Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 14:30
Static task
static1
Behavioral task
behavioral1
Sample
75ca53cafcf98ef8ee8bbf74bc62b963_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
75ca53cafcf98ef8ee8bbf74bc62b963_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
75ca53cafcf98ef8ee8bbf74bc62b963_JaffaCakes118.html
-
Size
76KB
-
MD5
75ca53cafcf98ef8ee8bbf74bc62b963
-
SHA1
1a7d52e3e878b882574a09391f4eda3fa991ad04
-
SHA256
148dbb03a3ab4b9022b6a2fb46a43213ece9001bc36fb51a3764691081c5930e
-
SHA512
efc7594c0a6516193ca3092ea2f924f8b0be9efb1916bcc5ffcbec792e3279600f75422621fde59a81e2dafc05388d8a0b34b4dca288744ec5cb122c16d0d053
-
SSDEEP
768:SJ/gDCBgtYTSxoQRLXPOkEZv0hL30emYDsHinGNALvFXFdi46lKP+tI1CDZzJ9DN:SJYDIDZv0hLEeziiGeNuQ2DGO
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a07fac5679afda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422895689" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{79B9C391-1B6C-11EF-A759-F637117826CF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000c868700c1746810723f623dc28383f1164ea4a0dea331f822adf35f08dbebe7f000000000e800000000200002000000022b9e29f13198c8a144c4a9ec806172d18530275f5e81e595a74862e723ae64120000000a32e0ef70274cfc8da75887fafc50055fc5163c84d56c73fac3ccc3416d5ebb840000000a0a0cecc5b6985cc65ffacda90759c2d7e1d3e63c243c2a4d22717f2d01994f9a9bc90903fe0062756b2d0c620219685cc005250610813b4f88af427316fc769 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2012 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2012 iexplore.exe 2012 iexplore.exe 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2012 wrote to memory of 2016 2012 iexplore.exe 28 PID 2012 wrote to memory of 2016 2012 iexplore.exe 28 PID 2012 wrote to memory of 2016 2012 iexplore.exe 28 PID 2012 wrote to memory of 2016 2012 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\75ca53cafcf98ef8ee8bbf74bc62b963_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2012 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9b1c1ef404731bb25098064d8dc000e
SHA138de07ffd27f4d58013c8368e16a457bc9ea65fe
SHA25621f8657b44b5e5b8545c0b6a3954668eb7954aaf67a5a0c458a69bfcdb6449d8
SHA512d6660a6a708ad66217f526f764cd493ba96d763358ef6128120343850e43e4efe7c3f997be90e74ce7f5c1a9b1e9709f6e3b1af13ad073adda7e550f054a3c20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f4b269c3f7c75b8d7f579266a11ad94
SHA19883848477d8a70f6cfb28bd37d75624eb3b4765
SHA25610a6c3787a7be34018352fb43e15508790bf6560c9e03b4d33dc4677a9ea10e0
SHA5121465bdedaa11e96cd9277b74cc20ace14d2cde0f55cb0854b39c33b852411b5f2f9924e89b90c4a055f8ec5738956bf15e02a3ce3f968987cadb0b3af67d615e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae23ab176585eb90471cae16ca6a7dbf
SHA1d6b81f6276af61da2f47d932cab2672428daed7c
SHA256bb31cc9777355bd60e6c70a5a1c618303baf5364eb8fb117d9a92488db3c4ebc
SHA512c5c9277c3c747f3dfc493d823716408bde77626d082ed2550dd813439453897b01e0f6a6aaf1591e90ec702e80d0e0cdff6ad4eacff14df74fe32e515783cf9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57949b443baaa850003e03c63bd357d39
SHA158d8faaa347fa1539a031a8de8893a6472d1a080
SHA256e42d6182868e132a2ef67818d1813afc9f0a1c5a0add5f0615e54b76d2042715
SHA5129b7e10d3e54e8343a10cacd4cba01a61c22a103f26342367af77463b89e7a35de1f5cba289728963a58ba40c7687170c6283da115bb7b3f06c4987af56aefcd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a10665e0387b7b17d352943f587ec756
SHA158707f50b01222b10903cc4c5cc62ad1c830056f
SHA256d0afab8d02dd27700aad4407662d472c98fd65cb4b18adaf812c1bb9625258aa
SHA5120c43c742f96a748ae77722f975fadf3c845bca321383766f0e389b2976a2755f25bc41a41456faed65bf8e3ce70b344a1f4fb1a9eebca2601453de39a137d9c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c4f1d9f80798e170382108bcafd9c8d
SHA17c122b7b32e316271429849df9f0d6282879af6b
SHA256204ebd9e9916ee5bc9bdd267e8697aac36330c8eeb453bac38e8579889136c98
SHA51288c3e6ef59451862e331b104c943df65e41d2207c5f221210bd101cadbd5195ed26689a2572a9ed81bd32f0cdc366cb1de04cd11b751b86d6f744ed1068e4ce6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5721ac33d7173ff70043992dc6bbcf1ec
SHA12dedf00fe2178191d63decea7d71de9bcfbe1881
SHA256a7ed2b2488a2a49c6ee864a274a1f42ea3a0cfca3b1ffc080ce1f4b7e43cf9ba
SHA512c6bf124655f71c698957c08e1b4e519d625909fe818d81e4cd9793805bd3fac51100a43723b1f80ff522753d76846021faa5af3440b4a3d981dca283a5b9f9e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582a8a671a5fb15b79741b6dc127773f1
SHA156199242817455849b71d2da4567c6d858aa64c0
SHA256eeef6ededb715382eb8b62004a94265b4baa9708b160ce0b34f367f99ce2ab43
SHA512806f4b81619d6e7ff4bd07cababb80038720d2f2e38c4ea7e09217a3052fff82d2b0ecb48e490e309e8dd8d80589750a6a04f989a2a074324f78792e2e04b453
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4ac36bb8d98132668895cf3ae898a06
SHA15f8876c808c23265d4eb206c47bf8111eaf9369e
SHA256f559b3c455e392a79436fd531ccd6d93afa92c95fd48a45f1530827c133d1949
SHA51246bbd28a850c4ba5dbc948fdf98cffd6960d64a90d717819529b5a2be0d258296a332191c54629cda932d48c2b7b182bab8c40fdb9654df88c37d638d7328f93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eda42bd18683210bc0bb1cf2bbbccefa
SHA12d21de3ccfb6cc9b98c40a2ea9cbc44098a39b53
SHA256a0a97f1740bb7f4ecda6bf53956b3ea3b0678c71609b8f10cf48771e2ff64631
SHA512c5340afbd2f7486b93a1787f6378e33e58def6c081a30ab3bbad30979041399037f4aa78d621ca44e3aceaf611e9448b8c7122386af6c388e7c0d447412ee125
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527d627d52496a11c811531f691ffdf6c
SHA17939cc8488432a454a89f55a62008c1f82b28c07
SHA256c46d7ee830492ad921659f9ed232e73f9c4a85ac650c2672ed62a11efb3e652a
SHA512f56310e1a68fd9409ee2ae9be4379a34dd244bb5c2393da0fce8f9b4a743f915653acf6aace315170b63e36aed7d54017f7d8046dbe125f59a3b0b6871c9e1b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5485f52d97e55b9d36c86866792357572
SHA185e0375867ab1319f54563dcfb53f119ad5c8ed9
SHA256e314adc73a79d93b238b59d7b80f2ad36cf2e1a6b5af48a2cce95c74b2657b76
SHA5125f1b520f404104dd3333b8339c791d31807444fa58c83e0d26b24afd77ef3315399ab02acf2256538e0a94d27700e836b632a8dce158a9433f1faba47dec1dab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5623e0d66b486f24f69bf59da089b2a63
SHA11696259765d5f9bbc6165660bb6cc6a3b8f90e4c
SHA256454772cab1043fc66efe4e5bd28fae9d1913d955fcdab5ea2c79a0d9232c1654
SHA512e1f35d1830b008e32d0bd67492e4d6db6d0faad0a41fc212f94ea47375a3c9d07279b032b27246d7d5f9d4e8e65d7b85a1368b319faff581946664ed636425a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d39e354fddf4098905032cb8b0539b3
SHA1e59f601d2651d93c9ad982a54095cd52626c64d2
SHA2564a8f16e7de6503e2412a195d336d135dec186a72098dcb640ea2e4ab642ca63d
SHA5121094ff8ff3218622bebd0f10211647cbe8eba917c3416a95e71b73ec7ee323e30e6b4a52be1fe83af7b7b73e07c0ad375a0d99a7d663c0efdbe2b861526c8c38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aab5a4143da4f18de8fe632c61a2b207
SHA14312af27f9c0f6379a0c15677695710112e50271
SHA256eccd363961dbfd01c9cd383dbce9fc330f8956236c0cc54a94a816ad2ed56f43
SHA5125fc67a19733781b9314d124097a08f4e89911ee426d3376540632f56133452d0276205bc84eae04326d21c448516448fbb6122e4de0fa41161934c6106564859
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f61bddb59dd1ffb3e1b225c37845ba98
SHA190976dbcfdea1b159a06589e4d978e5bda818527
SHA256348b329d6d9b050730a080e4fd3f2fb8beeb10c67282ab870592a06e697b44c8
SHA512a7c6f547ec922de69fddbe6b0dc67cc452f3cb2afcbd4e4a9f9af513369ae897183ec859584c67f2ef3bd977656b5e5da5b241ea0adcfaf3a0f14f670178513c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520acb2ce72ee100b8d4a2a52628c263f
SHA14a52476fd072bd011406d37379cde21d643310d0
SHA25695d8a3114240feac7b1bde64e8de174ff09e85f179ec4864ccec77ffa77f724d
SHA5129738bbabee126bdce05750f14974dd1227a438398e7a7c20bc2bef780fb6be6b911a9aca585fa18164c3589813c544e178e6c31cf05b4554e11e2e6eed090608
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51212bdc555a92921255a37352424b44c
SHA11993206787d2cd0723d838922a0af324b523bdf2
SHA25695703b820f34cddd4876c580ba06ae32126b3b0aa3a5b7e0d7bc285bfe5a1af7
SHA512174b5bf7a43a70858391bdace06575f9357abc407fb4baaf32ac72d402e7ddd1b425c66231ce4200b8a1b393abac8b534ee346c29b12e532a2ea85dcaa8786ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b349e6391615e593e73c4f4af7dd807
SHA1e63808e93503837978042af75ace7655433ccc44
SHA25623d6ef54f21064da8e27eb9cdb3dcf868f8de0f3fd42f0983fc72dcead1a7431
SHA512e4c279755d5e0975de9dcc1eb8d07ea0f84982d6706e8e610dfb28af9ffd2be195e8b8279708cc088cc16d26b12ca99a1bfe6dfc5fbf2b9a5949fa7751921ebd
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a