Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
21/05/2024, 19:08
Static task
static1
Behavioral task
behavioral1
Sample
646e4f4ca4cc70b06db9cb65f4f1a505_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
646e4f4ca4cc70b06db9cb65f4f1a505_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
646e4f4ca4cc70b06db9cb65f4f1a505_JaffaCakes118.html
-
Size
460KB
-
MD5
646e4f4ca4cc70b06db9cb65f4f1a505
-
SHA1
82fa7c8681b7327988fcadf95327a6a31372e4a3
-
SHA256
ac7eed6d050acabb04511e984ee052ebaf5f661037a65cd995abf5165bb3bdb2
-
SHA512
b5250e2941162d0695e8e3bb84fd903a30812ba6824a04ff5283458f1ab562097e123bf6b2ec35e4cd789c6875d891790120479308235f1c8b625bb6c3db7bd0
-
SSDEEP
6144:SYsMYod+X3oI+YOsMYod+X3oI+Y8sMYod+X3oI+YLsMYod+X3oI+YQ:55d+X3+5d+X3M5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 500e2a51b2abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000a94842a28f7313d0ba3f05434daaf147e7bda437e9bac297c738f07b45c2c6b7000000000e8000000002000020000000258cd74499ebe138265688a87d412fa11ef78cecc873d1acabf9de9c14578b3620000000cb1dac39a9e902b388496da00bf320f288d2269de78048141b4de1dc40fb09fe400000004eb3706c2279db458f9ee1d6df2b29ef7d1a0ea4a080812d4b55d0b812b67a1e669260be251e6179f408493697a5943d854c5560530da9bee1dbe95ebbecc012 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422480361" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{78A81211-17A5-11EF-ACD5-DECBF2EBC4E5} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1620 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1620 iexplore.exe 1620 iexplore.exe 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1620 wrote to memory of 2336 1620 iexplore.exe 28 PID 1620 wrote to memory of 2336 1620 iexplore.exe 28 PID 1620 wrote to memory of 2336 1620 iexplore.exe 28 PID 1620 wrote to memory of 2336 1620 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\646e4f4ca4cc70b06db9cb65f4f1a505_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1620 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eaffe6cc16ca75243b2a65514a51fac1
SHA1628ec779559845a8993eaacf3f6a4f951014d391
SHA2568b9464853fcb32dfc15292bdb7b40ef996bc698073d4056799f733f63faa727a
SHA512d1b59165a2250f438aa20c99086a4c905563916a0d0035621babbc7efc4b943bfde7a15c879fce146fab1c5b1aec8b45701bdcaf3423a38d898f3c71e11454f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592abcb68ebac2ae0fa8873217f0b1438
SHA1305f74ced80faee215eaf948a96ee1b5ee20efd3
SHA2560a65270c28214bf50462fb5eb7ca71c75431d40c23b63761df0df345962b01da
SHA512669287d2e544835cd130672df84ae6d68b01f1c2bea6da84c68680fe57a0d84cf2f154de657c4c24e471f651066e5f6df0d4c223b899d5f98ad247204c72f550
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557d9cbb4ea91bba841bb0360035b7088
SHA101315de00ee8493e3ea4319da0e533a2e13eed67
SHA256eb4c5684459c0dc99854a1812b0627298206d15ec171a436eb00999a34abcea7
SHA5126183ac3db6ce727cec52ebf7892fe38bf91a698c072afbb8dbd9a9a1816956377fc1691135d22028f5e34a6ae51167f6d0b530007e946b8ac98ecac9c5e40a11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a4a482834763e1d37a970f3c0251fd4
SHA16ca59e502394d670483c730abdd78bc45c3d83d1
SHA256c4bc8848c7335bbcc55391a82d51ef53e4e32b9237f581f3f379e823d6008b08
SHA512503ca2dd07c6c310d3a30f37b83398cb1192f2d1926f68ddd1c445ce93c28e8a190b6d123761d2b2f3e5306c0411bbbbddec6f087ad2891010895df7b4504b2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5110d8a8f60a3a778685e309fa6447005
SHA1fcbe7170369f4c7e03db2ac4bcdfffed14bd4839
SHA256afe62079f670142165ac038b9b29934de17bb41d52e85ac8b8a97fb07c3b3476
SHA512e6228dc2648052c1f679b44c3b7a43b0cdae52fe10b6f834985916560852a253c1848a2933bd22ac9a07a34e48398f9fc9d6813563f0731d89a0f1fca5dd775b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5e909723734573632fe3eb6c7aa1d00
SHA1715870f56e6f0078777c2be808e3ff686e90b9cd
SHA2567a16c7b05f961f3314712aa32f82bb186548120cba90a284804f1cf23f3fb78c
SHA5127edc64a436ce9a6835950798f39016a80144bf23bd711adfa1db985f044f14e949ae0918da3ddbd182775e61582276d1c89674b93b989dbb73dad979a18f281b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eec46304433409cfdb24cde35402a0f4
SHA1ce56b269648c75efc06b9a953e005b665ff09199
SHA256a1b3907b5093701fc92d626a8f4d0915afcec5af28a60983f09f9f0cb7ae5ffb
SHA512807e15a19c9dfeb6663284fbf612e9dda92f3cce58751bbd8a78f869d8ab25c4f352edea89990a7e4517ddc4eab1d6c384d171ba67694b76b9da3a3200a6f764
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5571a96f08c6e88bcc13c7151d07e4570
SHA174c58f65fd49b4e36e7f0dfe66fbac11367bde85
SHA25617b96df31f96a23dcd4c3296e2ff6b90176c49a7b43285b999f10b75f9d68610
SHA512f0285a23cccf0d644ba18e0822ca795a38eaffb9a2b948db20bc7cfab527834bd502decbe29a54382098cd42a2bfc583163d4b0f582598235fc8810148f80898
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5208734d8af23dbb0b77abfaa0620c041
SHA16d06f410cefe893358e06cb37a19553c6e61f108
SHA2563d0e55527aac74938786166536373b65627bee2417bf29ba7b1f1ceaf5263264
SHA51247f8200f984a33eeeb1d6721e81a41620f20627c5ae3b57db7dfc13b7bf18d3ed34e4f8f9d37e2a2fcb429acfd165933f134194083dcb170cf81df0c7dbf6c3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52dfa25565e9e4540d2fc881674764da9
SHA1218c13753aab59675cafc0bc21eb92350acdf62b
SHA256978c6676096ce295d6e9b8ca0a2e70e9a7f72db0fca847ab2bb19208b7f5bbdc
SHA512d0e897cda1830d2dfdae1c0ab7cc932afa253a6797eb99fab7189df06caa763c7f0c8a8be0e21201f33efee82cd40d1860786da0bac504a2b3e93b26e5e6f907
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5916ee5a18f688c5c45f21bed8c035e62
SHA15fb53c7ba03b9e97ebade667800a9c3a0236d00c
SHA25621dd2a00245c4530a4306d043ec360f3092a6d79678265402293a4d62d8e7263
SHA5126c7f9b6e589a23a43c446f96e4540471231b6496777387119917dd832bf908cfc9d6272c643548eb86e102f164d464c4fdc22e703db126f15f314cb4c726292b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506ee674deccc48b3fe07c03b0f3a3424
SHA1a5fc1b7a2de4641ecc9e17e03f0436285ad773e3
SHA2565d5ff416eb53d82c3a76bebcb484a1a2b44f34ee6672c9a9b7cf6ecaf0a5a851
SHA512e50ea92cee89057b0a9ad824bebdc6d5d44223b179447d5e60b4b61cce57425376bd8a36d4842fd965cb24219d6a4b0bab30911693b86fae5bdfca4fda815413
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b6b07b62d2a1e780e6f82d76d62d815
SHA198fc305d71f5dde50c93747c96892d3907e77466
SHA256fab7aef767f5635ca0c091263a46b16ffb3a3bb78e617a5faeae200fd968e5b6
SHA512c2c89559aa937b47e895052c1ace47e37c764f812d8549a4ace86957868a9d56a4ae1cda4a613e39ab4735b474fef22d71c1c1bc9b5ffcc36609f0dfe342e9db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b1c96e1803ff7421a40b875ce01560a
SHA1c6ff2e597d784ba055e6b69164b14d62c76b31ae
SHA2566e2ff3965aba3aa62b07c22d027b7bdb96388d2afd3f593c24e3eb1f1f2b95af
SHA512a12b5d08cd296e795d294d8d5ca6f4fbc489af9eb8af532a0b946c9d4357444d9f78cb0d94ddf1f4479ce2657a4a921076583920cd0996ee5b200b708f416e32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b6dc20669a4fce7541a9b062ff106a1
SHA18c716ebf64447aa5105351c633b381b1ceeaddb1
SHA256084fcfe8d195dea3cc8273f4e6e8b23980a2765443cc98209b1c116e63e4d8d1
SHA5125d59fdb36090975f16e7b0016960afe151816351a9ef7e12fa1f723cbf10b8508b206ca599a96eccf394e306b51925f98cd3d2f1407ce7530a67f24804d156b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5a5e2d91a417b1c03ed205b63e846b5
SHA1a683e64bb2812dcad3be5a52d65f31748c7d844f
SHA256188821fe5c2efb172fdf5b0eb180bfb5b3ceffc08da502a99cacc1bcc33164e9
SHA512f2386778252f0616bbb60c1cfb82707205972929e07d2d2169bf48c79533501074c712ec71e92833536191550cfb8000f943ecbd1a928eef5f2089182ee01769
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531b78fe3669fb6f869e5f1482ce51f21
SHA123957501731019c2374121e98004d984e07702bc
SHA2562cf353f666ad15a8d48a834a9fc7963cd4e9fe2addedd5b9d4157ae8539177d0
SHA5123999453a63d0324a687bec8166096e670b82f326bf3080cfefbe6ff80e4b466808a162f33740fb410bb764e9925dcfe97525a4ec9d82d3f6d36b8b1de7540598
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fbf9182cc77385ee8d571ad2d85097e0
SHA123e89396ed0474ce32c19aedfa3bad6d8d7a6626
SHA2562a60ea90398101ea29fcb94b7cd9a2d406642d54a7e06f80aa30afd342562e85
SHA512b574c8af373ec06556d645fc73febc44e7828d018ab91b322d887e0b46d9529ac1baead302593a56c0f0c9ee531feee888e4813a0a4db27452b28e62a8cce446
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554ba19759f214fed922c96d0f5be3ef4
SHA13350f7236dc46583d6236a6c50b509b2c9eec772
SHA25687b2c86f51c72f99e62b1fff8dcb4e85f89f2a215ac1bf89eedf657f74fb77b7
SHA512ea8279c75b7344924cb5f001eb73ebfd67614504938949b0ff769c4d47e96d7b104de6ab4ffbf5ce5dd7edf821cd75cb86353c3a6737ed7b07791917c4d5b332
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a