Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 18:00
Static task
static1
Behavioral task
behavioral1
Sample
72cc0b4e9f40a7914d36a5b340c7357b_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
72cc0b4e9f40a7914d36a5b340c7357b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
72cc0b4e9f40a7914d36a5b340c7357b_JaffaCakes118.html
-
Size
460KB
-
MD5
72cc0b4e9f40a7914d36a5b340c7357b
-
SHA1
eff55020ee813b20ca8bda381992f7433a928d76
-
SHA256
c75467677b6da50497e50fea892dd6ba7acd0f7655c25c10e7299996a0a32f50
-
SHA512
4eb7ff70de789e30cc3aea9c39dced7231726d628aaa9559d9d0402df6e4ce2e0f105d6eaa1d9cce782d02fd64c36b18112e7136afb2413f656d8ab3c0936497
-
SSDEEP
6144:SjsMYod+X3oI+YSCQOsMYod+X3oI+YosMYod+X3oI+YLsMYod+X3oI+YQ:I5d+X3B5d+X3k5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000008ee666226bf3d062ad56ccd999bd748e6a21b8a65bd26a58dde6fdda21adde9e000000000e800000000200002000000005f1ed3e7c1c8a20c77fb65682ed293dddc8022e9ac05b975bb40905b0ef10da2000000051c83c1a9a7fb7ce5fd3bed123646b5b1ea14c5c93d2968de3674e497b303feb4000000058bdf800010121681077904f5c1e677b8886c9d263876cccc90175feb1228384848cd5139a9b2e5405f71e9f3c1109fc9aff6d7477781c264cc1e0e68b1f5be1 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90c71297cdaeda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422821927" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BE755411-1AC0-11EF-A5E3-DA219DA76A91} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2008 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2008 iexplore.exe 2008 iexplore.exe 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2008 wrote to memory of 2984 2008 iexplore.exe 28 PID 2008 wrote to memory of 2984 2008 iexplore.exe 28 PID 2008 wrote to memory of 2984 2008 iexplore.exe 28 PID 2008 wrote to memory of 2984 2008 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\72cc0b4e9f40a7914d36a5b340c7357b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2008 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53cf2cb1aac967b45fc986dfe54bd1ba8
SHA1b6d102e24ff64e8593b8b8fdee4bab209f5be318
SHA25657754e7264ff5fb00ae8587a0ed5c6789d370c1225a9aef779fdf8fe38007728
SHA51203d5e90453baa2503a274ce99d63e897da07b800137f829f8943fde73626393bc93d9c8707d0e0cdc9ee34b95de7f26ece382028ed8cc035934f5c1e8951d246
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a49838c7279ac5c74e94ad23d58aa1b0
SHA1fea6f042bdd6ef6cd10c317559f1dffd2f413f4b
SHA2569605fe0d337cd3da28e598d40b9720fb9fc5936ab84c29c21f143af34715bc36
SHA512987a576a592aab61b5fdd04946551fdd1bfd0bbe0fa9ff88ec6bee6c42a5f02aa9e3e4b44f8191d28f309d1a28f79af52ec2754c3becd31277e6a3aeb5f1d086
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d2358153d73e1d0cdd036c592d1257c
SHA1b08b7973e739fedc338815313a3533253288fe45
SHA256e2655289243dfa1c338675e15e8681f8f2a1adcb05163ca76bb566f80b0e3f27
SHA512fa439fe2a5972cc79c4dc66777ca38243113871369c5181975acdbe1b7dada900e23a7e5a7e0b43ecf634836efc70b550a0dc9c2d99964828c03c028eb164b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3ab45450d7af6c6ed713d80c6b72b83
SHA14b0b2ba6d0a0f0d05fd90bb1164b4039e3e54726
SHA2568ab06835145c9f83533414ad963e4ab0e7ab62cb3250d469257727d3e5b6fb31
SHA5127c0888313659533f0dfd6247a5d4997d9cfa5b88e9423b9ec94df12370f72070c48e48c144fb0315d11124976041e88470b17af574e1151be53c66c7e8b011f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5401df09465ee552d6af691431bda5190
SHA1a3a366ec011d1a8ab31ec847b740da1c1051b31b
SHA2561f403e409b16ed77fd2f25e81ee37d4928e3055976db01ec7a7b3e8cd3cd7025
SHA512841af1945f521fae94aadfa19616393b9276b33a95cdc696f458598eff3162567a155225bd32afc365a7f81cf75e44de1d80e9461cb4c581ff7a15fc6c7bb1e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa7d8abb3f1b50a0ccf94ff379eff4d0
SHA10766cb28bd4011857701bfea50e9df101d33521c
SHA256c16b8b0ef6ff7b9b5266c6b792ac1bf1c2852f14edd8931234a2b65eeaff6c19
SHA5124351f4875c5d10c103a1efc9ae5b723225e5cbcf851bc64ed6f5e2849d3dd17a78dca5cd655cc4b5a47b91148ed9737cd3607de03a993cae08d2d405eecd554b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57aad657a15d04651eaefc58363f349c0
SHA1f4cc415de24e04218b782747ee5a7206d71e1dbf
SHA256a4f15553b28803c72ac1ac17f657c35e3d8fd5715bdb2de57e3699dbbbcff3f2
SHA5125824d3f59d25603b6e6e81a632e8f4bf4d2e8504a2ffa98a192d2c1ae003abbaa9c175646ba027c5c29635d689ae5642f029ad86aa79dcf94971e3b7264c3fd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513ea369dfe686a813a31250ebc5ffbb9
SHA158fdb5d779f7d22b7b0c0d7eddbeebcdf991d523
SHA2561f375e8f1bbc0679b420569664b0aa6aa618175635cc48b9fab77b1ac21fd1fb
SHA5123480a0d512d863ba47eaf5299d44181a41eaf9d12bc5a52d800fc16645557d1a2c244b0dd75327cc36f9aebd182b47cef81d0a2adcf5f0196a2f5f1df5685390
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef42c2593692ab26a103245f3ade3d40
SHA1eb54406bf677f8bea030272d118139f80e19960d
SHA2563731fd2fb1ca998b5a3614bf93bb38855ce264dabc10feed37586c4937092d57
SHA5122b3b0c6208029a6b8d6a4fba59d5dba63020418e959051e6e2118375ca41c46684968fdec8458c96bd3c37b718e8ad36f27ba2750badd5aa56d628eea97a93ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525c6a1e8895292bb3b05463eddfc254b
SHA16ab354930e63fb027301066bdd4e784fbd514a94
SHA2568b1e4716cd9b02c47ab7407522b00ae6b1c709021e59d394e4dc145bb95fa542
SHA512ede956c6f31ddc6ccb2c0bd40de404186e0272d59986211d6eab798b31525097a0d77385c6e784decf332ae1e9c6d92b2feb45d3bccee4a19351fc7b7841d04f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3d4a77a681d06f9615d1a6c21760e37
SHA1420fdcdd223317ce22e1257530257f9d508ee232
SHA2560188333f39c96fd56f897c0035352ddaed4c1d371af6c834b91068b5de7ee6ac
SHA512e09d2d60e51b2f1387a60b1d1943ca216b01473a4f783ea6f584628827ce15973b97da7486227d5ee1583c695ead9a06fbd819c401e1e3b3da3c46739143debe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e20e14904ffcd2fabb2f8afa8f8520ec
SHA1d8096cc2fc0889f2f477f274549794ea58712c50
SHA256ba4f6439897040a1652f2e6fe0d1a86ce244b9a858a09543489918fbb0a71a36
SHA51273c2fe5faa1ea117a22e0e5e0aa0a952546f3747a8be088e9a2a7ad86ff939d28585bc53574487d9f72e5f1ac1731b262c819c36cf2c454ddf0a66a088044eb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e8e93235d2e21d954d852bbccc50f1b
SHA161025d96598528586ab32aaa75c891931bd73663
SHA2569a304acb6ee2196a16e9a4558b797f0c708d7455cac786d8d9a58edb8de64b28
SHA512e5fa82475c11ed6bba52173efb57b05c8570b6d55975430b4f0b15e3e221b99d580ad61f6284b451521da4b77a090fa974349128f159fe4d375d29d21def2242
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a826c85ab371cc18422cc8d2906309a8
SHA1fc687c12e2f458644c33d48a9241f0e7918df333
SHA256e15d5e38107a262861c9dc3bcad85526be4c9910fc1a8d0d3a80b4dc1211c0a8
SHA512dcc588e9eb69ec882ae198f82fdce9dbca2443a75afd698e37580284055ab34b29cdf121e6b320fe4402e386e76d3304907fac96cd905e156ded78e0d5e3ecc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0ae5b8cb3bd51edc950bb5f7e0a7e34
SHA12a3b9d1e451c95e618aba6e4967e25c80fed09ef
SHA256369c03ae2d77da3fafe20c9cf019e03b5297a94be7dc53f41b054841e1e6244a
SHA51237e6601a1cf39353eea9dfe46ac915f06383aaf74245fe5cd8ef02997a6b561f675d78684ce76a4ad9e1c94a44a268f8a3efdaa8c2fd60d795c2bc6fc563bfd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5208d7d377c4415d97c1fe0d9878b0de0
SHA181a612adc124dc3bba6f54e59c26509a72d4b385
SHA256e8f5fcb2e9b16d1c1b3007a0d8e5a71b9c802f6e38ad635e31b2a40c8329e63b
SHA5122a9799bf99d4c675b020798ca8b7fdf9cd39eba2b5f04d0cc6bdd81e1d079d31cbbebf0082f65c34afcfa8c22ac2cb6040a9842990d2677fd45425e26e840135
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531b5e11385449115c4eebaecab538c3e
SHA1e0ce9e43140a12497b32a6110290ecf59ab9fd81
SHA2562da232fa284bc663de5e5c62ceb19ae110dc7be5237a840efda3b447fe24664b
SHA5125026f4ea8eacf2ecda998155269f37b16c1bfb823751aff9600aa83a785b225a91a78e1345d82cc3471e93bc22a3871a6c82192e9b0adf2cdd60e885cddb51c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e4af60d11335e0494063dbacb5191d3
SHA118350f13205cf548c08ff65efe659a9479b4b8b5
SHA256f6da32643f35c30b3e68d00e2529f9a4c6b034946d81bbea0e89b90ad930ecc3
SHA512f9edc867f7f780e7a696fbb7de7330053219dcc18796245beb9345f873a2d85bb84129b3d95a7b28a42bff4ca5815ce7b5d33871f8155b1edf6068cbbd1716ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7e81a297a322c746229b852f455e089
SHA1e58c0a21cf2ae43084765bdb3b617cdb86aa357a
SHA2567f3eb259723eeaf07192eecd5bb77591361f67a76aab992c136d4299eff34d93
SHA51241c639c26d271df7358b2736cabef188d72f3130367ae102a4a99556605d58cd63b27148ce3c4986a88fa99bda31fece5a8f8e6f9e9e789d0eb79b458cc3c7a9
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a