Analysis
-
max time kernel
133s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 15:20
Static task
static1
Behavioral task
behavioral1
Sample
5fc954f0740d848ec3727a073a9d609d_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
5fc954f0740d848ec3727a073a9d609d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5fc954f0740d848ec3727a073a9d609d_JaffaCakes118.html
-
Size
460KB
-
MD5
5fc954f0740d848ec3727a073a9d609d
-
SHA1
86b6a546ff2687093206ad404e11bbe8793022e1
-
SHA256
811ed3a698cce0f53aeec514f3b7f1182ef638f63afc384708e990f2414d64e9
-
SHA512
6aa95e6bf7688c35b916dfd914ca5b03115323c28955c460b083ca6e17fd98ade4ac638750c0dfae27f44d2b5d9b38af523b86c183c9d83602bf0984ef5dc165
-
SSDEEP
6144:SfsMYod+X3oI+YspQysMYod+X3oI+YUsMYod+X3oI+YLsMYod+X3oI+YQ:45d+X3u75d+X3w5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000bb2e27b0836c608d1cb3ac5f16c2c4fff5df3f2db602f807ba5a19594bfe01bb000000000e8000000002000020000000d20f6035572a01a47583b9c170ed00ceffc1d81d6a5dbe2b6e570102940ea16220000000ed0feec242c3ff1607ea0875076271fb81a8cc5d373126a7620c037ee68e7bf04000000035c2080cdc61c3c01de47a6196deeaf685de23d63125b74c1050d7668317c86093eba841c86bc6d0c8a98672acbdc76480bd4c4544e3851a954f5d8620118a1b iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422380284" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{76299CA1-16BC-11EF-BB79-CEAF39A3A1A9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6047c34ec9aada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2164 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2164 iexplore.exe 2164 iexplore.exe 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2092 2164 iexplore.exe 28 PID 2164 wrote to memory of 2092 2164 iexplore.exe 28 PID 2164 wrote to memory of 2092 2164 iexplore.exe 28 PID 2164 wrote to memory of 2092 2164 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5fc954f0740d848ec3727a073a9d609d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2164 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510d8a2b3ee4ea0ffdeed14f99ea6e2c4
SHA1a4b406401e6851751987271f7924256667ea4d7f
SHA25601b86f605d73290da3f7dc1aafc996d2f7001903bcdc86674f4983d09a6628e3
SHA51294bbbc9b1151e5f886cfb5f43564b314fb1205dd1a2ba541d7ffafa2f598ea22ef571aceba9b3311f72888a33c947ce3183b6dc14592f39a6e9ce041556cb2f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517bea2ff5ef53255c4ea079ca9a60ca4
SHA1b3b5a89a9722295600ca21c22e9a0b1ff1aea667
SHA25630b2c56967fa9c204f08d3dfc263243f719ef331033482e327064f17f8e0deb6
SHA51232f14e1af74dec3985e63c84ceeb6dff973475ec8b8e105aa12cf3a722d40a2c3ea7bf686b487f5abf7d54da8cb359ebc1e0f7e2417cec9121c68d87e81cc541
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a0f0d01d8dbc33a36708c0fffaa7e2b
SHA1ed6835f07a77ca2f98930901c2e3afdbaa702092
SHA256b427e98c78d9bb828e030b8a9971c69fe069cb25615246ffc017050fe9113886
SHA51231571c2fd056582d1bc667530d8648889ec60253f862783f6bb605de609aada976f78a85d53b451989d6010827503fe4c8e7a219eb3243d0085ac649ca89f170
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583116f9b99f3d3c50c2f5355a35c351f
SHA10b49b1d9dcb77e3f302e9852e162e1e14b5f5cc0
SHA25678f92dd2ae728cca5d94013948ad53453ff0b269b45020846af1c5673a0f8faa
SHA51207515232ce18dc37ec520ecccdbddb383a6071fd6f09c5f01e585ae3e84546671369e038c6f071d41ad97c0086efeac438e364c444b707a703ff0677383b5a76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc5fdc7fda17c1e90bb032afab682ccc
SHA153089bbd59dfead13a2ab70fc116d45644ac78d6
SHA256dd6e1af7b995296a3441d1a8ac85b0ffc1167683c28f888ce640c4613bb6cdb2
SHA512a53d9c38b0538a5d1c7274a55efee36109a18db53a63fb38c60deea878a83720545a14cef264dadeecad431153b40d14028924afd9552b46de2f2b1c12232974
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce0deb1d5d30016d88444ee63b4cc4f3
SHA1c52624909f087891203f266a8dce4dd5c0a6fad8
SHA256d422232b6f869d4cdd898ca1f3a95589c1cb19782131f278ea5456f13b66953d
SHA512bcde8efd51fbc82b46d8c254912d9d2a34944f96e639986ae72987b16ea3f43e2c7c43489cc15667d4c1678d052d50d3207b6cc724b0e7498937a44d347b135c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53011931834969e258745fb9a16d117c2
SHA135aee643e77e32271bfa257c5847f85c99aa2f22
SHA25627b68c8bca966cd5de2fa0e2c28031ba907f7d50ddb24d0ce45567b8204a9709
SHA512923abde98118821bea266fefc577ae9d5ee6406329eab17171eea4b4d1dd74f2454e3b16378580aacedf99f4fa1cfdbc8a6824776c95847f85eba992fec5cdbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a7bb6373667507a8564185f722cb958
SHA1f2f8fe0b8bdf68e9db565ac01ff7564273b1b605
SHA256d6386ab6a1db00a4b18c6fabdf09c36e34f41a979e79f0e1551be02d0337cae5
SHA512699caf7e16783800386e51d78deffa2afd98138d51193ef06ddba88a74ebb9354e3374659a3cc5f765e7757bbe1aa81756a80ec44a15d472be17b77fa6704158
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fdc8942b63ba10c28bfa38a2cad231b2
SHA1cdaad34dbdfac41bc20c190acde72652d6ca024a
SHA2564b0a28e8c8ff0301d88bb9c4e561ea6afda788592822ab26949f8649d8a87a50
SHA512bacc27cdc20fc18487aa11f7bc98b3a875ca45a299f9b1e6b4756fbbe9f82a678ee6fc84b22aca00337ff542fce37d0fc2e96cfd302983698f8e4820a73f266f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549ca4088813e1529b34dd0165ac31e3a
SHA13117694db16a4aa3b947f4af0b1413f771809d99
SHA256dcb6ebcc7d5f991fb62d00f8811ccb11254020fbd39b8c618c2b236ea81fc938
SHA51277c4b887002d68db3713be1047fd4ee55bb4e6b41dafa7dc255cd879ea7e429b5da20dbf9f3e343bc7c1a7188aa05a122447813a325cf933c65882f7a2e2845c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e3e0cf6880ef08668baf738dcc9b44b
SHA11bda004846c72ca5b029e15ed53e5b61c213967a
SHA256871e6224947f7f34bd4358519f0e2795d8c8afb0d963bd8a262856b7afc02569
SHA5126dfcd37ee888242c36664851b0c2135a245eb80214320adb1fc418bf182b3dfe9d30e3b65bd61326e29750f42ba934e20f0c25142159d5fe7d4938b791e9771a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e08db7197adf9ca90330c243887b37c4
SHA1ea2c1a22932c0f1708437bb43f77cb0cf89f9e20
SHA256edbc85c9e4c1c57cc91586f59c719b33766eeb2b91a6bd995d20ac7390ea059a
SHA512788db5f73c8344c9893f8f0ae487d866f06c9061a68efd79f212a1a0915d89e11600521ba3f59cfa2cfa89598ccf604c7376e63b793240737dc498bab2bf0fbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5631f93c901959d9f769877f06f2aa751
SHA1a5215ae546bbe2dadc773dd2e79cc7c6f83fa4f6
SHA2562833db37e5f746b5e6a6b6bd29130ba49f5d1cf59128de42f93741c1accab4fa
SHA5125b5b9468cf4a737abfd8f0451549d82900603c42c1a8378a0107073030feec93c2c0f14cc2cd81ffb440419b0bca9a436082d337d1acf77da4c551da6f745671
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546d4cf27d17fb743ef1554952eee1734
SHA192058275efe0e7afc829173e9026707b4029acdb
SHA2565f4a87eafb73f0b4c01d244b31898f50eb37501236e895d470737fe980ffffab
SHA512a2a2b2edebbb72d2330a8518c2f486b144330d6fd0111588bc375a87e55718980c77a4ada6827d1247d5b92f5156a29573e43cb1320a313aadcde2e2fde07269
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa1c61b32343324660ae25e32b5e12d6
SHA197b2547b1403cd0a4c312516886f680686bc6232
SHA2562039f7344f62948ca02a53556f0a2a29e2eb88ea02cf7e942d5d5105deb357e6
SHA512dc4a6787766306daf00c6bafa61b525f2668160e5cb5ecb90d8a71bd3271a17e5b36ab57fe3fc5069986a8e9973fc258ac1bd810210538b136ff5d1bddcf8856
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb709cd28a24d280092e97f10f205514
SHA19ef9695bc13b27b73c0f2dd0db16e15d76022890
SHA256b82808c2ea15469ad42c8f7905607b737f93d88baad8ba2cdb85b7556a1a478c
SHA512bd0515e6056f2b6661ef9d8b89a1e25176aa76f41c481b32997b4f97b571d7a6abce4cd9f485224b5d98bdbf85380074df6a45c3d671d8dedd427200866d2f8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a2ebf41bebc9d3743aaa495b7a6cc14
SHA1e6bba46a2da43f907abbe9d853aaa8a1841d5612
SHA2562e46edf1fafcc2dde0b23a5c1fc9c4d324f7a595fe25fff0eb050fb6b7a2e933
SHA51216deec7fd2e3d56c659c7ecfb28cdbfbdaa5a91b77c032cc73825d3af518d4841b16628d59b91593438fc315f69979b5b30929e39361ef1e0af9fb5e5ea43321
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56cb85e81674ced07a11793f3268e0b19
SHA1d8021808d3e2c613d47777157aef282b8217ab41
SHA256c8f64b7fa230a22172fdb058e19e4614ec538152455c45fdc135dc4e50e6f2c9
SHA512c5d671c7e47f17fa402992062b157cc5c085ddf5741a3fcde5531b2c92c3631fef887a0e200acfa2ff3432e28822bff183e04b7aec34f1784efdbd16e0029c7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57476fa94b18f863f19465e69fdda4c87
SHA1ea6b10bf63d78e6ba7c1891ed909a148cc3e6630
SHA2565ced9ed463d36b76fd276a12cdce8348a63f740d8fb4d1ae941aa0a1deb736ec
SHA512e5a42be50440d430d5e6f9132c2de5a5e5cb5088b7f7a41fabc6f0245e195eb79c1df6198ab65ad71e0ace9d5b9a3bf62087d0946bd55b769f82cbd64207642d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58117b52303c92396f350825cd7058900
SHA194832833b0aba203c4e19150c61c46e7db082457
SHA256feb198471c7657e24ce12c190bce57ba8ad8b70dec037f135117ee050c6b2132
SHA512ae903f1fded6b1a915339645d2b2eb0889123dfa15d909d5f95a41f6f0d8281958ce5facb21a6fbc8f876972365cbb4e800494f7a2ac6ea1b33514f9066fd4aa
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a