Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 12:49
Static task
static1
Behavioral task
behavioral1
Sample
5f28c6f7fae9c6e7179e0bd793c93104_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
5f28c6f7fae9c6e7179e0bd793c93104_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
5f28c6f7fae9c6e7179e0bd793c93104_JaffaCakes118.html
-
Size
23KB
-
MD5
5f28c6f7fae9c6e7179e0bd793c93104
-
SHA1
7f5a46b5b04a1b600f6801e0c94114b620b1210b
-
SHA256
7cdc2f38231d6544ed895e02cf352f7e9ed471b83393aecd68a47b4b0575c8eb
-
SHA512
d7d306bd7404a059ff21bc26d753b709011fc26ee50d80950e0d38ec1e8a54a2d3f549e3f4bbd4bb25aa35e99e79d840e761eba715a1e7cdb99b4b7e7a2b3952
-
SSDEEP
384:IU3/8OJbUius1CJMdG9n6zQh8vQmCcPFkkkaalOe36lhuWDueIGOee/Tvjri+vl:tUM9hCJM86Q+9D7UWNpOfrjm+vl
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2031723db4aada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{647F1BC1-16A7-11EF-AE77-52E4DF8A7807} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422371234" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000eaa23b3f7f216114a02fe0d5c2b96a7009eb213f867621dc6c531ce4809245fd000000000e80000000020000200000008298b9157b6ec31c16c5ddf08fe2b9930a2d99723fa813adb5f90420523a92892000000086e7468fe0f02d4a950748bac9c4c24b40e276165ed2ca415a353fa3a7d84a17400000000632e06cd0b9871e72c4503293e6ad5ff76fa8bad46b042c7d1e48d67b9c2fd7464de04edcf816f14b10bb0b521c89fbaee5fa20cc8c1367521fa765f8cd6c7e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2056 iexplore.exe 2056 iexplore.exe 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2056 wrote to memory of 2920 2056 iexplore.exe 28 PID 2056 wrote to memory of 2920 2056 iexplore.exe 28 PID 2056 wrote to memory of 2920 2056 iexplore.exe 28 PID 2056 wrote to memory of 2920 2056 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5f28c6f7fae9c6e7179e0bd793c93104_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2056 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e263457fcd15f4456cc441470120673
SHA1150daa498b423dbb0985641f7215fd468946683e
SHA2568db75fa9bf0240443a0843a1e7e24553e210e83022c8ca9f9068ee3b67fb6d46
SHA512de61dcd38be1224f1566081ae2f0e2e202e0c9cc2d3120c15b8dc37198769decd005c9b2cb98b6b9e83efd3b0e5a122797e31f65515fe3e8c066de48f89d43a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52728f5caade358c99c135c55396e8e37
SHA18712a978ea2e4f6e1376ff9a4132d7ae3e1a23b0
SHA2561d52c8d89829f7fc4ef4e8e6704ecd8603a5162b2e8abc4ed2c17d5b73beca48
SHA5124dd1dfc78393d3b9d7ddafe6ec05512020e060d1e394a1b325fc8d02c0dcd98e19d22656471cda154ff7ade946185caacc11f47997c04731cf6b79eba4f644d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5472e6b1d384bfc0f12f1ccfdbde240b9
SHA17b733e30a7330754c84e27547bf85713c4d40c2d
SHA25675882c856aa2ce36c8630552716441e7a9c4584b782d67403b0c89a04d4b8cce
SHA51218f51fd5939d28319f5b1bea7757beaa9abbc657512aa731780d0eaa4e01c14feb70b7ed48fbee9d67e1d322c9fd0aa21d237f938b6ec0ca9f7e9a624258358a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af2bc1890774b135301320b4cdcc3b98
SHA1dd7440bc976415871bef0ebb5f9a4e27bac65954
SHA2560840bb39d5b837e7b6ffd4a9fed80c61dc13454d8e0bbfa99cc57e9cdbdb024e
SHA512a697b16935e7dfc4e9516da80df79b1b3c89c0a55e651990e12290738db9fefc73555f18e030f55ba56980de82f0c5fa05679b2036ed22c27d983f6dbc87b7bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc1a7da5de4c0909bdd9915692303e35
SHA1b371edc7c2c55a0e64ddcb9bad5a8ec82298afd1
SHA2568d668faa8222aa439b9a138d9b56ae255427ad9b67f3e5556924b3bc145a4a26
SHA512db86c123477a5a63f430ea97c397d2343cd868bf75841030cd9e3aa386c51ca9d8ba9150eac8519d38032405841c267fd7adec65dbc6136f99631834d306ed34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546ea2cfea1fa7c60bce7a9c5723d075b
SHA1758187435c8fbde4ec54177e2b25b3b16eab8d71
SHA2569063555b1948e18405a4b450f67e907abe9a331b6fcf05eb9ab1b5ad5b1b3805
SHA5126064f01daa03de745ebec6ca3c4ee40490ad373a23946692846593876f8a87b5832913d3b43ce77cf70b7bf542b2af63969532398909054c16c636af4607e467
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a1f531c47acdae095e6e2a4ec124af6
SHA1fc1b693d6aeee88b12ff83e68d10eda31ed9ae5d
SHA256e4d9d4d0ae15fd9c71af3ebb191dec55ead94d1e9a501831d1b3f1354c6d8c69
SHA512aa11bc0b704c06d04ed2ecbce5a54a30b2f44e82ad50361d806e3c6a2236d0bef389615d0ed4cedf18431ff399e87177fd678c7a84f729293d04663067320f51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5139431dcabbf85764bf54fdcc403dd61
SHA1fa5cda47b3296081aac0faa2e5dc9b454643333a
SHA2564361964917a388d0dc05dc8e21ae49fc04beaf166bcb56403a0cebc15b331ffb
SHA512094af4300339d352db0530fcc9e0d328a00aa55550ae01957dc6977db04c0211249464de06877d1ec82fa174c244be197c34063914b6e9afb666c16572655359
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6d6813510b7dcf5e8ddf7052e38731d
SHA1206dabfc780ea75f67338d69ffc231766300311d
SHA256113bfaf63ea5b3d2eab7b56f9ef726aff18c83d76e504af42883747760687b1c
SHA5126bbf02b5f53ca08208b600fbbae6978869259af4cd13c80b863bfadc8513f7c6ae00e14f349badde6850dde3bc054fbd51acbe7dfd8352e5eb4def9e69543587
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a65cad2b87b132dba242db6d2c9c17e9
SHA1b0628bcfb2c668b2ea52e0a7e8782adf8fd8492c
SHA2563cafbbab9699f3708cc27577f7064753774bd596da770a1fa6cc973409e219cc
SHA51220d6a354d2b0e692fd18796fe3b6869ea475d935b65c888a49cfca568c73dd272c2716d17bb08a7ea04ffb8410ddb45b51d2ac11f699da2b999b93a4bbdd53c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c0a51fe2a7bc0da67ccfde8c8356130
SHA1c411ac3e4667fd56514b87ae2cf64bb1bc1daab7
SHA256a58102cecba70d0081d167946fb3d4be8beda20b16e9772d1a0756894515207c
SHA512094fe827619679063fc6e7165ea39e7835475bede270ca1b6e96625105e737a5e34c77cf0b0b96a454302016ca829c371cd3b5d77d77ea2d53c982b45af6f031
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540eb5b7ff87704b91403f07d4031ecea
SHA193c3cb58267ce2f8a86f2e4909412b096482f844
SHA256199242702ce5e5a6d19e6e3c90fb9d37b020848e53bc089ddada4f6c33927523
SHA512a68c568a38768370c77cd2637778bc2479b1c2391e4f43af0e1ba13fc91e4da754982d6583ebcc3373e4c56a73061273dac8cb508bbb35408c97feb477ad8357
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51956f1469008fcc1eaf86ed2b80e102e
SHA1c2074e0b2e0a1d9b973986fbc4fd2bf84daf979a
SHA25659a7e1fe5310da793cfd64b24a9e7c8a8614ec6120fe5921888da2202cb15b0f
SHA512aef74a43863656d8e7437e6b63281725cf2dcc75731ce1e2f9df306aeaa543ef2e3eb9536e9e4016ed3505b5642699de8928b041eef511ac23d5b7f31f795c24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517c621524c071699d52a37e233985f9b
SHA13092d12b593ad11b4d89268a479c31747aa1efcc
SHA256e04f57d02fa61cd044903bbb77a78899a0a6a747238fa29fec56091d1bca1699
SHA512f2930d798deca2dc7d4498e0f70fdbaf27dcb4746966ac597658ad9926d0ec712b781943cbd955d2fc022d406c1dbef6c375319c977627311fb7f410d3170e1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f620b6ffec50b7c116c8910d0699126
SHA11680e2b6700af9ead334f1b74f19365665fb5e0b
SHA256b13d86fe298a1947aeca8972ffa24ae9e263e6c7844a503595a97b4a84a6a45f
SHA512dc7bf56304f15ea767a56ffc9f8ee6408ec1cfaae45be3c3ffc88c92d0e154e53b89a77e482ee77fef014fc348e49e5b3feee8bf993be10cf1d460bbd176013b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f94edd1e2a6cdea18571204b3a640935
SHA1e9e1b096760d5a22f7c9d3e8121616c751413ec4
SHA25679d9d0c55f7afa2fa6c04222d0b3a27fd4809177570c0d8771574c45d5678113
SHA51213ae228a58fd84ca0f8df2d2d0e2cf99f92f886450ebd02ca3f0ecc1c1b6ebf05e1f6532302fe71fd5d5595e977f7f8ae92388e12f1c06de224b0f0fcb7c7ecb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b7dac13f88bd6fb79c6d9b7c387c3a6
SHA113564f2c80d610a4714531f57b5b231ee5919132
SHA25672c0cd234c2944d978629439be87c7fc20ece3d61b63df5ef525fc0d50351b03
SHA512dc5cdd87667938fb397c77f0b76c2d81718739a950078b3df014992ce92913e70245e6457de8a5988914811a3beba51b139eebc25dde89eadb2d3fa20c8ccd1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbabf2cac4a03dd5a93959631f789b62
SHA1f2071944a86ea021d0f95e338d115ec31050c56c
SHA2569e90f244fc885c7005ce56f5a4cdfc2e3889feb49d6c30e67d92b9f4f28d175b
SHA5122caae220707ccf4f3580893d9611a4436a7cd2b81dd53e7f334efb00555b6ff2403970355db239f20d65178ef8e38a1ade0a55fa11f3dc6950d6ec4476a3075b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523bf9664f6f5ca49136f7aca0a080cd8
SHA1ef61a56e435cf235d6423455ae69cd1db7134a62
SHA2563241477497f74cfe26462312a201754ddae286cd742971113192cfd12c845acd
SHA512088db16859f4ebc9f29e1c0382d86373f89a0e744d770b8ef5bd1adb50dfc0d1f8e4a1f0b991cca01f02246048613e9e737d52404801519b2506e37a9a82ec12
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a