Analysis
-
max time kernel
119s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 15:33
Static task
static1
Behavioral task
behavioral1
Sample
5fd55f95fd7430f33da7c1cea6d0f649_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5fd55f95fd7430f33da7c1cea6d0f649_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5fd55f95fd7430f33da7c1cea6d0f649_JaffaCakes118.html
-
Size
348B
-
MD5
5fd55f95fd7430f33da7c1cea6d0f649
-
SHA1
0666bf724aa901799c47bce10fcb3b85cd7c6b5e
-
SHA256
4b28518feff51d5054b0cddd83d8cca9f671f9eb46ea74d036db9a4a24b6e7c3
-
SHA512
47848494b76b58e988968d2063bf990c33e0e36f46bfcc544047efd1177ec9e7ca35ca4482906537e4ba93ac4648c0592769237eebac31039b96c4e88a2904c9
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3EAE4B71-16BE-11EF-8B04-EAF6CDD7B231} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000002a4970be16e30db1000435e4ce7225d4cb5bb932ac274c7c13935e86a6724f88000000000e800000000200002000000045d7164bb248f901ca0633a7aa5d4f517b744e0d27cd77a20825ef255274fd1a200000005f57b5b48496d3d72fd4e8a6c9c1df918499e402dc1d60de56b54d5651fd18e5400000006c54d38c834ab01b67119c58d00a9a4a70257ce6d6424b5c4a335116388a098b5991f63eb27c04f7f07c6753cddd144b4bab7c7140e6f648b07f70acf09dce9e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30255c01cbaada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422381049" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2368 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2368 iexplore.exe 2368 iexplore.exe 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2424 2368 iexplore.exe 28 PID 2368 wrote to memory of 2424 2368 iexplore.exe 28 PID 2368 wrote to memory of 2424 2368 iexplore.exe 28 PID 2368 wrote to memory of 2424 2368 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5fd55f95fd7430f33da7c1cea6d0f649_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2368 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2424
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d165a043f587aa437ce1023a2eb53bf9
SHA1a608ac2c50ac03cce73fb580952c9b3266fe8dfa
SHA256a02bcf65114b3447da44431a9c28a2d204f4aee40f490f9b5bf1018c5e2ca9fb
SHA5121eeb6a54eabb1643d5868a697eded5a5bc53cfd738468dc6f14beef83693d0d99d6b08665f8ea724945cb4c088a55d95bd73cf2ef91385f11325c08691fdb04e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554d18891d3fb8963005754a5fae1d179
SHA10a34118f9f3153f7dcbac012eac2b5302dd10169
SHA256415fa8e769eeff53de761cf0b074855bd90ea41c9218a7ef86f1981e2d825f48
SHA51291fc138548314b13253953c1f9f1469d7a7f365037410f09e8866810402d2b7901f42b4c23746d00d69afe56fad7dd35db5e9291972b60eb251342c55d6b4861
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb50c74b81c2fc0451bb0a8678cc29a1
SHA1f157a7d2b6ef10254969a531092b99fa65f6167b
SHA256a454a00e835e73fed9b9b4352dc55b7af69af2cf7a34bc689432999ea637d953
SHA512fecb74f846b1764f7db3ecc9f22a0a8361b549cbf2f0da010ccb7e1c852145adafaff212915960ffb55f6243f2abf841f6c8aecd98fea3df1e877ff112293837
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f29db97eca5cb186768b5ca27aa271db
SHA10562b9231047cfc6e51ef9fa8a3297838402d97c
SHA256bd6aa746f469e6bbff749f6197570fd0f6a75b0203b6a470a4a4250ec41192ce
SHA5123a0c3492c8ee58f38937478a86a8691b3cb15e61a0e3343df884a894725952f950e1102d3a5f105086812e4ee28b3f4bd7763438f06b6c4ec03a30a899d10507
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524b5908d44260e88f41e7297cfcb775e
SHA1e21aeb7e17d50ba10e554a939b1e225c7e83509a
SHA256be6118fc4748c86148363536895a4b116c1e41008cd9670f2812088bd801a6cc
SHA5122121c350cab04492afc0a88960288b6e02fc71e16957dead0e3c739f571869007a85f005983ee1d181416e6c5b96e971ec042011eef41920f64ac8bbd916f2eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4552311179c1ae4f6723c083a658dc9
SHA11925e9005d1a7fc8e5cb1b2524e56abd22cc1b66
SHA256e21925a1727a7ed675bef977a85cdcd9589d4d8552c69b796929f9d40d332855
SHA512e6746fafbf214a65ab5a859359363f2379f158cc55d8f114f9961662414333373a07845c436d753c5f46030046c969131a58616ae368d93976ef9268093d8fb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc741b34f77dd637c94dd5299426b0f7
SHA18ad53ceb055fb55745043be8b9a1b1a1af43d7f2
SHA256d1bf4a3ce043fd87c2760269b148caf14dab258db4aa64eacaac202bdfaebc15
SHA512953a4b50356dfe0c6ae6e470e324ba5cc53afbd968a853d98220c4dee91d698b30cd746a7610dde5088a587c49448697ca58a499b3cdb0d3cfe2c8ea1a466736
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e3e536b3705dbfd5ac71f6f0c16baf7
SHA1c892972cc6a516643aaf511ac5ce2c658ce6d2c1
SHA25667e407019e71a9cd79069b76229ff70aa5e7630d986161a17ed5740ff9ea67fd
SHA512f8fe48128d622b4fb4d370dfaea3d73400d8872219b6ad276f3a8aa7305fd4e1451678b347ed7023bc3d52b5e2ad6d5c8e97e47592d90de29f2d9d8c563373ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6423195f5eb5ade9c3421724bd7c7fc
SHA16ee1108489e8d5dd9110d346a99256d8ad17df94
SHA256f6613919bcb6832e9cb7fcb286934b09722de213c0ef220b8bea18b28b744da7
SHA512e3e1ea3d39ce847983a3e87acacf642a164074d37d3e6bce8d4201d352a56eeaeb37be1268f327ade4e431b5da71e567f0c9ae94d65a1002857b0eb6017f9be8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ca0e70415c25c0abf9e92f011e8981e
SHA1d62a91aa43ffffde8b4b9b2e6ce002c3228a2147
SHA256c5109109b1f7150cd6ae38a267d35e1c49f9d0c9d69e438f3132c1d63b2e6539
SHA512e44c4ea029e8142355692a73ef302abdb8eacf16609d9899c241d1d39abc56cd688b5c78d418092ecfc73fd6cda2bb2c0ec5b97ac847dae1512749835f20fa5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ba25f06d7bc76917a8a641be9d7f2bf
SHA193d379da3e8489281e863e00073c9db88b88ffce
SHA256ad48c1ea26412e0b4223d1ead20f228cd820bb8a58264bdea2a8572e7f123f1e
SHA512a50c5205b3b2d6da8db3051be30e16c3344268241acc4a59872b81b4da41821c41a0304088938e29f5c864a8900acbca737c759ada86c441c45cd65807876c83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f525a3cda5c5156b61cad15ba153e6bd
SHA17f0bc343608535c2d28daa094d2dda9313a1a210
SHA2568fc8ac015ec5dd7a69bde9fd449475c38521ee3073ab19b3368ca6e4ddf5a39b
SHA512a486fd5e8f2877e43273137779762285766f83cd2e21209499bcd594a6e35179a5b068b40aa41052513563bb29c0ab04ff3e601e7a272be285da82be8d256cbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5feddaa244c1b174db9c1930d851366dc
SHA1119bce3dca9b64a2ab8c53d9decbd2a0f9b66c1d
SHA25636211267c83927c5d373ebe77d4758ba767c5111c2eb428d721740a2b289e514
SHA51296051a0c8fd4705078e54dfbae9760eee81032b22f3ce5b971ab2e6114d92d7f79b35e86d99ef0665351fc53b49c3f02a451722566945b5dedb87805e5996fa7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c29736554a7252656513d7d560af1a93
SHA199ba937cecb46ada275a2a66741fa6fafe8a2e36
SHA2562e9628a57b18e00e1faaef960be12d006fa3abd2dfed7883bbadac45b3876c71
SHA5127dd14735741adaa2ec0d17461f6241f7f6055158a8e01f090334e24f0604b1d0300cc6576bc36c711f70a4921893ce857d251a5b9223004c1d5a19bb128cfdf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9c1bd74e87a7ebac1997081c910b7d9
SHA19582b53c724068c633795fcf6b266fb9ebe220fe
SHA25656aef84ec35a30fd03e6f9d69e276af7091ebb5fe9860197f89457f0b67d97ab
SHA512f3e166830c2f7e0658c0e83e10997e69aaabd99572b20a0a3543afe4704125e374290a3733359500231d15f14cd4716d7cb7c44c32bc45db170ca9e74b704153
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b69d5670a7f0646c5a65e82e28a8e86
SHA1ed4c8a71b3f20e3ae130efd00fad7da83e8d23a7
SHA25678ba635040974f65c269e78f488fc1d1c8edabbcaf71ca811b7da9e8bff7320d
SHA5128b0d50de8800e51e6ce00e868186306d72c2dff2e7ff4881e255417b835405e4f6738758e0061fc15df1be1d6cb318f27137f461fba97081a517524d84c641d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568733fded08bb1f860018837a9e632ef
SHA1caec5aa0cc9b41397219a5edb96e30bb2b54786d
SHA2563bd7bb7136052235e19c5c713d9fd2a00882869b370a06dfadc066316073fbf1
SHA51270c31dcf7b0713e4548569f3d71e3c9e7b20989c07d3971eb16b0ad5398dd7b1cf1bf35f5c6bb16de2eadfafb216146ae0e413bb0107f606a2fe1aad647990fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504476d8fe74806baff6e5957a809808f
SHA1fb36623ea637d23a9bccb613b49df0c825f35906
SHA2565463897348a57f1dbc563f2c54df4e51e687d7d7709677f6f65ca94f143db27d
SHA512f512539609818f2092a95e97d1fb00ae4a52be2130cfaca17e56b211b5c49857ee502c68eb6ad314b168a0b23b7efb0b3eba2bb40bfb9eea547ce7619a67eed4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df85a19456656a8978dac5f7c01a72e0
SHA1c7990b0ca3970407d2b1388294ea377d45c58c61
SHA256a6057f66e1688fa2ba4a7dd8eab5971dc24d001228064fe8384c4786d2abd76a
SHA5123274d14781ca053280bf6609ce5ec4eff7e7f44ad5ee4a29f41fac3a6f3c3acff3fe9f4a0e077a88fe40b978a1c832fdc87fa5d7ed92e00f33028a3a946de6dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5facc5c50c2c0d5b854d924e3cb2d53d0
SHA1d99368bc97b6f16351ba737d27556a9ab8609a8f
SHA2560a83425b8e3e41b701c284707d5844e4ec4e879c2dfc93b1c9f5103b5face693
SHA5129537a3974cc916d1dd320b538b5ce4626a49f6ef0d5b7db4ba3d19abffb9fe894ced40c17e1077dde0b233a9057a1ea16d13955f91db9832294941b678d68970
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a