Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 05:18
Static task
static1
Behavioral task
behavioral1
Sample
5d5dd8675b7f29a03410df60825eac7b_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
5d5dd8675b7f29a03410df60825eac7b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5d5dd8675b7f29a03410df60825eac7b_JaffaCakes118.html
-
Size
25KB
-
MD5
5d5dd8675b7f29a03410df60825eac7b
-
SHA1
7d8859944a7de17fdb0abbe9d55270ef2690b51b
-
SHA256
ce0ba463e3817ece1f776c3c0a9a34c75b5c87316b4992e8bbe472dbeecc7f2d
-
SHA512
ed04329849b5e926e576d756aa1c4bd13ccc7eec750bf02b43b42b2fbee9bf6b2567828508cdcb35ff72e168d51dc2a1a8a5ef130e781978dde8c5744ddb60c6
-
SSDEEP
192:5a+000EH000Ef000EVxN6/IavgAaT6DPeaV5cDaAx+EdX000Z1a2L6Vyadm:F7zkZxp50x+E4u6
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422344178" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000008774453c07b1f48b261586d602479e000000000020000000000106600000001000020000000d9888755b62869c52758c1c26eb3d6351e8a7440fbf0cf0b31b7eee9afb79ea2000000000e80000000020000200000005c92f9c44d5d9f21dcd922d00433d37c28f62047484188553bfe8714aeb6ffb6200000007197bdd6d9472ee8d1c11ffd23ef869dc36d8c16c11dfe820c6b697020d61a9d40000000e0f85ee68d2301d8514061f96e28eead847a0ede2e81337b9f7abd2f9fc0da1817ddbef1581f0d96affa22575e5eaa90e663c4b62f5c7b9b3fbb905f6bc8fea7 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2004e23975aada01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{654E8021-1668-11EF-A0EE-F2EF6E19F123} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1680 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1680 iexplore.exe 1680 iexplore.exe 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1680 wrote to memory of 3020 1680 iexplore.exe 28 PID 1680 wrote to memory of 3020 1680 iexplore.exe 28 PID 1680 wrote to memory of 3020 1680 iexplore.exe 28 PID 1680 wrote to memory of 3020 1680 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5d5dd8675b7f29a03410df60825eac7b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1680 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572f258169e6d20b31161cc76aa9fab4b
SHA1b0f15b00cb85031f2ebc1b2fa0643c41d29765c8
SHA256d84192c02e1a87301441b8f44728aede76523af1d4f38f75980d905ea88de84e
SHA51284be22f7c3b524a4e9a8274e8965507b521ba78068cff1e781887e0a3316fd4ee8977d163453dcf2b733a63bceb4cbeb159414fc39a581300634d2deffa58345
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5923c7281f15d8c794cfa5efa42cb6996
SHA122beaec9e1e01b24c7b14addd090dbddf144d796
SHA256c0ba89015a55f1e065ff38c870ab8c7a66ec0fa9f392baedd81aaa3cd4fb4396
SHA51237c42d1e93c5b9c58b0c2ecc6f0b46a5b89923422f62ede87973949bddfe01d8061284dde9ce0d0dfefe6d2105b90b6190b2377d27a312158cd893a40efcaf9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c25022543f122eb95d146da4b2e83a88
SHA1d8ff4a421015986b64e6a0ea81fdb2e0e7cd86d5
SHA25611424a2c1baacb3728fd3cce389f200d3694a60b1d43123cd31859c66e42e728
SHA5126e57891653eb4df12cd2d6dbcc8993b1c9b1d7ab2d6f75d0990cf7e4154ab1c476d4fe28ede7486401c31ec4871c86ba8f72f77f922bb0651f21151164676cb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f2aa518a8940a3210464621bed1752f
SHA1e4c976eb17342b3e9f7360dd1f5c2b362a04bd83
SHA2566ff37fd6388cfa8f315c375d336b40ba87e4f054b994c2607ec3ed0e2926a2c8
SHA5121bbd69ecc22a13d0dc9794a41aa143f214652a4d763a08ee17386dbb2105b1cba9427d6f9f0abddf995cd9b3cbc072a5b905453e8fab8b357ad0e49ecdab1f5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fa6e71d7bb6b508e3b9ee7b59194ef2
SHA1ddd4265ea76ccaf68db26065bf47a597dbe922ff
SHA256a2aab0a68609c09d1891a40295974155c5f6ca0ec52e2facb6bd350b188dd1d0
SHA5123274a2a3441fef96e26efc1431cf457c7678612b4ebde99b67619493f903ddd383c85cf0b51308338e8e34bea0b091f2587adf418bb7ad900fb922becd8ccf95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59478144a346a97002bb5d98cc9438a98
SHA1b2386f691f03dd3022badc41bc710b858d26c502
SHA2569e77150dc1e1464ee2a9a905620646aeaddcdda962ed2d660c4b84c32f6d7a2c
SHA512db22c6caa1d254d8e225525dcaf953c8d586a77820ba838763acd9fab32265a335188c88ba7ed90b7f9bfc1f607ca272a48a907258527d66b6bc7cce98bac892
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5375b31cffc45890042053fa129b0496d
SHA1db368e8307594f1bfa2a7df18b793c8c12e380ad
SHA256da82a1934e14044aebc30a4b9fad07f70c16e84750a9e06137058e8169ca36f2
SHA51248a9bcacd2b2c80efdaf4b93b6c5ab84ec2d40dbada79262ffbc79df11620e4ab8e4f0e0826f717f021d20abbff00e8f4db43a2f9da06ed795731db9853a0612
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5712550d5c0d50d145e1da64c8ba561ec
SHA1f719c8e9ade7401dac1f0aa8c203fead48c814e2
SHA256dfa9a0bb7f2e716dc538c98c92f263f457b50f2484ee00a7d80199aea3c7bb97
SHA512cbf0800327db1d2bdf7b16e167b7c507876a7a1ade19ba32762f41488606b347b1cfff0ca2c34e1a3d218b18eee65b530bef6bb94c4984e0e3ce34d6db42401a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e89770115a33e8b4cfa06826cdfe1f08
SHA143e3d778a012da3ef0d44fc532673ab5d766c126
SHA25606f12b39c4b2b0d04bca55d8c616dde0fb74c2209e2230c2ae042b40df8710e0
SHA512adff722c5e7847040b0a39146152025dd300d8a2dea1f78be07e675883df55749c34aa6c2f11f48fb69156a0f6285437b672f86391c2cd920868880c35589e4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e729d85c60ef9ca1828cfc82d44a4b97
SHA1d4d7dde0c94e8a58e3e75c14cf35d3d594631c4c
SHA25621d6bb07646ffc74e73fdb726c856624b9bbb68cb669f1bf5e9df1fe5ec8d22c
SHA5122a125e84729a79ec9dc6eca176db88d996726a1c80eb091ee149008a9e7f3004b6e301cff052ccc7524c9ea1a78a343eaaccc5d683c19221966cec5dc28dba2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dcd309b7b04998fbec032e1aecb0896c
SHA18fb4264922dc7e1fe2f0b0cecd28d3970c5dce56
SHA2568f2b23d55f8fbd43f2f08aefd5167e1342095a049853ec5dfe45b3e253e87f8f
SHA5120d11168210b9814b8b9f3b418eef6958d0656b56b68f0c88a273e36d5166ab93b76fa7dd5b120e1e925cd18096a246686ce72b9d9d0964460dda9e1584ea9c0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6569e765501e66f5ddc6f2c883abbb0
SHA1caddd39e64bd049d6d76b649b3795d488a2d593d
SHA256c532e6b9ca30e9555e4a569e414aec030678bc2dcfb4e7a64ff9ffc6325c8cef
SHA512de1b37a84442685a594b0691246532184779c113b9e89af79f4756f37b502f6dcd349a6ff3e3245c6eff07dc5ad4f2175ced58ca91d57f40c3d0d49d553aaf9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bce00dfa1ed86d38a245fdafafbddf4
SHA11fd906f652528faa906a6f2c36ff53c805675aa3
SHA25658c5116fe0ce14e955af3c73c4b3e7683cf298c7953051cb0ac6d18a7d9d7607
SHA512a84c53c7bc8296ed2daa469257af9c783101b2f28b44d258e8749122e82c9108b6f656555a5008cb17105db9f7ed80aac2d977e7a213301acc15bc1df019e30a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e873c1564e1a54821425dc1953bef52c
SHA1219d100acaea1c7b71f390e34c3ba86af8dea1b0
SHA2561bedb1ed9ea565f5f86e73d64e37fdf210d297b331932ee3bfe1350db31b70b0
SHA5122c112c777f6f9586fd67726eb25cafc5360e5c4809e6b4901b2292d0e2d23ad5bcba4ff9a4a6278575f482c455051712283f905cb92360f9fc25edd0f0145866
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e333b89f63867936a7862ef7eb7d880
SHA1539c453332346e93f3f7b3fc3e7adcdd102e7427
SHA256334e1bce9cb09f07d9bf66129165866c042ae58b726e880c64192ab4522f5d8e
SHA5121615eda57661177f17704f50d8119557c19b5ace48c9e09ebc817ed44ff64b94fcb0173ac88ded42aedc4076f16069119f4e44124482b304b72e0087261c26f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5921732d9f781db091f0e37b34d31de81
SHA1a62cff3546e733a14258a65ffe501d6766775c77
SHA2568f33829601d8a84afc417bd81721b5e9939c490cd339f37e5dc6786cf64b90e7
SHA51266e51df2789d3e36361a3a3f03bfc9f196b31a8990206f53eff66f26f9baba627f290b88e3d2ac9a6048f2cb0690e325bb5c1de496b03b790185d134c64c974b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57565e95fc9803157e95f20fe168d7e95
SHA1fc31102bf94b0941a337481ae7978fb6b58ab167
SHA256382fbf3a17fb8b5d7eb8ab137295a8babd29ca1e1d6e65e8dae1b199eafe9242
SHA5122ffe15700091403d55f55dda3e32e70a7ec3987641cb4ecdea1745c5dec99fb7f65569c2e552fb6d8d5df63fe025bb26bf9e057488c7f6049efb161e364ca1c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527201f6de0732f931bdaad8a3ed95d1e
SHA1264feedd2d5a50bfe82e196739ca675dda7b5ff6
SHA256c8e915f272921795189b0b1568dc5694a76f6a7657bb6f15ebbf251b5be7b897
SHA512de8f88e48a361d3d6375ab0adfaf1d4dadeb9810f5ceca570f55bcf18376d2dfbca1c5719d7f22aa05f773462830c15cbb367f73d0ca41170de6a917c00659c9
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a