Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 15:41
Static task
static1
Behavioral task
behavioral1
Sample
5fdef0ad45e6f3f692f68ac1962298c0_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5fdef0ad45e6f3f692f68ac1962298c0_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5fdef0ad45e6f3f692f68ac1962298c0_JaffaCakes118.html
-
Size
70KB
-
MD5
5fdef0ad45e6f3f692f68ac1962298c0
-
SHA1
f41387df7ef541ce92aea0019a43eccd89c573af
-
SHA256
4bba5ea3779d930c9368c3fc74764c2e98e6bb8e5e22eb638b6be91397f06885
-
SHA512
5ab6da73b09aa2c13e2bf1e30dc7f32165be2ffb1ee800a591cb2370e006589938406a137ccce142d7aa158f6dc23ff592cd7e0e6cb7cd180aaf0a9824c2abd9
-
SSDEEP
768:JiXgcMiR3sI2PDDnX0g6sZ6/urGrHoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFf:JTxCUTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{65B99B11-16BF-11EF-91CF-DEECE6B0C1A4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422381544" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000b4e0474054f4dfc4123d0ee30b4d7e35c48fa5df7965f1111df65058f1d8f718000000000e8000000002000020000000712211be96d39f14a55497ffb4f62eb2c4042a3bb1c64c5ba95d33addda61de920000000000f2f006eb0f191fd61743484d62c5d0e22f6ca42ac8f40cb1ee725aa2f88a140000000fe9c6e4a0229724771c2b02899f71a79b773b757110e8551dac8813f267990f267ed2e45e1bad43c943833495ccb105f16c482ec04ef17ee68d783019703ac07 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30d67a3accaada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1424 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1424 iexplore.exe 1424 iexplore.exe 2020 IEXPLORE.EXE 2020 IEXPLORE.EXE 2020 IEXPLORE.EXE 2020 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1424 wrote to memory of 2020 1424 iexplore.exe 28 PID 1424 wrote to memory of 2020 1424 iexplore.exe 28 PID 1424 wrote to memory of 2020 1424 iexplore.exe 28 PID 1424 wrote to memory of 2020 1424 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5fdef0ad45e6f3f692f68ac1962298c0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1424 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500eadb2c4e528a52a2e9907d2e24797e
SHA1926f35310868fe1c902260baa4d2ce12e8becc1c
SHA25660a3507b8b4baabe342227ee8eafe9d52dca2d3a0be50daa84eb2a5d26772f54
SHA51206a09bc29aff5ab7a05a08196aa54c2eef241634099adb99c710b6bd6304c03caf34b198da535adc4b8482376bba584219c0c3ac5ada83c9fec287c23beacedc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7d2aa1c6010569edff162d22ebf4885
SHA1347d173f5269b265a95a1f26c236409efee283f7
SHA25671fa3bb27732d0bbe7085047e4428ffd8f2a25acfd103eb4e12fa122fde3204f
SHA512364fe49c13ffa6864b070f4136d7ce8c06a6f8332e76047f174ba58ac2bf806500e9a17bf5e1e1214e2ab5a8358cb0434cf6c2c2544da7e4cde2d949db129dce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535469c69e857b8062157d6f8d79b3db7
SHA1ea5406ba7d9c711e9325960d15dbd8d6422f39fd
SHA2561f35f26c46ae20129871f4332aedde89966bf0fa2b88ec2cf08c5452e66ad7f1
SHA512494effa072c4b5cb955f157966f5cfd3c1e2dbf2bad62bc018b9cbddba715b87206eed77cc979edb5220e5a30a7a9622b743a6635c649383621d83bffa128161
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5419798338abe56fd0c8383a424b954da
SHA142e4930b0b133688e7694edfae7b81ebd33a5381
SHA256b247a2087dbc322cbd0260600adbe845fd897804ccd129041b0e87c68c3a631f
SHA51224c6142a10cbdde3ecd6c5bcc74eee9f6552da6e251652a1d6fa705f2ec4bf965bea243328e95827cea57511f0e235f99087019b89e1e730d590a899ac7f13b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547d271ca29181409e32468aad14d6950
SHA1ab5ec72f51204dfd0daf42fe366e840edb8268dc
SHA2568c16a359f2197571f77ef8fdf665a8675a78762719b73e327c0e682a29062aa0
SHA5127022252ca435b54dd4dfc93ec14cb4e7137595baf5881b9d6349db7818ad9cb8797199092b431bcf766c827fa25a2ccd53dd0609a6027229df79eb83d1792c7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f83d4ad95e6bb081d1d58ac1bf21bfd
SHA1c9c3a51a84d68e48846bbcf56be914fd3b1786a6
SHA256607805409f0fa23de0c90bef10be50dd9e30281ab313ae2934069fa10599841e
SHA5126a434eb8556a2f07f727dedf1e46dfbffcd18699ea6dd0405b4a45d5e98b1f0607503999e818a57836187e7e41ed1092ef8ab9119b71cd3928be8c5c6bc3dab1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3cc506c430dad872522374e0aa28be9
SHA1d341a4511c179cbc3b813769084c5cc7b22b3c00
SHA256f087a5c25cb55b33ce533a04ac5b077d90d6431f2e219ab2e0a190b10840979e
SHA512ba59a766e28da83ddfa16ae2cd3868ec5c0742aa075b6c0d146aee55286ab88524a0d0a7b017ac3cdae873d00e39f402e24f065c4a7acb685122cda4c13d4c0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5655193c7997d0053518ea0f30e2829df
SHA1142e02df1989b02f69dddf6a26aa4357bb001537
SHA25615828652250a87e0a27b18637ec6b2ae6d4af18210daaf8872d20f48a982f131
SHA5127ad35f6eea54c385486af45bcaeb3cb6f608d604243b2e9dcd7f48ff7969a6c274eaf43fcf61ca477dc1aba3ef0d80c051a454dfe10817ae88be2a71576652f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544eb1700ee738a8411ffe85ca475db67
SHA1d9a924c9382c7f500be25323799ab6bce3362c02
SHA256f158ff683796aac1b809f82bb645d1d49193ca86e47adf05b5c5488d7059b926
SHA512a194176514c874b3499c6d0f35a4bc2a4900a3c29141eba3616426c216ecda2ba1630428863c8de9c2c8f9c8db433fd087d758d94894b45cd30ac8d4a60fb88a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51cd837c6a48c593c570f7bae42db291d
SHA12e80524b2b71590c8e544b4dc794691e6da000b4
SHA256a10119aeae68523c4c2747caa31a937c52f23f4b5be56f8f684e20a15729b490
SHA5121068eb6e25d47d2f6df58b9f985551240855e3a98e7b2f55c4ba15dde5fbe2fb21e9ed22b31df2beef26e22f87017df0d8c3ab35cdd4070f62ad450e21f8ed89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504c98c74588d5572d5d6f1a2473fbe1f
SHA1599347818bd6b69d5a6eb063d1c26de037c57aba
SHA2564a1398734f1701be0850302aa972daeaa720fa44fdba1785136d33ed6b21a6bc
SHA5120ee72582b1689627505a8d12bf4fa1e48d2faf1ec9a2e316f2f453cbfd9607afc3ee6685014169978f2b8d244a8d296dbc0886a882f5f65893447bbc8f21a613
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528f0c372f0aa987215d763ba07065494
SHA17050c93e56f5db1ec3717291fd95a66ab36d5eb9
SHA2565b1ccb3d085805977840409c570839b2eff355797638c3abe1acadfcdd97bb6d
SHA5128f3494032a16f9c58eb6aeccffbbbe012f29acac15f0e5951cb05a1b28a2ccd3fd65e429a05a2b930c9417b654c721907c40ea9ef50be72a699b0f7b2bfabaaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e283523e9ac6421017f534c2782fa90d
SHA141c1293da8d6308afb88d02ce2706947b6e46790
SHA256bdba9d350d7df3f24dc0caaa13406cf7c4ca14241181d8ca7b2ccc8ddce9f5b0
SHA512f65704593cde0143ecf1764f090579030e8fd1469a404c4eaa001802c4070d98dc65d4f794ec896306b8e102463733f7843e99d4e24ed53f79639509c01fcb5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a284ac44c9d65cf62dea5b755630fa76
SHA198335383fe4ce20e639b065d1a18aa5fc2a9c06c
SHA256a0f31bd72bbaeb02904f91c25e498bf50a082a1b3288a8ab9e15390043cc8e53
SHA5120f5ee0778e550e218dbe29544412ddbcacadc80d7c0673ec50e66fd517a113c5517d6e504596fb1bf1fa0d3c221ce4e9596c133954fb5032a5f97fd7b109a645
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d56dac55d739f66d0c9e5551e6db15f3
SHA118bb0a26264b6da70fe28137a9b5d08459750d61
SHA25674476ee55f8f73442699fcfb9bee915a52e596cfcb86397f46eba1a5e6826647
SHA512f0c95407ebc92ba20cd72c22de477573eb37ee4520ad708a6a623b95f68dbcf8563679982b4c3b10d29f7f0b0f55c4a4fefaa7661e30efb3e31a2c77c353011c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551181ae19e31965bdba2ef968de3d315
SHA1cd3eaa2af414445e6a7488d3249b3ffdb0e7ac3c
SHA256dca23b1c60e42bd5222c7fcf642620116b4f5aeb08c77a26682abd03e36255bb
SHA512aca6ba34d7652457caa77eca4d9acf6019f30b003efb925a1cc6333c3d65996f170ab9d63ad6f15e5bd0f1b812ab1e07e791b00065d3fee197a4e5aef6199691
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50afae0f4d7e2d9c4e0097e10de91d6a5
SHA1bbe5d29653d234fac00efd10703c4be0725ea89e
SHA25624dd824297611f96512f555a47a915f29ed34118fb8662b9a03ff51ba98710e4
SHA5122d2735f6e13e89e90e4d0f1f26b7ff0d5c38e46f4c83c076b4a75467d2139bf7180a2ce10dc33d47bcec2329abdb1da78bc1a78ae7460166f35c2999f6a7ea8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0eedf76f15f356e82e42bd59c9b3fbc
SHA1082af043f498c65289b08cfd362a098978649f72
SHA25618d5e639c4baa1cc5823acc12e83d17baddcb2b9fba92d60d404b62feca0e007
SHA512739b9af47ecdfff76c22e7b8cb7bfbe6c042cef8410c01390fdeb7cd1106ded13eb05890d5fd7259fab50e4d72583706926149662c0006c3b5de67d3d183540e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bcb05d6f23d15e88ee83612df2632141
SHA116d2e5bab4b9cfddbab605d68ba9d4df319efb27
SHA256fe4cccc5f78f104aed1e1f62536ae0cc153197ca63ab4d8d1e5c7995be1f97f8
SHA51230678ec62c17b45f07fa655e069c9eed8eea0d5a4a08b0489c3d3f30c3b764c25ef4c74d1af6ecb490dd19f47cd3999c591f6a0c8cc0a8b9dc78c876d1b27d59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ab8f2d0a402f7544c9f43c4bbedb9da
SHA1765e2eeea14573935aa9b9623325107dbf425707
SHA2561a294250d62156e8281d15ee8a60f1d76a413a4079736273a328b2e9fc506357
SHA512cf3a1b9a229da28b85cbbe9f59672716f4c8978108939424c2c543f9f73caad08167f4d3fe90c2c9e0d731aeae34dde02c892c87e9702c2df0e1312e5868f583
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a