Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 14:32
Static task
static1
Behavioral task
behavioral1
Sample
75cc13e7abd7f281d891fdf709cc654c_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
75cc13e7abd7f281d891fdf709cc654c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
75cc13e7abd7f281d891fdf709cc654c_JaffaCakes118.html
-
Size
66KB
-
MD5
75cc13e7abd7f281d891fdf709cc654c
-
SHA1
70d53289d9f9ed653751692ab18c7c321def640c
-
SHA256
a6adaf4fd2b76c8a4d8cf2b411fadd3fe7ef2fab4166f073044bc5e95fcbccb8
-
SHA512
5eb7fc8254bfedba362bded0c66cc99304e7ae0d981c5ce5cf33090b3d20b5967235128113e564f22b3373606d71229301f9dfa0cc919136945bfcb2b9015fba
-
SSDEEP
768:Ji14gcM0St8tN99OIscdoWUg7tgHdCoTyOqhCZkofnMdtbBnfBgN8/oycc8QFVGu:J0T+LhUg7tg9LTIgeo0tbrgaCcFNnzAC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000f73764fad4365305f872e637d632b9e4f8516284ba1ab2c41582a5b23720428c000000000e8000000002000020000000be55cd2f323d9c3e5c8575139c7760d533548aba9471c9befb1349225b7b2e2b20000000e0a1252fe1c25e6cdab76d3630cb32c8072d1bdd74e33671f6222d3b4f9e74344000000058a032829124a18cf93492533f66bf56073ba76e2ea0f89ee0a4eb0cf82f4ba571c571421a2573813db670925f931543f9903f492d6539937f5481ec12288fd7 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0060da179afda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CC7D62D1-1B6C-11EF-B587-FED6C5E8D4AB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422895826" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1548 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1548 iexplore.exe 1548 iexplore.exe 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1548 wrote to memory of 2128 1548 iexplore.exe 28 PID 1548 wrote to memory of 2128 1548 iexplore.exe 28 PID 1548 wrote to memory of 2128 1548 iexplore.exe 28 PID 1548 wrote to memory of 2128 1548 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\75cc13e7abd7f281d891fdf709cc654c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1548 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2128
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0df39ecfdde8b27b134d1f022fcdf04
SHA15b74cd4fc408f2f464b4a730e9ff7b36aae73d0d
SHA256a5c0bf0342f9e13d0a54de602216d09c51417b7cce05657228e32da3cd034973
SHA512560ed1e42dab340ae6c00645efad7b95d2461cd0b2476bfc13ede53bd96a71d184611b5f617d5751198d024261a220e41fd61cd4f85651aa1db43a892f7ba495
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6d266ac328edd3402dd510cc0746236
SHA1acb02624906097bc43f9a8898f82fcdda4048738
SHA256ddadc831747e4301c319cb4eceba8c419427906e73e8a5240806bf989c75dda4
SHA512974b615184898a293184cd987a676cb01e21c9791246e5ce79030109e01f8468d6e5344bf2f193c468cb92ae56669d67bd908bf57943e283e1883eba3f161744
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c387f97bc99548027b95066102999707
SHA1f74a2c593c8cf3894e472de67ba74ec629443348
SHA256803c64305348e9962f4e85a7b87631c3634650f9732f9469778e6540e8186851
SHA5120407652d82e14e5e51f7a7d77d087f87bf4df583c0410cb8ec1dcad29645a156a5979d790234b9b5cf1d522af951ea6b41e50778368167f24440f9b9e08877be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574f9d4861859e77ea99f010b8b1c7dd0
SHA19018716e11ffbe6ae0f6cd4d5ba88b3699ef5052
SHA25614d921cfa981f9d0ac33a4ebdc61c22183b8f8a2f494903d0cbdc6276b14b886
SHA5129a5b01db30440bd8c8ba681b4d2eb4a41377b77df8b018410bc7c345250f514326685311162c8d42a0304292aeb3c573d0a32b32b730e4e16a6f70861e552ffc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f6dbcd4e00cd2e8f6bf17bd2d129c37
SHA12d43e37ae7a7a8fd16339d45aa2ab1952768bc86
SHA256abc5f28cb3a78680105dfea4678322484f4f1293e8d6484ff2150bf5bde85ffa
SHA512dcb2ac17d7a38f90717040ccd007da01255cc95426f0c02122de1ee2b6426274e623ba16becec03dd2e0b90a134b5328942238b445222db7ac07560eaa87d7d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b207ed055efce2898c2baa88bb9fe652
SHA18457389ba6f06d2ff20cc4dd5af296bd499d9524
SHA256478506004710dfd176982bc0489894cbfe32f3c2c01b8c632cfaf24a11b2e617
SHA5120b6804a8856d408c0eade6a3c1b39bcf81f84db0e5b0039930a262c92c62c71e3b83a97d8d0348c2a593af733ed2916b896423386c81df92dd4a7417a9b631bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5976d292d7dca350c7cc33893a9b6cf36
SHA1d062b99f460ba4027fc4535a87c3d6d8cbbd1b21
SHA25673dd24c22152920eceadcfb121e26f6ea7897c30a4f89185d07d389d0c4803e0
SHA512b927a51662701b9c1ae44507563076ceac622b677e94b33bc029fce79ce9e2d4c53739504eccad558de2281ef6516f43f94510efe2e3f3d95fda477171ec124b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503d041e2ddd38ae59a9eebeff65e6942
SHA1dcb3c795f2fc5548e0a09913d8211a911e1a2deb
SHA256e6cdc0debf3c1a801a0339ce0cfa245ded8b76ffa7f240079d01f9bc684db5a1
SHA512633da84c87431279084796a34d32b0fbf4f133f3ab038f172a8e397c0d8913114c67981dfd00fd3674b6e45a2f38ad9832e6bfc07610e617b675454e4771f9f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53fa766e79925e63b959f1a6390598f86
SHA109c12928a3e158b66cd5dd163097f770411bb0ec
SHA256b3f2add2d2620c7567d4a2cd71fc276ec799d105d58b1b7e6e3f93de949f66ea
SHA5129acca369a21c933908c52e6fe5aebb7b2d0118d7effab3fb1ad859b83e1c3ba84f9a5a33b6c586c44db6df47f59b5df434e988bb1c70ed3cc982e05bf66e4b72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2677da910320e3e676f2604704d8bfc
SHA149345a094f8d9f91c04980fd983f16bb0ceb63c0
SHA2563e14d354a6f3ddf22a05644b47a99a550fcb38063f1d811c5c8806d35819f2c6
SHA512c8f5fbe4f125cca07a7467f19a97f3341f795f1a5671628d626bd279af0f3adc5fee1fc6a33876aea4369190b18bf78e33a3e3eb65e3c888990e5579391b98ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56cb229aad33a7aeba96f688800072223
SHA1de69b30cfa2d31d1c43fe1136015b1645caa84a7
SHA256054334a9133f1c7732582d5a8f787fc6bae7a83eb203d5314d2f1ab0a47754f1
SHA5129cb504abacca2d3b82fe11b7d59afb7d6220a2ddca5e4ccf68b96541ce8b07749e2a051b240d2eb291098a6413696cb51018504d337a4a9fbb7a6a3eb7423ebf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1abfde884cd4afbee42352f628c1989
SHA160bbabc39e4c5bd93cd1304efee845d1d1186ceb
SHA256b4c20f93ee8ae6f4ec2c2b0eb00c139bc50b78068ed7ed0ab00763f499f4304b
SHA512b8f4409981303088529b79f47dd1474aac414c3b3e00a6abc5144de342d14e5d62e3968ee584176c3c99d90e03d233e71b504170e100987b0b67a7a27a951916
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e6ee80f3f852bc3c7091611c508ffc4
SHA11654ce19e8c6749c6b4907546efc276344996071
SHA256834a1bc690b646de041398b205de8585a6f34bc379105befe35a4bdc2e9b726d
SHA512820f71bd0c24af7e98be3b1a46bffd5db431fe6a403bb2970e3c456e4648a64bfcadd3638407af63a2b196c4e56fb7d978742e97a9e1a697cc8633951bdf1c7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579f434a69a787e21802f9daad4ae59cd
SHA15d0a7274ee4035f26c8630b4bee35a0ce2fb934a
SHA256fd542e26ef9cd9c021ab0dd7a13d8d86a8b2700c046637524bd6aa6994a86977
SHA51277bc7f916c09107fa35a9614c7c5a0b2c917c8474111687fba8e345043c5ba41144337825afd920d03043c9e2b04a86ea4e73509bba3f8ca48d9d5a6af429ba2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e7530b9fe3fee77052a2c12669f3bd1
SHA1af09af8a972316a20f5af23162e6eaa2dfc46800
SHA2564c1d2e9a645719dfac89e0342a17f3ded6ac9149e63387e33b8154281e9865d8
SHA5125318a00e638b5adcef4d060a533033f3a54c177a7a1f915d0e6b360d78b427b504c71b00930d977f89d0cf09e1bfb26da35d793221138ade5a3b5eeb29dfbb3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525efcc29486586a93d313113430e9f0b
SHA15130459170e5b2cadf97de85a3019b4b0803c05b
SHA256b4170f9a73e8bde9de5d7e281332b7d3bfdb20fb1b020d8c538059a9225509b2
SHA512966698abd13694ddf322e01cbb392fe915e18e508ed3146ae27e86a5a2c53e68735df0d2ec74f0ac8b4b06400764c5b6758ed5e71d7df80a1d339a370c507b79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aac7be5804e140e82abcc1b38fe52c50
SHA1b2f85e4ce2fa77f1f010d7d4d5e0fb7416ce64bb
SHA256fd2c054f85d2d65ce65417e6cceb6251a800b565289244781c40463932e53f0e
SHA512d9c0fd439e8438a745148a8e8a3b8ace1271e37177124a86a1918fd3cd21cff1f6adb85ee86b062165f5462bd2b97b8a2d22cecc70ced1e58af22d765562d2e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5991ca1ea494dd75582f5bb5ea74a2536
SHA1386022225ed31e68ac448da2f6b1924c2fc7365d
SHA2566a4d0fa354ed78a6975587ea22f45fde415dc0e285383ffc17585df5b1c0105c
SHA5128c060d622b517091dedb82fb3d6439c66006608abf7414c356a8c95c860bee8976d74d8298b65b5e31db9e4cdec5133facd2c9b157307df606a643af97acdffb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559cd3b8a788fcd0567e9d35d2c083676
SHA12ab1c9b94f3f195b2c5f8c0cce3ded495af9f49e
SHA25618b7b2aef1407c0851a22439e6b92c272f7829b677089a52d3e00beeec449f93
SHA512d57440ecb38eab69313675e3b7aa6bae2893b64f32de20af475e467df7def96640c78f69a3020f4e65d5124d42ebb2e768f6f47194173a6f5f8e5bbab704ed4e
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a