1
Sample
5d622dd0c45fd67a98156bb39c68bc2d_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5d622dd0c45fd67a98156bb39c68bc2d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5d622dd0c45fd67a98156bb39c68bc2d_JaffaCakes118.html
-
Size
10KB
-
MD5
5d622dd0c45fd67a98156bb39c68bc2d
-
SHA1
3ec2c5686a44d6dd99ced9c857d044efe03926d6
-
SHA256
cfc14e1e1940e77eb9d480637a82013015868754de6472f4a1738660a0a0e541
-
SHA512
270ce9038f3dcf164149341c84f6ea0f7effabc1c5b39cb7ed8b21e5fa3ab41f7397b7e78bb3a6ee746919262e9d3fbe01ae4287485b939c9ebdffac7cf06285
-
SSDEEP
192:GjZTmq4H78RHJzdXFlDrNHu6ufROtWTk1dRMC/:GjB94b8RHJzxxHBYhU
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422344400" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000e645bccf9a16f6849f6e812fbbc8045281bf65782d3865818ef7f0955782bdd0000000000e800000000200002000000073e29d4f14ba6ee2f0f065c25ca434fee405f51c6e15d55fcecc07c09fbd6aee20000000882df462b0b173cfa0cba4e9cd7f346d207047a326c347ab4281c2d0e3fdfe9740000000e76f873fb65197cb76e171b57543c6746d94641ae0743e5dab981281c6dcb9b112d9b35eada395553fd1f01d475bf4c0b3954fb7b2b2d5ee2cab9df933728df6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EA3BE391-1668-11EF-BA8B-4EB079F7C2BA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 108dcfd775aada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2236 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2236 iexplore.exe 2236 iexplore.exe 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2264 2236 iexplore.exe 28 PID 2236 wrote to memory of 2264 2236 iexplore.exe 28 PID 2236 wrote to memory of 2264 2236 iexplore.exe 28 PID 2236 wrote to memory of 2264 2236 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5d622dd0c45fd67a98156bb39c68bc2d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2236 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2264
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562ab3a288aec9a9346274743d878de42
SHA1c78f3a9ea269d903c63202e1d5516084d137bb57
SHA256e700d14632b403e5ce6558ca7981ca19579f0e5e2b65e65fc063bb69503cf83d
SHA5129a1efafe897b4775da70b5a52716c833f27a1d48e4a121997281ef3cb6409a50862cce76c0ba1c073f21e4c2b217040accbf8a4645244fe2ff84236a3a7accd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538ae40791649be5eab6e400d8a5e35c1
SHA15b1e6f089bbedabfe8ac53f83ab93e18280da6aa
SHA25610c0aefe2c388d9822eedbeb2f542be6e588aaeac4de95a15e6eb05e2aff4e46
SHA512a736b8b52f21bd2f34f536282860990f0bf7388d02eebdb378cf94d0a9523c3748d9af91dd40ea5f5b128a8f005aabdfc9cc298e7c6e9f4a8e72d875d68099ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c350a955467472eaf881afa6af7558c
SHA10b68f57e182177a72cb674bdae1738b97886de16
SHA25685facae39f430c2705368d498cd13094f7b85104dd2c6a4d7034d87a17ef4420
SHA512c648a65dc0ab5168c2ae1bf8c93d3ed35a1d736c73b7eb9a9727dd50781fc3f7aff8170e92171ade24aad1d6ef3b6213123fe75504398baa649230f458dc85a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9c5f287ab6f39bf47b5a227233c641f
SHA17bfc14b3b4863ae00bda6592651d88bd225f4e00
SHA2564b37177e1c5d1c8df28f030863ef07e5dd74059a8dda8d1aabb98c05c140f418
SHA5127ef943e5432f348bf32e07e98cebf944b407b8a75d81d472e85fdadb88927f6cb2d1634cbf73894bec8301210230781624a64e36770702669cfebbd53f77c89c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b327d4ee918e9177f3a9db7298f53ce3
SHA16c817d4a127b81c6f470f79597f3d89687ab22c7
SHA2566c36fa9c77e1153ac81075369cb91047b4b02fcf7cc6f5d199e4f838b2314bbc
SHA5122eafd7e76686f1f1d9f92901e4323226e61914ccae2990c40667cc570e66a244a0c89f72e323e804eaf2157c6105f0eca0bd7ae75cfa7a8dda9bb1f7c34874a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f36661cdc52a4e6bded61bfd039536a2
SHA1f13b4bd947bfc14319c4d5551bfaedc745a9a47e
SHA25668e312f6572fffd6602b243fa1f5431215ad8fca0b2d0c6010414c26d37d3ce7
SHA5125d85d30de21b5b3a19deab74f3363521f6a08320298a7483883a27b044e8b7c8051d8e103c1f5251fe5c49f7789f1e7bfbb31f80da695345b0de04e8af5c1ea0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b21f972f35cba449c559626215fe2c68
SHA1216a09d09e0cdd10e9863f68ff4de3e99953a825
SHA256fa75b290df0105b16392d610d07a57cee01e221057ef795e58419de63c68ec06
SHA5128cfcac97e703ba2f4e10a23a444267fe002efdd69d38dbc1cb8c0bb8fc8888bf51901f62d82d294828109b256d0e6fd6784a4f31ad6b86b6c32e59d41bd88987
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f020cb4ecca00a313fe71fb83b43a24
SHA1b2f6f01c4a925c94f4d4009343d4391274299cce
SHA256d14014e561c3b99065ef7a074a24401ff9ae9aa5acd1b07958fe7fd9093c2274
SHA51266345ab529fbfe7608227376f7c87d8a3740f6d9a94ca9ffeaead9ec6f399945d4fc9803a9a61f55930fa96432ed1f8e2d2c77cdf7f9cf4dd577a34d32c228ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5088501538441d420ae937d238335d49f
SHA1eec6bb81e0690e6e3db6ab75c7296680241b6352
SHA2566fa9c485741da68929454ef1f422c4ba405f035a475e77b08c2a6011eb55d5d3
SHA51278376211bc42de0aa7ae55cc2b20c8f2c98dc34fc0b3438d0702b3f138a22bc210d6cbb84ffb15c52524e600838b2bbcd25bbf9defaf18bf78ef8b7ab1d1131e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558176abec0582edc6991bb0a2a6f1be3
SHA199239ca3a23727f97b95d7bf2fc04b7f862da13e
SHA256e187aea6041aaa1b2b9a4ceb1aa29ece430f00fcc9fd8b8a2d0e4f072d41c655
SHA512218d716cf8e38964b8967801f05fcfcebecb557a872c0346d5f35d3b162650949b3d8a8313a88612d58c45fd6b7e2c46c070c4a0a60cec287b3479ca2a27d0f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532b6fb7890bf8c519939a51aba7c1d52
SHA17ba1f67f90723169a921c29ad1cbad94e404842c
SHA25601bcb749af32ce87984ad75a2d497f3384db19944514dc3ada0ed2eda54ee0aa
SHA512e7209f5896c3cef54998c66c7b1f6e405b6039354504dc5c54b0075cdaf96f32064ff6ffe3bf96eabbbc36104299ab99685c980ad2b00ed7ab75d3e79c5585dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526e0996e43fb5694c5cf8cb7eb49913b
SHA1c64c3d4bf02ccffe8164d8301608547c31552fe7
SHA256dea71423f9f9aae9d599380cbde9ca62e7c105f23d022722eed47243c5427f67
SHA512a8befbb824f44f0d4b15865c536f4f31834777664aa79ed57a248183b092277e96b542fa5663ee340001568e623f71714e5654602abf9ee8233d1971afd84ce6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c23a2c17a725a194bef441b06761c382
SHA1889f1dbbe83f9938af8058c64f6f4370e4f45bf0
SHA256b23248898497182da404579f46fae5ecb87e46ea9824ea379347e52cf36dca46
SHA51217524b5638f09dc12966fa1566346d2f3e995b8285cef08cd951ec38849cebe77b06c50b6d10b62152f3a4cbfcc9fc4e66d62bea5cf4c82cf1e92d4ccf9be96c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b3bd8abc18c711bd9b8c98ea6eeb1eb
SHA1de26d5b221fce5419fc1d7027ed6b32651d3ec44
SHA25640fb67a3282548838f790380f70175b7523a0a6d443b2bdfd6bb413c8da97141
SHA512336363e1ab1540f42b2733984249568f5dca58cb13cd38e93e40d39d81b602c38bbad89b834956069f3ed91abf6dbd52769e93d346f4c29488dcb75f67e5e387
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f658e5101e1050c9c3e8147ad03789d
SHA1bd7492de0e6e508e1a6833946d8461196dff2194
SHA256bf1de64a12510a894e8c4ae26c0b283017b6edb5b35379c9aa2586ecd382ff5c
SHA5124d0261e47fa353232671dc685ad3d3adf6c5be1810b5e25a6bb43cfff36e0a8d1e17c95461288b0271e5a2012e7f7fa42d182b9a61233fb232df3020cc002a33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea8a45967d610dc623423e79b7491df0
SHA1f7d5799d159b654ee5d27d2c5d69de864b8e8cc1
SHA256b3bc6c36626af3e659d26e641bc3245d55d24e715b3c286ce987329baa89a02f
SHA512970055fb7fc22ee7674ac47f1517d00e7719f14504b85a23c5521f0d1e8a72c457b66682ff3451d99c5d9f2d0361d78a875bd19b0f9b64581ecf5fa490c47b32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5411a3eddeb8b6b69b4770943d1c1b3b5
SHA154f695e4279b6e76c0159d7a2667ec23f42994d5
SHA256405ad30af17c5ddca285bfcdd5dc937d8aed7575deee655c78393ac5f36bf472
SHA5128480cce3fab9135bb976616adc9f27690796c133bd61787ffa75d91e877947d169691f11c88ff7b5d989d22767a276a94b0ffc5c40da3c3f294f0f393975ec98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b33c8b623fba622698c59d2be71e822a
SHA1180ca97568ce979c2ba2254759600b5ac20a7a91
SHA2563fe49788cbf84082287f36ca329cf2e3b9f113001740cd7fa487c234f0b79818
SHA51251a92aaff9f5d7d0c2f2bf8f6df282464bafa8ccd9bbe05811923fcf99e0e82cd7637f6c9437f8f7c44bea27c843d6ddc17682af66fdd88628a596a1facfc6b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1df9502e90b3aeae121284d465b4cd2
SHA19fa932a861d4d4dad5eb2e3dfaa7b741d60ce134
SHA2569c36687ffb2751fbc5b805bb31a516027e6204eb3898c627b2971219e2f7884c
SHA5127e74b7ba6bb4e2902afaecb6ca4db1ba6aab481a3f8757489dcee1244c0915a91643a3a9647700ba7778799bdbb2075252b3edc55446ca7a588543ee06bd8981
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a