Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 02:10
Static task
static1
Behavioral task
behavioral1
Sample
7403eec14520e5cfcc9c2f04e4747175_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7403eec14520e5cfcc9c2f04e4747175_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7403eec14520e5cfcc9c2f04e4747175_JaffaCakes118.html
-
Size
50KB
-
MD5
7403eec14520e5cfcc9c2f04e4747175
-
SHA1
8713a60d88c88bac2b81e85d3bb083c675d29a20
-
SHA256
60b3ac05305648d87bddef76f5cadd3c84a9000360a82c1c85ac161308495def
-
SHA512
0f99ace3094e197f99bfd175c6e5fcc678e529ef3fa28b55d24748ee0a546a07e8ebb2502f45a2833287d08737b42d7091568ff0c63b7d3569d945f2d7eb5baf
-
SSDEEP
768:672a9hy98uueqCeIkB8ek++Z8tststVvt2esTrjqPnOx:6qghy98urqCbkB7kMt2esTrjqPQ
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000167ca77cc882f3b120b57610927e86c1d331224ca3090c69a0570c3d3823a014000000000e8000000002000020000000a36dce7574478c1d8334c169cccd4b92eb6000b20e063642eaee7dd03a078be8200000007ccdde0a3c589a677d229aed809e6dd2af540fa86b5c058c287c7a1cc225a6eb40000000f6b9f85b3127182c0814af1fb71f7686f24e81be7d0797c412a15561b64c8ce4d197d7466d744ffd9f2c9709024e0f86b557375dbb67fa5160ba9c6b03edbeb8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422851276" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{13D62351-1B05-11EF-BF51-4E559C6B32B6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10d0dae811afda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2984 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2984 iexplore.exe 2984 iexplore.exe 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2984 wrote to memory of 2064 2984 iexplore.exe 28 PID 2984 wrote to memory of 2064 2984 iexplore.exe 28 PID 2984 wrote to memory of 2064 2984 iexplore.exe 28 PID 2984 wrote to memory of 2064 2984 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7403eec14520e5cfcc9c2f04e4747175_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2984 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ddcce7638ed57dbe9e1352d4058ddf1
SHA1b5d2c38ff207dea4bf8250d081c9dcf2c2c850be
SHA256bc02679a8d15c8343efec84809eeda4e1eac787dce27cb43b370f0a72199fb19
SHA512856ac316154932645869fb5b8febeacc2bc400fa7e263d6ecc48404c6f866f1b1e7aef6994b97a5a93ab0b22b12b71c9b226b23ba3bf1b398f500ea43f555dfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb71e90bd0ff46029746e304f8aeff7b
SHA194ea0fa9c976ddd994238d0d47beabcfe94be990
SHA256ca5688a871b494fea6e5577219054213e7b6edf43010715c0523707a93ace971
SHA512cb0141b5c717862f02f17443e9baea2a6ecbbbad1d2fda79a2b000cab0b1beb6409176ec929b49a58173fce13d6a3c88bbfea493c3c435a84f3dc4d06df031a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5afb23ee9eec6f97c68159bc90ed37cd4
SHA14e075465f99f64e599a048bd2e4e2493c08ef3ea
SHA256c7598a1e8560195716ca144e1c07ba0e09528e0dad5bbdfecb2943118fe5f456
SHA5127cb21fc5b5bd7af764b8e8501f5146b8d0b9bf195588c168c7652d44384d1b0a132799dfafbbd838abbfb85e411afdb13590136d96932ca80e41b97b21760f0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd5b0ebe72ae305a3647765629069e84
SHA1603e56b154db1d9a8bc0fdf1098cdbeaaf55b55a
SHA256cc87825a6a26447f6d8601b8053f53917479daea0a12efe9488846c334e6f548
SHA5128a5b8ade95d1f7e4e64566f4b2d2b1e46ba21d200c5110525f260e58ad1983e9d99712894365f21ada19e6826dde0059b5a4fc010b2aca6f1c1894af6e5fc784
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502c7761453e76f7c41255aab550ca78d
SHA108b6a6e8795de660b76d7f9b11726365e5ea2f1a
SHA256e7498d770bc852664d23161b69036c3717a55143b450d876295db8eef4af5038
SHA5125843e5073a89006d93f971a8eee93d67ee3575da3d54b69b02c4bd19fe20968c36cbfbabd168ef488d1268499b6318cbebcd1ff3a65010fab99e33ed2204d7e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b800bc3e43a566aecca10941805ecb61
SHA1636484caa21f473edd518b25caffd35e0929b014
SHA2563c5d65361ce45ec144a40db76a56504118fa19508016c13e104e165f4791529a
SHA512bf3443581b205e1199f48e4bd5f9c465ec197de78690701eb0a0a2a3ab226b84b71c79d8a3fb8184afd9af7cb247ec506ab303992395f47d620043672cb937eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513e87b45e73c297f7bb9ca01a5d41652
SHA1c47efcef6ceac5dc53f4e66cbe54b73d271040f1
SHA2563df608a143524fe8ef22bcebd10e297231b869a906e4541370c3c9cdf73d3c33
SHA512df881ecada55d31ea1b7ae3a15c8881588c5fe2493bf814271b9ca51655de32714df0fa603ab5e763bd6ec1c62c31d5acf4f13deb6e663b857ddbd7b4001bcf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547937affa0a956ad54667924877d47e3
SHA1f51ee24587ae1e3793f6b73797cce4ea07836aae
SHA256baf87eabd2c73291f38a5d1829691d97fe9e5ccee0023f27c43103382e9bb870
SHA512a19ceb0ec1aaba8c7059211f513444a161d961993908455b7eb0e68743f2c995924e614f80403af4124f02fdd14649756db564a3e601d2d66890341a94f1ef6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5baabc88e07ce029eb04b715f8240853d
SHA1175598278bcf37826291e6e09bb286d8f40e6ef5
SHA2561cb7192b82bab70b34b6159d05f25a70aa17871f5d6496ce5afa89822b427a54
SHA512e413fba82397ae54729c30981883989d96fcb7c0fb26a1db5b94130ff86648ad7a8705196d31c64dc6e3371c845027886afa95e8a247ab214988739dc2c5ce34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0e2530f621de923c6bb1105f81b6a57
SHA18ce75c74d011308e7ae5966a05662c197bf74b2b
SHA2568765c84dd2b493911ebc9d427d172ff6a5116e508f1bc833aa87873a0b27979d
SHA512c40caafaf69fa6b67f819df70d961fd7e97c9651134cacd71b3ad327ab1b6d692285156afe6f7d24d7efca0dd880831c219650e04f062607d58e0ef5b950344f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7b36acdff80bcea2f8a5c3167ef65b8
SHA123b24d72a2aad870b23868a8e79fcfbefd1fae3b
SHA2561a61b20a7b11131925ec1c99cf26a184eddec4a2c1c7ec5f318e7cbe614f9198
SHA5124cb5f56d8d3fd47f923497e556514d154b780bc2441d95c9a1fe43db8b382ef040efd8f95538e9606d231e43d135b0682d3154000e07459595a80f92b711a996
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5412fe550be8c63876db4df9fc092406a
SHA107b55dd2567835b79393124865d7a8e101e8a227
SHA25604ac1a0f11095dc77050ddb2d321a9f9b069f01015b16aafc2476abe093db9f3
SHA512ba60e2ad75abc93f5f23e44d6c166682991a0f62124d1b69f3458a4b988de671d9972af979dbf4b41d5b61d5fedf0a0a0929824f3a827fa95f0b23647bfa8b0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1e9db41f177fc4b3cb155ae4308e5f7
SHA186cc25a95bf2aead75445b9010780b9d26fe90ed
SHA2567b39d66a4f1b8d03a5a36c75b629198afbbc17f4d7c637d938bc00fe388041fd
SHA5122e20bd5218423145eafd7fff648f05af57abc97d4c071811b1c55c4e284d0c5ceb09a83ce6a10fc7d6a1ac27dc9f49ee54f4ca0f0110cdcddc6ad896df000b9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c42ee614a6929ec4786bf80ef0a1bd3
SHA18bc230ba6a1d864c2cc1e0eae3022e694c13d916
SHA2567ce5fd1a307275360c193dd702ebc425dfbe320fbd668582858bba0856722090
SHA51242a82eaa804596fdd7dc8f96148bcfb906f634fb41fc9a741a8d2d220d6a74115bebb5b7d5cce326791fe9e2c98cffe53b94279a3193f84727023dcc1030fb46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a73e763991376275fe6b0c67a537dc5
SHA14d9d20620b112eb5f5835d1e92ff13a04fc66bc1
SHA25689147aa56e6cae3d762637545df09aef37e6550610d16084c060018d197962d5
SHA512a5e7406bbc3e0c68f6d6eda610925e5c048790de94c9885128759e18e4b16fab71f6098cb79c8905bbf5291230895e9c2439cb07503475bbc4144bdf6306376c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50393b4fae883492a52e2e3b65473a284
SHA1b1612fa1b2fba6251c4e655164323f7e67b7fa78
SHA2560073245958bb169f7359d57cc658a67fce94ed840d9d29d54fd97f9bd60f321b
SHA5120970a578f4630372a4a203dc4c461a9145f9e9cdac0843031744355164e3fbc401d95cf90bf06d5b66619a532acf59081092eca3d01aec2b329e81836da43027
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51aff5b46e350ccc6e28b3b3238ac6f0a
SHA13f28ad0c1f3053edf8d0e2cc14e9c30fb4f217f3
SHA256cc7fc420b93d02e9582cfc15b96a961ec4eb410db143b4acb1ea490e07dcf4d3
SHA512cfd8407de4a03fd5882696a622a185c96b7734537888ca9f204f620174c252a6c82b8b2980c0a5094e402a64d1e194fceeb96ae7bb21c9eebc02b822a6bd6e8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de5951e0f193adce5ff26f03660855d1
SHA1d00a6cc596369b9cf5027cd2fc6889042e3711fc
SHA25694ef9a1067773450a91119ec1179dd48441f38238439fa4cba57ac40a7f1f47d
SHA51204df5e5c957d8563d8609aac7f6befb6ad51bdc7eb5f02186f15a6fdae2e33ca261311702fe77058ee67982c6034e0fbd5c6e437c26443d0cd9ae5caaec8a56b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0fb11d84069fa662b6c12d72f780500
SHA10d22b6ee7c73b3771c3203cd38fc5a4206b0cfd3
SHA256be39a8035ed080d0e4deb0b608e08a32e07b787c2ccd0998f0538932e1c72c9c
SHA5126546ba5360e9f703e7b26899f1b5d831da9a1dc8d657de4d13b352f75667bcc5438239e9d20f1afd97044ecaa3017e1391590c5bcd74c1160ee9e8ddd8866160
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f40680eddc6d8fa0e42e35ce06adf66
SHA19638e8b9e5b79e6a9d7246d73c992cc55cdb59a9
SHA2566076c5558dcc979fdf0c21e7faefafd31706a583e7138faa7b23d491ef6521bd
SHA512ed9f471881462f569a178d278f7b3164ccad954e31e5dc4d4a328c099ad7e0496688952e2e6dc179430fa1053f5080b1a2b33df862b660f84c0707550c7f3791
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a