Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 06:09
Static task
static1
Behavioral task
behavioral1
Sample
5d8f37b8e5d077c3a8669fa33f4bba85_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5d8f37b8e5d077c3a8669fa33f4bba85_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
5d8f37b8e5d077c3a8669fa33f4bba85_JaffaCakes118.html
-
Size
460KB
-
MD5
5d8f37b8e5d077c3a8669fa33f4bba85
-
SHA1
89c8fed372ed016ca1599ee2e9bab7e66626acc4
-
SHA256
9aa2773b13b1c77967bbe6eda836416ce39d9d6dfe2254e370e7c19161a95b87
-
SHA512
83600f6b1d6a1f205999d9151bd38638c6c5c55575c913d7f363b679986c8f900b7e852eba4fce853670f8d9851d8d47819b9697c0327580fa25ed6c08fbfa29
-
SSDEEP
6144:SosMYod+X3oI+YjsMYod+X3oI+Y7fsMYod+X3oI+YLsMYod+X3oI+YQ:H5d+X3d5d+X3p5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f09b4a4e7caada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000b588e78c5b0d4d7d1587a621e4554a0936a51d8e16ca75c8ecea3e1c24df88ab000000000e80000000020000200000005c493da3466a2efc419867ed152b582f7cfefcd4a0b9349012ccc966cd78831b200000003cee078c9c3019dbc84f90609e1b10e97a2351b0f0ca9248a1dd996b86a38f0c40000000d38429b895d985322ce2a4ff508fc058bbebc650bf76f5bdd2313481b50ed6e9a24a5d87a8c07dc849b1eaa01326f882a76f2d4a46658d5627ac3bf87d298987 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422347212" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{75B28771-166F-11EF-B937-729E5AF85804} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1720 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1720 iexplore.exe 1720 iexplore.exe 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2780 1720 iexplore.exe 28 PID 1720 wrote to memory of 2780 1720 iexplore.exe 28 PID 1720 wrote to memory of 2780 1720 iexplore.exe 28 PID 1720 wrote to memory of 2780 1720 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5d8f37b8e5d077c3a8669fa33f4bba85_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1720 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ccad3ba908e4f6f87817afe879c94dda
SHA1385e149acf716063e912c6a88a89a30867d6da7d
SHA2565e238235dfd0b2324024414b73d8ee5c65cd9c552990984fc511ffe39b27cb37
SHA512bebebd0232a4d849cdc351ba30943249945b3380ab85c5ad89f6da16c20049f5051423d7a4ac14d16ec5adc660471f10ce17412cfa9dc4f543e62a61435363cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578224f56cf92a1ff47aea083a1e39f40
SHA1acd415fe0a1e32af152bb05d87eca86f2f0e7917
SHA256ec293a66a354650bfe0bf93c9ca1513539007e09d3c8d9111457bfd6f47e3244
SHA5122f438191317f37befe623330ac64b8fcb86ff287cc227be158b6ed099e8fb974bfc9f1e3c19a86b8d1ae6909cedb900c06e792358734004849e6fc1ca35b80f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510b6c533f906d5df58eb012bd7e6057d
SHA198c7d9d88288e10db395115d73a5292ef9f7c480
SHA25647d08d4b383819c93e7253b9cf0d3bfccdabe8b24a30fb72898d2964de380226
SHA51219ceb19dc10ca72743f65850da2dbcaaf1a021ddb484fa755f740a9ee3e8d15077b194d9d984af5ac532a0d2cb23d1d2cf0adf0c7104a8bac38a2003af40d284
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501673fbc822df7d1a0bbd0d274bcdc25
SHA1f96ecc7cea69138028f098d6e50256bff7a89794
SHA2565b5f4d369a906d2f30855f0eea487b2695be215efcf92545c7e8329fca948606
SHA51297dbf0a552d3f6e1b0733414e7002631acf33a36bc12816315addf2833ae6e0de906e594ae9811923b50c2cd0638b24d3ad914a8a61200d01da7657374ed176d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b95f3ad16a1fc65ae9ab3e53cf20a11c
SHA10de8d8ba356704d43bb95efc3222c77785a001db
SHA256fc5f4edb47b53279a7d29a21adaa0829e8848bc509195af14cc7dbfbbff8f949
SHA512e4869a5e81e8f6298f2d2bac705b9a38979814bd9eeab752b63c54718a583a6d8682157cb58fb9b2ed5b28a1f9c8c8c5bd31484821ce7b2d68c8b7e99e0e308f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582704c64ae205802f6a42b4a619afe06
SHA146ee21723c061e0f25b5aafa997d82db0f9039d7
SHA256f38d3a2d0b310517e63e4e4b05348fd0f979ae4b8cd9b6ec949c46030ddcd43c
SHA512df1c58c0c55e5c3a9603578a4fc03cca5f846db50dd73299eb6d23ff6a45ced8c1171b8d5be4542cd6c3c763973a26b692409c0060fbc387dd95035fd2f05403
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519c48e84fbe3d617bf36107282daa4f2
SHA1192363c25fd0e5a3dd15292c2d733f3a4073d553
SHA25686cdb763e20f281720985285191d0b469325ac0489d885d5ae1e706584ad98e2
SHA512fa64bd05fddcf92a4a5e39cfcb5316d6fdc0ca524b6ba95fa3f6807a0aeb226418e603ad01096cc7b123b338cf57d77d979869995e3b9452002d6625ace87c02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56dbbe810391403df281530b8c21a2dd8
SHA169c9b2de1e208001c2528346b57953ca3baeadf3
SHA2564ec3d1fb34947b0f91033c173121f5262acfc0f7a433fad081b74b8ad6becf97
SHA5125ddbd50629e6f478e8abd70b539fd17b84ec64b8e42611ca85e27edbbb12f7868e93dc16ba0552a2a9eb77f00ddf2872e1186fc8e66eace95a860171f63b9b5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc45bf640558eea012697f52f0ec30d1
SHA1915ddc50707098d6a22a0d1038ba6c8d046f9f9e
SHA2569b897ef23eb66907b8dec25ad1f1a1c178ff3d3a85112282577cbf92af6323e9
SHA512a8d1e8e9c38fef08e3c3b1014ddf0ffc700aafad538947261458553cfe76780335acd6a626bdb6573a4db9c60c4f400977c9dd384a5535c3632339596663cce0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575ce3db0acd58567536db789887ee24c
SHA1487f3d75a8e0853432e21f09eb11e3c11ad63253
SHA25640cfc046de0986e8e02496d071d1e9d91cb7827da51ab225a6bd15c2046f3a91
SHA512c1da1989ecd28edda57724aef0d643014d00b718c04745d993f2cc26a9b98ec786675843f115758192c17ab1a62ee14756f50339ce139f70111e1bf288f113e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516df3f28b0733ba337d58ef19a6b13a3
SHA1f91105a45d67decefbdd8773d416841a4ec3a631
SHA25634ceb87e1656a34ab3770d17cb6eb256dfe6abbaa29da3e248ddfd4bee5fa616
SHA5124bcfdbf37c958e1f743e576e961f66acad2e73364c24501abe4864b7ab46ddc99d0222f09fce7d6ca8293edb45f35878369df587aa3c6b257a384d13d38a92bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5867a4794d79bd7f68decea2d20520d6e
SHA14f56100665124001a5243624a181bb8aedf9ab8f
SHA256511e6fced27a0815268a9c24630142594070605abed198be356e0456994a6d6c
SHA512a48bec3ed1d07c6de7bd89635bb29c2ae12182536e56ad2a0bb52dc6923190b31aa7ab9eaf62cf2872d8185fc23b98486315ad67f7a4e5af345ef1ca4619ae68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57eba4da40b15a381efe51f5337654f89
SHA173a4677d61b5d1acb8362eb03a287ebff7baf94e
SHA256f076a2f73be4b0b58481671df306a494edd14fabc94e263f39675b71b72db7a8
SHA512aaedc7f3d4a4cc57f0748231c5b77f33db9a8d0ffb176d784a750ddc6fdaa4fac4e322917b64b827b761f3c6ddd18e1f7e920255360b1d389900dc21a296fe39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d3c41695cf907df5158ba07d06716a0
SHA1851013e1c768eea4ec9ce348c1920a8073dee623
SHA25632c129a3f594f451ead3708e7b8c60ede9a0f62595309e5c49a8c531ff1a113d
SHA51212d683037800d7013cce7b18103a726fc2d896f7fb50eb9b8eeebe2fb7f0b0b3f9c77deef14cc2ff99d5be0ac358bc2e692d52afcdf6285653f92d24b3a471cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d4f1e7f7571ce3209eec619871c29fa
SHA185c78e8a4e6de01be94a9164f8ce4dde29db7bea
SHA2565b5b1f83bd6b71144a87fb7aa077b09e8394695b4798ee4086403a5708c6c6cb
SHA51247bf350707133d9fc6eee7d46261cf3cf5b33977ba89fc7aff1cc320bdd7b09e4c08390620226d80880e1a41d70528eb50c8e2ee21625fadc30aebaa700058d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc3e969c673c9d8f3c280a42e81a3184
SHA1630b92f0352b8f0f89fada45f0e440cdd8364ee9
SHA256be47c0cc8347d333f7ab6436019d45d86fc5cb12c2f3efbff2a28bced60798c9
SHA512b523d8e5bf7c09beb9dd92dfa58ff783829b3c1ecea7ea5f9b65227a294619641ac449e7448679db7510bc0b28034493141c52e5f10e6273e0262ef668774228
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c7d8b6c5a8635f08e7caae2ff23c342
SHA11b3e58c316d10eb680e9f323eaa35c4f493b3b29
SHA2562cc8afb0264e32a31156c86db6967253809700ea4085e043cfc9077933e9f90a
SHA512c5e2cd992c6d3961bd8e7fddffbc7a6125cd0a6069390d333b132e603114e4b86e9ffd2cdf10d3dcd23ec91a84ed0fa67e4b8fa96be72040004a69c15500366a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5846b3150db46cb2bb9817e45780876fe
SHA192537be521ebba5d2948a03dd76e068fab4dbabb
SHA25670733d601f359e0969cb54084d8df59ac3ca72d80310f48b698e14f53eb32e4b
SHA512cf0443e7a7ef0971198d71afdaa6e194941de42671c91e42c96de8ffccf53f1e6736f42afe6d633a7bcb83b30fe755bd4535b666f3437db13fc0615b8f12012a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597962a70940992beee60ed044e24d8e3
SHA1c647ef6aed09177262d7f6b462d16422a8fa9861
SHA25699c9a4f3fdb8bb5b338539620f7c15154976e5ac67579e54afa46eb590cf82e7
SHA51283693802d0517236c2055a0506ff3172d3041f065211bc52d47c83f5c3160f380a6776080db1251dd62310abd87340c65dfb2cc03a34561f419afddd2da4b18d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a