Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 15:40
Static task
static1
Behavioral task
behavioral1
Sample
75f645df59e219b8136106fdcf14b7ac_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
75f645df59e219b8136106fdcf14b7ac_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
75f645df59e219b8136106fdcf14b7ac_JaffaCakes118.html
-
Size
65KB
-
MD5
75f645df59e219b8136106fdcf14b7ac
-
SHA1
b009c9626564c2a63706081299ab58c1a9e9e925
-
SHA256
40b65dd3d2b059f01288fdc3e5beeef5f42fb41364d58551e29be594727d7736
-
SHA512
ae75b6de67eeb3553db96b85312707224ddabd49482ca9c0de6c23cbda3e645c61af2a0ecd3973c5fcab8415480f3b6d6d30efe08aed56f952ad8270fe278304
-
SSDEEP
768:JiYgcM0St8tN99OIs2+FqQZoTyrhCZkoTnMdtbBnfBgN8/oycc8QFVG8sP/IjkKN:Ji+CUQuTugec0tbrgaCcFNnzAC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422899907" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90c46a2283afda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4D972281-1B76-11EF-89B4-66A5A0AB388F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a230000000002000000000010660000000100002000000096198e6abb49cfbdddebf3e8c591e343279b019dffa0e7e91b90ffe44aef4b2d000000000e800000000200002000000060137839cdad504741d7d76747d14994e5b6e338b6b78d726a68653a5f2b1102200000005fe3a803ad229bbb1f51b9df4fae393f74566e9b905bed0e5bd728054296f10840000000f034f5fccd4e732e85219f82e117f397fbd306f1dd991033b5f1755757d11dc7d060072fd008815b7c26d556923ea3e4108f1c15b50eec83e764973637b030b8 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2964 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2964 iexplore.exe 2964 iexplore.exe 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2964 wrote to memory of 2432 2964 iexplore.exe 28 PID 2964 wrote to memory of 2432 2964 iexplore.exe 28 PID 2964 wrote to memory of 2432 2964 iexplore.exe 28 PID 2964 wrote to memory of 2432 2964 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\75f645df59e219b8136106fdcf14b7ac_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2964 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2432
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ad8df4f4f087903502925d2363387cb
SHA131e9e650f1429a102612c1ce2f251bcb23335cb9
SHA2567fd1d3a72970023cb21e921c858e72c42d5d11ab42f22c2957341ac4a305200f
SHA512bb372ce967ab7c449be5aa0bc07d2ea1b80d8cfeddd16eedfa6eb1967aae531568f75342aadd98af359b4f64f856cb98d275f996d179f218c7fe0dc9437177a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5289b7aab83dfc4eb7dc072934b15c049
SHA1cb740a6cf87e55d1f18d5fb2db979b19e29cc789
SHA256a33001fb6390e7fbf7d1611eb69c9148a04185a8d034b1f083cb6ab6488d1646
SHA512823673f3fd5515bc6351be297106c940753b4b3a1a16f67787e3cdcc8704f17c99b1be171df6cc7a1962329dc783d4904cbc9d94424780a5eaab428e236fe689
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573c91fd79dd7567c613b735e6e21b8b7
SHA16d5416d7b259a57cbf6955c2f5e39774c54b5675
SHA2566a0c1aa93f9d0a322e23f4a2852b9374aff0f1c947b7410aac3d52c35ba7098e
SHA512fc1a3a24a2c6169c2e7a0443a239b62af3baf8e3b9846122a20fc1050f1a03e5c79b649b69cf333657f68578c48ff33a5165ce258330c53bf92151bcc938fdef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cbc0301f6197df6d21e3b8dc5fedabec
SHA189f38bf35b9418dd45da2f17ae53c64f1dc6f82a
SHA256335c77039388ba08d17c8d5fc6a55ae0d1fcb067717b0aa89075bdb7c6bc76c1
SHA512aa6b976b5ec9f61959cee96acece6e137c2c8d732e543bf67af5e794c4b3b44081cbf677767054da872f12a01f07521315936a58316b524e4939d2978f92d917
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e447b478b28f0e0eef3d07f6af001c4d
SHA1dcb0c126d6498d1ea39ec082c88ad26c562ca5a6
SHA256cb2fecf66eb4e60fd52023d736b88637fe03dbada570deb43fad2b85e7901dc1
SHA512ec3212b0fc45cee1525709730e37fe9f39003989d18dd87ae76f89fd447b2e8d2694accc64a79a57a42800757831ff0cda7b91d9b6e96ae4e8ac57748067073f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc57bc8611c9a9887213e0bc46829adf
SHA1bbb6b495e2d5d6a312932f5b4e83cdd8b82cc038
SHA2561771c7948f73bddf7a038b8ca72d97cd60143907cd7abb20fe1e4783f17755cb
SHA5123771cc73e2b5cab7988bad13bc264d0747ab68af67d5e5aeed427aaa26a66c949860d1f8e1c6cf1ef2faa6fc23ae3a6b076698ff1115c9b80388383faa66bb9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c19de993955b9838f24bc911e5f0adb
SHA1745c5d42849cecc38b36905a08e5264a7c6a39c1
SHA256cb607f0ab7d5249e7b7b48c436513dc6df287bdf421af5ae7720e097dad1b1f7
SHA512f2dcc205140a432a8b06a96b9edf897f97c372708d6d19dbf897403e72d0d9ccae3cec47c518fcfbdfdf7e31760b90c390d0d86cf130643315646e60e6620207
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1e56a80c8301d2af682206067ffeae9
SHA1d507f5642dada0fd73b5530d5199db45b42a5019
SHA256e9f50b12cd08dce4f30a8d52e342d493114575bde64e4d88b47d413e5250fa43
SHA5121b5424902293dcb2c7a7fccbb554c95c1e1a8672e788b12462c1dd905267f04e979ecefb7e822ca77cba9e564e506c2fe57fb9924f10ebac4fb145621cfa9c2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b5909c8f5d75b1be46cf73122957e82
SHA13e0d821b241ea4584bdc76e26c91b2527bd0acd3
SHA25684343de0d427ae0141b3619dc9986983aaa39f3fafa26c2071a9878f9b366a36
SHA512be5251ee4102b444555e8ffd959420dc4600724714d46676ac655f5b44f9f973d2fa8e992eeec9b1a7bc13a5b5170e78c237aa7aa2520c1a507d56dc3be530ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57cfd0b432740cb350adebb4f8752c799
SHA185db1cd1c1a15e7af62a81b54e2d902eb3b6f469
SHA256794d8bfd4651da20af115f714185722249e416d9f5ecf0951ab1476c615aa40d
SHA512f5e1ead0794dc3c76650f316950e6774ab6c6656c50638ba699dff63dab440f8fab6f29bd85f52289570a07f5ff5e31e43381f59e59998451ecc2f0072044685
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac3ac335280afa21849a8c32e57273a8
SHA185767d151add780c8c98e521621a38e4f24bf3c1
SHA25665b8b6ce852dca61ae5c164653093dfdc208d09f5dab4b0b3ba2f66b17e5798a
SHA512a935a2cf9c75f9a2488218eed2e2086b00a4fd75a4d051b644060eeb63b33a0f3a862275417ca2fb6741f7e533269c1917da57b0de5b4d5309e3a4ccbbdfa031
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc5c3b21ee0e80d49e628fac54fa7e9d
SHA14a770c21eda73c3eb458d28d78cb1e9e35dc4906
SHA25694d4cc3a11ebc7cea3aa506ff966f9969ee005417521b093cdfdb39b6bfbc5ae
SHA512a1056730fc62b60ed26a8aac3afbcd6ceeaccc1c6a1d9a7b48deeb413c245ab69fad79a7927b596bc93a9bc434fb1305f14ef2e14995838988a8f440954af1be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5267e345002dd92d806180b16cfb74759
SHA1c9570f6dcddd9e1022c2b428941c19439261af1b
SHA2561acf3aa0bf8f0aab345aa6980556dcc44f422a336bce8e07315535dbadf3a029
SHA512af09cc810e31594541464d4cdd2e8a9e7e9dc1c83ee3d9550cc20996daec41c099b3f79ef87e7bcac4dd7db048146e1f477b283bd073a61265a1ba3a6497b271
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2025ff38e37d1e8ae13ecd021f004f2
SHA1b4350703170d8f0ddb6c2e3a7c929baf1ed97228
SHA25622fd639070727116a80cd73c8b56f7a1a63916cf61b69d7763bcdd16ed7010a1
SHA512b094ab3d4e3f49d6dc286e781264b44a883170ac69f1cf4ad7e5b821e719801a209c1a16e37c5f4dc5e30ddee882b6a821ffd5039cb56839e11ac4349261e5ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56cf0493e41d11522dc346de217169700
SHA1a49755f700bc430061d8d61dc9776f439beb6c90
SHA2566025df5ba58b46fb92e9589c646f6f2c00257af034bdfa6c27657063a27228ad
SHA512d34a3084730c291006cd25b349957b34be032d2a6d7dac944c89f025b9c92d681647546c36a6bdaac933e73e6e9ae2226381d46df276ab87a4a047cdc26b34a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2384c186d11dc87f772467a6fb7fbf0
SHA1e856ba4d091ae57b31221009b333fa8a1f449cda
SHA25694365a5a72d6374aaa9fbd376af96e86c23772366a30006bca79a539fba0cd3c
SHA51282f7cc8281cf61d92566fbbb0449d4cf4c32fb1f11cf6e7d6a4115b286dee583a465fbedba1434baf0a1be96b3cb8403fe9e1341f8c8023a4d33acb9c4e09e03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3c470e0f2954a3164c457504449c6e7
SHA127902248ad7efdac6d7859adf3f028a7c14e48fd
SHA2565a225339996226c1b9efc82c355aff7766882930642eb36696cdb5bef8e36939
SHA5126665c5262e003b7ef142a5dc805987be358e5b3d49bbf7b99ecf60b7d3bbed901575ab90710a1e43d2d449f1a2e004d37cf7bbd8d33f08d4ef23e7150379293a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ad6438b04cb879b03b0376087acfcd6
SHA117500c3179c239cbf5c4650777cd65239dae1c03
SHA256fa8ec65785badfd644c421be93004ea52fa4622f06485c702d8979f52a7582b7
SHA5124548a83faf90e0d32fd89fe80d661c779f41211a611e95640c94a048feb3b11df8392167fc8f5f1ea6454efcc3c3eab7c676ec31cb9e05ecc965d63618d3bc6d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a