Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 13:18
Static task
static1
Behavioral task
behavioral1
Sample
5f47d0c567fb63f01ba1a52b82d187e7_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
5f47d0c567fb63f01ba1a52b82d187e7_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
5f47d0c567fb63f01ba1a52b82d187e7_JaffaCakes118.html
-
Size
460KB
-
MD5
5f47d0c567fb63f01ba1a52b82d187e7
-
SHA1
f63363b8d5aab92e2e9a3e880ead799f5ed857c9
-
SHA256
c798430ba28057aab6faa318f776883895163e0ed0c733b99f2dd9ecb2b8eace
-
SHA512
596e87fc2a27dad438739cbf8ac733a22b56a82a39fe00f5fce0c14340ff0b79587940b2524e34d30dd89db4d888d75285d71fd3d5ed6b80d934f78739ec51df
-
SSDEEP
6144:S7sMYod+X3oI+Y5Q9sMYod+X3oI+YDsMYod+X3oI+YLsMYod+X3oI+YQ:Q5d+X325d+X3V5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000f7fb311320e3a4ab239b417f77d74b200000000020000000000106600000001000020000000d3d5c251d4dc5c40f19da76e7786c7c8617bb27313b07dbe39c1be9ca2954f73000000000e800000000200002000000042ead97819cd45e069bd4bd64582b94881695312f93a8abdee2df71b211e6955200000003587b39a2e8db7d8a08955df1199911004db2092e774e192b6a2a80482de954c4000000054eac6ac7305d4aadd1dfd79babd9cfb183028bf43912cc3ec15557d2c7b0b88eabd8c8d0f16cd82a9562a981f17300cc2b2d7bad76e62ffaa5f558ea4aef97b iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00a31459b8aada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7FF17CF1-16AB-11EF-A6AA-4E798A8644E3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422372999" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1756 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1756 iexplore.exe 1756 iexplore.exe 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1756 wrote to memory of 3068 1756 iexplore.exe 28 PID 1756 wrote to memory of 3068 1756 iexplore.exe 28 PID 1756 wrote to memory of 3068 1756 iexplore.exe 28 PID 1756 wrote to memory of 3068 1756 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5f47d0c567fb63f01ba1a52b82d187e7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1756 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c6998dd7dc47dd99a8bc4b72251dfb3
SHA1af4ea1ac7ddd6507f3e672097a0203acf78096f0
SHA25641083a810418d7aa14f2ede3f3a1471da1873d12cd797d2ba4c76ced65559b15
SHA51260cce79367955ea39d0b0115436cf64cc97daabcb66ae6506c5116aa8a081dd4dea0c7b06ae17dc22d973c2a266f57bcc5e4535fa31125568fac89301ec746a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5429210d493975579870fccc6d3882bbf
SHA1209128667bba145a5817eb24f979e8ac158e4614
SHA256b0449b8c91ad96d33f74f0504b83619bc5d5fd2b8375145f1d574153a61d905e
SHA5125cc781e29752b8eb4bbb8c5cc8dbd42d1514abbecc2273f3ffa197a98fa230b086fdd115788b0978360d5c43640748dd9701a39432ad794c09c79113faa248c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548044b5dc23237d9c2693e0f7b93d99c
SHA16b5e3ad9a5c6d3d13c277e95e934a5d19de9fcdf
SHA25630455eb03415e320690e275ba4add6dc26167a213148fd86870fc469df2a12c2
SHA5121528659ab3d5e06ca4019e6dae14eb0c80d48a2200efb8b5e99ee0487d8b4152fd24430f52d5d71c525904214801dcf955f3e941c5afc6db310b7fa7881d302e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a652db4e3cc43f2ab8649ef07cb61a5d
SHA169f929317ce165c7b5c5201440e3bcffc777f49e
SHA25679b64e5b80d9f6622de393f69163fe6749b3245f160211a4caf1e9dc1601e4d1
SHA51278d9270ceec85ff3bb803e0edf785eaa5f7765934fec554b3471512767d20e472f0f57ebede25e6f303681a98ec5fb4d82dc82b4dcb29462d29bdef364b2682c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541a6084b98cb78f57188a277602b5d12
SHA1dc2f6edf5dfd7026a21e428f83a18e233ba898d9
SHA256b9e1b3f58762ff2425b80958384f6c396935bf15085713a5ef46c15ea1d67b3d
SHA5121e30444bf81dc7a80ebb28ee65462777ade64e19651f49270a0f225971df0270184afe4bc7b80beed5b603e221a83eef0f289a0f1fc933ab708d64c38b32aa5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590aa550d9fdfac8d5987c39c6f6b40aa
SHA1747c36d005f8489e2656d325f4d04cf6a020af9d
SHA2567713a6ae3c6e63df368a1d6ff8c77d6079d5eeb5af2983d31f0e3df230c32a56
SHA512fe8af5e861cb265cda6b15ab2d6a0987d6bec29a00b86262fb337cd7817051e81ff08b4c6eabb8c17b4bc3b788c04af881a57df74692feb18d5c61040ca97150
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53dab63e490af0663fcc9bb99e2f3074d
SHA1c58fae4673d05cd4546abda44ea8b35b49e5214b
SHA256c91f1b72a165b8a9c17e3265209ec18226da11d89b340390e13639e5f71923a0
SHA512148bc32abd4320d5d59afdaa3dd9101404dd47aeb8619254510049aca7daf9f892c57eb5471c638db7411edf788ec2e7bea949821097c75c0ff39e9803a33cb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3c4279a3e8155cad82b055eb2040bb9
SHA1bf4a4e326a972b01bd67b424bf4f54ab4edf9b31
SHA256b3a06f593835334721f677297afc3be74c9120e180e4c191326274b2f1b4a930
SHA5125a12666b884ae03469ad18ac6bb481b3d74fc551b1b9da90c6a010aa252e41ad7c443bbdecee8532a84a81bc04337636272bf39ef40323b447489e0a5d6afd0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e37a9cf82c77e467f010a2af4d357040
SHA1ecf6cba15029e6e4e1e6951b74a741e130593fff
SHA2566ac7da00b1d4ecec61128441476a2ea7edd2e0445d8700e5c7038cf6ab19e2ba
SHA5126ab379e6c7bcd05af112f4b5e13e234d5835e29cbb72f1a5d42de2aa00a0a69c1d92e50f719f1fa41d784c66e3cee2ab3565bf396cc87a252f944a5e7180ced1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e78e5a7cbedccee6c29ff323a79c3f0
SHA197f48ef8edcf9b2eca4fa2bde03e33fe3bca194d
SHA25668cb42643ae8b616b36b98d7467f0e47b976815763088a5481d24c08fdd68d95
SHA5128951be44d1e7a9773cd9ef7d84098ba09cbf50699bde5bc9567c5d895bc1a59865d955f111a75a97b5774ed5618453ce5f280eb49bc011f09e45d44edcf7f8c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e9fee4df28ab2fb1021067b81ddbe3e
SHA162a7d75524a4372c68f392562ceca0265aacf4e0
SHA2560282ea9f28f5a22563c7639fa200554db61741c3a3d63343d435b6c83728f626
SHA5121653c129b318a311085a0fc13405df1c8bb5bdbb8c04afc166973741c506d3d8df35e21d71ac56032c6a567165e61a45a97ae49edcc3e3058b4ebbd602deeb63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51dfd96a35cebf526bdee5a0d8447c842
SHA1fb575dfafc2f85dba788cf90be3549d40af18839
SHA256463d3397ad4e4787077083e9365d7974f06f0147c87b25091c581916a6def964
SHA512c6b0c185a0692efef17710f3da214f059bec63440608528ce716787272136504805049e81577b99814116eb986325ba79ac2defb79645d01a72f712fd3d641ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56db97c4328491edd4a65d084e21073fc
SHA106d3de5f75081a69e8a65271cfff08a312350c05
SHA2569fb6b3948ba0d1b3a89e98b72f8111e865df25e1ffca07bf143b171ba29331fe
SHA512acda86e58e52b54cad244c0e37ada6765ee883203677bddb0eb65c8e08185a08c1298f6723ae48b9fe96232ea7c74c9b09cb4ba54929ea0ba41106917e336818
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546297578450c486a53067d82c547e799
SHA17464aacc77c937e4a1a0b02c59a5e1e2de76f881
SHA256fad4660aeb4c8f6f7efbe80248288d7a3cb55550a9f39f41f1fcbd673930c563
SHA512d17a31840a98caf3effcb59be06ff349170b58e37c14c92ee32233f639b2aeacdf5e5fed24bfc252ebc528d36b30457ccdfcbd356b3abae5ec74f4c25944a444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526de6f73ce32c4a4b2e3b6de80d11b44
SHA18e07f024240b8e2bf18a605116947ca6ccb28b08
SHA256cd2f449e612c4a9ef9d990493f4ecbf00ec3e93305fb99a90683ab91ceaae577
SHA512479323a807cb3060a8d59ad08452eafac165046c8c505326db978eb1f3d1379c0eea996a16a886f2b9b518612289bb99dc4a00640716baac9d2952c5b4f72fbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55959ace00a422948b13d78a996d51435
SHA1fa400bd79d97371885de3f8524492e4a5215484e
SHA256db038fa5af5d95d06582fed47d8c28452b8b48cad5e1e160efa6e922282cd02c
SHA51251f02bdbdf0961ad9f68fbbffbb8cf543323bb6a5662314c890068e658d7c471c95ce67d2e1bf6b1843f98013a1bf278552bc6fb9ac491adc6794ec0b9db9bc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5741c5c326ba7223933e34cac6944a4bd
SHA12c9c6f3470f5a66202af34dca8a183f317b12ade
SHA25658cd519c0113206eddf6232efa436a8cad1aca193cec9d9a3b4c28d6f319b94b
SHA5125f93c846e1cc52d97d7f7572232e242364192231f05718877232f510cdad62405796d9cf6ba4cd6974eed5bdef6752e09614dc94bffb03a616c8b1173836a07d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0867e708801074508ccd6b823e153ec
SHA1cef7141394885e2df5c60a129b431a132c4c465f
SHA2560aaf0c9c6df08835568ee00e6abbafe3861dfc41dbdbc7911d9b2ca2d6b8d8c6
SHA5128373008b156fcab2923f0c905abbb51b9e916153620ff5b9d123e70ca188a2c2581f78e4f3a8e0cc279a5aa425eb6d2c3653c7a69c0bde76dbf4464d94386dc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c380dc4b1db0ec0c4829ae7e58f4bac1
SHA1cccb7137fe12a7b7ea2eeb3b392f30dfb6e631cb
SHA2566516ce926f9bd1f200c0f7dd35471e59a40014fa20f3ab97e8da83d2b3e53959
SHA51247e43b6b36d31cb27ff33271a50228b359a4dab85aeeb7629b050540807be2bc5b1ab425153097c850b4d35a4a05be0022a53c23a227076acac315a04e66b8be
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a