Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
16-06-2024 23:46
Static task
static1
Behavioral task
behavioral1
Sample
b5cfebbb450dd031bba49f41cb59c110_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b5cfebbb450dd031bba49f41cb59c110_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b5cfebbb450dd031bba49f41cb59c110_JaffaCakes118.html
-
Size
4KB
-
MD5
b5cfebbb450dd031bba49f41cb59c110
-
SHA1
5cc6827f5777562cdbc07ac795513c323d7bc24c
-
SHA256
f58a3338ceeab39ddc048a30a95a7f6ac463d560f4f774a47a52b500e9dca2ca
-
SHA512
e36e3b50a0f8747992cadee6e62bd6e165544a522d3f7d39edf45e0676074bce3904a7e48d301d10305118da538d2a0e7120eaf2d108bfc0c4c50e4f69012bf7
-
SSDEEP
96:1wd9hwVPcoGg/j5yntxI8vq/5K/u04XOLQpy/:6dbwWo1/j5sxI8vE4/uP+C4
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a03905000000000200000000001066000000010000200000000da7000892b399704242c72986396c22d8574f7ab502a4a11d1982be677810c6000000000e80000000020000200000000e39a9309672aa0fad93d1fd2a785dca4a7c4ee17e72f0a325f16b359392191f20000000b2e9a69d2e287fe9fb4cf32a8987e931483b10935eb11f50275d697c20b7e15c40000000806ba85cb382104bf8eb531151ce7b1594f4f3ca815d2c58192b0b7220b96697d2aa85ae285d7e00fb4ac59057d824f6ebb97ae050cd818eea3edfbfed73c4d3 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2074317447c0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9EB0F041-2C3A-11EF-9FC8-F6C75F509EE4} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424743443" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2916 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2916 iexplore.exe 2916 iexplore.exe 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2916 wrote to memory of 2428 2916 iexplore.exe 28 PID 2916 wrote to memory of 2428 2916 iexplore.exe 28 PID 2916 wrote to memory of 2428 2916 iexplore.exe 28 PID 2916 wrote to memory of 2428 2916 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b5cfebbb450dd031bba49f41cb59c110_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2916 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2428
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6edf069fb016d8356842f8fed180e9f
SHA113c365410189dad7118b8af461a427b6427cae69
SHA25603dcb5ca2bc675080d5bdfc940a9c4ea105c9c10bebe937cb94f79c5c45535f3
SHA512182da84f556be536ab5cf8015653e06a9ef4f11907cc89719d34d15735de9ce229b5f57bc1cfe021c5002a29b4b54a3627aa726f73e0961dd82605a1522b5cb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528b14ef93e47f3cd71b7026af47d7f73
SHA11f5cb445b964a364f0db9953b15a6f39fc46a8d9
SHA256ba90e82a3b0263a1fd2e4848594bd21812f2574e726a47713651bd0448a3bdfe
SHA512964b5ac501586ad58bb63a904f9bd42ca0ceefaa19754abb34313d4cf65618aa825eda9c3ed3315cd99c8cf88dc1165419fe536c173e7c02312af299ade03c21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a1e294e954f6efa0f3739790e8e4534
SHA1e23c8e49021b9670c7545b1f852470bc85a4ff6b
SHA25699c17d5486340ba801eca1d3d09b0238f64476728903abbdc7cf36fdc91c309a
SHA512ccdcd639b3545aa05856905cc78154bb7a68eb038b4d9d059f4669d7fca339bff6d8bc30b1b9afe88638144addf46ff603a975e148f919cd22fa25782f69b1fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557b65f8dd9353f1f3150fb960eb08c9e
SHA13119dcf182acdb602402150389f33cfb62bd1a15
SHA2564970abee3f867b705c5b965d809cbec97410fe5783031effdcc7c6b759766ed9
SHA512b74bfc5e5142e8cc3f170fce2d80bc85eed5ae91d8e9b9e3865bb68d77fa1695b0381282fe52f69ec3cde939814e69e9458f4be0c66252d8f554553e6a390f58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ca3dbab7866275b6bf34d8760791e41
SHA1438ccd8b9e13607e80b60dae39b60d03730bc076
SHA256b363ac3cfe1bca7bf8d920f3fa6d49ed014d6cd564d2d7521aa56b2cb8716046
SHA512789bbbf6316d8a9b7d3b630e53e5b7ab5110131874a239986621f5c539fe0bd89e1d0c7c04e8a21dd85c7b948faf2e7c6f223508a4ed6aecd44e72116df4be1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558b2c374cb10d1c8988c93a44e17e930
SHA17c330fad066d39fefac1c68ba98809dc82ed1781
SHA256b0dbdd4a204b028246de3067badec0d0d8c8162d7d61c0a87963b79893cc81ed
SHA5120b49d4c7753393a22b6384c437ad366cee018795eafc8b027fba39b6760aded6e4d87015ed01cfd0e346e5c4e1435d7a0080cbc2d9aa8a8313188889ac7b3a35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d49d4243664826f048d7ba90b3911b21
SHA17e3177d50ad4109adda4f9950ae1a8881f31a5d6
SHA2566a9b7cd11c49e61b852ab210e52cd74621381932d16b4f1758c1cd262da12920
SHA5122efa6a014069a079dd48e86324894d2ec670243f1980f475ab1d52bcad2c2893299c4770ce5e5131d2cc39855c3ac9268ffd74e442b8ffa4464bb42f5d509188
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b67ed448de403b69ccec7ac911454bc
SHA1048f708b613b2b0b9fe8be4c3b108f73f4da018e
SHA25638cd60f7c3399474acb1bb812b629e139a29e90d71052aed74285c9f46e8ccc1
SHA51229e0733a49cec250a7fddaddd1ec01c8eaf03efac733651680a46319d1e105ba74a22ea1d686a2087518eea9f16da40b6c5dce665aca7ab6c293c1165255419d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53446bd00e59ef1ff178dead9c35ebb85
SHA10861367174425a93333f76a5a0123e6af115c2bf
SHA256387a50d97d50dd1b1eeb2a64a472ac2adc67ba3a5520d1f26921db0c2837caa0
SHA5123090832934d262cf43bfebf3233c8a72b3c1e9662c3e16a6fc5ea5c1d7c84971ae04d9fba1f38435e807f42db1e13f0bad52a5d515f9044accfd2859b350a7c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567246cc7952bc21eb7d4e26cedcbb9f6
SHA1efa735160ce34cda76d6670453b7265d4cfadb68
SHA256e5e96bcb93c1f202f83a9e51b7fdb7655bf67479450f485bf5c1276b495a7209
SHA5125554f929c9d670f1af4830675beefe2a6d2732e0ce65cb7a93f3c0fcdd8bbd8bbecf6fc950e36b51dd5f6f957025c4b975f2a7d913c74b659b9118c12b560073
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f61004682fdc9050d210bd3cabfa925
SHA1063eaff1e60ff1ee7cdd22649dad6a6be7695eef
SHA256d7127bc66a2282df72f4b491ea8c43bf9747828cf3dd50f9cf1254eac5e34a20
SHA5124e0f97cb033bd6b60cafe699125f0523a92cdae646e79e71e1b1c6d06e01e46e572318cc6652d0e9ab118fc32548028156e80c69dda15ce1bd9d755cfe7c0e27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b7f338b9fe17706fb6c2d6b8185b017
SHA14eac590dcfa7e5788f5438a9517288d8e6ad4901
SHA256d36d12d5e165d4ab1673ddecafafb51fd4aa158c406cd995117111b57ff30ee2
SHA5120db1a3d757b134e3a8373d9a0685b1a0126133341ad7d2aaa597b9f0f6518f5ff561ba371b8268fc40ef44c3d7121effb6becb901393db6e6ff57677b129c716
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d566d65e8274a4f5f3b0fe4e221284f3
SHA1f6afd4a81854ad30b059bbe4271ba7ee603b620b
SHA256bcdc9559de9bd16b700ce54abc817d120de817843129df496436d53373b4b197
SHA512300729723758fb7e380dea7fbedf04fdf6151678dd676fe11151679c9558e5a718d623ab49434696fdac709e8ad25732ee1c27ec1a9e5aa9d7b0691b5d8fafce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581a6d3c7e0a966089b6aded037d9d7fe
SHA10480f6f282cef09fc44341f2b1c14d70fbe47b3c
SHA256e0f48bea3670985a8156a0a486134ef16b0a922186579f4181339d8a9f08180d
SHA512a6ab9d0ddbc74dc275af43286dedc0301cd47764b571f6b67018dd6de40a89901aa10370f043f80cd0d7c210c9ab0849f8c23241299361f6208d73b9c195407b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53047ff5a8f21cf9f94d815f78012d121
SHA18d731c6a585149fe2f25562d57515c72240721cb
SHA256a88b14d3df4df1bb00cd96c2cba843eecc89580c0b16f16e44a83678f1de1297
SHA512d76576525493bd89e037a0624215d3ccec6b4b71d53594e54a864f7cabde2da82b4bb2c195e7952fac1eb962d13c709be9dbf6208b98ac30081a6f5a27e9cb5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9417115846da5c9c40baa9e5024e99e
SHA110338936914b3de6d162fc29046dfa2022f702f4
SHA2567d9f3aad89330c2466f2f108708c08bdaa35439e6999ee1fbd3720fbbba4c6e5
SHA51245bbbb2f016893850d901e628043e3b52c0bfdef7fea6a783861a25b18de7c3aebefe3b372e07632385461471c82214a0681df278a648bb1faf16a2a3540d24d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d00e78a00effc4114307e6749593a239
SHA17dcc5fb9c9db27f7bf67bd50772bd647512add58
SHA2564c969bd1949946732dbafe54b92473cbea69998be5c5a36428a666e0cf9202b4
SHA5128bc15d335b7a964539546adf4f6428cd56c4d8503f414454e9c56af642164d4dd31738384049bd59cced6bb227d041b33c3d3c7e356e76ec8d749a38c723bcd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586fed4657d170f7f0564f4ea1e9485d4
SHA13b67cc244e06ba8bae52694018cbb3d3759f9eb8
SHA256dde7dbb6415d3904671fcd1d2a0c5f1f5f0ef49af57d5c7ee2d93249426ac9d8
SHA512612ca2c70b3f42a55a273c059cc03eeafea84c79b721cbbdf6f0515cf65d8913a48f04035f860cf4bf90a10f482f5be02d685fa52b92f6023cbf931e6eb9da3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5031d3febe4ce9761724b74077e928027
SHA1101fd4685178ef9f6d5d340c35d68e13d5283aa0
SHA2565bea0f16483754b64442d101cb82712846a624f6e412e3931f8b9ba6e703d1d8
SHA512bc141774e975f0d42169ca46d62f7d91b958300f5fe61f24ba8cad73aae9d7753f09481677f7f9e88bd06ab17abeb2d0717eaec1bd0a5749d6d5e63d0b70b53d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b0c85c3080c2b5a93c0a3004e28cd26
SHA1076afe2100d61bb8a9409ac354834c3dd64ae1c4
SHA256e224fb68dfe380ba017f1e2eed8187c22fd31c1c319dc25f38278db6df205559
SHA51267b08e6171f03364cf193cf42d097ad78811db988fdc559802dcdac5793b4d9bb40f19612052a96f5fb0a48e1de7a2cbe34b53ab5e79f8272f1bc5a52f855dfd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b