Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 02:58
Static task
static1
Behavioral task
behavioral1
Sample
7420f586f49d0bffbf14eb0c67cb59eb_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7420f586f49d0bffbf14eb0c67cb59eb_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7420f586f49d0bffbf14eb0c67cb59eb_JaffaCakes118.html
-
Size
67KB
-
MD5
7420f586f49d0bffbf14eb0c67cb59eb
-
SHA1
b52633853972b4ee0607a871e5e99b1021088b5f
-
SHA256
a755b4816a0d0d0457a2034d22b91dbc742c41850078d42da3b06f7d9babd4d6
-
SHA512
219f2ddb18be7c8e7421cf948231bab9400891bdbe9c9b1310084608f947c0e340cfe28d2024a548c6b9dd0e0f562d38c0d555d1d2ca306731c1174602cbae2a
-
SSDEEP
768:Ji9gcMsSZ8tN99OIsVKAjoTyfQCZkoTnMdtbBnfBgN8/oygcR/QFVG8c//IjkK5M:JXW5TePec0tbrga6cuNnzIjv
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000007c03652803dc6b4fa3965690056381b61269d577015e9d88c860a95745430cc9000000000e80000000020000200000003eb2e76d17d18723878f1a139ced6438e16f94fbee5868f22f2a95bd3e7620ea20000000035f52ef723b8f08a3392084bd909cc24e1d794139078ab83980d6480d466b9240000000c44bd1427db5a8e9f86237e30643aacef08221e080171b00b277170a9af4a5754933785e6335d42274f722b260dea94875242b42361db52a2eb9889f971b768f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422854197" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0f5d9b418afda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E04C6D31-1B0B-11EF-AB84-52AF0AAB4D51} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3008 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3008 iexplore.exe 3008 iexplore.exe 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3008 wrote to memory of 2168 3008 iexplore.exe 28 PID 3008 wrote to memory of 2168 3008 iexplore.exe 28 PID 3008 wrote to memory of 2168 3008 iexplore.exe 28 PID 3008 wrote to memory of 2168 3008 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7420f586f49d0bffbf14eb0c67cb59eb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3008 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2168
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5345f3c66404766c6b15eb12a60e01988
SHA174cd0904016f0e60122c9a63fd25b0fcfd31c664
SHA256f51b01562653e53154e26dd506ff45edb8f43866cdf95a6b02566bfe64b0251a
SHA5125988cff662dc5ca6965e2233bcfefb07ddcdc9512198c7dd1215cc671949394aa7c3ef60b69e0d5b021904c5ef94a230c58ef5abb71c9bc67369a9e9c6f4d0b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540e872e972c7b47a80d99ca182bf6f1c
SHA1f47bd16f3cb943724c38c35c3f8a068535ccdb25
SHA2560d9e08a8583c18a6dc6183a8a20a23018e906a79dd3ac23fae97b34dcff7c0af
SHA5127f8f4d6bf25be9d2d8bab4e315899a8cc152cd650d9f084f403d0d0d85051a8f06096a27ed7319030547402c28bca97662c9ac26b1c8ab98f232954bc69a689a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa862f9a5441b671962b8389b459768b
SHA1ffe255fef28488b1785dd29bc9f2ea984c85d334
SHA256781a6096f941a0fea1de8c92446f1575b12ed38c66b283d977a040996d6a9a6b
SHA512ecf37d50c439ff2694061f5500dae46e6eeec18c766147bc9d2ff4f166f0850b194821fd66e08265fe70649917f6e093f756b3fedf98605f472fe10a990b423a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509c5fa31f70ed8b8ef9c38408200e4e6
SHA15d3b69438c119c12dbd9e37514632ea45959466b
SHA256bbc58278a366c91a219d0eb90277526e3e528793159f8d7954c3780ca78443e2
SHA5125bf1a8e2074099dd54c706140c2db3de2a4c4a9d60f0beb4e19c3a217cdac0fd4164a173afdce91be9327a686af4d69585165474d51c44da04dcbd537d381839
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4167a83cd01ac747a7767de40934aed
SHA178b119624839db0c5e23a62fcfed5f37b18c67a9
SHA2563b788afd4f7323bd160ede6dcfe16e20a3b61882f4ef52fc4e68b1eb6a694833
SHA512660bb6a1f1854f11d4e60a4076fa6eb69091133024b0733131af2685082b6e9c81565bd7b008e55dd92d0ce1297dbac7816b7eec101d1476477924389eefdbe3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c256991b28a156327c3fd4d35c056cca
SHA16893039a09dd15c864526a69f2b453bfb4584690
SHA256de55f4aed1082abca4da53eeaa898f328a1a296122817baa3d29d969145f44a5
SHA5121faac3fe721baaff668cf21571387782952933f9591c7145b8a1503072e72fc0fcb85e54a25ef3a3c4e2cb943b1f2b1572e9d6836ed9460414dfa17578737ea9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac42438d5cc6a5bfa7bf6f644d6cfc9c
SHA1e6a6e3bb5e2924f9a10d4084152413e54466a8af
SHA256eeafac103449764167a31b9b5f19e34624df6502e6b873888e8fd4788ba055cc
SHA5129ad99f6e1dfec315af7f6c1c43e0e8c71a174751ce146cd5fc2890f358ccb23f1f59e8b6b9707b7835176e6966bd211cb12614c67f9bcade3ffa81869055c022
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52dbe37413583a7753f04957bddeb21d2
SHA1ea6e9d00fd887a083c92a2618c75c40c8be0d8ab
SHA2568a128649488fb4871d672197303d86aa32a9c0becf30d09dc1db18081c81e63d
SHA5126b6fe6fecca642db5565a8306d9ec8a6441c9bd2dc2b5113e9471657e960116908397bc5a5cc2fd837a408aafdb69caa997ba32ea6f0ce8c11f0f93a9e5c31db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e9bab27cc6993242c4933dba97113e6
SHA1b4b79126d647b9b71c3cd51c953d963bd39a8188
SHA25686ce75ceb9a48e3b5621daf1fc78805e8b2ecaca400cb922791d56b760eba963
SHA5128aac50c4789944389543fd0dda42804adcccceb4a3e0bda2fda104cd8d731ab79e8b6c3030757cf473f92ccc2f85f0683fc8544e40964b3b901c7dbeea268699
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556261424bfbdd7e60c752531bfa89c48
SHA16f621d89378cc4601e75133ac1e10049d3b76d63
SHA256c46e0a1202e72520e4880e725d40d77bbfd1ea9d9e2828274d646957ff01e89b
SHA512f6a97ee429b4e9fa630280ea1f3e2ac234dcccd0ca11e5821475d957511b980bf7447e28dbffb273510e688e3fd18340542da94c80f394754463e3127a0d77d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3bdfda62f70ad3c7b13eecd0c5840e9
SHA10efeef5e4ee2ad45257eb09340351e6b9c9832f4
SHA256ea9157292c72805d6882f964a9cb890b74ced882abbc1275ead011b9a7511eb7
SHA51270531615bc9d5ac7c9581b13ba767c4814cc7dc969f402e606f701933cf70fd5957ad1ac6ac50d82a1c703aab1debcfac65e16b2242b2a47c696c59762b0eed2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f87eafa8cbff1f92430f0a0a434dbb3a
SHA19c94f7048c4c5af3d38fb8c5673d2a1c16d31004
SHA25660deb6b6158b63fda474c39f7082cbaaa0e2b686ac1fba0f35eacf0d222c2434
SHA512105775b5a69b5961a28e4bad1f39b3dec8138227974bc341eb8292ecd9694f97098b5737afb5cf24a5912fba97e374d0ce9650e37fdb7f76ad7d502b9ca0337a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1523c3c919f594fd7bb68484ad2236f
SHA1dbc7815d95f604af889b20eb1e4cfd0e07753f5c
SHA2560d52fbfd8ccb71394d791fcec3d5067dbfd671bb424d6f855c8fd9bebf5d53ed
SHA51265effcb9078d4ecb7a328c727093cb0028e39725be2a859ea357267f147551a2b57e2e9da5f9e37a1e5681db71e6b1c5202a3de1fe8b5b16ffb6580bddc31825
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56dbb28d57bc8883c090638a3347e4e74
SHA1e0581dcc8292d1f14895cc7a18579cf9c289b64e
SHA25678a51ac4fbc4364c1f53565afc8c466991e1891df57b90c2758ffd52e96d2732
SHA51283b10f995f89e2a7ae780abca7bf29d5b89ca67be2712e6a64c7b579cc5729be7d99d0fb4b31ae74009ba3ea4cc2514204e6416d9e6f160f25860f792bba2aed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5051bedbf52be0c1cd6bbecb8208a2637
SHA1a13c23a0cb4ae1b8e61747252c0954c09ebaf5fb
SHA256170bf2a75fdc3275759c4b989bbf81963a2ef6e6c7695b518ce944ea920a5f76
SHA512f532eafd63bdd9568a54b266541f53ae1f67f56c769db5bcb04b7a779b73bcf1184b894633fe96c5e037a261e29846fcf9f7d4ebd2143d6d60205879a90c11d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1e55f728433bc19e6342655cf120799
SHA1e7f7fba7fe4b4423d0b0f999bb33fa10db24e04c
SHA2564852ee8064cbaac5541958fe35d7e67eca4548b0e5cf20f6e3abeebdf5f4466d
SHA512f754771fc0559bb2071a0be9470570d43024dc0c2c57ea55ecc148de2213ce8eb9a29b1186ee9e0870f91a9d855cb360a907ad7d65198192d223b6961b9d0f3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552c59017caca35def0ece5ce1fc7a36d
SHA1bce494a958c34321d1c78cb8b8a580243a837dc8
SHA256b569393185aad0b771926a257b46c42c29f8cd8821d2c11dac97e691ae5e23bd
SHA51291c016809224568250aaf658565e4946efcde38059ec9ea7807c5745a270e51b0037c9ea83e164b9b5b6494e6730527d85eabe555da2843120e94ed8b15abf8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557eec54e76421f3cd2ed78a1b87a71ab
SHA107d7c1d525eeed54e07bccc7e5c194b117efce21
SHA256c4b4541a1bf776935e7f4ec5eca66cb67e8e1e95afb08daf91d1d77ca9381547
SHA51277d3af95d03e3f5ed7ffc7b7f6dea231f65d04a854263824bdb800da03a7d5064cfb36df66a1726afbb9de1109b6b9cc1e7b18ebe5e4b965b2a70b3a1a384503
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5318200e17bc62f927a05afbbe52e13a6
SHA13a26b467197f3d0f4d7f0ae54602c32ba7945091
SHA2563758d647ff3b9d0d147e260edf806e65a5bb7a3dfe251b2c7e1c78f3dc7d8c0c
SHA512bbe3e534942843fd6779c14b23bfc2300d0afe90d33fbc39e989f65c6b9154a661c95f3ee60424b07d20163687d8aa1215e70de965762ed4e9917a323e3e725c
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a