Analysis
-
max time kernel
137s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 11:13
Static task
static1
Behavioral task
behavioral1
Sample
754b8e50007a95e1f3c5032cab27ebd6_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
754b8e50007a95e1f3c5032cab27ebd6_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
754b8e50007a95e1f3c5032cab27ebd6_JaffaCakes118.html
-
Size
44KB
-
MD5
754b8e50007a95e1f3c5032cab27ebd6
-
SHA1
9a32b14600ca6fa7e01949eb98018dc9b2bcdfe9
-
SHA256
351d67eaf445418e19e797cd3a841789080b3b446d42618fb8cb9557860dd3b7
-
SHA512
1f962e0a72518c0bd5fe0285bc522a831e7a8feaf477056360fcde58350a3d07b861fd8d74e90622da06cfdabd52981fe8b00e1b65002b34114e58b502c4efa7
-
SSDEEP
768:QGKM+BvLIACkCQCuCPCSCaChCf3xmSxicBqBS3cwQOMvx6JaE/00z/QEAJmb38NA:QGKM+BvZLxd2DNu43xmSxicBqBGcwhJJ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a230000000002000000000010660000000100002000000054737b37d5c0abd468bd2dfe8fcea0ebdedff317613eb59cd6b95c4a77d44a02000000000e80000000020000200000005a4cdd8c8c3c5513691941f1784970b09d7e33c0471793421b421330111b01d820000000b22417cb48c602a66e94adb3bb65d26c96fab4f047a10877107187740d56d7d640000000dfdff703edb2f0503d2d36d724c621f1653e08802824dbd9b661ca6cfded9880cc5be48bca8e355d6b5101f033fde3786b4dc05190e5741ec90dd7e234f9387c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422883906" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90c2f5e15dafda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0CD42F61-1B51-11EF-A233-7678A7DAE141} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2012 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2012 iexplore.exe 2012 iexplore.exe 1676 IEXPLORE.EXE 1676 IEXPLORE.EXE 1676 IEXPLORE.EXE 1676 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2012 wrote to memory of 1676 2012 iexplore.exe 28 PID 2012 wrote to memory of 1676 2012 iexplore.exe 28 PID 2012 wrote to memory of 1676 2012 iexplore.exe 28 PID 2012 wrote to memory of 1676 2012 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\754b8e50007a95e1f3c5032cab27ebd6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2012 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50af1c76ecd86425f6ae57f272983064c
SHA1b630b6be67af12ba33f1d8c342f41caaf1d5e725
SHA256c0e7d0a3b5db54aa8d799b3d02fa7e8b29d16571d5beddc9acc1f402356ab34d
SHA5128241a7d57c5f833b557e5be4d571548748149be5fcca7b6418c661dd8d99f0436670af485e3b14f55b1137b752c24b776f5d61bc18302c772d9fc76e3607fd22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576f2961a33663f183d31a80131507c46
SHA1f22cd94807e413122f742404fd075c03fac9214d
SHA256ce0df0d85a4d824928052382c75feed05c62bb740d8128f208a40716c9185f06
SHA512ce7bb847654fe666919b1d1761ce824b938dd7bb639066b55d4d39e30eca978d0d2801053ed5bedd442a83db3017036ae6cdbc195286bc5878ba2eb893030621
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5659ff3e883e26d35b076ca6f39c758be
SHA1c86f4936957376245dbe3b60fa4d052ea16a9e62
SHA2562ebdad771f974f1540a925ec95b48e1f747d4e0304b5c0146032b50f24dcab59
SHA512ee37118f53c6c320c32648e096727adc095f735bff907110cc72d0380bdcad392b924fbf0bd354f05445869a0808cdc8c55b441aa9c55aa3b0f75dbe8061956c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac78fd57509fe4d3d657616e2ce7cea6
SHA136657895aaaec4cc4fb8f8f9bc8d73ae2969c089
SHA256aa849f172e2b00d69dcc1d79879c6394001f751b3323198a609a7b5641529da7
SHA512e735f01914686fd97c950b1ff25119c667152c802fbcfd91eb5b819c2f072e1cae8b0891b9a5e733458ea48b1f00bcc2836fd1bd37f8497fcb01492f9a300f83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a4049e898460697e7aa8cba4ec86832
SHA1979ab1905e2088800204dcb48bc2ea2c523bf099
SHA256206594f1bde38f922670222552e74f1c65ecdf21e7a61631969d27daba159aa5
SHA51223593cff07f4d6ac3fb430722b0e9db5eedef208f48d2da9bf97bc850b169488fa91eb57120ce98a601659c99cfa05e124637844894b00e6da07de05aeaaa8aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e6864bac2a993ab8e6e6ead98bc7734
SHA1e9074477d2e082107228f6f157a9d6f2e2d6fa2e
SHA256a8f3adca9045ed693ba09a97f60ecce1cd17c6ef5548eab25ee20987d60cfe49
SHA512d24f6fb8849bd7b56ab704cea4455bb9ee393fe5a3367e20f923be01b2b8469d84e53efd790fc7628094a6cf23e235ec1ba0d50f0c65c55d9ff02342e7126a47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aada83ca2070783c548e0b853a8443ef
SHA13c534079a471a86b400595b342e7edce876ef41f
SHA2565a8a74dc26d81ae1c86fcd57d30843f0a5ccbb9c74e9425e2729b8020ad2645c
SHA512c00d9b1d92202b5d0b2d7d79349ca897c58c425a1cd11e46193434d538a1ca3c15ce437d9830cbcfba472f046ee1f3c0e43cc1b149c6df176b502881d33baa12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5edcdd0cdd17af60c0ed8926327f20403
SHA1f1051c5f6cd0d4fbe9395d4e0ce4bd59f118f3da
SHA2562a1849fd01d9f85741688ef45bda9560cba8286efd3ffff48342a8080093c41f
SHA51262a6c58ded3d92c4f61ab7e1b642ee26bb44a7e6f232cb90fcd92cf7439d5b15f1b63f08e16650150dafa6920f64050bc4849c3eb3c231d3fcba3114507c802c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a381db2979308673587df5009651ad7f
SHA1cf24783ccf39f6c281321a892758cbb9d2436ee3
SHA2568e57a1c296ad04d5a5f6094cbccf8618db83fbf71e7ca24013da7ecee9758ba2
SHA5127646a202db3b96184bc96352522c45e318db9c785454ececa4d59bdbecac1e62bce44976e6f7916fc52da39e3c7ef3c75e7a7de71571564cce5a51f178ce573c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5d99954ec523d95b391a1820b4c8b20
SHA15e71bdceb6b609258f9e150d3ce879dfa1bed3de
SHA2567887c05d81b0bdc95fb7c783b0c82d8dd983354153d18d4f2de121858949fe6e
SHA512dbc4120635cd6dcf065f0e0d9b7ba4d5ea2522c9d5a3f3e9ea4d5ae5a14e7a534b56a75523eb7591229d213748a937a109d95eba7a278bf7026f8083c3fbeccf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c03715a5a4aa83fd940c911d1ea08751
SHA18e0c6d0b4670d36dc23f497e291478971368404f
SHA256ca81918e40280386918e8e5658c64cb83d425342c249900d4d76e19e0ccd7f20
SHA5126cc22ee1f16a0ed461cd5c09fab3a624a329c15956910cea2d3f737e0d41692ffa5958b412270a4fcd61b8163aa86b15046f9fe7419b875294e7b6291258b7f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d2bdd12e074fedbb9fe74f2d8f0aa15
SHA1bff83abc96d46189e625c6f65d6c512ee8b40a22
SHA2567330b190662eafd04f923cd95505b063cb528ca621108175f3ec41323db8fba2
SHA512bc1093c0d6bc1d91433df3de905a34f40194d69acc1a8cb38b86ee648bcb1a401eca2acb16fcdfcea256b40f3f7989f1612d0d47ad26607280a6d2fec209c369
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555a83b3c2ab73916abe8dbf3d07e00de
SHA1a7f0e0b7f08384e3ab69c28304ef02b0410cbe31
SHA256876aa0b7db984e71b432d64ca2afb56366debd725fc41cd84b6748b105ff5e9f
SHA512a5c9aff8c4463a62d7db7811eae4fceebc1f3bc717ecccfed02ea2b24e969e18210b268ffdffdd2a55d64ad7833e85e402fc818faca6289ed5ec9d65e82b3f82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58da7b3ccb9eeebd9303da995379fb743
SHA1b949c585872354937de589137c473696b5ad16ba
SHA256fa64abc00a983f3446543f3227b95920e615063fa965aafd7593eede16dfb58c
SHA512954572d01828a6000606133ce98d92d312a2c318089eafb3ada8e2177468a61169739e47a491803037264f02434e1f35c4582420ee75393630c203fb2a9bc132
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502884d423679d511a9131dd9602e8d9e
SHA16c359c1794e5e6429d6cbb35239ed4a347b7536e
SHA256b55712c5a7471f7212d64e94e8b976a5da496a5b0290780ea082efccd7704358
SHA5121a81b251f4c7dcf957505a5c867a42b3e98f0f80593df2236053af2c38bd5e82fe4ec5a45dcd49f58a77b1c353f76e16a86bd7e58e985eab8f9c096c1d7a341b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b6b4b431200bf2f15a2500e99ff1820
SHA1cc9b63d6fe872b7147f7774dcad9139ab70652e7
SHA256afd94458023263a483f65e85bb72db3640a125b818a775e06f73556891ec42cb
SHA5122c9683f12f222ec1f75b9b3daf7be8ad843931f4d7f744fe57f4d116a4542ce5bbad905b6062b4f4427e03b399815c9cc2204d9d55a45b0d028d49ae1415df41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5295b675a45ee097bc8f474a5f3b18ba6
SHA132dbbdce3e801bb7eded8cbda2badf29b1db0922
SHA25661ff01950a0c830745991571340711ed8074b299e2c2f4d8e7f9c94d02465f2e
SHA5127de1283e7656ea1ec03f091fe929bb7ac89dadf9adf469637da272516e1cf86b485f99bf32fb34fec18cd50ae2f7a66fe4a295dae945da3d6b57fa4bcde25c37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1d348715d37da41050ec9c34440397f
SHA14a69a99c71c6985a4fe1675a668c73b51485c851
SHA256e0a809b9d142c5fe3abb9867611271dcb0f88a7bc6da8bf74bc98102dd589058
SHA5121bb94cd518fa748ee899ed8f36947e88ced968a5e0bd47e363223e6ac9cb65c4054ac9b69795bfe26aeb7d9c1fc50ede979aa7f07de4c2ea65f2a4f75db7d7c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501c25f2c7008f5364837cca3ec2e30b1
SHA157cb76ec08654135891b30ea37b05045e4e73e76
SHA25626b4ae150c7e00c195f0a8b9587fcc3df7376c324ddbda6cd81f368cff694aaf
SHA5128a6676be5980b6b533911c9fc2dc0638d8a99f3384365ed01a61d1be8b0ea19e3f8f7591f2ddae665c880fd0f7c5052b1e02d691c9fb7e30f6f88ca71d4cabf4
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a