Analysis
-
max time kernel
121s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 06:28
Static task
static1
Behavioral task
behavioral1
Sample
5da32b9d0faa3f5edf049d40a8247535_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5da32b9d0faa3f5edf049d40a8247535_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5da32b9d0faa3f5edf049d40a8247535_JaffaCakes118.html
-
Size
3KB
-
MD5
5da32b9d0faa3f5edf049d40a8247535
-
SHA1
58b571e9f9767730143d626951fb2f6d0ccd2c3f
-
SHA256
192bf325917998d78e18e1ef074f6db6d52eeb0068f0fdeea7d1b97955119e1a
-
SHA512
21076f9694f88e676464c59385e6f45156343072610c6a92dec5691d44debc6ad51197240152e424ca70b303007dd41026be10d7613e68bc75522064293555b0
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c03ba0f97eaada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000cda2d25002a12b5c892209d0541fca8506646e76b0ec0a449d8d289f86523a4e000000000e8000000002000020000000304fd0646ee21312287b763d31ffb93d96edb1a1cfb57d359d3fe357ec1320da20000000097d2cf65a9012fbb3dc64a43a0f9297645b3735a3061be5796b0032e50c4d6c400000001acad4a029577886700fde22391389fc079714a96612285fed3322f50dddaf6548a9f1b277f0766717e465ba0840c55b0e4ff0c5e2b55d6d57c93893b0955b0a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{24F2BF51-1672-11EF-B97B-5630532AF2EE} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422348364" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2212 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2212 iexplore.exe 2212 iexplore.exe 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2420 2212 iexplore.exe 28 PID 2212 wrote to memory of 2420 2212 iexplore.exe 28 PID 2212 wrote to memory of 2420 2212 iexplore.exe 28 PID 2212 wrote to memory of 2420 2212 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5da32b9d0faa3f5edf049d40a8247535_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2212 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2420
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cdd4d20e168a50a4e456c6064e49a907
SHA15f6d93d9a040e1f0f46ff435a895018a9d281151
SHA256caf27cb188b792fecdbc580c00b558ad0e3b31efbd805e23d7cc1776c68845bb
SHA512f62566402432a5c684c28c99a0467021f05b439838a225ba11139735c8f797c3bf846504c8639cb6a6dbc639444d2646ce7ae817165670f20467d21d643b8d62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1e074678f654e329e62953ce9047365
SHA1e517ca10cf97e911cf34b608de8923d9ae66227e
SHA2561f1a82a999795a04fd9a77f8e84e57f30765feeac85e9c02979af2e260e51f7a
SHA5122501f13e80fb0fe9d955085e01e74f9d045be7f49bc2a951aa1a22a9fa2e4b7360d4017924c74183eb0069c286a0541873c8b62cb34a3831732faf5fb83640fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9c61dad9d212200b7c35b654e224f5b
SHA164f0043faf1573c1555bae2bcf0d04d4b6d5a0af
SHA256c7c6b75ee5df370802043acd4bb4dde3fef9a2bc215842246f623157f7c4cac9
SHA512004fd1371dbed71f3604fb1d505928e98bf2bfbf44176ccefc2c0d5827ee6f878ab0694c4cb42f7b315f3950e228f7929d79fd98efc3dceb523bdcc63e72fc74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5ca08b2a5cc460615dfebfcb8a607a5
SHA1868be5e150863609ac48539617f571965d2e8e52
SHA256e642b090678e2e08e93033b799e0d2a1f567c413373d377f2eb04898e6411203
SHA5126db4733bfb2ce011c6d3360fbe2c92d475c2ae4f291a3f6970bea47aab01a05d814df31a9a799eda5424b3fbdaaf19f2c79ce074d05ead580a4a74802f30afc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5877abb5f6c261500f6c0c5272eb488c3
SHA1a22cd1ff479f944cec3227339545aa111d7a02a6
SHA256f13996b8a02767c3c1338220dac3e28ef9ae9c695711c023e030949ee0ceb264
SHA512a1d638a2696f9219a37d80647fa925676c1fd8f54d32d7e7c1431452c90b69d5f9de7f40fdd605b95e6f8dd11d4bfe40c54ba366db8dc4800914b06a08a8b644
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c820cbf68544576818d228597f305ff
SHA151a0d8df696ebcb060b6b75070a92de901c0ebd4
SHA25613096ac8c86225dbfa1414e5fd097b3ff74f58f3e097685227ada4ee6c6b3abd
SHA5126bab08cfad0e4ba018ae2de2fb272f682060d6790e83835ab4438aab7ddd15b62c68dfabc2fb8dd9e8ff50be627e196df0f2f4d915ccc5749d1b53fcc196ce30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51263eb984f28032b2e169ede3f31523f
SHA1a0d87b9939d74a92a696edb2c8e0867562b1f13a
SHA25666b9428e80ba4141d00777d8502418782d4376468244cd8d705132a2cf3e393c
SHA5124eaf255e20f4a8ecf5eaf98e7e67a913b33babfd8a7d3c22b3d4c68b38b37662981a50e5ac2853d04dc04398f349f43a2cd1c70a826683f9ebcbed0183ccbcea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5845591fd57a5c88dab0df6c28a269b68
SHA15b126ba1687dbc5c038c6338a520b9b7bcda5135
SHA256d6e10e6525938087e851c0094ee1cf060ca9fb68ce1b066a0e4510baadd0dced
SHA512bfc9e310c36d8fb99a7709a40ef25526547283472328447e66b14de23952953af0365e2607713a4afcba4b4be0a8262da5f9855f59f3c9389b8c7fa9f58983ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2aa9315c230e951df3114746a77de4c
SHA13bda627389536eeab44d393b36513888150dd510
SHA256d01141607b5e213934d8c7cedec7b62f8137a06560cc6a6e1eff70670a501d98
SHA512d2297f1227f9c603792f76e850aca2c2a76c1f0ac8c0d14497b2dd39a397c77e827972c07b115a19ae901cd958fec0ab44f0e9df9647aec0a51aedf3e00adf41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5415d4f53aa1ab6c8d449bdbc19ae4dd0
SHA1c3af4723c61254e4bad3dd8925f119494dfa2111
SHA256ba25a89a32e6f439dce9315d0f48d5e01b4d3d490ef3a87289713283ee68ca25
SHA5127ada31613c0014a4a66d75e4f9f1e4c41e1ac19d3cab44f047cb50a175d1ddecdeec983dbdadefe9d525cd7f2e0210828b0370f6de66e1e0fdce63e3de4223fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f3c70ae27fcb72a35e8d8d5f150cf33
SHA1be743b6e25d3516285fc6187388e611aac00ca59
SHA256d9de15b636969737d98e9d36e77c8773bb60465453195d9b208ee4b4fb22a936
SHA512fbcae294e48ee00a2841e9b4e38e5257267b7848fad16111419c84e49d2429defd9cc3e67eea42b99de34f676baf0b66f849e3c1457cc83c2ba48d5a0204d6bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5123bc128c90579357ce08af605fc32ed
SHA1bd6fede16bccef77b85d2c14be9d518924cc9f45
SHA256d2aec2ff182df1b448a2804f177c0f31a0485fbe5ee9f149204cca8cb1aff26f
SHA512f74563439abf768bb55db20aea6b46e3075ccc195da38bdefbc7c90d467e46d9e7fdfbfd30cafb9bdf7ab947f757917507b9262cc71cf66c87ff90ce808f8ea6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0de5ffd527aeb314a5240c03716cfc1
SHA1e1435a166285a60277c1f54769de1fc07a09eb36
SHA256207bb57b0edb05106540f18c4abc6e84c1c93b37abed09084e8f244e3fe26429
SHA5125a4ed1ae507fd8e9b4db98c9cc1eeebd68c131da7266b1706a5f4886713dcc0c0863516172e4053bbbae27f935384d25a68feffde58ecf047fc3a218a4f9908a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589a31a99b02a93ef88aea0c59fdea27e
SHA1bed852f2554a7abca10d332389a4f78d90c49208
SHA2560aad85e348bb90c9fa92cb733c843fe433463a757b20ee5b4d2203c86f0aeaf9
SHA512a24de9589f2e51dac79171b6c56405fa49579d9734d437deedaa33d34a1b8c241acb468070d9a407db829cedc40a0130dcb8c9dfa8be3f694bb51c3733266d94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5feef3357bca097f91f512090d9ced6
SHA1fdbc8a275e054f3eaaff2834a7d802989e8dd641
SHA2566b6f99b87583cef6e7b4e1d9ba9fee8dc0998f49f08e141ce6be523f85f564c3
SHA512733af045d962a7ee19e4fccfd4b7ef43fd4681a24b2fdfdbf671700e946e371fb5a590a9bd8ef18974b419b813c5a43b70bc879bab552aa49b9e2e0559d05bd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5679f352bdd971c7ddf19920997aa2600
SHA14c59c4ef1dcd16ca3f647baa94d0c2dfb716b3d1
SHA2560b849d75dd43d17c82e7e8d31ed367a6f0a0f1e43ba8c0d4571cf8fe27a5afa7
SHA512897017d95e625e9e78ada17488b0c7aeddeb9e9396434dbaa4d60db2f2e2c66c1c55b5a923a43c96974e20dd3b22d193ded0890de4a66f7e5d982513e7c572fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538d0509ea8ec17427d91c82e7181a85e
SHA13bc07094b7fbb1b552160d62cd0e3bce7d30a1f3
SHA256ee8725defa983b064b64587c39cbe67c9e01da43f9adf727d52de0e90a551ca1
SHA5120ef9c7b80ca3a3508d865d4867c9f3da336bfb2dbc2938aee4973137bd79258b75b9720ba56ebd8c9c8027b0f0db96b6efaaf559e051944592f3fbfd4f420aa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5cce2278f7da1626e603b19baa3849c
SHA11771fa3950c781556490e344876e06cd78c56814
SHA256961873f1756936ca298e61cd0eaa520fcfe40385061415d9beb60a5f8e751f3a
SHA51247f82c8fd40b17256eca1e5accedd6322387be2279d2a04b3446980320f812449bee8fa2666a292dac812e66ecc0c6f8be7e2f0deed53df5e0efa7efdfe70674
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a132ac84b24a824761ccf5862fb7af4
SHA1a6be77604bfa0d98bf47f282e3245817e101e811
SHA2566b8ad5f06d819be8fa2d7661d9859f9a3ce7bb9d5d393ef15aac24c688a14768
SHA512725423ada0e8c1010e101207559dc09e3fc94d7b22b09843983f13c69fc37d3d9cdb50aa03e633a99ec926e1f8859a2b53bdf99dcc9abb2e52e2a5bcc0d0e426
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a