Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
13-06-2024 13:32
Static task
static1
Behavioral task
behavioral1
Sample
a5cd7c2af7f7408c6c4aa6745b1a836b_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a5cd7c2af7f7408c6c4aa6745b1a836b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a5cd7c2af7f7408c6c4aa6745b1a836b_JaffaCakes118.html
-
Size
460KB
-
MD5
a5cd7c2af7f7408c6c4aa6745b1a836b
-
SHA1
df2807a70e51d62b3e55b8d7a5946253b1a72733
-
SHA256
acad5a867c84b3a1a0071b07fc71dfde4c0fc602a2eb11a3b2ca00664d4f03ef
-
SHA512
f09a1d6d0c9abb03d5ebfec242dc74a2cff223635a80f557f4d0d5300281c61a34fb0d1d36708f0715188afc40ad46e39f0179c379526a91d3979a4d6e0c74f8
-
SSDEEP
6144:S0sMYod+X3oI+YfsMYod+X3oI+YDgsMYod+X3oI+YLsMYod+X3oI+YQ:l5d+X3V5d+X3E5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004b7f196adf51f74aae527a84d7f052ae000000000200000000001066000000010000200000006cca27bcafa29d95f9123d7aaa395b3d708a0e291b12665b45e0740a0934d424000000000e80000000020000200000000483fa8343dd7516d09b6f71d41b7b1a57df311bb9680ca81f972f818beaff27200000006e941c7f90ff519564d6f528334f20b3f5e151264c94b1b13cb9889c70c5dacc400000007f280d3521be1e0e8fda1007d70da9738f488e7c2efd75e636fd7a706e97fc42eeb0391938a05d83242272d06b83f9316d5b731cb4eb79f1b1aed759009bca41 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424447409" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5CA17431-2989-11EF-B73D-E693E3B3207D} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30982c3596bdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1640 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1640 iexplore.exe 1640 iexplore.exe 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1640 wrote to memory of 2928 1640 iexplore.exe 28 PID 1640 wrote to memory of 2928 1640 iexplore.exe 28 PID 1640 wrote to memory of 2928 1640 iexplore.exe 28 PID 1640 wrote to memory of 2928 1640 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a5cd7c2af7f7408c6c4aa6745b1a836b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1640 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ae312cea17bc5017629075a99dfdfac
SHA1c74cb62a667db24b02ecf2fa7b068d9b6553ee6c
SHA25658c4d327a791f555db702a845fad8e7a421b7f9d41f7af75de39243d10f0e545
SHA5125b4e70066506fc3fb5e66d91e93a529e7d10306210fd0078818dfffd11ff9e88f875ea20404fc9dc0c88d08aa43c8f9cedcf10711744c212a768d6b9cea606ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c11b85bd8c80bf43ed0011a4672bb695
SHA193f77a9560513557a3c6a92b7119b7d9244b8430
SHA256ffd3bc32647c9bcaa37a61b28e963f81db7c618de27fdd03adb1c3615a1f4a77
SHA512c7a7e74a82a74bc54968a79d9462d2aff5d77150aeabda844c5c47f7df168e061402be24711c10102a9dbd49e1f917ad91c4dbfe1d123fea93d39a2eb3fbc7b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc665718a2f6357cbb0f4365d1ebbb8a
SHA13c0fcdfa740dfb59380ab499e067a8ff67c626f9
SHA2569f8e99e8dcbc20424e10664fe819eb2b919d2cbde7f8013b840659f6b748e572
SHA51218669c35bed175542c1122912810430871fd9583af8406c2c4bc73da2b899440ef62b519a6ea9ffd0cf30a512444792787c53b96a906c879370613e1eceaae45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540fe93dd7428cac38841ac85830d5921
SHA11c0fb75645b32e9db80281df0531a7ed0aef970a
SHA2563f704465305dd4cb4521604609ad812ede29a768c681ed80130a73a70fce2683
SHA512b4d570b75de10f5b002911e5d6c42f54660d4f7793291aa459358301d8be1d9bbf1ed062995f62ac1f69352e062025eb57515b0eae4ea5c9a80b948ea37af9f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5817d4770bc939c0b06f53891f4bc6188
SHA10dfd3f2b15abec794cfbe69a55a044d4f1d64e58
SHA25648223acb7af3ca2a2e6a7020d4cf0c43e8206e867f15b0aa8a4f62f7e17a1580
SHA5121643bd75654063facb169b74e1dbfd09afbcf4369950154f234e5b211e3ae7a2dc8961bce1ab2d41f3dc68362d661f5d50159ad1743f718eb4504a7620c2461f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c516fa48f2097751e2292926cfafa855
SHA110226326b95e657e4e18d7de7a5231993f094511
SHA2565210041cac15020daaa02b54b22f3afb3c09930eccfbc1476b7746539998a8ee
SHA512c79bb3f8511e49a985e39e5abaa6df60a2a2088b5f610dbee2fda76211070b9344d7c6f254fe80962cc374ceea160afc0d8a54f52037d849b5099831900d2f84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f12ae9a8e8d2912842198e7eaeba4ada
SHA180a115db77cc4fca2c7ea80d36a04359000e1c7c
SHA256ed5db3d52c0518b45283ac6220d3a1ef6e789d81fb525d1aa727cd60aeee777c
SHA512ad8148f3b6edc9ff2f4ac6c5cfb36e984a276a2a541de1cca986e64fbeffbd916755fe82f361c4925bb886f5ced4ccf878336bdc3ebabd94133b03f52a028700
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1a7433b65f81e3601b5612e0b629ff1
SHA1c491e216ea2e70ee7de1bbcd600e2b08403019f5
SHA2566262e1117401219dee7526fd9235edbec40989f70214e9c855e2709f26fd38e7
SHA51288204691bba29e1c2dfb647afb1460f6945b73218b011b7f17c3ad2f4e18b77268088498e355a6bbf5c95af240dc7e1eef4151d3eb75b642d1e3ff3762b0ebed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb84f743528b52c601f92bb07883bf3b
SHA152b6e861ee7ba18ec48c5ce480470a95f4566a4c
SHA256d3e8691b8b8f370a5daeb2d7c1d47f414e2e1b8286e71b07577bad6181151b80
SHA512a71576426d5ddd19a309d3f75e0a11f7e05bf582c8602191631dd6dba3e87a16489af36ed6aec78bc7a17e92a0fb6f646573bdff76057ebcf26b6d377a6c5518
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d54e4f199c9b5812b7494a81da6a66d7
SHA1c158fd0477f8dce8e837f6dd011571050ede1b3b
SHA2567bd31dd7da6d5134cec17b69d417b751c6393b5d078b1fb7c1752b51cf09dd7f
SHA51288fac691b6274dd217429188f7e1fb0196d82a3ed7f315c3ea8fb571b09e963f35a4394b3c56c5d14144f659b8d8534f5c2fddcdc4fb0cdc21915c75ae4abda7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf17757cd0ef7c442567058d364d6e78
SHA119a00f9666d41ae0f27cde511b441e2caa1b8a98
SHA256a96de5a9a463b49c439c99ac737a5cf3c1621cf8966d9e6471a252d840d3f776
SHA512d573b12cfdd42b281f63cf5ca3e4f9584043786469d0b5cbdd7e71b1308573b459dfa2f966eb9728a789902c8cdb8fa3bac2f128767b605f3e59ede5c9ff7394
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf5bfb22a4a2392e7257cfd0afb3fe9f
SHA1ac9bc3d2d4b2cc1e85368c86f63225e85589deb4
SHA256afd892942bd22e0794d35ffd7cf5c5d2d8ed4a36015f70e27485f9faf4fccc0f
SHA512ccdbf409c282869bd2fea5c676082854d644956b0423ff3d59064ed3e0301d02d238766c421d1d0e842fbe9d9acc4facf31d8aa804b3080e7a71c30d4b3c35b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e8c8a0c8093c4d43dd483f02c45d9c7
SHA103d0b08e44bd131f759501692cf9705f74eee2ed
SHA25628d8e2d8d027d9a08fa7b0b79d86cf8cc391d74b9f9c1da2e326de59b8b8b2c8
SHA5122d8bd93498929a0fd93f201596f2ce97ba8c2a4d2ae77ae1fc91a0ae44613ade0d4ccbef0ba32498cc895bda11e3352575230f5878aa32d3040fc43b204f0313
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f12dc5d3e6d40a888c0402dd98adf7a8
SHA11505026530588f28b0843e852b549c55b580d9d2
SHA2562b75517d0a2c4f57956979df2e49d80a015f6f3baeeda029d2ae74cb3801dcd9
SHA5125a9c24e064d3a472171f4d733ad3a2364ece645f3337dd7bb16c32165161f1f8bbf7582d731e0b79b441df7a8af1486ce46922ceba20aec6f968c31ad91f6bf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580ef9cb286e677c91ee30addd51ef8a3
SHA1a9b5a64c64bab611daee0de534777a57e57db9e1
SHA256047727b77276f661eb161ce7a8ef7085e197bc16ed6f59e21dcf3107055c6982
SHA512ec30733cb6616ddb71a23ce6ee9a4e8504de985349208d5f9be7e2e6a0e4093e2f9e21edcab8ac6d64292af753d13354d2b348b857ecc09b7fbd59ffc877114c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5139eb5613e4c8c09dac60ab181725e51
SHA19132619a6104b59f576910d874d6825c7b4f89a7
SHA256a1bf90a44933549c1f9b9c7cddc19851ba3fe4a4d2586212446489a88b9e6c27
SHA5125a0bb30cdf075b686d1826de911aec8010a2596f046d572d0edc5a731607ee4f679d0c45e718da10ef2807a020219212fd09d35f4294371e4ee453917d796285
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541eefe77a1da5b2e29d6f0cbacdffbb7
SHA18917aabced5a2a327484de042e93a50cdf7eb356
SHA2563ebe31a383412f333fa6f3e24182d8248ea6ec01a304d8c38c47688b4cc8abe7
SHA5127f89a847b29aa1d9cbe748d89bd08ecf6e98dc9a4393082755b928316000022c09f30a11e757589402f4c69924ae2903346762a79b9ba63ad4ade960424ad540
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5726f16c469283166fc56fbd9a4364768
SHA1901d816056f9652dc9814f126f8c66625d86d1e8
SHA256f2a5c85369626a7eaa9302ffc8a15405471553af7d7c16cedf89823deb97de29
SHA512a704a29909b84d960101bfcdf3ee417436e7f201e92ddd907544158fbb1957ae9a307186ea853c2f42deaa0581f3aa22c9b28ea7574d6d4bb8a22fa1d4bd1d36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b917c97317130a83c4d7f3d3943722e9
SHA166118047c37bbe255520e39dbbf8a920db4bdfe3
SHA256f02243846f921cb101d1b6546356b965ad8b5fc584254edc9a6ec12d8a1d9588
SHA51267a281bc8c8db967c6c09fdf449de5af283f24d844c946cf276a9baacd872daaa83a506f187b08cece559fe929eaac842c74020a9ccf2cab1a89e81e92730a25
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b