Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 08:56
Static task
static1
Behavioral task
behavioral1
Sample
5e399dde183f310d53b826b50aa8ec80_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5e399dde183f310d53b826b50aa8ec80_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5e399dde183f310d53b826b50aa8ec80_JaffaCakes118.html
-
Size
3KB
-
MD5
5e399dde183f310d53b826b50aa8ec80
-
SHA1
1a72ae6c08535d553f39624d88164d70c1449736
-
SHA256
4127e3f52992f5cde787a4bfd8e2af6789b1f9b18ea534d4eae0487a75ab23d9
-
SHA512
663de221eb09038c9c22d4c8d1f2c9c11e51774aa1aaeda8d84934c3dda6cbb028df95d947f34a28d533722f71aa33eb772fff3b4e0ade6d88bc7555eafceb8c
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b0000000002000000000010660000000100002000000062fdf536ada35fafeff84d25ea59c821b5a44763c4fc5180464dcc728c7d2c98000000000e80000000020000200000006c004b84ce8b5b7066edb1518f37364af437c92288dd1f000e3cc19129689f5b20000000d1e5b2482cf97a0c5e4a5c1faff8d9d44a0a44d9d24d1c37bae2f3a4215d57e240000000d5f51d465bd8b10de4aa7d7c33b9cc938fc3bad86e6847c0e84ed728ae9b585c695fc67586c465090c796103fc0a0bf05417ae9fd152f0364945ef6f12d35879 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70a65fb593aada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422357267" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DEECA471-1686-11EF-91CF-DEECE6B0C1A4} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1776 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1776 iexplore.exe 1776 iexplore.exe 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1776 wrote to memory of 2004 1776 iexplore.exe 28 PID 1776 wrote to memory of 2004 1776 iexplore.exe 28 PID 1776 wrote to memory of 2004 1776 iexplore.exe 28 PID 1776 wrote to memory of 2004 1776 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5e399dde183f310d53b826b50aa8ec80_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1776 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53523a6a7596d4ddd88b738c4c40d8a34
SHA177a2ec70cb2e5f3d4efd02369f8bc9d1b9640326
SHA256fb88f371040932d183be283c73ad776ca63c7b2a37ea1d953ec9dbad3aae82e2
SHA512436892b5fd7b32774bd27a14f473d00c32c3ebee62b87de851fcb3dc1b03270ded5bae22ff8a6a1713a37d96986c84ab64a9ec44ee3f3891c7e401a2503c6745
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2e36fa083aaa11dc6e9d4f74d94131b
SHA135307b5896e4c2fd68774aecc576d1195f5bde45
SHA256e9dd3b5a1044bfdfcfbd6e84f5912e0c4848318aa1e9fca590e92c3c1bde45c1
SHA51232c757d3d0fd3d07459abbde073b4c66bfb33b75ba2573b43621037a96509df1b1b09360c8373ae4b65de82de8edddb17052fdae0f7b9a6d642a14ee381560c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5471e69562b09a212126a172d5ed1950a
SHA1429011de41140f4374848b9e1f660fa73a7b02d6
SHA256363623879b23929961aacbbe13b3a92698d3f96e0dc2e8af818a26e9d174aa3e
SHA512058116044cb1be83021313d7f8c711ef811eed6453d81c97b89cba454e2fc711115c3e8aa96f52bb77f919ca37dc75be62806baf4433cc8c80502fe1336204c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5724aa794f639f9085d894d75d3dd53e1
SHA121954dc6f0d6ff0b20b3413367550b03386f3639
SHA2564a96262735ed43a6d8e130fa44eff50f7abbd18cab0c1bb250d4279a193cdf82
SHA51297eda237bc89c83f12c64b3516075e41c1779f952cd8bc6dbe11b64c3b1de39b350454f29bd80d66177d03f1194188799cbbc9fa0d567a8772f37808bfbaf97f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9eb94703408229b905e5d4f9fb0d806
SHA16793e66f8268c945de82f93425a4305ce1393033
SHA25681f6addd9fe75a2783a6606a5fc46f5ed2f93ee60decb5b5f7e66ef1cb71ea22
SHA5124de41b977799b809dde54d3b15fb968f8ae2cd9cbafc3b725c9b5361f87d15a8d95d82c72b16317dfd4d01eb5fdfd0c3ea1831c12abc42f225584362d1eecd4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6e718dcf4f5090a5f2601c21dbc69d3
SHA17bd9af4c198f3a040784116867b835bc577d9ec3
SHA256617be2a64c3125eead093f0d4fc7fdb6af451cb3536941a4b79259b64c065875
SHA512bef9de4c94b407c50e6e4df2225511f60047686bd54efd895777787cdbd60664de6d2b5d50e1af904613c83584c8e91e65bd22547337844cb4f1918b26d244fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52344ef338d35fd6ddb09b57b6ee66450
SHA184d258ed7431f6db6cace81f207013dc29c45bdb
SHA256385295e20cff5ed344b08556af4df88a392e92e07a957cc2da51c5dbcdd8b80c
SHA5126b2ab05bb8a50092142df1f280886b70ec952ec2878c1e07be7df7598be7b989bcb398fb12157f4e83a320ee981d663161a206409256b477163fd293049dfcae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514890cebaff9604a2d7d622124e1a4c7
SHA1c8c9f570002356e4100283a5c55494465926d131
SHA256fd830083a5ed9044e98e59be77e342b63501830dab0a48c48bed11f153c8054d
SHA512c90fc79677504a25bff6a47563a177a0e41c0eb532b80863273c9f0367b56f6e782c5c562099b7252081bacda8c814cca4f2d33a15b5f860991b32d3ae58914d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bca8d785e9af4c6c006b77cb07ec0ac4
SHA11351e0695b4595546cb61299d5ef562dcd5966bd
SHA2569f9e8ab11609c4948402e5fc560c5feacb3a50649e733fe2ba58d4c8f59fff65
SHA512b05cce76d3755379f6b75932c7fd6e7718d0db7c0755e0db374687907f402c7035cb347304e2de28c45ed7dedfe90aaf478e0ec1ab2e8dd00caacedf60fb16f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d64eea90ad9a3248fe57c44ba52298e5
SHA12b6cb3e87c5f2483edcc891fd266eeb30c26420f
SHA256b28294aff32fe0a2b0baa16f3e4e41edf5411cddf6b18ebb642c3bca833da39b
SHA51294f10fea2d67245761b6f63d83fb6aa1733b9a64557f7235f72845c05547e17e239c31b965103c8ab03b0939f702b42c7815abf824df9f1532c100631c9d9426
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5357cc28d672596183be541ef5672e2bf
SHA17a5eaf2899e21ea2ddcc870982b40791e05ae05d
SHA2564180700550155944780fd183d63c3b2babd97985c4d2a4828aab969bb1f77c87
SHA512211a67be85d4a84208e2b90619079d1da042fa930b06a31783306d6a69c90ddcf022a5415304ff9eefe19d5475d72ea19f828b1e08c43b5e1f6a8bd953c4c2e7
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a