Analysis
-
max time kernel
132s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 22:50
Static task
static1
Behavioral task
behavioral1
Sample
650fe552825f3a69f1a8dc9fc8329500_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
650fe552825f3a69f1a8dc9fc8329500_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
650fe552825f3a69f1a8dc9fc8329500_JaffaCakes118.html
-
Size
6KB
-
MD5
650fe552825f3a69f1a8dc9fc8329500
-
SHA1
44a63b76df988ca06547c3c2aebccafd1fdce03e
-
SHA256
de3960b42b2cd496887ea0796528e4e302afe1412c4666ff0b671081a438c25c
-
SHA512
984a620a859589c276149386ae66f0e5a3f585e361b3d75a9a8498b86a9679351a15297ccca0f29ebc234fb958a844f84ebbb58e6c2c4a164c10d7dbcc12b48e
-
SSDEEP
192:m9iqZOrjjUL4ogsc1Vgrc0ddZdRdhdudIdvdAdId3adXdCdVdGdLdmd6dndwdldt:KcUEWNy2
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000acd4f3d249213fde78543f9436bcad4770a9765c7e2644b956e3f3f5cea7c3cf000000000e80000000020000200000000877a57c93dbc4866c051aa8d56e335c6faae815e0759a5a820b75c902d755b520000000d9fd611d78d08d5dce83c190855b37099a8a298197807aa260f657a77f57fe8a400000000ceeb1d497f23b6e04d5f1f0dcce89d7de65941deaaa2f3dbd27a19fd61b1062627a8d06b9f588690995cae0078e653ee2c2dc8dcd739450084a7f665c041380 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{77D2F6B1-17C4-11EF-91AC-F2A35BA0AE8D} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10476c4cd1abda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422493673" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1884 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1884 iexplore.exe 1884 iexplore.exe 2416 IEXPLORE.EXE 2416 IEXPLORE.EXE 2416 IEXPLORE.EXE 2416 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1884 wrote to memory of 2416 1884 iexplore.exe 28 PID 1884 wrote to memory of 2416 1884 iexplore.exe 28 PID 1884 wrote to memory of 2416 1884 iexplore.exe 28 PID 1884 wrote to memory of 2416 1884 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\650fe552825f3a69f1a8dc9fc8329500_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1884 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2416
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d59d67d51c0cfa7d427390dd5d957419
SHA116ba083e6ef66fbeb29e9ed24f1f38ac4fffc5da
SHA256d58632597a094b7c3aa4fcab133c4d8ea5c3eaf4209ae84c595700de2ee62788
SHA5124fb39a5e2b7509b2cf2a1627fa22c174b58506605899163f5b2d1455533c6b762fbd14697c72e61c039cb2c835ed949739579c9fe959a8b7d25af03f57324efb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56295a153c834983d2cad3815131a2ca8
SHA1c6f53ffa535b8779517124284c503c1476d604dd
SHA256849d14dc26445160950227481d0756cc83826031f6fcf73486d0592cc17c985b
SHA512e1a3edd6bc44274c6fb18ff8ac5db97fe224b22310a36eaa089223ce5d99fdc7cb98e38c69215437a72b0eff217040cbbf464cacd3a230a2f990cd55dacf729c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5664a9a010f65d80e5906bf1b1d119941
SHA1e94bcf6c0b6dc7cd9b77fd141c873a95683a5edb
SHA256be1a44b8f558a3167e9f77e7cc912f2c8d8f1924e77d2610d6cc1495ffcdba17
SHA512d9822168f5a1faf2f43cd751aae50d4c7d9e6aefb12c3cdd5a34047cb325c2e17fc35f85c16ee50fde74cc7480c1e80fc5e30027bf1a6fd44b07f2e3095db0b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f35b9bc5ef40d166fcac3a78d586c6b
SHA1baa835bee80919894a6caf24efe4b3acbbab9d11
SHA256b0c34ec08487604f4fc377f51076c478dce45a90ca918b427e8cfdd8ae95cfd1
SHA512b00d71396288ba739da431ef516d61c482cd91bd009449c194352083efe195077ae408241efa1817c130a670f59c4a4b5b7a208e2e78442a30c53b2bf30b4348
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e7cf23a040379e92371d17fd9b973dc
SHA1452e7c019f7c3ac32cea772c3d2fcd8ad2060724
SHA2562df6bdae89e81424de600de55fee8dc2c55b06f72cc005b7f51bdc4a6000673c
SHA512f4e6600460984130b1795eeae2afe2c1a656c2905d1cee7005d86efab3bcb5a91b31310101f942d2d2944f3304b957bd231efecae42eff9538606639825fef9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552fc0c2b103fffcf5e670e0b934d01aa
SHA1bd14475b265095ccee6980542d8b09165e0b7213
SHA256ea16a17ebfa2d545e8e3edaf54251d5e41b2e5db541d181770c657bdfba9c376
SHA512545dcf7791c44fdba66e33f4cd6515dbbb202767a4b7718985db9c574b77fd0d1d0a8f3d9e3f6ee893424c048d23054937085441622e1dd8ff90f1c00f5d7478
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5b822f3913c87dbdc126e0037eaf505
SHA1354bbb0a30b3befd394b8dea99db229ddd895dcc
SHA2568bb20d1283f1dcc8b571f9ffd1101e3ac8d57e651259a25ffdb58bf4a0694584
SHA512d7e0b94760b261b5e58774970fe38492f627f23780ec76f6df0dca04ddb3063a7de74801314c897bbb7204a09adf3b6c0ed1cda8ae5f005f62f5d63043702f0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de7e86d5e3c4ab2e19f5f14109be0b57
SHA14fda38a15808b3177388f13263c7248021258c8e
SHA256b8231b48beb7f1739f383d8b4c97821c4592f020da8281540e9df006d4318e47
SHA5129dcfe56a94c77327e75668555f49c4e506317bd95347fb3b0004bdaea6f9708c3bc4290e60e1d7688eaae9b61abbd2298ec3393a08ab226e495f322ce015aacc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb1b4377f90133a52d36e2abfa5e9a78
SHA160efe7a906bf3bc1b8ddb018afbc9b3f60a8c30d
SHA25618cd26ef87ebe7e9b53ff12012961f63b039add108fe5b78d1cbad4fab486025
SHA512b6d5f16e2f12386bbbf48fa036ace79b5a12e03daa8f67041d944e418de89b2ca5423e28ee0f05a28890d3e1d03f7360a572feda87362e630b0cd3f4a9951b35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1775f646b32867530c67732f3b2e46a
SHA196c577e3d42d917012a6cb68b1782020fcd5f1c6
SHA2569500136f3663642a047b2bb1a59db8703564f9bf0797ca68c6c2bb9e468c9592
SHA5129972fced85206356eff9fccc402222f15ebe124d41cfe9847f8177aff1da54532e4e3860a734c7602e0bc89becfdd40dd4b26237f105d729372c416b0e6da0a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552bec148d467c2a015c38bf09df6d71d
SHA11b262956ba3abf10d665901d4a661f6e28c7303c
SHA256f39f9ddad790123f89da3cfa81bb9003150d88085c5a7cfd98116ef4abe2ddc8
SHA51283eb9635711d8e340b599c09b96879955c93490724269c31da038dbd9d8c6078d381e0390ba30c8ded848e0c744a68fe7789eb2bf80884e065ef3fd5f0db75c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee98e420ecb3bbd5863b2a968fb37e2b
SHA1e4010e9ee2480f8203d6763b47c3566ac1e2c7be
SHA256a7f1cfb535b97b0861696abcf8ee2b09c5705b1f28f2fcb4d2b55cfb1cee8a48
SHA5121ef8f9bdeff613a597aad62fd47ad712fa773ea04926397c6fde24ac88ab601672450e4844c4266b9a39453142da697ee5a2470e5285c1894e0a180f985bcd4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5720903985c610e9e5160c0884915aa92
SHA13e207bd6db629fd2a09370fa99bdcb36dad857c2
SHA2564262176a5b6ce2443162a88e540270cb86c97df6780ee4cb3840f710ff92d576
SHA51226cd3741afebf3db7e92f72dd406fa7b27096e64a017a877608e931f6606f9e63ca7c1b8dd30c00a691c56d3a03adccce2f7b030c651a7b5aac023d300b44814
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576e34a21fb8eaf7883b57f4fc8bbbb1f
SHA1cc44d3dbfd3140c2b7fff870d4d9965ef5d4d5fb
SHA25626f80d83a2cb4db7a94717bc0a5aa01806414c1eb3061c995a29fe2c1350212c
SHA512fac2c28a5e0b189fe03edc671790353390c52473fa276600e14323225ae8baa63f93670f5f3a288d9d66429a269a92e71216d57932d50c7724f3742139d82795
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533ae613a2978c45c8a51636453ebfe79
SHA134a7d339f04ab50d6e8adee20e251108f1fe24d3
SHA2564353d1655a4d9cc340946dc060f84dbb428971273bc119c90349677241247132
SHA512c5cd831e933458fe075e97b800b99789f87d64bfd43fe041853a0285dac9bb9436ec13677ef7f8c2fbe26ede586654f674a7bfa7a2468113334b546e0c9973bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b40ff17545fcfe40f548b79bc04d546
SHA1bc3d9607af655e81eb01e525335b695b14593fb3
SHA256e9ec9fda91d005304d115b038cd6b83684d06abf8aa766dc36d3442bbeecc4f5
SHA512fb3e2d441a921370440dce6b0b68663baffc8b05221a37fb6e3aab528a178e7dae2c5b08dddd70adf86674a4a942c60da3a29cb42b03c094a84bd13e68012c29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e279655cf2f8e8042945c6ddc56a5d15
SHA10fd55960a067588e9e57887e59b92303a76e61a0
SHA2567429c4154b809a60969cc27c476af9cebfa44f4934ae66cc21e795f66c4af066
SHA5120716aafb97f2df319409efcb4303ccd4b68401e190ba9e06f76ee2ca5a2030d0ab9851dbbac6d6a988593e8f4b5f57123f6443dafb6a2fdbe7c6d814d78b8bb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568752e3977b22ebec3abe64a236dbd21
SHA1080860af183f446651d1d3b072130c603a5ada78
SHA256ebba58fe43f12fbe14408137760ba2c40af449008f8d4120ac811cb188e6226c
SHA512992be2437f397bcd6f5ab4880f6f199d90af2cb814c141ea5439f011cff3962748d296f96aecc39e659322b799e2a5e55e9c0484069985151f4c873bb048b2ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1f68e5f222c81c14057b4dedde82b23
SHA16e905d8a875e0b38e8b9f6c27139ef7b62ff5b9e
SHA2560a9f46ec7fcccf3b32b619c643e785fcf2ac9125d66e8a84cdcd71c94e749692
SHA512a173a18d5cdb668ee59a065f0c56a08de9bc4daa661c89fa1f5065cc06b88a965b4922d120163b03bc11a5a35291acfd35cb2bfb227a2db57d25c498a73f2a8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597fa4314fd6c419cbd38e191fcd76636
SHA1634bbeb2dbcce568e6630c18752259a85cb08955
SHA2564efc3d0c33cfea2e22a583d156f632eec8ff58cc6debeb6d28b6a6d42950a07a
SHA512f9aded1e6538ea1536b44229c569a55cb371fc708772dc481130b473518a69112c8e67debb9931ced52fc7d2cc7c1d04d8eb7a2430f050f89d5018774f983bec
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a