Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 04:39
Static task
static1
Behavioral task
behavioral1
Sample
7459c5c4b147c0d029b56b15928bf795_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
7459c5c4b147c0d029b56b15928bf795_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7459c5c4b147c0d029b56b15928bf795_JaffaCakes118.html
-
Size
462KB
-
MD5
7459c5c4b147c0d029b56b15928bf795
-
SHA1
da26f3975a1ebe571581dc6e03300e03cbb6eb67
-
SHA256
32d94d0ea0b0afedbb057e174a96fd64b8cd5af4fc9959bcceb9f8281022cec0
-
SHA512
6775a6b0fb92decb8c5763c5917d36aee6705b18c1fb912d5090127d49ee1c93981438c4b777642b00b3bb0a4682359688331b7a55a452a5585dee371763b024
-
SSDEEP
6144:SWsMYod+X3oI+YCWsMYod+X3oI+YpsMYod+X3oI+YLsMYod+X3oI+YQ:b5d+X3r5d+X3T5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EB0ADA01-1B19-11EF-BDA8-6EB0E89E4FD1} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422860228" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 009ea5c326afda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000006ae80b98d66b3f37b1271a5e99f095df3b2c29be2e92ccda61178d4d729db149000000000e8000000002000020000000b931df4feba044da83aa648489e298488c1b7ed382fce61920de903346bc49ae20000000f04963a103d8cc858b75332ec6ac0fd73b2d254f95efec989122f2a0fd9d285b40000000d159ced24940d6aa42c92f3b7a76361c39e7deeccc3300b39b3e9d5c8af47a1d455d51b6427344ea3e302f7e6b25e0c66d1a04ef09bf0b4e29561e8fac95ed07 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2940 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2940 iexplore.exe 2940 iexplore.exe 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2940 wrote to memory of 3036 2940 iexplore.exe 28 PID 2940 wrote to memory of 3036 2940 iexplore.exe 28 PID 2940 wrote to memory of 3036 2940 iexplore.exe 28 PID 2940 wrote to memory of 3036 2940 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7459c5c4b147c0d029b56b15928bf795_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2940 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7f3551a71ddd9f148c4fc9bc757d231
SHA1534e4166a121ca9a72091c702603c8dc54a4777a
SHA256ad348bef86b93a647ded1ca36fc2f6299c936e88dbbdaa1fa8d5640059872c01
SHA512a68c91b84f6d8e3ba4a0bf2abab16a4af0dec8743b97983c816a72b5687312783d0d3442df26a7d265c64c8d13bb92a52da66f0077d5b71ffd6e10b5ce74f61c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8ea86a38d802fdc481a9fe7d579248a
SHA1e278b24746e3aaadbde21282329bbfc56dd79938
SHA2564c0d44b0492841327376908ae1bab2ba7f7a26d2516b5c3f4b78fd1061e94264
SHA512be1675130db36e79a8177ec668068baa21d0936eb4db263b29f7e99c2259e85a27b7ad2df3a7fbf0b669d0dfa742140fbf28d03cae05f36a595ee1eca1d2ec46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518da3d4daaf4c70ee8111bf17b504384
SHA1eb5491c9576b6c3331380b806895c58c08782cb7
SHA256e21a8d8a209df7246be78cda93c3ebf0158d0650a32e46431410f413e54f4413
SHA512cd21570fe74db941007d598843981da3361bd9ead0f26a4c55979e5e60a828931f606a9ea8efe7bffa9566621766e91554b5c7858503dfee49f1e05989bef3ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b97a26bafc3e7d7b726e3237901cbaa9
SHA15b82e036ee6006fa4a954d0876001e8c4bc0f7e4
SHA2568aabcbfea5aad65504480a7fb9e618253c2f580f59406f479ade37b403fad444
SHA512788e88d60828b367b8a916ea95c378dcae1210eb4752f4e920089928174da058ce0767009d20975dfbd8c2323be50a0c4e5d4f33432c5bc87ad872c3b628e348
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5573dbe3cc11b6b41af12cb057b2d1e3a
SHA19886a0d0d0f4c9f0e02a69cfb693e960de3c5a2f
SHA25600986f07340bd7700714579a4f458bd03544c6709483cd61c355ee7a1396164f
SHA512500600779d90599596f464b8b460760d5625bb02e26be14f38bdd10974cce06543d1aef277a04e876fc1569ad4366dbb9cd278beeb7079d6d71eb9da27e30778
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ebf2c66cac5f1bad3944ec3cf8da2f2
SHA1714f42991264d5b28adec2e4f690901658548133
SHA25647879fa9765af764558186682c13cc4650d96729f08e49543bba8dc41d0ef20e
SHA51205bdfad750cfa210ad31e1a934e919b3606f4f9f54351ed8b34ef65cbeb24e96afffb28e485ce773d584486be0e4b85e63b88b2eeea147ebeb426a96195ea00c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57053dd585af84117ddf27f6aea876686
SHA18514092262e813da42bf8ffe7d15e4a564637e6a
SHA2563a20c002de0ad5fd7399dabe62c30598f6b48279b3de448318c459c6d3090e1c
SHA5125ff0b1516d3c0b8601f472013ee26a18eb002f6d628f0349e681cd3045d478d3823f5a83022f7014fc01cd79980d8245adda1bf49b5bc3faed6be8cd3c5ee4c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0cab6049c163d8ee5cddbe8ea1419a2
SHA1800dd7872d701370af1b41593914e25da095a691
SHA25613bfb9e6c71ba0af2164be891b66261baa7cb085335f368bb01e1469c8653891
SHA512dd18f46b717f246b535ef5a8fe1c1dfb8317a181cfb2ab0ddeded999f66df8405413a406210fd664bf99737ec04df22b7efaf6b78259e63a9730a44f59ffe554
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a9ba1de3d30993f14478d6bdabdfb3f
SHA194a31fd317ffcb0fe19a97e12366eb9758431468
SHA25658d0e9e9a7b3e61dfcc5bf716f58cc26403edfffd633379a2246f7f09b8704db
SHA512cf812dfdbba8fdee1646a31e71ec9222b5c80d3c34aa607846112e8250e0c5bde25f636022dd10b10c67fafd5c3f2c978769bccc3e3eb651c57345a93ce70eb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5476dee1b57b7ba48a364e7f403ad8a57
SHA1688a7902ab54d4a3f891096050d3bd3991f04805
SHA256bc2b5288779d0e658ace0029c84ba1a0ef3b41608b457983e2ebca26c193cbf8
SHA51208318ac72b8b0e9a55b5e99150bff8fdd8a9e52fac48040399f1699f10c6c50d46ee20fdd5bd637db445f36f7168554576c88b49aa2a2c884a384dccc86781a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f53712056e3da3b358106c35c52cefc2
SHA10da3e4035407819c931987ca3128640d903d94c0
SHA256f5b6a2246f0c18e7b0813a8842248d7987b5935ec376268554c642993ed3b9ee
SHA5125f99530fe3f9f73b1bd8cf74a43317291428e62d7a6d0d09dd8700302e8a049f269c4c59a002b891ae5b6ef5f8f30eb2629b5b8dcfcf2d6dfc84ec48ce090900
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c341913e7a218ff495eba436cab2afd3
SHA1e2ae6e43b6ce7e6f0867a2ef8abd1783623cbf14
SHA256950ad997edecb78b971376662ff8520eea04cf4b50012e744ef9b8c3e7e5cb35
SHA51272747647e57e3c8760e5f7c976c5f4d5491acb32627080c6f94dd97ff212c29b232e0ecbb23a777c2d48308826136c019138ab0697d41a238d0904e198c39a42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c534a92e3b18742a6d3c101e8f4f6e77
SHA11392493f4f927ac28924ee5108ab4ccd489e09ae
SHA25690b65e6c0abd57ea934beffd2b9dcead9949510f0722da95dd68d4dd3f9f637a
SHA512033ebb43861a39b1875ce7360d6679dd68ccdd4891f1c5edf01f1a96be3fe274211448150e38215ded3d5f425467c15636fdb7bcb6957be71f74f5b822dbeca4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d667fbd1286230808fe1313f6c7df0a0
SHA1e73ce3ae887c8b8abea7bc79d8ac16e1df4b8f51
SHA256364ec3890e308f38e31f27fdf57e908f952f06857243932d0d14133f44497e0e
SHA5125b114fadeafb8be42c2c6959ff49d416f6d3ab2c24a52afb85aebf6da39780e8defc229442f1db3fc301840183fb1a94899ec8042960b7e41111cc2e2601dd2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d54ebb93382ce13fe4f3156c3515b86
SHA10428bc13688a1eb7d274df8e67678661bde7df58
SHA256bd1030cba942e0c3f26130cf446eb6c2f49564c16f6990149c81c37a2ca199f2
SHA512aab9d19be875c6353bd054d254ea0adb01515810ea9af8ce0874d6a3af32bf72253e9828b92fefeae67f45e28f598cc10fd6599d1b1fa1205fcc346572328249
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d213878bffd629b6a7507b5d03f7f17a
SHA1ef14d6d983113b439a4e426326c3f8e8662c8e74
SHA2567f6db64d7c2404d3b6c23c4ffa9586ed9c39e9ac42510b399796141332ae7c75
SHA51266b484b12793a1a4d04508420f2d26c99359d292bc733d20018ab38b1138af109b523558135c0f88544be6b0184a7b7750956a80bcea46ea626aec3dc4ac2d0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5aea7d22b99480d4d524c0c494ff99a
SHA1390a66a98def698b996d849f761bac29c0f8515c
SHA2566e18009bfb2605d4648fa8f30c70077850486fd91b73774131ad59c92ab13702
SHA51257ebab7c2b4fe75aaf922241057645775bced7a4b7db2b8628a81daba24e8438f4a41d0dc6bc87c00a7777a778dc2691e95155db75fd0c5a6f15f20c86a791d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55da08c77cd826201aa92cfa2f0da5f8e
SHA12a451f4bfa2fe570cea11440f30dc3dd56b0c7c7
SHA25678c4911cb581d32f57753a803ff3a2b9e81a4787e91885476e4a27dbe8bc6427
SHA51277d17641941ebd82f70883038a0e763ae838071706f690b4cd09dab475869acc910fe1983e43de14281fc621c599f88db1e0b5bfd4fe2b26733fc117b1a5e53b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eaa5e1ddd28757acb024bff4d55e0f1a
SHA1e50da69075e6c6988792dfb5541d1c59a55dbddd
SHA2569531e9056a62d33d144881a3d0dc11d7c61c6b1af3d93eae64b95bbd0032f629
SHA512b1db860be1d53237a2556ce756b9f84496f882e486381c86d0c4744a79c564a63192bfd28af5e11400c7e8427e4558638d3822601ac2249ec31cf1588f437d87
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a