Analysis
-
max time kernel
138s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 12:25
Static task
static1
Behavioral task
behavioral1
Sample
7578c388f371480a1df669ef1755dd25_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7578c388f371480a1df669ef1755dd25_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7578c388f371480a1df669ef1755dd25_JaffaCakes118.html
-
Size
74KB
-
MD5
7578c388f371480a1df669ef1755dd25
-
SHA1
23d73b7286fc950a187171a8bbe3fffc0e557c7c
-
SHA256
db30135c0e2ad6af5f9d4ffd7bc22c7d94132dae6286a83355c2a4965f226aa0
-
SHA512
fa9e7b43fcc7661e9bdde29beec90a555c52cc559c690fde2172873dc909f6489f424ea78569c4aa54159ae573c80a42e5a92434de190a5ff3be8a7fe4243f29
-
SSDEEP
768:Ji7gcMiR3sI2PDDnX0g6sk6BiBswGfkYoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcc:J3L6swuWTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000001d6392cc6ad7927f5cfff8fd099fe02a4e77a1c080770403f1b128fbeba8014c000000000e80000000020000200000001797082c5d0fc4cf5ad49d6d6b2183241fc5546c7d10964cb5a83bb986941a6020000000a9a4e892127070a85f654e8246aadd2f0c49a0a90a3bbfef4d8ce19d45bd375840000000f9e6a2f6f7fd0fd17e853193e7365a96062ee7df785a95334637001476095c65a53e4391a9889bda24397ab54e5b6a0d335fc2259f217b7175e685b424b150e4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40bf313171afda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422892201" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5C774A81-1B64-11EF-A1DE-66A5A0AB388F} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2236 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2236 iexplore.exe 2236 iexplore.exe 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2052 2236 iexplore.exe 28 PID 2236 wrote to memory of 2052 2236 iexplore.exe 28 PID 2236 wrote to memory of 2052 2236 iexplore.exe 28 PID 2236 wrote to memory of 2052 2236 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7578c388f371480a1df669ef1755dd25_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2236 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc4c508a50491e6aba1335b45ac803f1
SHA1c9d8c006bca73464892c48be971f86a3c42e07ec
SHA256321e9ddfc6bbb055f2f3cb2c2212eb4663f224386cae9b3a9b1f18653258567d
SHA512a9b02179d0cc97050cf39796a2484feb337271b0342263436f63586495aa8e9909d07eb73c188d46e468916d75584b17ce1960024bef30e4f766a08cf04adbb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558c703410bb3b47d8e85a1e22cd27236
SHA1e88b0bd8f28cecfa07434587e46e3cc1c7209ccc
SHA2566c2b35b7180eb02cfd71bc70776bbe6a8b39eafd1b891a3205f563cf4832dc63
SHA512283e800c565841778838d7fa095837201a38aa5c518fd7517943e627e10515ad8af3d10cbecb643ae56a3256b48dbebd2216b765086f43bade4afbbedc4d7462
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53160e2f895dc73868d428b2517f31ef1
SHA158ff7fa2674e7824e6ef384dafaa491f75157334
SHA25600cd635db86e2341445c1162ee63f292f50fbf6181d1b0ec55afe9904fe408a8
SHA5128556487cd9a0836ae97e04810febb2a3614e4adbfca731bf6b4b1d4c2f4f7e2e84cf01085419ca620c3ca08734016b76af99f8e13af6b862f91e939e0eac4306
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d48c1d287403e35d07ed9618b176fd1
SHA194891043230afa3266b3666789e995f7651609bf
SHA256e587014f51f8e2a94d94bc7af1079c87d518d4e8b5d48611222c15ecbacfca5a
SHA5120d6b6522b894f3a2c9cbb703e231b627e084b799b1d2c1db379d50132ac8297b7f3f5becefd0a0bc1d960d339fde6a3e654b25491047c6018bbb294752def65e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57da8447fccf89eb77926fe8f9c27d9eb
SHA1bffc1d2bc94543cb6a2ea489fa30e1d5fe7f8a26
SHA25675adcc18659ff95eb6e1c218e9cdb29b4e78ec481b9d31569c60e5e80d4d2f6e
SHA512088854f6aa7e8532c1a82a09429c9286e91daa3f1706cbf07bb8b8304e991415ff8f5cb86aefc19176845e20d7b433e0a0ac9cd23ced9422a747b1c2f6db1f99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f560250b14bfb20573550224a6b89b9d
SHA14e8d8b79b2c5ddda761764f1bbcf2cd59a3945ae
SHA256b5017d1236754893b4a7907363439db74f791a325624aeb65447e86de10fc050
SHA5122f69d9a7e01d03c849c4eeefe1008af38300ea85aff35aab8d61e26e543b5de7c5d83925a8c8edfea0efc89ea69e7ed2d71b8521c3bd866445404f9aaf24a8a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4178f2b5fd67b555beb1da574bedb49
SHA1285bef031fa08d59517421526d3f29ad7d6d19c4
SHA25620a1a50780e2d12c6c4072bd006df49c55f4e66f5c207fa477a5239bb62528da
SHA51291432ea7481c2bcd07d188fb739cdefd9b81bcca7bb21536024fb6f47910e66b88a4222bbde44a21b6e4e4f3a4d56ec32c1d671b53fd020e6baf389fa433642e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519cf13c8cdedde60a215faf2f8c675ae
SHA17902e5f3f217491a7082177fb4e6ce691f1f11b6
SHA25653c4bd62baea9b27534cacf4265a354fc7df8a40ad35539140e88555f21b9578
SHA512a9c48e233dbe8f44799ab215911c9f1984fb35497f0870e33303340043affc8687e60c41ea6fd4c3f9890169f07f9d4a9d74fefbcfefe7dd425a6ea3ea9dcfe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c36b792475974d9e71f0b088bbc1865
SHA1a59b95693f7eeacf26a9a36faaacfa7be1be2d22
SHA25632e0ed94f261dfac7003f507ad7f3ec57ce8930b803bd5cbc5bb3e33b84f7f68
SHA5129c2b183b23bee594c0545873cb3212e037bb1e85138b3434d2ea51af16041c957c6869c6e313cc9a2a3e6e87cfd6dbf9447b8d72c5e743d0112d83a79201c21c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5584d90b62e838d8adc8ed9e0e5d26eec
SHA12cfd2dfe89215c3f46dd8e3d771881ead7ed6513
SHA256bfe60ec612777f61724b2f62f7bea8a390a1f5fe8be978e0449602900da028b9
SHA512ee1409a089d87ba616c1738cfa97af87162459f2ff185490275b1e4ca000a05b58a19cc6a3894d0ff960dcec6ea3271fb514e974451d250bbce6dfd6f2d31c34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55954462562dec6828c02acdacbd0b019
SHA14cbe49f92455cee88746006b41c6a208677c86c9
SHA256e0fa30da102b21ae45e00d15f85f88f8a8ee22c870001fc2047bea994e779e0b
SHA5124a616d903c63904896d811e333b5196c55785af8b7941a5cdbc2cd15862199a0b7c75bfe322e5b399ba6d55efd397e93258fb0969c5b29de9f5d1f44f75c48f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514c5b00059e1fdf19bd868934dbabcf2
SHA1a903d0150dc31b1cd63f4110005fb05e97c17a0c
SHA2565aeed688eae2d68a94fe983a5fa3ddaa58112ccb0a165b4bf76cfaac49498ce5
SHA5120a6bb92719cce5cd36676b235c08eafb27cc1811545fafaa9d967c748cd66f9db5c0ca4dff53b33c64821c7e69119e7867e223c0b5a77c539be354b5878a78bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574488281c0a373d237083e5755e1da37
SHA106ebfe66084dad3345dbafd07f57109541f39b80
SHA256b085c82df23d3bdbf1d5a2a881433cbafd02f8103758a109b662cf08f37dc804
SHA51234d6dd3601db4ca9538b13dce86c102c5b0d81a63ee753e3abefd498b62366b6ad99e35a142fe741fca7026607681803f16414e38f750eaf891b3bab72eab657
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5126956232bbe6df5d66ba517d9c80355
SHA1140941d48ba61cbb8e42c3acc8c2d7baa06b15aa
SHA256c232ed96df6402df63db8d770c340339147bf0b529ebe7acf5fd35101a39ff17
SHA512b40f28b158e76239ae8ab19047706aff469094ee92e06e39ed0b17342551b32260fdb4b7eeef0c3c664c96d07f12b01278ae15cc61ba953bced26791b5867494
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6abf94c9d429fe1b387f9270c486e14
SHA10288adb6466af48c795f95d8eb3e22a8295416ee
SHA256a3cf9d351560d72ce458dff71be64dc6c5ad3092f8efff49dfc7c295afd44d01
SHA512ed83595d5ed573c9f06e35eb0396002a86f1ced90774e63e76c19ec0766a1ca7b5ab00670a73249ecc714e735181fbe43631c0a61735026ca05ee595673d88f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54294fbb6e0bc3735bd500835a1a87bba
SHA1c54a18576fbf0d374fd15aa5669bef032f85ec82
SHA25693e0de12ca5b7b7a0f3079f11e458eb48ebdb28a7bf6f517643a197b1a339afb
SHA51213c3dfa439b5b805e3e13e816cdc47eb41829e02f19c05fa5adde6554b58ec4ebb1e61e66aaa90d2b5799049ad443800dbb29987773e1c7212d3e2367a1c4ec0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd5e79687f04685c6d2ce2ed8b85875b
SHA13a1c1cde46bae7947acb362363aba0e3c5246c80
SHA256943f1545b0ce7d9c8bf7c4290dfaf1c7dc838b47940cfd341253b880bb854ee4
SHA5123c5d5415992414e516ce0a3b675aa3cd5e28cd53518f397eecca08aaffcf7904e781da371d798c874e9cea40b93cb293527a31a6efa6c4d17b12c933904ab9c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af5260660773f5be995e9df38804607d
SHA145de3a7bcd546eb3ecbcf42cc01b5aefea10ffd1
SHA256d38a60c3757969a97fb5e9423a851aa62b12020cc47f71d7ec6774c8312840fe
SHA5127a2a0cb49f6906cc60b18214102912fdeb7fd9e042dbff4c3a6dda6562c0d6f58e87a811bad0d939f44ff45f7c2959de846cf26abe357b4d63fe1b3af166ccd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d03193014a0b7ea0b2176ce1a04f57c4
SHA1d7836050a7eff29017f654b8ccb1da24b3368515
SHA2565fb161ba91d9c39ec10f9ede01178f97e23d966daea147ca21ccd0216a46758b
SHA512b1e18054c298332e2626cb5d0def9fef390a233569e651d791e6a88ba24350b2f2b55ef7bc1caddf7b83d217e3025ade10fee3285060b53fe4aa4b75ff3b1aa0
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a