Analysis
-
max time kernel
142s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22/05/2024, 11:25
Static task
static1
Behavioral task
behavioral1
Sample
6717829a4bdf1f5237dab1d6b3d1e5be_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6717829a4bdf1f5237dab1d6b3d1e5be_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6717829a4bdf1f5237dab1d6b3d1e5be_JaffaCakes118.html
-
Size
62KB
-
MD5
6717829a4bdf1f5237dab1d6b3d1e5be
-
SHA1
88a02dff2938c21c9499b36905e351c3ee1a902f
-
SHA256
39a03f95005f2a17e794d74a9a702c8b605943295b753cc71d8b762ff6b47dd3
-
SHA512
dcfbb1a84f4cbd4abc6109bba5aeb242129044fc3b8c844de4c45f640ff3f40b5e3a6ea3d7401957a6c6d9cd3c7484e440cbab17bf1e385a0b23c305b8578559
-
SSDEEP
768:2pHvvCIoYeQmLT5eOu7WH6DlCHT6bdMr7jT+Gu7KxTgpIe6x5ixXhFtndFI:+Hv7oY8LTYOu7Ui5ajotnU
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422538991" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f02737cf3aacda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e93610000000002000000000010660000000100002000000068ed23bccb26dd2dc8775c9e2eebbbf99407d5935fa58a8a2262da213138f7c0000000000e8000000002000020000000147f0a75e8d8a8499bfb9e82e090aada136a1bc02cdc33cf1535535e93bc16682000000021a6ca344aa9e139c7b49dae4f866ddf42604fdff9baa3d6d0f27765eb61833b4000000002560dfc51ee5f7e90a1e55f7dc6cd0b67a2bdeb1a8315169d7b486bf58004e4416278a20819845f2f693ce613ca580cfb51a18b7b0aef5d66d16f85d1edb5e3 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F9A863A1-182D-11EF-8B04-EAF6CDD7B231} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2180 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2180 iexplore.exe 2180 iexplore.exe 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2576 2180 iexplore.exe 28 PID 2180 wrote to memory of 2576 2180 iexplore.exe 28 PID 2180 wrote to memory of 2576 2180 iexplore.exe 28 PID 2180 wrote to memory of 2576 2180 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6717829a4bdf1f5237dab1d6b3d1e5be_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2180 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5195fc28150bef9b30510eed36fb325af
SHA11ea8a314d8af1d431b77d5280d1782e9a8e867c6
SHA2565c2e51ccf5767f80257a0a0bb66dee40957e5379431e15a118e7f1343ad1f6e0
SHA512537da7e46d8b5afc796c1908042088c583c5380fb729f3665845fe36286b3efeaec9fa26475e9c2263f55b1eca04bd7ae26088a9a85950b2b7f750fd24eadcfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5ac89a852c2aaa3d389b2d2dd312ad367
SHA18f421dd6493c61dbda6b839e2debb7b50a20c930
SHA2560b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45
SHA512c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD55a84ea70b3251d26464e5989ea612ea9
SHA1647a7ceaaf90d745e7a878db2835989faa9b501e
SHA256ef8ea6d1ca3baa0f7e983c13136f352c205f9cc7d9c1d6f44af09de42578d47b
SHA512fd94baa2f08fea5beb7cebe5a76c0643bb709dec4d8fb6693efe1c5d1f35c8c04f8a565810a44296411bdccbe8d304c02cbf4a25394c6d859e44187f4369aaaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5ad4701bad429e559165a3f217bab4d
SHA105a9465696e4ca19017d7890e4e54d67c66d5534
SHA256b916f8cf3d44ca5fbda1698022ea62daef006228613eafcaa1b12f8a55c75940
SHA5121da15e9de3ef0340984a11ca8214e86bf4fdd5af63753052467455f087085192a900f6aa9d256180b226cda3f477ef67f5d8327f8ad9958968f52095f95299ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5988f595b368e71a0d1e27320ebeb1763
SHA184744f5889204d909194fd80cd9c21146ac112cf
SHA25616e488dcde9fb17c7ae25d29a3cd1f68292417605bb230e03056a3107227ffea
SHA5122f0ea203811c2838294873dea5b34b7a0da0aecea6527fb64694f21fc116f228182f05cb30b176a29588d9ce10e5900bcac180aea9ee16439eb560202b1133af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d8c7849f0cd00691d7fa5616351939a
SHA1e3712b047a986cca40f40158193ccd375a8bf6cd
SHA2560de2b038d1d7c2cedb0f28298fb7be8ce315c15cd73d927d9e81c68c7dc34e70
SHA512b90b231eb402ea2b9823f605542b61a346daeba916d6aa40eeea06397ef75c879527a492cc8d604fa8d7a54190a0df0f6e53120f3457181aa6cbfb84dc12e8b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e87c715b50eb5f41c6c3c5373be3238a
SHA10dc4b824febb8bbb0759b3833c6016f297f9ac73
SHA256558715030066904854a10c7f28512b9ee3b2d22465267c3140fd972b503cbc1d
SHA5128a2fc29a8ea3efe6e4d40ddc6e278a407bce954d8f6f790795ace3353ae326b4f3aebbee29d9e8048503d7b40437fe799ab44bef180c52db8476b354e4443ec3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56bcccdc0fed839d94b376b79d23631f9
SHA1203ae54e30f25be5314414658c2cc81771238797
SHA256c17f2e63e8489d28e49d85a6d3fa6ac1d8d0912096dbb52bdd82dde08e6ca459
SHA512f42eec551b0ed5080e6563f813799727fa36ddb79b04e43caee17ba485b9cbc3f8815f81792e2e3aa025d21e027fe4a65a324902ed96c04ecc0d580a63217a4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e45788ee05835b5a3e4117e163a6ea07
SHA1d8d85d8b577de6c56cd419aff2d61d1a0f1922f7
SHA25655afa54bf9494c2e53988ec2a7a1c49e8a9ac352d44ecfe72e54ee578673c72d
SHA51281f517827aa7c05121b7c4d0c8fed50593153f8b8224e43d63af4aecc808e2b09cd77f78b9515998f9aeecc02c1452490540255077f41eb629332e0a02fe7aab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f5a0ec68c0ecf20aa686a7193e051c3
SHA1409b7a66ee5e8c14df7d456494a1a3ebb7335310
SHA256b3e902bb5ec80544e1a826b91b31872e9a6938c7a0fda9cd108d02f68bdb3489
SHA512e69af99b0aba559e508b2c26638e8e1c5feaa7aabce30afa825cd14188c4e3b0c33631f975c7187d413210eba4d919051897db47c65b22ded998e7e83205cc26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d8add367cf41812258196506adef655
SHA1618131245cb0a5a3c3419dd1fe17e0b9a0f97f1d
SHA256b50484324f5bd829450dde5b4c81284cab64c58e24836d7c3741e5ad97482b3c
SHA512494e5c0485b806c73ecf6a482040b7e9a63cff5d52fe12e905abbf54e224daca182de16c2906c05f8aa25a0064c776febb5daf0c5687a3369d9b155a846ac049
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5adcf957af9d10e91762c629648de6002
SHA1a786c8ccd1ca8f4676450169bbbc4e64996bc014
SHA256e25592dfff64de26665b4b0a39eae081b36a3f435cc475eefa33535f2af9cf2a
SHA5121214f3ce81fcca7f9e06afcdffd4e102c2902bec76090d7230f303edbbc1d2d50c8111fda040e8add4582593b5eca551a6a55d75e0d48958f20e0afa1271e96b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3e32533a78f303306d6d2380ee191f6
SHA1c00451e4b5db39ba1184f5c8c6a403da5352a247
SHA256346890e6b813c04fc1b7a7b33e47e1994a6da0df58c56cb763022f12646dd15a
SHA512b7688f1a9243e6c431c49cdef64dfd60ac38ff31310dd91b4a3f7ae83c7f51a0db82d5f5471e4b4a52c74b9b9931113bf72ec960295629a8b66a0585c59adb28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537d776cd38c2c19b3f3061a1f58bca0a
SHA132bc7d3e6f5a3371a82ccd10bd88a52cab080e50
SHA2561b67dd65904f833e583e995c78d42becd8a6cc3111cdb006aae3c215cde9524a
SHA5123076bd118052c92b883ae0e32b78cb23fffae59ae165bce4955f0460b8d00e136ac003a8b82849c33e990cacf0887669f3d857e1c2d68bd5e05cb4c04204da29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d97d6a3e7e9c2fbb89373c9e19f7f3e
SHA1d38257c4ed738653bc96e1144d415487551acaaf
SHA25606dc256db135fbf71baacc7501143a8c313be865b28d0753e6508910f2131657
SHA512581006638b7705a66b6a20bbd3179b861474119f4329215d27f414a9b6e5bbda68fd60e6269f53c94c4aa8a0928d913340e40b75f96edf82605501756c49c759
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52122fe3b7bc9a2c2d33cc371cb930222
SHA147cd5b202af0bcbfb6aefddc6b12f03179b266c8
SHA256f6bc77b806210ca5e831b444785b4eca93317e12c2f0724f39c038d012d6e3ff
SHA512f2944b3d91f1b560f16c201cae04e7720f7060ba79e29627b94775628c65877983c4bb5c462572c9d5c6d613e3e8ea3251ac7f958cc1bea93f41c3e4931ee378
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573f9122c47ceec5a3a359983fabb6416
SHA108402c7e90ac68c3c4c022fd0e3fa90b1688a027
SHA256fa4237c61bafc58d7c0c3d081ed86d1347e660c1e26b564767b707c1aa8bc9c8
SHA512eb726caa9252504834537652f6fe8759ece2dfdb1559f4242465bbcf11bfb0c84a311902f981bb11c1630762658a368d0a1a938ab7dee97b003c80c09ce24a2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5228293c65eed858820a35da16be760d6
SHA146690ef182a1fb4b23f052c94a12c3e65ee7d72f
SHA25608e06c4761e7c601d3cd6b55b5344e2c54795f15347f24e7b2cb13a42afcd075
SHA5125f631c87bf5c7ea3f951032e0ac1bfaed9337d5d561077efa71f5213aca2be3647729f0a523a4044376516ded6da756fda34797589420f4b6980177bf973b918
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD5c0ec6a8c3e0ce68be4ad5425d5b22bf5
SHA1f4176a4e97b04b96ac199da6edd81268d1b192fe
SHA2565c756c3679cce772111ec84f34306237755b14141717922caab418d6360e54be
SHA5128c1869177127793c3d4a0aa2d93ffcbf51db8a5c9c45ae348d3fba419e0d172a23572d6023ab781c676bd9a2befd3a739b16dc9127001aed63d62f327546c5a1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\G17BROQF\plusone[1].js
Filesize54KB
MD5fb86282646c76d835cd2e6c49b8625f7
SHA1d1b33142b0ce10c3e883e4799dcb0a2f9ddaa3d0
SHA256638374c6c6251af66fe3f5018eb3ff62b47df830a0137afb51e36ac3279d8109
SHA51207dff3229f08df2d213f24f62a4610f2736b3d1092599b8fc27602330aafbb5bd1cd9039ffee7f76958f4b75796bb75dd7cd483eaa278c9902e712c256a9b7b9
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a