Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 13:22
Static task
static1
Behavioral task
behavioral1
Sample
5f4acaaf1a2f44a513f6ccdef993ea27_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
5f4acaaf1a2f44a513f6ccdef993ea27_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5f4acaaf1a2f44a513f6ccdef993ea27_JaffaCakes118.html
-
Size
4KB
-
MD5
5f4acaaf1a2f44a513f6ccdef993ea27
-
SHA1
756e4367f532a6e3958e30d98890b4fa002d23c5
-
SHA256
e04a134adcdcbcb4a6d223e634a07575e83eac1f5cb81b3e7f0ce98a8fc4cb39
-
SHA512
bbc49a8a3deaaba92e75ac6403761931eb36282aa7e2e98caed2ce2e3773d36deb5fbc53b51f8fecdd7e27b48be2830c2af9ed7f593d4ed21104a7e50a7bdb49
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oi6A5d:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDB
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0039bbcbb8aada01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F72710F1-16AB-11EF-A1A5-568B85A61596} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c656c482f6701f4daaeff2c557b59e00000000000200000000001066000000010000200000000cb97ede9e3cffed406703d6a5266ecc1ce87a1de555928ba453de6873f33724000000000e8000000002000020000000941be6c3342b159bbe1e94e9ba41edaf3139f06949edfd1394231203c9ad7447200000007cecdd386e630852bd3a6159c1da53408235c93d9f4b9d21f2cd4144532ebe54400000001a66565d00683974c1e9f33814cecb55c79f818cbdbff068fdf2ae58991914faee9f50ccaad2a573ee11d807a524562e5c184273b6cc20a16672d58dd2fc0ef9 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422373199" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2356 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2356 iexplore.exe 2356 iexplore.exe 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2508 2356 iexplore.exe 28 PID 2356 wrote to memory of 2508 2356 iexplore.exe 28 PID 2356 wrote to memory of 2508 2356 iexplore.exe 28 PID 2356 wrote to memory of 2508 2356 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5f4acaaf1a2f44a513f6ccdef993ea27_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2356 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b323cca9af2fcc39c92a97d4256c221a
SHA1b238a62f330ee1549a4352bd7fe10d475cd698a5
SHA256cccb1f9949a3b9dc2f854fcd8812c84f8b281e0e28ef6ba5c5e3f48b272464a1
SHA5129f7bed5a5cd820ecb3868917a48faaffdccff90be0fbd2915cf2120b870dabe35f59f7e49aa24393ed21ba98614bf3744858569d6d33d7eb0b4e08fd137b19a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5ce568315a5917063127f972f04ffa9
SHA178096d55cc65953ed676b7b3377fccd00f81e887
SHA2568ff2bc44cfc466c88e12bbb8554458a796c92e2fda5f494cbf8b5f2351c42738
SHA512a87b11da3be119ba539165630c90494627a361536230de7aa53a838c6a0354a4ddc8f9d3041f7b3d14e61d647de4a5189e68f9f26eb6bb50eae4870bfcae1237
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569073d1464dbb8eb46689764066d7391
SHA132795294856c1c833aba0ac4e8cf61619d7fd9c0
SHA2565191cb2971a826fffaf4c4ab8a7d490b58b897c9580efebe54c0d2c4b8975c8d
SHA512f3c5b79fe9bd01d160aa965daa9e8dfa3ec18bd9995177d4bb97a221b3b6d3f86177207f5f8231ddd87b3a1848fa890f055af38d4811361003f9fc974ccc483c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579ac1af119d71ab19c04d7d3e0a9a121
SHA1aec911b56082e75550dcbf079f909ed9f6ba2155
SHA25696b756361372f01f6b2fb16cebb06fefe241412550df84ee802c654296e8cfaa
SHA512a0b473457061e74dac8efece1f60a0e57fa4936a066594bf9dffff87fc06f953bdaad02ff6f5e0c0268ea568e1476aff2609b89ed75198e874767e2803bb168c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1d4c4382b33dc99c8602f1b282ad4d0
SHA13834f2f2a861740bec59ab73c135c3f92e376ccf
SHA256efa6c6b10b1e677a242ac0dc64e3959979f20576b441e48917bbbb5c5a376c5d
SHA5125e70940938705ed6d2dabe49e5059146b5ac07baba3ac0f8241d795c8eb93f064873aa50bcc4e79f7c4862ba937ddadc1037a87ce34224e7aa15731c37e234e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bac6cc9fb02c856fe5b1ef98ea235a69
SHA19eb97bfb6af251927a35bf4b1ae48ace960d4b00
SHA256d2126c87dfe0816a275b0c78e82109ea8eab5374c33f011f4bd7d043bce80ebd
SHA5123b20ae7a2f1954748bd4dfbcc870ca237edccbab6fed3fd3fe04d3b21d69ca827be3e3e3e380a19e092ae71730f216ac831dd45d4aefbbe6bbf586d4d6373242
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53aee0d078273eeeb49893f19f4f06d08
SHA14aa3ed26f98f8568b36b58f3e18b85ea24389c01
SHA2561cf43def1cd9b3f4af2a83e656698234155f7f7afe6f613a0f611bfda4336079
SHA5124a6fcd72044a0dd1437f6e1b8db50cdea410091324416e3fbb5928266b6a4790445ec92b85e9c01beb18ff2a66d590af49ba7dad88a744cf8513f1968eb542f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d06ac2499fab2db34394cd34f5e4736
SHA1fa95f5b057ef3b41a2f79bb6ac80ab1ff8f1165c
SHA2569e4d1fb0d2434421776ed8433009b9d3c306f07957e6c8d5f38eaa98801fc15c
SHA5123fa525013ec222fbbe0a2545ab23954a0cecd035eeac970357a76ecc52bfa0f4a0ec9b40082459e70db096e59c77a2f8b49b1253347c366997ebb1d1fda9544d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d3278dafe0273ed4932289941c9f491
SHA10e3ae59ab6d801e0e2e7431495b1a8b38bf5419d
SHA2564103b077b431fb30058128a79078c41a24cefefa864a68cb6aadc998004ae121
SHA51259c9855dc02fc59f648e3a292f2fa74a7d0bcd2cf884cc8b6861e97d1e79a452fdec492ad873045f31bef229e5ef6907c19df932bbf7930217a592629d84e2d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560523f3464bf2fa48211ffda984fcc7f
SHA18d383ee452e852ed3bf02dd57d49b0f15c861cca
SHA2568b5143bf353ca9260cf206a5a3548a0a83d71782d8cb76b9af538a51edba0c07
SHA51239086db071cc6545b2685dddd51dd841840038150e847c5ee30d06b6ca033f84bdfbfc45198508964560532e76ab5582db0309bb6b0ab53d350257754a6776ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ee8d1b6b8506243932c7e2e2da2b13c
SHA141fc3ff3fa8a7ae4ca06ae2d58f4dfa9afe6602c
SHA2569281c29c297f6604f7604569dcf228c8ecff82b8b38b21e688ff5531700a5a73
SHA5122c7d7a748c26ab7b26e2137a92e51eb5e29b251912ea70d7fe9ce73fab6609b7841a395d4bd97ef3abf58b183e860241949e4c0a9c491eb76e8060caed2c9696
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5f09eb418e70639efa280cf8a1eeb3c
SHA182c280ed83d8963520430bf595d1c21a053da7b8
SHA256dd75900b5e7c8bbaba4810063d4fd21fe304d9ac77a2dcef287ad4f503a63c22
SHA512b8ad22cfe86c5b50deb8374aa5c319e1e1b2105b6069111e44bed52e0a394897a22dc69474d3bd1b530ea53d8272576531801a58698a838a1e11ab6114b4d0bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fcc72ef81179fe59eec16b84e2d6f416
SHA15a48c08c234d1adddffac993d6e78465f53029b5
SHA256a52d50040a6dfdd22faedd16b53f1667b643812e8798aa13270737cf3e52c3df
SHA5127a4265c7f47c48d70415a306759afcff7a6484bb9fba93214f2cc4ccd212454d68f5edf4e087fedc6fa7b6d9825be1ea2b1ab8480f30777943c864bbec1aa2b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd8d03233dc31069c9c5e4dbff649cf2
SHA1b0342f2c92a29d81773e8342db7526d94065398e
SHA2564b7acc50966c50b28f30c899a1549dd9cf47aed3606d270cc06e88198457fcd6
SHA512f654d87149193cd1e8b8b3019bbba84071f5812185598c9540f5694a781c6f851621bf442e8357c1061a841b87d4383c20cae6fdfb81c22050beceafa0eef2a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5444a6c1bee8e39213cb1bca0476ea155
SHA1e7a0c13fe4bdedd9f3861855cc06fb5960677b5c
SHA2564a32064b1e98b0d82d38b3796d8e2085574d0fbb1467d9379b923d8eeb33c459
SHA512ea00ceaa331b3f1cf7a711135b013187b1d438c698976e9d91c772170746aec0cf535f5f35e4063cbada9796d6773cb6dd664a77108e6a212a4073b522d524a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5746f1f50c6b2b005caa5449659e1e6d6
SHA182fe802c8128ee26edb32be6897bbbdc60509bf5
SHA256ebc6fb87f0e52ca334b7e087ec22fa8f8fc17fa9ded1734805539175950cf705
SHA512abada46b762716aec780b73ffddc79043824f9df149d47668d2aab8d1f337b8674afb821706fd2c42fda5a0ef489fbfca296fea0e9b4aa67cdaacf30d9b3916c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e357d540ecfee18e962ea3eab9b78c26
SHA1d91849d2df1963b9c42b81a59acd7f6a39f62e1b
SHA25611aeef53f4d851263413282912c053d57685903932467510e808ab3c0125a36b
SHA51223ada09a6bb73ba1fb9cfe77360486dcce941f382dc153625fcf76aa44db8ab1c35afb433668f95602855555d11f769bafd1ca33746608f4c7969f6e90d05c67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5558f9a001bb574e25de9b9600bc36ede
SHA1d1dee5d975aba239581ec05818f259fe4677aa5e
SHA25671a7d81a31657206d3e2dec0e3f7ecf00264958ddf509673bc3fb6eb13be0bd1
SHA512854edcf3dc71d9aef4a736fad1117ec396a42144b133f3774bd34a05eac5dc90c13e1f44e0259dda8c7f6f7ec10c188f226140b1a7130b56bbe6ae1cd7c42774
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0dc440fc914dbb1c64bc240336a9887
SHA1efbf6955b0fa3b6ca9ef63ef43cc0100311d4cc7
SHA256699727a3e3f5d367900eed1989b8f3fbcbde06d4d3c4447573a88e620e34d2b2
SHA5125df047fb565adce630b9a03950191b58938b1bb82d625472dab82bb855360980ce07290f3d07db14db77c0b97b2e5a1b85001a08e8ba813210989a144a626c73
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a