Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 04:26
Static task
static1
Behavioral task
behavioral1
Sample
7451b73edf2d01c03db5bb075772bb01_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7451b73edf2d01c03db5bb075772bb01_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7451b73edf2d01c03db5bb075772bb01_JaffaCakes118.html
-
Size
269KB
-
MD5
7451b73edf2d01c03db5bb075772bb01
-
SHA1
0c4689e47cb8072569cee392501d38c4e050b4bd
-
SHA256
0cac9f4b4012f8b71676aa5c5422e73435c63e24836855328809c1fdd1313fd1
-
SHA512
0df3632a3ea72cec14a59abfa62f2e0d8898ee7e23d7efdd29cc248fb95da30be8245bb82d6044a8d495d2194e86971f3d99087d994a8e42e6093429b8794eb0
-
SSDEEP
6144:rzPl2XVncd5htfA1p+NoCl1r6RjoTFa6bDXRY:H92+rfv6Cl1MjoTFg
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1D1C6561-1B18-11EF-BAEF-F2F7F00EEB0D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e93610000000002000000000010660000000100002000000002a1c14de2fa917de5507119f6037056c04429767cd8c89bb37e2f9a7692fe2d000000000e8000000002000020000000f4d7b5b7efe990a8444539c94cd93621030c213876da0654ee3d65f25f32d52f2000000017a0e4a3f6b04e5e39e7eed8ee3305c41d33fbf59b65da3950d043ce49ee46f240000000ca8b879bc6762b014abc114bbd07befe34a6a066ee9083c33faebc53fa4451cb712ecfc222054e813fb9dc943234dd25f1f4cb137688cc276bfb88cf06502f5e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90e02ff524afda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422859452" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1868 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1868 iexplore.exe 1868 iexplore.exe 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1868 wrote to memory of 2748 1868 iexplore.exe 28 PID 1868 wrote to memory of 2748 1868 iexplore.exe 28 PID 1868 wrote to memory of 2748 1868 iexplore.exe 28 PID 1868 wrote to memory of 2748 1868 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7451b73edf2d01c03db5bb075772bb01_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1868 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c32b5831aa53cd8edbc918ecc767eedb
SHA171beaf562c97efef6ebb72d2b0e42358313c1511
SHA2566cd68fffa03930f647ee762c9b8d35ddf91db38bb5efcfb043f513760a3bbac9
SHA512ffcaf7e2d51680ee213cb013dd4597dcd560bd29d5650b8515cda1ceb4b76dfb78f93cd200d5cedbcb897b63f7a1386f53984e08edcb6ce2a48b06b6a54a1f0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1d97a28036685a9d86b7112e7b172c6
SHA1fba738775efbfafe602022562933f3297c6b5b25
SHA256a8e8ea03270ca1cd638a70966b1fcda92227149899d305e91eda3355ae57d807
SHA512e0cfa1ea51f0bc76c09cbce2d9a2a8fffa94f01edecb7b7e46ce49d755a1fc6c85277a9460c5ab9ba4f467c965c6e8c577e5a731f38178b05995056dcf57294f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc14cfe05fcc46bd3c489a62d2fb06d5
SHA1e14fb7d1cc6c7e406eeac50850527291b15f9097
SHA256e9a060754c8724c07219625a96bc5d760f9fe5634ab60867c784ea35543bdb33
SHA512a1a534746d017df855823895fd9bd2d1df8b9e3c317c2031b1fe41ef705ee3a1c96e671abb7c9efd1dd9be228ff89218b63e8fcbabbc2649e854dc2002faf741
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58cd535364006b29e6cdf32f68370fcf0
SHA17a93a8e6a8aaaa34170a6ad50f39728877b3c5e6
SHA256ef0686e0ba8119e3b5c546d9c304a6753c181265b6906a30fc5be4b8c4fa6ba0
SHA5125faf4ed3b4b2e477e12e870d9bc9a2780bb4926cb33825bf0bb36834d21add2f3bd5ad8b2032cef7b17ca90bbe790f01aa11dbd2f174b666ef4876edb92e3f42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee0ccd1e62acf5a609c97143419976e2
SHA1bb27e0682afab605e47c7d3a9ffc849ab6dc1462
SHA2568d769b06e6b3a807bc1d2d4c2b25cef9ca19f518622db7f4d1dbd4152133271b
SHA5129fc0abbf2916986defc7269f3a3545c951b3f57ac10b205cb2fa33b3b6e87ee852eb20ce095eb27a8e1e2ce9ee2f3e48ecdd6857c6cd8b5c8a5f986731f63906
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0c5f2cc96383ab648e622c4da606037
SHA11148db992354b4bed40f77828aa9539e52709b9d
SHA2567cbd194bcd293f472da063309a4729358ede7cae8f4620ae97bd9792bc3b7e6a
SHA512762c2d3f6a0905f820aace76a963aaa344d7546b66facb11615ff02ba21cbc749c181f5cf89c8cc9750330cc8891b2cf80114e95d6b9f32f7f3f3d565017bf4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519bf0fdba908678e2d439a07812f41b5
SHA115997ceebfc31a9bc4c5c08a44fc1e849ff54357
SHA2560440c03364bc049a4e7bd46b7fc0a858d4afb878889edd8eeb35bcb4f3acadfd
SHA512e52d9a6f7f2ea2d641d16eae3cd3fd24404219cea7fffd35d558bf1e83701472417d33756f4eb030563ba20996270a24366bf85289b1af07b9d328bf27e25cac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554187d9b3f523726f9b792f4caeec348
SHA1cc51c9de521ffe5bd0ab2615a762fbeacb802635
SHA256e6c7e6032a804fe5ad4f3242d4d026ab21879148540c11359d16042f5300c5fd
SHA5120fa50ccfcfb79d94747061532f96af7388cd6150664dda8f79fdadd086ed2addeffd24ed9da201a8df980dfefd41bcd7f01e5892f51e05a14b65be0f3f96aa12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5110f5acc35e641b4cf85f1db674afa3f
SHA157880f3554c18207063b83be54343bd76653524e
SHA25616fc6b602c22cb44c319a19257815eb81b300d771c88e4798c192b3e7004af92
SHA512d5edcc607fb95a730c62cb443011da55cc58207de2650afe6c2351cd4eefb648cc4e4dee64df1e54babfcbb7d10f8f83e0987cebe49483f1a558b6b4dca572f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7a29c94133d8b01ff435f02babb3128
SHA16abd65e1e74ccde88c1056fa4486bf894abad040
SHA256b0d5e59baf9895050d563f757914a7329e7d43145a604945746f0eb5fabfa651
SHA512555435c15c2e08143a6d921b398e46c3d76ec3332efdf0132fac8825195ab0e016e10bcbc444ab2ef001322ba8da4e8e8ffd5b541daab6f3aee454fb088c0e79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56fb62972ff934ea6540cc5eab10c9d02
SHA1eb1f4847db4485783ace8f2189a1c90f9623cac6
SHA256c5a2e6e4be8769f51ce410e0d61a1c8969f7774d04696877bc925c6a19e76547
SHA512fc1b8a0cbb94167e1eb6c9444508505cd0bc1a2890854793607dbbd4e3bcb7914065ac85f1ba1e617dfcaf7bba6c2e178cfa6cc9dd6fb690e7921d0a6bd06eb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a92123ddd8ff6fd4ce156e06fa02d55
SHA1d37a31cfffb99fe0b20f83596e084c1dba36094f
SHA256cf7a5d21cdd371504e98955fc313d623ceb19b0d448b5d3c561da07da81a7755
SHA512aff3d46857d76c7e391355b4c87c8b03f473fea141c77bc9f321f53e5ac9a8dc082a7c80098c84fc0f8043dcfc04d52c73758be17b95842ee2037a5009b1350a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522b83dc726330221efdb054e7bf70828
SHA19862a3b7e31af7c259d873ccbcf21b9dc2d2310d
SHA25691590966abb51a17d63d6166391bb3f3e195035c6bab63054f4608c39a382046
SHA51236d972ad118deef559d24635d89c5b799abfccd2524e0df6ea2cccf10b5a24869460d467dc5011241fd8988069148dfc89318b782bc543ee703d85ffd86b5ee6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57615cafeb8e6de10b0b6a2daaac501e6
SHA1be6769b5da9e9749ff938e507399f921a40a9201
SHA256bf70b4b01ef6a831fd69fbaca4a7549ca81ac7c86997d9d2245e3abd7d234e31
SHA5126a672c22bd0e79a19c79f9d3f5b83f2a03272598cb2b91dc741ce46cd03b8deb06eb14abdd9995aabc9af0d6e7d46a33c3961306392056cb4b57f087550dc66a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f2d87de54c8c923883676c0f27a9ffd
SHA1d42ada637dcfd44032cc347d7edc2e5c67bc1003
SHA256ed1b5242cba0b5c4b149b9505d6be239ab77d44eb9f18c734808e7bbd283c974
SHA512492d12efc07de9e60d838f3e87dd0163b18a63e8a802921e13fc92a37ef56ce49dbcb1aace4319ca7642a57bf67519730143206883cb241ca78c261343ab7e07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599f60e26f8df59df7967bfaea2c2650c
SHA1940cdbb7c876dd2988181e463f717562334d6dd2
SHA256af137245d7ab1cb5f9c1981184006d30a913b86c95801bf8708b836e9e0fb46c
SHA512da6e8896aac1246b9347ed73a2a8fc0e47e9f37711c1ef633c42c4bf43c151ce193476a993794b94dec998e68abf3f8b6a920120057f8c551ae9e3c57a1b9b73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7d56b692c6aec70fc80a65ee45a67fa
SHA176dfadc13abaec1be9aba66eb3e96151e7cab6ec
SHA2567085b1b0489da2a26f43afe86f4b220da01c504d05745ba0ee84d798c9bc271a
SHA512c302b7ca92d8d59ad8bce475174e46d2d92d10f64bc7e33a23cf2f803dbf084f0ffa053e3190050f9620bac4f566acffbdbf1f857968a5fad4633a98804b7e6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c16b93ca1f6f3528c91e7cbaebb53572
SHA1cd300a8527eef0f48819c78bc5d9ccda7014b44b
SHA256ecc9c9233a0539fc1b4b0da7fb81c73c214f927941a616fcb77fc6413f1da9e7
SHA5124386b0a43e6fb3b44578cb68f624ef5fb08507aaa25558b4f7647c94d3a742151ccc5fe45ecd4bdb9579784b7dfb3e6bc8f309dae16689ca8a57223fa7c8419d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d51ae0610bfc3b7c4a11406213470330
SHA112538b1b80207b364373e34a5a994ca85e0c5823
SHA2561bc9d4a929eb4aad655ffa2e8f059a8bf16976a5718da24663e9a6550cf00820
SHA512925fd86ed4dc45449757b2191f2e045dc11e8b4ee5cb69a61fa363a9e57077b083d41629baed19a045a2164faddfa1d158c68d7117383b6930c4fd4f1ba600dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55597f032425c9d4389d8cf6fce13a53d
SHA1682073f59321d69cc5427710197e4e9d195b7162
SHA256bb1dcd9c095dcbd41c95155e665adb5af28ccf3b9af75244490188ddaaa300d5
SHA512f102e97edd8c7ae3dce95d2b8e05d5a129de512bee4c6a12e8f937d3fb39e9f3cfcc13deec1b4fa18a97c2ff40985b9191a30d54199021002722f829ca33a996
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a