Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 13:03
Static task
static1
Behavioral task
behavioral1
Sample
5f3903a5300c29a58a9177e476924378_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5f3903a5300c29a58a9177e476924378_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5f3903a5300c29a58a9177e476924378_JaffaCakes118.html
-
Size
460KB
-
MD5
5f3903a5300c29a58a9177e476924378
-
SHA1
0b2a244066c7be7950be4f56174c566ade75d966
-
SHA256
f8b8a3b7d296952374308f80a75a738ee0595c15e18d09cc63e45f9fe0c9c6c3
-
SHA512
b1d72f6db71ce50d59916cb77d88e8dc9981fb302627bda74e5d06eaca741e7cc6dc57c7f971c5a26b8e94775715ae1d42db7050a3d98521cfd42f65860395e1
-
SSDEEP
6144:SbsMYod+X3oI+YFsMYod+X3oI+YHcsMYod+X3oI+YLsMYod+X3oI+YQ:Q5d+X3T5d+X3o5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9019a127b6aada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a230000000002000000000010660000000100002000000075455065fd065508ac9c8231910fc39fc733fc24877b48dc159b798ab4568306000000000e80000000020000200000004bcedf00ac88e7bba25313ee1ab5668856d4a9345bd61ab50bcbfeb9eb555db7200000004337d90de963317756cd8cb77795189890940b1ee17e6115f875a4e0435a5b0f40000000dcf99cc5cc17ed46a38164a6aee6cde16c388e8c70aa11627aff285fcb9916fdbbce2461387b7e4e35a1fe29c8e7c5b715b14c8acef3d3f6c6f5f54ffd77da73 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4F13E251-16A9-11EF-B8F6-D6B84878A518} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422372058" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2380 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2380 iexplore.exe 2380 iexplore.exe 1748 IEXPLORE.EXE 1748 IEXPLORE.EXE 1748 IEXPLORE.EXE 1748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2380 wrote to memory of 1748 2380 iexplore.exe 28 PID 2380 wrote to memory of 1748 2380 iexplore.exe 28 PID 2380 wrote to memory of 1748 2380 iexplore.exe 28 PID 2380 wrote to memory of 1748 2380 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5f3903a5300c29a58a9177e476924378_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2380 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5848a5392172945e2b1eb18eb7ab7ddf7
SHA1aba0974870d5cc4c16cf6188f4574152b422cdfd
SHA25604728d1ef5dc528ba45e7dc68967ce0b17354a95f7427142518e08f6bc434d57
SHA512c381754d084c97f7d04b59ca0d24c973264d4db669d045d370743fa1650ca90bb038345ef32fd50ecc81653105aa6a0540dc65f4cb507c464625e8fdef7cfa99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d64bdbc30bd005cddd775aff3b01c16
SHA15f4794a17a871048048dc693265fbdd55834b1d6
SHA2566cf15fee44e20e2bbcee60a981c6d09003d166bfea9a6aa9072bd2192f0f4cb4
SHA512bb4608fef59c24ab93e7d2c97a59d7e17b9ebddf6627b15e4e3ac8bffaa44860b06b16bf9f84a4391df34cf032be8ebef14893980768d94acefc04b1a0e4b5a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb45174b0a5c7df700bb01844111f96e
SHA1a92957f17a6022694ca8c5c110f4263837acb2ac
SHA2569b112d6534caba84a0797bf64156273744cb4286839677d3128f7da7f85159c5
SHA5127970a62fcc25f7b235d940f20e398a99a03234621178e1b59830dd104eb35196a5926ceff41d87bde6b9faeb8d3201c03f8eabe5b8d746f95d6085d1c868d3ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522b8fa3c5d56622862a8ee049e247d16
SHA1addaa0ffe9f1e7594397aa973fc1a999c72a966d
SHA256bca89c0b2a8db95dd4a306d5d643b23b86c0f0dc2c7cea100732133ffdc556d8
SHA5123dae280ddf674723441e1bf0819d9d86427bc01b6161bd602ab56d50c889fdbdfba699c51d44788b8599ba8b2b5f24bd1449e90790f1b5e416abc9eeb4d0e04c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc2de3c367a4f08255eb36df7c3f9386
SHA133115bc4149629cce30137e5f6bb693ee21017c2
SHA2561580f65ba3b93846db708f043cff4312cf42a9997e0654c0c8cfae389885e13f
SHA512460c6d41ab101dcb267c05ad0a6946f09920e0a6d528da847188bfdff375589967cc14b9170dd8a67e63dab010f42b2ba005ed92269460de98342fcdd2df820f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504bde049b4314164ca8b11e6b59d6d65
SHA1e42e46857c6f63645c562a2be59a462c3e1fb425
SHA25644299f162d909708e19a853c88c0360eb31b8d554972cb832e8d94b4cf5846d1
SHA5129d5faf842fdf5002ff1e4e3cc82ca00b0dabd53aad9060f412e3fb2e053c99b36ba4bfee358127f058ae838a5dc6fc386056f7e9626966fbf3f4e1db46d4257b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e338b2fb7bd16c77d8522490ae04bcd
SHA1a21178ea21a42e9b7ee18f0c713f63210761d4ae
SHA256e38e38cc49878633a0b5d976224f94fc60e1fb65d1fa111432b06743bb07d934
SHA512fc6f328445ff11f7847be61a84fce6e9991b3dc3af9fbecd36833757328c03f5fb48afeafc996e5e345339ef4541a7506f7b1eaca3674586cdfba0e312e9c83f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf77dd51eb0985694fd58b33327dc70c
SHA108b29e55c1548cdcf849fd4a06ce4f2bd66411c5
SHA256eb9065b389c3d882b84270e3b93316ddc88d20c34f17bc89163b949c26aea97a
SHA5128afcf73c6cc17ae320c53ec11e3df909d542b9aa88b36c89aee0501df4a45cade5a95754fe2e4e62c9fed60728de6259aeb4ec0a9af2513143a06f473365b4f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1b75c2629f3d913c238a807a70c7d1f
SHA19d9e84a8d4a8376e5bcec74b54e26e8e3d51d2a1
SHA256f081321d25bb34328a00454f2abd7843aea2988168feaa964cf5944e8a7585bc
SHA5121e183e9e72e9e19f034b14397fad8a9f6b7c13df55e2f8ecf2640b61363257eec7d7134aab18e2c4a37a1883a838704e766256881781744a1e63c18da67c1f28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b563b71416f9ef1fff339e133b32e64b
SHA1d41f0a1406efc321485a5d9b594c3bd253b887ba
SHA25687c3f7eef119dc569ff4ac296f40570aab1bc623e427f91eeaa10495c0d624c3
SHA512f55889ec710c8a7f771fe50df43f8b3c39a6ac1f80d6fd6e249dd910823fd546641a94f8fff5563ce76d67d5c1c1959c19ce40548acec11448b9bffc5007a1d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e405e381278b2f7aba27d4e9fbf8b611
SHA103cfd392321c7cf0e1513dd68f043c6fc8c35e7e
SHA2562960b11306638304a6330c8bc34dabeb5063c5266866625ec4e5b4b4e3a71176
SHA51268a515086667db0a83ffc52972939b25f1e1b471ba5db96cd8753f44c766840176e52e2e9742a23c72bcf43b555cbeb7d98c017a6e0c0ba6b261e9857aab3857
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5953a010c98d6ec04b4fb49922bb0a5d8
SHA1220c9a5188af244cfa3884c0263a26983d2859ca
SHA2569baf77107481ae02bee26800e3510fe92b4c26cdda87e1cb25b07a6da28e03f6
SHA51205ee3666704fe361d043db1580e63922647bc11f97330e1ba8f4fa753bc6590fb8fdf0ff64bd42409c85b861fab61dd3bc8a27c56b2d203a6fa0e798780ea214
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51be8af65fff797ae579e8d289375eddc
SHA1f4a63b4b9132de2cf91c33d2508fb84be7e5391a
SHA2565257daa35f74cf6e16683dc630ee777e133f371fd63404eaeeb44f66791e1540
SHA5122d02c649eaad6801453ebce4f28a224bdfe935d6934d1f9cd09f7d4276532a2f6d62264b27dd8c20c5b439783ba522312a54fbe0bcef4e3191312db4f4042186
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535046094d9a25064a6d51a0d5765484a
SHA1624b9e874f87af3eff4cdedcd32b2e1e058b6869
SHA2560087ce2864b298338038d687d97ffa6ebc7d606cd9b1317801ef692d5da40fcf
SHA5129b7675052123edfeead5302b722a17958649b4e41baf29d96c5fcd4e906ff69f642eb6d3588020c7b885650e8bf69b22bc1eed91adc8c08dac98be50997cdbc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d5498dd5f6dc1d7500c57f3524d69b9
SHA1479f89421670dd3084095c0103ae3cfee955ef32
SHA256f7d95259eb3f53486b051a13675fd1d9005e7c5700f0e8d5d2f2e8ca8c4d683d
SHA5123c30e5ec5f7e05437964e57a05f6d3adc93b99ce7b736bf808a82660c8c5736319188e052660636072486cbd84c2a9b9b60021e7b7e71b196820b53221252f51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2c3bcf65776e2bed12b220e4713f40b
SHA19cf4743bcab03072c3b24b89506ed945b155e776
SHA2566aeaf60bd7dfa06e51ca37a75ae5343d0d12dbf289aacb06e6bd62778d06c5c7
SHA5125935ab677546a9aba311ba089e840186ddc1b5b9931d266ad6c6fbac0f79077377c2491d504c09cab31a9b293d2fc6b1be75ac38cfb65b1ffcf351f7482ec706
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552a1224c8563d8f74a0aeefb23e13f96
SHA19fc963a8b8b57654bf7f25ac4dfe90703eada2fe
SHA25649ffcb69364294db9d46063f4378aa5bfc9c3162d905f9142afff775244a191e
SHA5124811cf6ba777dd7b1786be848ad49a97e00dc0e9b23431f7973414d782319883422ccf216e312a47e225c79bfc2467998ca59c2bd95905ad54666ffd7f5e41b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b524ab44a080a61235ee26ca1d5e1638
SHA15eb35e495df28e09f0fa36041675e876bee92611
SHA256f588f4699d3d10969f83f7d358429b8ec1a23784c2a53b6d4de463355776443b
SHA51218a6a3b9d3b0b8243fc9defc14417fd609a924055da8efbefce32effc71f8df7cdef3a2d531faaa2e249fe85170315541c962e33eac6530d1d642767539f986c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55baa7bfdcbd43aad1a918d80cf5335a2
SHA1c7963a64448a29625685796be8ba56863134ae5d
SHA256c27e1d0fb87d5732591ee8109f47c7af508075155a1d0dd0edf12b3ac28a579c
SHA5127423cc601b23ec0c7f71e9bcc5dcb00c4d31bcce340e8a511030cb8c98f112ea55c23600324cb3537087b9edd894ff8f7f06816ad99e797ffbd86f0072f62ba0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513c1e7f693dadf23692bb2c6b8d7b043
SHA1cfdbcd45b16d8cc6cab9f668804a8fbfa2c2f2cb
SHA256ec05f42216a66a9b8ff31e6004695e969d5cadd184b9f849f8b2d02e76b38064
SHA5121fd814ed383fe2816378a0c9459a338de82eabf898819721d74e49345eebc74318aeb54b1655c02bebfeae02ab5bfb8a9552673c93daf97340ca324f93a8ae9b
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a