Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 06:34
Static task
static1
Behavioral task
behavioral1
Sample
5da8e19b8530dd3dfd9fbb24ba592a12_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5da8e19b8530dd3dfd9fbb24ba592a12_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
5da8e19b8530dd3dfd9fbb24ba592a12_JaffaCakes118.html
-
Size
463KB
-
MD5
5da8e19b8530dd3dfd9fbb24ba592a12
-
SHA1
af238ac6343869b0b4cb047025899f41847df9c1
-
SHA256
25c3eeec716bb193debefc4a8d6f123776b297d694689c1ca69a79c045a81e1b
-
SHA512
9fcb2076bab563c2141518fa7efe30e496cb8aa92fcab70422131a97d9005353a3e20219f934c6377911aea5c7989a6295b71f3fde1f6ed6ff267c9b9b2f9050
-
SSDEEP
6144:SWsMYod+X3oI+YCzQNQUsMYod+X3oI+YWsMYod+X3oI+YLsMYod+X3oI+YQ:b5d+X3D5d+X3+5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{13F08291-1673-11EF-BD10-4A4F109F65B0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a70000000000200000000001066000000010000200000007b44ed28246a3613256e9a65ec3d8cb8907157c1c145b8acae031e7235c12b25000000000e8000000002000020000000ca8bacaa61fbde098a990961ae6b62d58b4004aded9cb751e6e7be2c267b58ee200000007fe9b4e00ab81a79ae98810fef086b639d159e6edd702bc668b62f6fefd7cf2f40000000e1fa54c7d19fe505f242828ae1693a2f7ea3c852943cc0e4ac4d573c9bd68230363fc2eae946b07d1714081cd28933b3c9b55e9667273441a88fa9b936b1138b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b00c78ec7faada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422348765" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2084 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2084 iexplore.exe 2084 iexplore.exe 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2928 2084 iexplore.exe 28 PID 2084 wrote to memory of 2928 2084 iexplore.exe 28 PID 2084 wrote to memory of 2928 2084 iexplore.exe 28 PID 2084 wrote to memory of 2928 2084 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5da8e19b8530dd3dfd9fbb24ba592a12_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2084 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9176d1b2e486427caa7db22c43e6370
SHA1aff680c5fd48a0801dc2bc86f17f619fe62d2dbe
SHA25648f7dbc898a8f863b3db05a7cd9b8e47e8ffaa75692a2a34d581c78bb84b76b3
SHA5129a85911c36729a46e768570c479cdd6d60738059663f3df0ffcb9125cff32784a2769f76bb6f1f55ea81c45a0dd1112a1568b887277c766a5f35ac5e27b91c74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50cc75338111824b882da42cc0251ad55
SHA152bd225c1ae082a52ae9f1f3634060a2cd5fc5c9
SHA2563f123a0809abbf30cafe036acb40180c0f1c7035131d84873f03f82143fa8073
SHA512ce217dfadb72674d5da7d969c74e02e2bbddb8ded5965b25fbb3871a2df9d2a9f59f5cc7c32e03b73ecc18de52df061cb7ea6a2b68603d92998ef682f83007c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a003eebe24ae2a9498b540a723edf35
SHA1fa09c5e53bec0716d1571370bca6b177e971fe82
SHA256edf86619be1fcf478b0361ff0a5abd950a85910a4826423ebcccdce20c36c30f
SHA51243ad596ded0993e74fb1a12a5017ee615923d2e734c485c104b79e42fa2ab84d47c0b9fe32ad7b744219d88c8d780790a0dabf9cd321b6b906a4a304e3ff02e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5809c54073f20a45af92014430ee1a2f2
SHA10799d213c9b43fc3d8cdbfc0ed89235ad7057e65
SHA256dcbf84b5870c3049dcfa290ec9a7d76d636f82f5387146b1c34b40a81e00fd53
SHA51232750db6c2d94bdb21b70ff552cff0f659c3b55823a16c087844950301045d90d823e576d3eadbcaaa0fb6e9845ed033272506dc5de35c5f1d85aa9c87c0e825
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d53ad011ed727a9e12612b48d69fff74
SHA1cbe5a8222acb27b5ae5547faecf37b9f0550c260
SHA256bf16c60f89183cd70d9f745316ea8fb2571eaf8c37a6ffd6732e96d5eac86b74
SHA512477f78dc6ec5ac47b6a1b8b2b784020c54ba400244dddaeb8545d53c84274e99a8826a18edab5c82c4386c71f7d7594879e9717875f360d2ae421dc36786f72e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551dc7b3d77de134582a3a6fc04e42812
SHA17684aace59fd3ae5acedc4f605d42ac026e57784
SHA256bc40996f2fb1cffc9b36afc857636580bfe75c11a567ddbb7ddb4875a3b4cd1a
SHA512e774f1dc8185326ae828e93ccf28ac1ec623ab942200aca48c91406e4872b59ecaf23d2f9a7fa575d48a2f4528bd439931ef4ae8dc3141f4a3dc8325fb993b35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f985c8c698cb9fdd3ca468d73c2bef6e
SHA11a43c31aa9c716c5da8de1123541ebf473543181
SHA256ef6fc6e0bdc6881bd18c5853b7cdb289d34701d1c7a4d18dff7486286ec7a0dc
SHA512dfd9933a8cce2a8102ff598a4eb583da44b6c6ec39e0c4f5a49b78759fd393bfb532d256cbc89b22844429bfcf1f2c25b992ee155caf4142709d21a67110b3d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd44323e8a6c124d78d38f0da9ad597c
SHA1ed819223aa973b472b88a0d44f9a1e931cda7a5f
SHA256c360b792c3989543a48096005a436af32a1c140e9a7ed294a50bc2a126a1d45f
SHA51203f0f6690325c2d69faa640b4b4c062a9d49ae3dcd821571c6292f31b81207ad491e1387824602552b044b50aafb7d761a08b49d9af9da14e37a843991e63c4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f6904ede16972df881d4a9218cab09c
SHA16db903970a27f7287bf64dadf53e1776ac7eefd6
SHA2560fbb54b78a8f64c63cb3860a21ee71dd21006adfbf8538447439ac14f2c78d74
SHA5129546d675154fa1d0d6d354b8293c3bd6cd0ebd2303d3bd359df276acc0018c2820e6938bb5bd5bdf14ad33bb744c77fe77f29e4eea057dce9f97db2e6885e5ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564e72f97c9142d6a4e27ff99b9983e9d
SHA1635ad8e351a1d2bd24e2250ccf9c2fb07668ce1a
SHA2569fa35baa9316ac19385c2dc251127975293bb76d5a6d2aec0c29457e2612c72d
SHA512f4cc3a3840039800b1a4fefe3098bf366441d43dc2f022df1100ebff608c117e766d99670aaaffcb60337e832961fd99c492624cb033dd5d3c38b2f65236da85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d3506cabb602da4d304f0372c063974
SHA1a9d2f063ca94347f0de32125b76f601506577494
SHA2561abae7db0e629c6dff5c25de2f1e4a22decac8d3866e909269982d054b8bc54b
SHA51216de6ef5a96f126d6e6a7466c0ac0db99cb1b6d1657328fa4dc12acd9f275ccf7ef7c36fc1058971db38959cda49b445693aef16078c2b92e2ea2b52b59c7db1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd1ba1280139b7eae38f5e6341ff4473
SHA17452781199485eadb68dd2ed483b6386de4b9a19
SHA256e355385087e152dd6986d2d2dd1bc8355abb9f10cb5cd12bb5ddde61bfd393b0
SHA5126016a6088aa07de6d278bb09b3564ba1b2a51abd0f42b57faaaf22ec56d27ff8feb4ec9dbc841a53990180a719103f819bd4fc974c33aeeccaf8b790b0cd56c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e82525e8fe77e44dfb9bb6494d1081c7
SHA1e976ef41eccae91d8c8bb275313defbee580e788
SHA256675ca808df8e847fb2d78b77956ee5e62b9a15223ee02159ddefa93ae9765db9
SHA512cda3298051f34fd942fa031a8976644f69c858f65dbf6d6e7edb0743b659e35927a52a2c015786b253371345b5c15fbe970fcd65e696af2e73944cfd9a756064
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5323f68c108a6e2a3fb2d7c897aecdf38
SHA1a37027e93a86decaf34ae7f280cb2d18c786f07f
SHA2566a99e382ef79fbc9daa819b8b1abdfa46389decc8735008c421df5052a5d1779
SHA512fe9249067129fb9876718ff7744dc7ebac60213fbc0eb071454020e177f74ce47a9c0c3881cd255083940a76a9dca6261cd03700eba336d5d8e49193d219c918
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5411a28cba0591e6d899813ec5f8432d8
SHA18fbc9d33c56bc472b9e85d5d146b0c1ef874a6d1
SHA25600fb439f43462596903a38d06921d655f2855f0f8919eb51323dcce566c282ed
SHA5122609c51d6afd849f9f90eaa8cbe0129de96f0ce028e7b41e552deb3e13acc6b5455d1211eca434dca6f1ce47e1a76bea16ca2c7c5bc43910aae2d90285caf2ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b2e8797475fff3e06afb4feba35f58d
SHA1dc7c5a6dde5ea3e94bc3644929cdfc524c46e49a
SHA25635736bbff3712026d67178fa3105748c03832d2e887c8e896541357a073a0843
SHA5127036e68a46f478e6569359a6b47fdbb3600e7ac2da3ee5b77cab1559b9bbde2762f8d364a13de1d5e2b1e6448f18b24791410112720f743b38dfd47aad4e0b19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529c7c5dde2d0054323fb5a40d5d5d21e
SHA195409e977c224f32af0b5bc0a9bd39a2867f0cbb
SHA25641d56ead0f74c2c4d76613220f517f6183111e38b799633e21464017f286cf55
SHA512aa5107f7abd98aea33167c3b39a44bcaee757d5646bd6e19f5c385ffbc9116ac921ec608aef80eda20d052e2cf0819a5eca5f12f1965d2dcad78c12f0d78c155
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c5f4d182c181aec5662c30ba92f8179
SHA1cf18c669d6fb248e56719cb8f2bb27105d7b3a12
SHA2565c3fc964b323f2f74b56124ec014d2fce5237d67e4c3b69224d7e8e6fc16e9bc
SHA512695aabb1fc815399b5165c6aa4aa8978df366850528b9120f7033d50e5668cf4d70977322f0bb0a66242bc999ba241ae8f6d52275e754ee1f8d08ffbd7df0a53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6fbd712cdd021048a2ed30ed9d40537
SHA1bc2dfaa709bd931f1cb9ac5a09962ae8aee97a57
SHA256b26e38e0660c83b54931fe682631ca8fbc52c46ead458194ca9a14959412ef7a
SHA512ad106ef14a7b6220d099fba9ae3ee08828140fb6773ef2e82506d88d79f08b1ae7f292ae0edcfd57ebc51f9d8831c71535b87c4d73550f8b2c3b0ebf928e4450
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a