Analysis
-
max time kernel
120s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 14:33
Static task
static1
Behavioral task
behavioral1
Sample
5f96f9ac97f2e516400fd41c15a6069f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5f96f9ac97f2e516400fd41c15a6069f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
5f96f9ac97f2e516400fd41c15a6069f_JaffaCakes118.html
-
Size
448B
-
MD5
5f96f9ac97f2e516400fd41c15a6069f
-
SHA1
f7f351910c4c1efa5e1b2ce4a9d8cc22a857022f
-
SHA256
35fdc860eee19554f203eaa579e7b8ffa9efaf865b4bfedb65ec3752c062dd83
-
SHA512
001cb4a5e4c5d638375f4e6ae6b5787428dac2df810d199ffa78ccb183649d60cb2d97293a5053d44dad448c03b228ff3f6e6308e82a925295860eb1bd0a8b1a
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422377513" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000271b2b5e6347abc0702204b98d0de27664c6c3ff6b5ce3856d43f6beb2f66086000000000e800000000200002000000010fd18bd38617d0bc98501564f9f9dbefde5a67d202e356d6957dd2a17b59b1520000000e7303e5b49e7c1e7df2db82d71156ab7d79cfcde2262dd790aef735e7e62a7a540000000076bee4031b495b4e12e491286af7794d53691826585d00f0199731456c0b60c3703451dd71dc7f882d15ef433d32a2bec54767054a811bacc4eb2f496ce60df iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5080dfc4c2aada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{01C4E2D1-16B6-11EF-9FA2-EA483E0BCDAF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1612 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1612 iexplore.exe 1612 iexplore.exe 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1612 wrote to memory of 3012 1612 iexplore.exe 28 PID 1612 wrote to memory of 3012 1612 iexplore.exe 28 PID 1612 wrote to memory of 3012 1612 iexplore.exe 28 PID 1612 wrote to memory of 3012 1612 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5f96f9ac97f2e516400fd41c15a6069f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1612 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6fcb8e6a0464bd1998717de839bef37
SHA1260f05564816e059c5019d8d69b32f0347bc361a
SHA25613ffb29b04248ba1c996cdff5aa8558ff0e416ef6709a3d409551002056cc0f3
SHA5129d0b26a5434f4ecdc4ef592e0512c0b60233bdd716c51f14f93bbbfadb3c01b13dea2354586b6d2f73b76be764e82f3bc72275011014bbfd7991904c995aae64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55eaf6c48d10b4737641ce56f18dc375d
SHA1ee8d7c6375f1a3c0d217a802b77a7aa1a26c44d9
SHA256c77fb6f54d00fc93b43872494b428795462adb62d6f4ea23e0ad4661bb110790
SHA512927b184c26e085aac5af2352b74b73b52b459274bfcec5a0e9c0d0f7b17daf5ec3e7eb67f1d6262b1b127663f151bcf7da6b5574a8ad2683c74f18b4383ba6fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507c360fb10b3d102488d7094439bc22c
SHA1d2e412e7435e289a16b4c2e7fa0559e3431e481c
SHA25671f1208c47994a0febfd51d6c0312ccb97f774bd6850e4522ce68be21f50ce5c
SHA512dd3355ddcc9cc8fe185eba1cedc24f860cd4f76ed3fc9a69bbe1cdbff21eac0c6e88453cb078d9210aee2bcc2e7dd603212ce386af746af49d0d33645d56a1eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b7a408f866690dd15b4b7746e1a41ed
SHA1660c1150cdcc9bd914fa230fd74b28b6a4293e3a
SHA2565b4041ff62e0ee45f6eca0eb2e66ac66948f96f3d9b2d48446b49def05cb5446
SHA512eec446b3ab42f73cfb5bf5127d6ecc27a17f30ad982d8a297230462ae2633c1326618df38c6503363f3d2833eac38fd349acd19b5947f01a73a2e194060893c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d7a9c6621595d40dca9e4e8fac3da6d
SHA156381085ac56094bd627c0021b63b8e7aeb47a2e
SHA256e3d947a641a074ae64cbc140b9df1919b9b55ac873c622134dd525046999700f
SHA512d0eeccec476c4a3231b9654858ea4b634856cd69d6cb3cd13e8a0c49ed4d97bc6429a25a829261b7c3356f58659b4515878d1e157ff27e45d7b9a799c54b5bfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5081e8b720749ffa8ca5e23ad3bd25761
SHA1b4180ecc20a001f6c961e76c48d6a799d0cfa0e8
SHA25672686d78b3d434568b3f1c81aa75c42149d10bce21d6a3bff603b082be14124f
SHA5126d215fea8528d3bf01d6601a1e833cded2494482420db45758cda2d4db05e491bba348815d2fb9cf9d3d17aea1c9123ef075613031846338f2ea4d8fbecfa68f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589da7a7ca7506bea0ce47fadd3c37335
SHA168883773aef4cddde4a8854e9a2e76daabc35f7c
SHA256ef81eca06d2cbc9558c7e5cbfaa1de1a02c0e7c2bff94b345b4f311e97382965
SHA512f7ff7c1941bc1efbd9e59d366c39ad3061e3b5f9ab7c28ee177c0463e56173cdb19c3108a355ca125992ba7a6de56c178bbfb6a7770c04b60208641231da0b61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a35638060c831e93b23f6b76648dc056
SHA17ffa70d1c5eb848f7ef2281e761ea35c7fbbf771
SHA25659ccd9d59dca958f86207abfd44ae48d3c4370fd84e6654d64a3f23ec5ef2ee8
SHA512a5fbc73f843cf0ce8146b2c2f01747257fd3b87f1055199e8e185eea3a7f94810abcc1a5041dccba4ca01935166975b44e615cc3d0b38aa97f366ea67da942a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562b65bab023f59d2894950d73d4716c2
SHA1e5952cce7632093b8b72c550d9a8e8470b639276
SHA25615012cd1c1efbff4ad1a1586a0c2d5ce6ae34752d35930e587a948d5ac42fe2f
SHA51226efb22e9b46593cc5097c27a1fb7429ed5054e9262c6980835c4e7ffd6df703505f05a400a69dd9023dd9c0770592e2d06b1674a61c45d209b92423ababa509
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5228086247f67e9e3ca87c2e96dc296ef
SHA1f1ce4f78f44f942d2bcd1775b78373b0f2fe2251
SHA256d70043d1d788cc965eb2cc9c29b3dc7df7cbe95bf71629cce8caabce93de22df
SHA512316d0fedb557a50f3d1b21a468c12b9221b92d9b589d15305b4ad0db3ebea1161857046ed749247c018a6d41cdc00828bc99515e9579d654f22e03694e42341a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5606f9e0110ec69db1e4826ab9201cc9c
SHA1696d96133c4f77bddf0fa52abf9c32a2dc09319c
SHA25639d6188220147d252cd710404692c4cd90642cc3238088e2e1f4daa3e7b37abd
SHA5120021361f1845404758d794c74668cebb9c2653f59b25f292868c7a08a8f2dcf7f8363e853eacea743910ef0cfa78f7eaa8135aaa697657384f517305be23787c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56481e2f6809f5f683045ee97861e788a
SHA1cb6a442fdf00a5c5373125d92ae5b5e125ed99da
SHA2560b1c85aa461778b6767ac7872d9d439d005d4eea9e4a4d1d179c200ea999ccf1
SHA5124b32c380c7a661a504f4fc2ef5958fa493b80223ade7d16584e7978c3081d1d7159b09daed3516979ffbb9e5cebdd5ad27479af6a54ea0cf99fe1fcc05cd9064
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5951874c367d002bbe63d8b3547eb94dd
SHA1eb925958b8626c1d9bbdb3c87df7b3297ca0c566
SHA2561d3a5eedf6c025302179875d61fb998b66110af1831b31736b0daec6d0fd9e5a
SHA512b1f7216abb96d8f4d41bcf80ff28131ea577352886e257b454095751ddc9ea984e0f63ce04338e5a731b2fa32f8264a63048d0cc6b16529d93bf984d90438f54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512db3121150487727a483c7a0a6a0723
SHA139232c0245e0adcdc4418c8e44478a2fc20c45f3
SHA2567ce725713caa309b148fccc042e4bd81c1fda4143204cc5ec61a0f170f66a015
SHA5128a965044becb08f2c6b44aae01d755a792470b4a48bdd1be8a24683720ff58121373af457fdc2a5ed6ed8665e60d7cf21c8802ef6389736ead1cee26619c3204
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b4827f8aa0256e5f506f3fe1816f0b3
SHA1a3671e00b3729f7908540c95605a1c3e3bea7d68
SHA25679f106803cdb38b5313270009f122cf518b7eeb737e6e81ecd2f83704aec3977
SHA512d04dc663e4f96d44b49539cfb8b3ab81588d80f87e8dadb0efc1a30fc30d8cb6a712bf103f0ecf04083e81b8ef3f69c83c887af5653a76dce2a42e893ccad9ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50172526ea18172979143d64d0256516a
SHA18b2084adf855741d1985826539961a5dfe0511d5
SHA2568e292dcb3ffdbe2eccb5e3ab553dfb05face9aea3c5039c88677fea78e7cde21
SHA512e9689868e6820191f4b44755e3897012387b6e894b4a0ab976601b0306e2565a1f4fb448b65ac2bbb75fc1d1825776b24f045a7ae02a57e5f8157ef339133db1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53added0446e7420f1d4714dc95580ffb
SHA122b82306a0ac0c826a3ffca740e34ecbb0c283b9
SHA2562f1c098da2569dea5c02459c1c693d8a444612be91b7c978479c03a0b75737b2
SHA512e887dd434a2cd323eca62e649ccf9d1e62a881176ec5058413ae9d1730b04be6fc0aab2ea645ea7725255ecdf5fb83fe978a1cb8e5f7708581d48b52b42b0db2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b38d12b21aa833c0f65ba5c755b8e03
SHA1e8c1ef4eec6ab144fa9c40fa94413301213fa5e2
SHA256a5ad431afc3061cb83b9e7e1ca2af9638f9f968085e43301f84aee23440631a8
SHA5120a75d5a09c26d91e594299cc56c5b2a1fd58b5120573aee75f3fd78d414ddda97f0cd810883a2e6e82f99ddf106cb747839c271402b15bf248e0d55647c3be0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d84f651ddb57fc9f4efe11c59800e11d
SHA1c9e7463b78dd6948d679bd06b67e1451009d3163
SHA25606fa4ce82fa8ce67facec166c612f1b39bd27730e42158cb92710756b1d6d834
SHA512a66c316ec915bbd21a37930654c627d917cd4b12f7fb97e678c55bee9bf679e3a256981454f3223fecbc5feedf3472e2a56907956e75482f9ad0329781849e86
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a