Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 09:30
Static task
static1
Behavioral task
behavioral1
Sample
5e5c89e1717a600eff37aa18ba66b0fb_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5e5c89e1717a600eff37aa18ba66b0fb_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
5e5c89e1717a600eff37aa18ba66b0fb_JaffaCakes118.html
-
Size
68KB
-
MD5
5e5c89e1717a600eff37aa18ba66b0fb
-
SHA1
5f13234c12ca3b702cc32c638eff7833bc1d2693
-
SHA256
f1a318ccc4748031f9801c92a5a4f2180ab3a7a14f22709d7faf1fc67703407f
-
SHA512
08ca2e5958e8bd445df3f68d7f3839c699fba83b1a7cdec210b742feab16fe9d94b84703514860679e0d178decbd7de1cfc186af96ec69755c18e85567bb1f84
-
SSDEEP
768:Ji6gcMiR3sI2PDDnX0g6U/OkwiDoTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVGo:JQChicTcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9683EC21-168B-11EF-A965-CAFA5A0A62FD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a960690000000002000000000010660000000100002000000032b553111667ea7cf42c4da8e1385554227926997801924160f228ca8f48229a000000000e80000000020000200000005b922cf3b7421779b83027fe5e0bac3c427cc21b3ae0c31e567b57da7552d701200000009d9b7e986ec76278d4efea7b2cfadc93d01e2bcedbb2c5b844824db4c2d366e340000000a4f0c36c46d87063c6c92d7f3ad76e42a2ee883a3deab303844fb68cb0fe997ce03ba280fce44c67592b42e09969912647c75eeeaac4173f159f4ce4bb962d98 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422359292" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 600c186b98aada01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2872 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2872 iexplore.exe 2872 iexplore.exe 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2080 2872 iexplore.exe 28 PID 2872 wrote to memory of 2080 2872 iexplore.exe 28 PID 2872 wrote to memory of 2080 2872 iexplore.exe 28 PID 2872 wrote to memory of 2080 2872 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5e5c89e1717a600eff37aa18ba66b0fb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2872 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e323e588246095f8289ed99dbca6440
SHA15c87ce251876eeeba993ee61e2bfc9233801696f
SHA256395c0e993d9cacd42ebafa6df67b02d554d6ba78a652006c5f57163ef52b3e37
SHA512fcad5603c15ca00c4a840224f29224d5dad93a00c6344d801b0d04854813fc970841a9b329069cd741cccc158a8a1cf5311beebc65e893242cb7a2fccb44048a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e20aee99922bec08d54edf0a931f798a
SHA178327eb0779f2bd811872bbafdd2c5b9690a63a3
SHA256efebad693e29f7a90afcb446d21ead1b29f55bb4feea69588844975927070f76
SHA512e9dfe42bcb9d3fae394a57c76531cb4fd16f74774623aa47f934ffa6fbf19e7d9ff91c53060f86458dffd55ada98a4c77c6bc94c343ee986c00dadbff4c723d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5907c125a64606bd8a09cd9ef77b56f11
SHA10010242bf5a92b6b185596b7bb2f66915e85b9c8
SHA25699d9687ebb4dd7cc48f78f590128fb950aad52a6e1e75f9b5d1522aa69182881
SHA512bb65e729ca103b0cb418e0e2711c2f12f7040f5ba0ddb640a345b189d32ced18bc3f4ea28645ca6ab3a4aa3c8605e8096b4924e04be851834b6edb909bd8b7e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504b21c45b5f1ef86d014c30dc86e9dc8
SHA1876d029def48ff39f48798a8ee215092a09162f7
SHA2566fac54f3cbc83696498da04f5b7fc388c1e1e7889f319af958436d74a4e5e7b3
SHA5127e070b1d6c82a6b2f3d67eee1a99556075968c0e2871359efcf435bc574cbd1cad6c1cf61aa29ee5a272809291af0a86c8830075f57b138c7b6b593b97f923bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5115cbd004914aee876fbaba90b6ff484
SHA1223747e1921899a06d8d52b0a461aee4840d26c5
SHA256ea16361d2688d7c4abb779add82e7ca91ca7b9a5a414191dfa8c293fd5c71f4d
SHA512cc7de5fefe17effc0b958e5c225aa24134d20eecc40ba1340a89f56d33ea0c213a0490cc0ca5865a0945cec475c3cadcf5490b975f85f2b5556f29daec7acc9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52bb3d407ba840d2d20a7814578d26160
SHA13331eac99359739eeb3a18d8faef4d4aab2bd8c0
SHA2565b2f089e118ba85a25b79dd5af5065b54c516ae84d0e8e31e6ba8ab35bcd40e5
SHA512e9e607308f82fd485e172d2f44c1d49357e6582a924121a1de254be54e571270c862e8ac0dba6dc950275404318d6410e1d2c46299aa005a652ab8c27767e2e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5282120f4a78410dd2c27643730d998f2
SHA109e0b8092b2b350ad64d734ec53f9a8b7d3f7036
SHA2565d485b11144d85d1da000f8e9c672a7d235e44fdacbe28294b80eaf2c02a13e8
SHA5121d30fb02a91ce66186de327fb65d61aa6f0c84b6852e88ec447fe353ba7d3bd7b8029f1b5b337f050683747d7bf5c334239f219b8c442ef394b40e699441d769
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b8efd2668dffa4deba7030097d83cd9
SHA1fc289e3dd4123e19a07c6443a2e131658307874c
SHA25612937c93148e3ce4220c7d86640c95568cd5df928a4d6434fcd97e75e68f7e79
SHA5129b3279814129a6701f933b33ffde1e629e7216221c20cee286dca36b6418824e4b9b11805eac8951a27c7fbe1a4a5b052f4a4a57071736cbabe0fcabbe6dcbd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f6165f5335bc248f0c33ade340a0a6c
SHA12077e86cc6e7f0a6a9aa64a03f9ef67c2121cc2f
SHA256c093d6635dd23452f9c296f8fd73f54d5b831fdbdf89832e452ed9362e1acaaa
SHA5124f96d7a4b4c204772e464a10d90cf9e0a189225469fec3dde1124f4592f3489970cd613995462ce04fad393b965e167204864d72a02a58cddd76455615406bc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c8de611a593a2a37a40e3bd091237f4
SHA11d4f2a3d9e4bebdedfbae9ffbe49e0d5f79f1804
SHA256835f0fda996fdc4550d11940b56356d70c8c3260326825a17cd6e732e1dfc69e
SHA512a7d5687debe3e832142540074210da08eae2f2a139d6272832aab87e6d701bb794c2592b2464c5c8a5468dd9293ab597a212469819b652592e301afd6b9a06a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5238bded0df0629e99ca29e811a04ef4c
SHA1a93ed6954074ade737869dfe637d81c30ede2c22
SHA2569c8cdbde93373642420aeca7e15275c74d568cf945b6bc665884388247b155f8
SHA512dc35d1ba22e9a3a76484875960dce2a69a0106e2735504f87ccb3df16028456032a62e3c7e219feb01a50471888250b9a238fe7351d6fe740ffd64ecb8bff189
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4950f1953275dcee444558860f166fe
SHA1ba4eda8d6825215cea87b0c3aafad65838d8e7a0
SHA2569a04019fae8516bedd40e6d77ef3f51361eeb667fd4da81c3a7d390c9745d562
SHA5125f2ed5183e1410a732781242183a441fc3608d3f46c5cd7c87e70e6a9fcb27923ef399d4986547669331cb4ad7b858034c3dd41639e7ca5582b16fd59633adcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553dceac66bc40c34f53c61e40c2d329e
SHA1688dfa50b09262e994fd94f6f17dd2c99d541e86
SHA2568699658b5518e1bb5f0a68fe67ed566db7b18bf1633939981e0b523c5161afc2
SHA51251936514af855392c580f1d6834def5dd297a52dacc9a6ec084b118b0a970334eae7742712b92949ff4fc5e97c9dfac8740c15d12d6133a49be3a44b92b50a9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a6c0caa5e725275fada3b1726acda3d
SHA1c7159bf8a9594e6a132f641ffff6c6cc4bb20d83
SHA2562c9c1ea7b56e9f42bc4f48a0d54a988eaeb7a48c843d8ca0fb34caefbd7185d1
SHA512a80788c9f37ac15f45cb59f260ed0c82739bbea522be6d340fafe746cfd2871848ef403b9d01122d9941669fb78f17a583ca0c9c52531ded87684026e3494f28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6cb6eea8c3d643b73da78d6c80282dc
SHA15af5abd2bcd5aeab92d563d9d4fad6c191f2a580
SHA2560e49b7fd43e76f497524ae8e15b344fbb190f8bfc027e403ce2483219ae4e5d1
SHA5121f8a394f866e174f4e5114d57ed9738b9b170b6780aefd369ec692f186770e0646a357504c6ed67dd9a47cfae7f34e5ece81bcf2ae1ec830b10d3e15051fd7ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586400a9a44dbf6b8d3f41d77e82ee2e8
SHA12ee2c88d8c1240045d9adbbda0c41f4dc9eea32c
SHA25639a77b35fea54dc906e30ca383bd693ac2d7382a5410f0f502186df6a108df6d
SHA512ada72bd08a7841738801560fbb16b1afca945176f27936b4eca049cce28312678355293ca9823799af8972b91f3fe5f7edb5ab50fba2176da8d4544554668614
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b63b3184f5be9eb98f20aac9eede8bd5
SHA18b560f9ebe70a1519e41ae5879c701c0edfd32bc
SHA256004a563c25c06676ca08fa55145cad5093976186c093021759c5913a1540d19d
SHA512bfdba6ce4435372aed7dae141102577d65122e30debfba2187ca2be6c2a7446b2c27d4df657ea43c3a713b22233e9fbaa4105a05e8feb20de9cd4643be81058e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5677d1b015c139bdf0a2bf3fc8dd22155
SHA10b9c393329d7b5417ec1ff29183edc4dfea04fff
SHA256466440d665763f64ece91bd26c99a16d66b04133a702c8c084be473bf0282c3e
SHA51290354310948cc92c5d5277b5534f67b3f5e78d43a04f5bb753189e268c04dd9f151c955786fec2b270363266f62b4e5c22cc1e87f3f1a3612f1c5ca32c7b63bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e8da15c8a1734f59acac3e87a26cda1
SHA1a961f5ef792b2901fe4a76c6e01a810d90be5490
SHA256c1f0f4d7147d90676405c160cb111278fe0328a53b30e69cec93bd3026fb1919
SHA512d6e6c4b6bcfb058e91142478876b71df3c6c27dea2f1d3764dd7f000318424b31c9dd570e3d820fc8b70ad2ee0a86b44e9876999db07cdaa1f2e176a007fcd4a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a