Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
16-06-2024 23:01
Static task
static1
Behavioral task
behavioral1
Sample
b5a222ebcf706bbd197dd6a98e0bf921_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b5a222ebcf706bbd197dd6a98e0bf921_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
b5a222ebcf706bbd197dd6a98e0bf921_JaffaCakes118.html
-
Size
211KB
-
MD5
b5a222ebcf706bbd197dd6a98e0bf921
-
SHA1
3f4fedcf1c2fea1eae1d49571ea749d2505a5efc
-
SHA256
132c0f51632ea1672969182736ec66d3d039b491dc88fc275d9fb1a6ac39b248
-
SHA512
6d0872fa9985c4c0d606fd853c7ff873d019112bb4ec2235289b125dc2b12abe552c7688ba24e87b80dd97883dd7eb1a0db3232200998067c154d12fe1c4932a
-
SSDEEP
3072:arhB9CyHxX7Be7iAvtLPbAwuBNKifXTJK:yz9VxLY7iAVLTBQJlK
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40719a2b41c0da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{57212431-2C34-11EF-AB73-5214A1CF35EA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a039050000000002000000000010660000000100002000000048898aca2783b2ae3c141cb18ed72e125c0fbd311334c6ea3202e5c1ac7b478c000000000e80000000020000200000006a88e3de536c70c16e6c773014ac9a905e2476eab54221b2099bb74d2d64bd8a20000000836f3d507f3109f6b4adb3d24dd7abb2d5597aee5af3a2bf556a03ca49d87b0e400000006674f9a0229eb635c4ac8b8ee93c4efd81aae4365e9669dc2a8526eba972cd63d5fc07f2ca6b4202ba9e1282e1f2a481491438e3584f531311bb5e2481be4778 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424740746" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1740 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1740 iexplore.exe 1740 iexplore.exe 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1740 wrote to memory of 2104 1740 iexplore.exe 28 PID 1740 wrote to memory of 2104 1740 iexplore.exe 28 PID 1740 wrote to memory of 2104 1740 iexplore.exe 28 PID 1740 wrote to memory of 2104 1740 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b5a222ebcf706bbd197dd6a98e0bf921_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1740 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd93c1802d20c42d19bfe724ded2bdbc
SHA13077da67d31f1a8718dff1cee6a40b416aae97f9
SHA2563fd85538134205fd2419b8efdb3d62acd408d1681865ae1add4fa30417496e5a
SHA5120b445a6a070c5cc809e8affd8524c587d4a590c4ebee2d88a982549397e9816cc8d4a4e475567468c7b1c31fe5030735243dfaaa73f883a9829db05ff05f6eef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594261a1678ff07e8b64af57184817955
SHA1a390bc5dbed3463c37a0b45a0d036f66fdc98b5f
SHA2560109af041a33e74b5b9b88e7715f8cbcce5dba4fec08bfbcb90796bda215efe9
SHA51280145396c786cecc0ab889789219dd132ba066ec85bf71ab65de37409cc23a1c293862ac9e5e21286f14dcc70cc22e9426d00590b5f02bf8a536d38da7b8d089
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b88c9d8966379726ca24a56c88cf105
SHA16f2326e819d29aec3f0fe1eea5659afdd468f961
SHA2561705d0c7f0cc88475f252775fbde05f533b2bf86d8d22b63c1efcd1cf4aaf7c0
SHA512c80c4028ac4a616d939ecf2e5d977bb45db0925daa412df745558401812755aee3e465a177af92e84d1c1f6aea754c8c2cf5df43416af53b9088a6ba9b75174b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af3edb61bafde87a8637bf489d3edd6b
SHA16948334e1082be6f6b5b7dd53d3df3e2984ba72a
SHA25621d03ab0f0de0751eaeb59ccf1798841fc35411afb5b462ba13df9346e96f997
SHA5124fc6c7d3b386803fa8ebd7c329c6036ab8d6ecce0bc1717b113504666f644f3c5b814eaa95bdf43528f3394a368793ff321c210438d89a434e1d2f37c5c41ab3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56312100065394bd4e19582ab04f854fb
SHA1dd59930f2e7e4248280914693f15c680f73db503
SHA256eac0402b3cc20f5e59d3fd208897b5f2873d6c5779679abce6fffcf7afabdd28
SHA512313a84872e0e4d2ccf8b64ff3cdd457c2bd5b490611373f1b963a90d7b1bcf331ba39fd9790f0be4ae9151ffd737f81b6fce2b7fba9c7e67065496ea6fbb5b4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d27808c1495636fef2bdcb8f5eda54fb
SHA1469c20e5321d522dd9562e63334e1c2e53649a97
SHA256604b8fadea626cfb3e9b37dd254b98047d7efa3d3fe19affc0bdddde30335637
SHA512fe9624c285084b027969b40766203c4d66dcf65d17fc244d59efbc9f681f76a68c33779026a8754c51ba4cf01639affd54527538325989280d264b1faaf70ef8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c7e9546e66f7b7a12b9c3c90f755a95
SHA119f08a19e6475821b8b843346f7ba59d646b19dc
SHA2563051a72ae12c745fe7aa9ba8d29276c2802cdd66248ee3689af9108669bc6763
SHA512d4e5e5b90eae7d1b751dafffcaa0635a7398e717787141e87a9a676b821b42a8f4fd69d5e4b298bed312df20e60d53d518332442e371da8edbe92621fc17b5eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d978d082181601ecb3c59767e03cc14
SHA106dc2300075cd8c73b52da892625ec4064328815
SHA256a4f2fa34a7e0c5e91f8bc4df742949c661a63cf32e2b1000d3b9b9f788801aaf
SHA512710092425d63e26141f85f83a7e86f8e787edc2301f9a0963269a3e937b4a029931b39e19e37c5fabd3e9fc1aeea8526532a2f82e286d31fe7f9f5483e371331
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e50dcd9b099a524034c8010a2ca1b66d
SHA14a7404ee4d8904199d6da14d19d54476bdb51ebe
SHA256be35141a09ce6558ec40269e550407973f2e93a9e62ce19c254b39a8041e9b2f
SHA512856c23e217e962d404458079c51a98a20a9e6c0896f6fa44b60347716074842ed94f947b9bf12910787f18a9171a49178e4599b46cc7f3ab56aacec25807774e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555b65468a6a33f34de45b2a50ef70951
SHA105439e64ba4504c80b0b2f655ffbf8fac3903cf5
SHA256217a733fea86367e61f95dea13884af924d6801b1a0760f13ceed78d30b594bc
SHA51225aa46c4f8e0f333076b1a82d7ecee10974d53f474c662130e24a697421e5d53b57246bb518084e173ae94522debd63288645903f0e63d89f71a3934b17aadd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537ff9ce2a9e414ae146c918056780a0e
SHA14bbaae21f72c1b511a6a90b156eb93d0481c66c3
SHA256b7237f5545d1d12ebddb4d5a133221e9e9d3b321ecb0cde137523de1295a13e2
SHA512245d309154b71f377db5ed80daa47436b3fae6e0fe7dd3cf15f9cdd65af65767853b3a455bff170131bee04eb1699298e75f976b4328c1d1e04de958754b8ec2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57832f34f761e7dd8beea24af7c426962
SHA17f2edfb0abcc1dd2dc534dc74dc51cbd46118d0e
SHA2563c0498d5ba8ccfa213b4fbf5f9ea39f91b554a116ac6fb2b9c5e5a7973bced6d
SHA5123a15402a895402804925af1efd8edcf991a3fd5a4d4311c296aea52f4600a210c2d677d0ebb74e90879a0d0e11f720ba707dd4267f8f8c0fcdcb4893e6c02c78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc7aa84c3d48da3d39c3df0ee3fc8686
SHA17f14922063368fd3d9b7a9c21324a0fa92e3a7b7
SHA256190dfe2377f480ff2a8e1d9e0d1eae9b4bcb7996b86207daaaf11fe6c746b824
SHA5129363153f8d4f43dc990f17ff7516c8d472d6d6b45425686fe1aa8886d6ce3737c8a32736d5f853dc779c144a6ed35a79efca8b3e442f2fd7330dd0a03de8eda1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591649b29b8e4ec3ff8d74b1ec7fef011
SHA1d1488068354d16fed97d64b76b8f22ddf7fe6b9d
SHA256b4901b7d568b47f4d8bebdaca3127a9e8e09454bc742dabed8cd722d63422e7e
SHA5123aa81332166e53513f9b70fdbd174cd0cae1b1302d161b91cd25d1a2abc0a165e9eb8fee9cecf7188f8264ad4318c53b0678c4e1c4e2c7b5fbbf3fd6ef561165
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510317c0f5ed0e6a15f7fa9e589648e38
SHA198bc47886154ebfa5f2826a781fb438cd74010d7
SHA2563c076fd14dc6485ab7ecd5677eda72124b5ee73b9518c58a8f20bb03aeb22441
SHA51242861fe83d973ceae27c3810a91fc8b6a583a881f6e76f96600d264a9e3b1354c422eca84399550e8373ca09c741176f7464aae4856cde1ae588de0de5af60e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e711d5fc917cd661c324ea349cd2573
SHA121d82b31f5b0c1d542187d93cafedb6c5dfad564
SHA2569441eb7d52264d24c95acffd85dd10a633f55e12feed97312b77f57c6a7b0923
SHA512f06e2db06f699a57437000b2b39edee0c65c79021ce51a241dfe17c7f6b89d22bf051b58b4d09b4ca0a9adbbf5d74403bda1e5c1ca993b9a950c6577b74d8c3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5657bf3e9b5b4429baf1c8c539e6a256b
SHA1e5903a3312094ffef352cce84ef3c8de255ad2a3
SHA256e4007809a3c00107a1abddbacf2125b730d4e6aaee46b599a0ccdd3c87c098b7
SHA5128c66a10e39bd0e0b431249c06db0d9f75761c234df70dc8c46fc46397b3b8beb9d409154009d36fe30b54ef19d8e0060fc038d731bdf7c31f77442b8b0eb5b12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543b8d74e16f6dc677f59c5ae93fa40b9
SHA18e8d305bb725e389822befc9423183985e4f3c48
SHA256d67531f5258008265db89f01cc790412be362c0f1ea28c63ec22f6a5ad71e1eb
SHA5120ea25afa12bf5f0d3337ae9b142d1a24d80280ab565dc8f06e1151b307934c3d9bf5c9e7a0dcfff80ff9329c35f3081b7b3ba7d369bf2378f5e5fc5d4d61c4cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3d24f155c38c7d0013bb3f605aa65eb
SHA1d9bf0095de64d5b37c0978ed8a2a468aad3c7690
SHA256e6b265a89cd6566b196974b6383aed16018ae0e43daaa5db786ec60988fa0d6c
SHA512eee29ad61a6e7a7caf0fdd3e166053d54d1849676c2b85ce2e9d172fe32076d49980c1dc75c937e766a752bc1dc7b28169651747cc49fe20ea37b519c1df6581
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b